CN111199601A - Access control method and device, intelligent terminal, server and storage medium - Google Patents

Access control method and device, intelligent terminal, server and storage medium Download PDF

Info

Publication number
CN111199601A
CN111199601A CN201910831143.XA CN201910831143A CN111199601A CN 111199601 A CN111199601 A CN 111199601A CN 201910831143 A CN201910831143 A CN 201910831143A CN 111199601 A CN111199601 A CN 111199601A
Authority
CN
China
Prior art keywords
access control
access
target user
code
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910831143.XA
Other languages
Chinese (zh)
Other versions
CN111199601B (en
Inventor
文涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910831143.XA priority Critical patent/CN111199601B/en
Publication of CN111199601A publication Critical patent/CN111199601A/en
Application granted granted Critical
Publication of CN111199601B publication Critical patent/CN111199601B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/0042Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
    • G07C2009/00428Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed periodically after a time period
    • G07C2009/0046Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed periodically after a time period randomly

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention discloses an access control method, an access control device, an intelligent terminal, a server and a storage medium, wherein the method comprises the following steps: receiving an access control authentication request sent by a target user terminal, wherein the access control authentication request comprises identification information and a destination address of a target user; and acquiring an access control equipment set associated with the identification information and the destination address, generating a unique opening code based on each access control equipment in the access control equipment set, sending the opening code to the target user terminal, and generating a graphic code based on the opening code by the target user terminal, wherein the graphic code is used for access control. The graphic code can be dynamically generated based on the identification information and the destination address of the user, so that the random generation of the graphic code is ensured, and the safety of an access control area can be improved.

Description

Access control method and device, intelligent terminal, server and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for controlling an access control, an intelligent terminal, a server, and a storage medium.
Background
With the aging of access control technology and the continuous improvement of terminal technology, the traditional method for using an access control card to access the access control card gradually exits the market, and the electronic access control technology is used for access control authentication instead. When the currently adopted electronic access control technology is used for access control authentication, a method of issuing a two-dimensional code for a user based on address information of the user is adopted, the user can open any access control equipment in an access control area based on the fixed two-dimensional code, and therefore the risk that illegal personnel enter the access control area exists when the two-dimensional code of the user is lost by adopting the currently adopted electronic access control technology. How to use the electronic access control technology and ensure the security of the access control area becomes a current research hotspot.
Disclosure of Invention
The embodiment of the invention provides an access control method, an access control device, a server and a storage medium, which can realize random generation of graphic codes and improve the security of an access area.
In one aspect, an embodiment of the present invention provides an access control method, where the method includes:
receiving an access control authentication request sent by a target user terminal, wherein the access control authentication request comprises identification information and a destination address of a target user;
acquiring an access control equipment set associated with the identification information and the destination address, and generating a unique opening code based on each access control equipment in the access control equipment set;
and sending the door opening code to the target user terminal, wherein the target user terminal generates a graphic code based on the door opening code, and the graphic code is used for carrying out access control.
In another aspect, an embodiment of the present invention provides an access control apparatus, where the apparatus includes:
the system comprises a receiving unit, a processing unit and a processing unit, wherein the receiving unit is used for receiving an access control authentication request sent by a target user terminal, and the access control authentication request comprises identification information and a destination address of a target user;
the acquisition unit is used for acquiring an access control equipment set associated with the identification information and the destination address and generating a unique opening code based on each access control equipment in the access control equipment set;
and the sending unit is used for sending the door opening code to the target user terminal, and the target user terminal generates a graphic code based on the door opening code, wherein the graphic code is used for carrying out access control.
In another aspect, an embodiment of the present invention provides an access control method, where the method includes:
sending an access control authentication request to a control server so that the control server acquires an access control equipment set associated with identification information and a destination address included in the access control authentication request;
receiving an opening code sent by the control server, wherein the opening code is a unique opening code generated by the control server based on each access control device in the access control device set;
and generating a graphic code based on the door opening code, and displaying the graphic code on a user interface, wherein the graphic code is used for controlling the access control.
In another aspect, an embodiment of the present invention provides an access control apparatus, where the apparatus includes:
the access control system comprises a sending unit, a receiving unit and a processing unit, wherein the sending unit is used for sending an access control authentication request to a control server so that the control server can acquire an access control equipment set associated with identification information and a destination address included in the access control authentication request;
the receiving unit is used for receiving an opening code sent by the control server, wherein the opening code is a unique opening code generated by the control server based on each access control device in the access control device set;
the generating unit is used for generating a graphic code based on the door opening code;
and the display unit is used for displaying the graphic code on a user interface, and the graphic code is used for carrying out access control.
In yet another aspect, an embodiment of the present invention provides a server, including a processor, a memory, and a communication interface, where the processor, the memory, and the communication interface are connected to each other, where the memory is used to store computer program instructions, and the processor is configured to execute the program instructions to perform the method according to the first aspect.
In a further aspect, an embodiment of the present invention provides an intelligent terminal, including a processor, an input device, an output device, and a memory, where the processor, the input device, the output device, and the memory are connected to each other, where the memory is used to store a computer program that supports the terminal to execute the method described above, and the computer program includes program instructions, and the processor is configured to call the program instructions to execute the method described in the third aspect.
In another aspect, an embodiment of the present invention provides a computer-readable storage medium, where a first computer program instruction and a second computer program instruction are stored in the computer-readable storage medium, where the first computer program instruction is used to execute the access control method according to the first aspect when executed by a processor, and the second computer program instruction is used to execute the access control method according to the third aspect when executed by the processor.
In the embodiment of the present invention, when there is a need to open a door access device in a door restricted area, a target user terminal may send a door access authentication request to a control server, and the control server may receive the door access authentication request sent by the target user terminal, thereby obtaining a door access device set associated with the identification information, and obtaining a door opening code for checking each door access device in the door access device set, further, the control server generates a notification message according to the door opening code, and sends the notification message to the target user terminal, and after receiving the notification message sent by the control server, the target user terminal may generate a graphic code based on the door opening code, and displays the graphic code on a user interface, so that the target user may display the graphic code displayed on the user interface to a camera of any door access device in the door access device set, the camera of any access control device can scan the graphic code to obtain decoding information for checking the access code, when the check is passed, the access control device can be opened to allow the target user to pass, intelligent control over the access control device is realized, accuracy of user authority management in an access control area can be effectively improved, and the control server can randomly generate the graphic code based on identification information and a destination address of the target user, so that safety of the user in the access control area can be improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic diagram of an access control system according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of an access control method according to an embodiment of the present invention;
fig. 3 is a schematic flow chart of an access control method according to another embodiment of the present invention;
FIG. 4a is a diagram of a user interface for selecting identification information according to an embodiment of the present invention;
FIG. 4b is a diagram of a user interface for prompting messages according to an embodiment of the present invention;
FIG. 4c is a diagram of a graphical code output user interface according to an embodiment of the present invention;
fig. 5 is a schematic flow chart of an access control method according to another embodiment of the present invention;
fig. 6 is a schematic block diagram of an access control device according to an embodiment of the present invention;
fig. 7 is a schematic block diagram of an access control apparatus according to another embodiment of the present invention;
FIG. 8 is a schematic block diagram of a server provided by an embodiment of the present invention;
fig. 9 is a schematic block diagram of an intelligent terminal according to an embodiment of the present invention.
Detailed Description
The embodiment of the invention provides an access control method, which is used for controlling each access control device in an access restricted area so as to realize intelligent control of the access control device (or an access control machine), wherein each access control device in the access restricted area can be controlled through an access control platform, the access control platform comprises the access control device and an encryption device, the encryption device can generate a unique access code based on the device information of one or more access control devices, the access code is an encrypted encryption code, and the access code is used for verifying any access control device in the one or more access control devices and opening the verified access control device when the verification is passed.
In one embodiment, see the access control system shown in fig. 1, the access control system includes at least one user terminal 10, a control server 11 and an access control platform 12, and the access control platform includes at least one access device 120 and an encryption device 121. When a target user has a need of opening an access control device in a door forbidden area, a destination address for indicating an address of the target user can be selected through a user interface of a target user terminal, so that an access control authentication request can be generated based on the destination address of the target user and identification information of the target user, and the generated access control authentication request is sent to the control server 11 through the target user terminal, so that the control server 11 can determine an access control device set associated with the identification information and the destination address based on the access control authentication request after receiving the access control authentication request, wherein the target user terminal is any one of the user terminals 10, such as the terminal 101.
After the control server 11 determines the access control device set associated with the identification information and the destination address based on the access control authentication request, the control server 11 may obtain an access code for checking any access control device in the access control device set from the access control platform 12. In an embodiment, the control server 11 may determine the address of the target user based on the destination address, and based on the current position of the target user terminal 101 and the address of the target user, the control server 11 may obtain all the access control devices passing through from the current position to the address of the target user (i.e., the destination address) from the access control device 120, so that all the passing access control devices may be used as the access control device set associated with the identification information and the destination address. Further, the control server 11 may obtain the device information of each access control device in the access control device set, and send the obtained device information of each access control device to the encryption device 121, so that the encryption device 121 generates the door opening code based on the device information of each access control device. The device information of the access control device may be, for example, an Identity (ID) code corresponding to the access control device, and the control server 11 stores the device information corresponding to each access control device in advance.
In an embodiment, when the door opening code is generated based on the device information of the access control device, the encryption device 121 may directly generate the door opening code based on the device information, and may further acquire the timestamp information, so that the door opening code may be generated by combining the device information and the timestamp information of the access control device, the door opening code generated by combining the timestamp has real-time performance, different door opening codes generated in real time, so that the graphic code generated based on the door opening code has more security, and the security problem caused by the leakage of the two-dimensional code can be effectively avoided. Meanwhile, the graphic code generated based on the door opening code also has timeliness, the accuracy of authority management of users entering and exiting the access control range can be improved based on the timeliness, and the management safety in the access control range is improved. Alternatively, the encryption device 121 may also set a use number limit or a use time limit to an open code directly generated by the device information, so as to improve the management security within the access control range.
After encryption equipment 121 generates the door opening code, can directly send the door opening code to control server 11, also can will the door opening code is included in the notice message, and will the notice message is sent to control server 11 receives after the door opening code, can with the door opening code returns and gives target user terminal 101, target user terminal 101 then can be based on the door opening code generates the figure code to show in user interface the figure code, so that pass through access control platform 12 is right each entrance guard equipment in the entrance guard equipment set carries out entrance guard authentication respectively, and when entrance guard control platform 12 confirms that entrance guard authentication passes, opens the entrance guard equipment that the entrance guard authentication passes. The graphic code may be, for example, a two-dimensional code or a barcode. In an embodiment, the target user terminal 101 may scan the graphic code displayed in the user interface through a camera of any access control device in the access control set, the access control device 120 may decode the graphic code to obtain corresponding decryption information, and further, the access control device 120 may check the access code based on the decryption information, and open the access control device when the check is passed.
In an embodiment, the access control platform 12 may determine, in advance, an encryption and decryption rule for encrypting the device information of the access device, and correspondingly issue the determined encryption and decryption rule to the access device 120 and the encryption device 121, so that after the encryption device 121 encrypts the device information of the access device through the encryption rule to obtain the access code, the access device 120 may decrypt the graphic code generated by the access code based on the corresponding decryption rule to obtain correct decryption information, so that the access code may be verified through the obtained decryption information to determine whether the access device is opened. The encryption and decryption rule may be, for example, an information-Digest Algorithm (MD 5) encryption and decryption rule, or a hash encryption and decryption rule.
Referring to fig. 2, a flowchart of an access control method according to an embodiment of the present invention is shown, and as shown in fig. 2, the method includes:
s201, the target user terminal sends an entrance guard authentication request to the control server.
In one embodiment, the target user terminal may generate an access control authentication request based on identification information of a target user and a destination address, and include the identification information and the destination address in the access control authentication request, so that the control server obtains an access control device set associated with the identification information included in the access control authentication request and the destination address. When detecting that a target user opens a user interface for performing access authentication service, the target user terminal may output a receiving window on the user interface, so that identification information of the target user and a destination address of the target user for desiring to arrive may be determined based on input of the target user on the receiving window, or, when detecting that the target user opens the user interface for performing access authentication service, the target user terminal may output an address information list within a current access range to the user interface, so that the target user may select the destination address of the target user from the address information list.
In one embodiment, the identification information includes user information of the target user, which may include, for example, an identification number of the target user, and information such as a registered contact telephone of the target user, the destination address is used for describing a target position which the target user desires to reach, the identification information can be A-5-12-3, the target position for representing the target user to desire to reach is A unit 5, 12 building 3 house, or the identification information may also be, for example, north 3-5, which is used to indicate that the target location that the target user desires to reach is door No. 5 of the north 3 area, in the embodiment of the present invention, the storage form of the identification information in the control server or the user terminal is not limited, and the identification information can be stored in a list or directly stored in a database. After the target user terminal sends an access authentication request to the control server, the control server executes step S202.
And S202, the control server receives an access control authentication request sent by a target user terminal.
In an embodiment of the present invention, a target user terminal and a control server may establish a communication connection in advance, where the communication connection may be automatically established with the control server when the target user terminal opens a user interface for performing access authentication service, or may be automatically established with the control server when the target user terminal sends the access authentication request to the control server, and the target user terminal may also maintain a communication connection with the control server all the time.
The access control authentication request received by the control server includes identification information and a destination address of a target user, so that the control server can analyze the access control authentication request after receiving the access control authentication request to obtain the identification information and the destination address of the target user included in the access control authentication request, and further, the control server can determine whether the target user has an authority to open the access control device according to the identification information, and can determine a target position that the target user desires to reach based on the destination address when determining that the target user has the authority, so that step S203 can be executed.
S203, the control server acquires the entrance guard equipment set associated with the identification information and the destination address, and generates a unique opening code based on each entrance guard equipment in the entrance guard equipment set.
After the control server receives the access control authentication request and determines the target position which the target user expects to reach and is indicated by the destination address of the target user based on the access control authentication request, the control server can acquire the access control equipment set associated with the identification information and the destination address. Specifically, the control server may obtain a current location of the target user terminal, and may determine, based on the current location and the target location, one or more access control devices that the target user needs to pass through when reaching the target location, so that the determined one or more access control devices may be used as an access control device set associated with the identification information and the destination address.
In an embodiment, when determining one or more access control devices that the target user needs to pass through when reaching the target location, the control server may determine at least one route through which the target user reaches the target location, so as to determine the access control devices that are passed by each route, and further, may use all the access control devices that are passed by each route as the access control device set. For example, if the control server determines that the target user can reach the target position according to a path a and a path B, where the access control devices on the path a include devices with device numbers 1 and 2, and the access control devices on the path B include devices with device numbers 1 and 3, the access control device set determined by the control server includes devices with device numbers 1, 2, and 3. The device number corresponds to the ID code of the access control device one to one, and any access control device is distinguished from other access control devices.
In an embodiment, when determining the access control device set associated with the identification information, after determining at least one path through which the target user reaches the target location, the control server may select any path from the at least one path as the target path, or select a path with the shortest route through the access control device from the at least one path as the target path, and further may use the access control device through which the target path passes as the access control device set, and send the determined target path to the target user terminal, so as to remind the target user of reaching the target location indicated by the destination address based on the target path.
In an embodiment, the control server can determine the device information of each access control device in the access control device set after determining the access control device set, and further, the control server can send the device information of each access control device to the encryption device, so that the encryption device can encrypt the device information of each access control device according to a preset encryption rule to obtain an opening code, thereby being capable of acquiring the opening code from the encryption device to verify each access control device in the access control device set. The preset encryption rule may be, for example, an MD5 algorithm, or a hash algorithm, and when the encryption device encrypts the device information of each access control device in the access control device set according to the preset encryption rule, the encryption device may first generate an authentication string based on the device information of each access control device in the access control device set, so as to encrypt the authentication string and obtain the corresponding access code. For example, if the access control device set determined by the control server is devices with device numbers 1, 2, and 3, after the control server determines ID codes corresponding to the devices with device numbers 1, 2, and 3 in the access control device set, the ID codes corresponding to the devices with device numbers 1, 2, and 3 may be sent to the encryption device, and the encryption device may generate corresponding authentication character strings based on the ID codes corresponding to the devices with device numbers 1, 2, and 3, and encrypt the authentication character strings to obtain the access codes.
When the control server encrypts the equipment information of each access control equipment to obtain the door opening code, the control server can also refer to the timestamp information at the same time, so that a unique door opening code with certain timeliness is obtained according to the timestamp information, and further, the target user terminal can generate a graphic code with timeliness. After the control server determines the door opening code of the door opening instruction for each door access device in the set of door access devices, step S204 may be executed.
S204, the control server sends the door opening code to the target user terminal.
In one embodiment, after generating the door opening code, the control server may send the door opening code to a target user terminal, so that the target user terminal generates a graphic code based on the door opening code, where the graphic code is used for performing door opening control according to a door opening instruction, where the door opening instruction is generated when the target user terminal displays the graphic code on a user interface and performs code scanning operation through a camera of a door access device. After determining the door opening code used for checking each door access device in the door access device set, the control server can also directly include the door opening code in a notification message, and send the notification message including the door opening code to the target user terminal, so that the target user terminal can determine the door opening code based on the notification message after receiving the notification message, and a graphic code can be generated according to the door opening code.
In an embodiment, the control server may generate the same notification message based on different opening codes, or may generate different notification messages based on different opening codes, and after the control server sends the opening codes to the target user terminal, the target user terminal may perform step S205.
S205, the target user terminal receives the door opening code sent by the control server.
S206, the target user terminal receives the graphic code generated based on the door opening code and displays the graphic code on a user interface.
In steps S205 and S206, after receiving the notification message sent by the control server, the target user terminal may determine, based on the notification message, an access code for verifying each access control device in the access control device set, and further, the target user terminal may generate a graphic code based on the access code, and display the graphic code in a user interface, so that the target user may display the graphic code displayed in the user interface in the access control device, so that the access control device may scan the graphic code through a camera, and decrypt the scanned graphic code according to a preset decryption rule to obtain decryption information corresponding to the graphic code, so that the access control device may verify the access code based on the decryption information, and open the access control device when the verification passes.
In an embodiment, the target user terminal may process the access code based on a preset graphic code generation algorithm to obtain a corresponding graphic code, and the target user terminal may use the generated same graphic code to check each access device in the access device set, so that when the target user arrives at the target position indicated by the destination address from the current position corresponding to the target user terminal, one person and one way of the graphic code are realized. In the embodiment of the present invention, the graphic code generated by the target user terminal based on the open code remains unchanged in the process from the current position to the target position of the target user, that is, the target user can open each access control device in the access control device set from the current position to the destination address based on a unique graphic code generated by the open code, so that one person can have one graphic code at a time. For example, if the access control device set determined by the control server based on the identification information of the target user and the destination address includes devices with device numbers 1, 2, and 3, and if the opening code generated based on the device information of each access control device in the access control device set is sent to the target user terminal, and the graphic code generated by the target user terminal based on the opening code is shown in fig. 4c, the target user can open the access control devices with device numbers 1, 2, and 3 based on the graphic code shown in fig. 4c in the process from the current position to the destination position indicated by the destination address, so as to reach the destination address. The randomly generated graphic code is kept unchanged in the process that the target user reaches the destination address, so that the convenience of the target user in the access control process is improved, and in addition, other access control equipment cannot be opened according to the graphic code generated by the identification information of the user and the destination address, for example, the access control equipment with the equipment number of 4 cannot be opened by the graphic code generated based on the identification information of the target user and the destination address, so that the safety of the user in the access control area can be effectively improved.
In one embodiment, the opening code used for generating the graphic code may further refer to timestamp information, so that the graphic code may further have timeliness, where timeliness of the graphic code means that the graphic code automatically fails after a preset time period elapses after the graphic code is generated, or the timeliness of the graphic code may also mean that the image code automatically fails after a preset number of times of use elapses after the image code is generated. The preset number of use times can be determined based on the number of the determined access control devices in the access control device set, when the number of the determined access control devices is 3, the control terminal can indicate that the number of use times corresponding to the graphic code for checking each access control device in the access control device set is 3, namely, after the target user uses the graphic code for 3 times of checking, the graphic code automatically fails, wherein the safety problem caused by leakage of the graphic code can be effectively avoided based on the timeliness of the graphic code, and the graphic code can be a two-dimensional code or a bar code and the like. In one embodiment, the preset time period for the failure of the graphic code is greater than or equal to the time from the current position to the destination address when the target user directly arrives at the destination address, and if the graphic code fails before the target user arrives at the destination address, the target user may send an access authentication request to the control server through the target user terminal again to obtain the graphic code for access control again.
In one embodiment, the preset encryption rule for encrypting the device information of each access control device in the access control device set and the preset decryption rule for decrypting the graphic code are rules predetermined and corresponding to the encryption device and the access control device, and the predetermined rules are used for describing the preset encryption rule, the preset decryption rule, the secret key, the verification logic, and the like. The encryption equipment and the access control equipment can realize off-line encryption processing or decryption processing according to the preset encryption rule or the preset decryption rule, so that the access control efficiency of the access control equipment can be improved. Furthermore, after the access control device and the encryption device are connected to the internet, the predetermined encryption and decryption rules can be updated, and the secret key can be updated according to the preset update cycle, so that the safety of controlling each access control device in the access control area can be further improved.
In the embodiment of the invention, when the target user terminal has a requirement for opening the access control equipment in the access control area, the target user terminal can send an access control authentication request to the control server, and the control server can receive the access control authentication request sent by the target user terminal, so that an access control equipment set associated with the identification information and the destination address of the target user is obtained, and an access code for checking each access control equipment in the access control equipment set is obtained. Further, the control server may send the access code to the target user terminal, after receiving the access code sent by the control server, the target user terminal may generate a graphic code based on the access code, and display the graphic code on a user interface, so that the target user may display the graphic code displayed on the user interface to a camera of any access device in the access device set, the camera of any access device may scan the graphic code to obtain decoding information for checking the access code, when the check passes, any access device may be opened to allow the target user to pass, thereby achieving intelligent control over the access device, the access code generated based on the identification information and the destination address may effectively improve accuracy of user right management in the access area, because the generated access code has randomness, the safety of users in the entrance guard area can be improved.
Referring to fig. 3, a flowchart of an access control method according to another embodiment of the present invention is shown, and as shown in fig. 3, the method includes:
s301, the target user terminal sends an address information acquisition instruction to the control server, wherein the address information acquisition instruction is used for acquiring address information associated with each access control device in the access control area.
In an embodiment, before the target user terminal sends the address information obtaining instruction to the control server, the control server may first obtain address information associated with each access control device in the access control area, and pre-store the address information in the database, where the address information associated with the access control device means that when the control server stores the address information, a corresponding relationship between each access control device and the address information is determined based on the location information of each access control device in the access control area. The system comprises a plurality of access control areas, address information and identification information, wherein the address information is used for indicating a target position which a user expects to reach, when the access control area is a residential area, the identification information comprises address information of the user, when the access control area is a park area, the identification information comprises office position information and the like of workers, and when the access control areas are different, the address information can comprise different target position information which is used for indicating the target user expects to reach.
In one embodiment, a developer may first record address information of each user in an entrance guard area in a control server, and when the entrance guard area is a residential area, the address information of each user in the residential area is recorded in the control server, and the control server may further determine an association relationship between each address information and an entrance guard device based on position information of each entrance guard device in the entrance guard area, and based on the association relationship, identification information of each user (i.e., user information of the user), and address information corresponding to each user, the control server may obtain address information associated with each entrance guard device, where the identification information associated with any entrance guard device includes one or more.
After the control server acquires the address information associated with each access control device, if an identification information acquisition instruction sent by a target user terminal to the control server is received, an address information list can be generated based on the address information associated with each access control device, the address information list can include the address information associated with any access control device in the door forbidden area, further, the control server can send the address information list to the target user terminal and display the address information list to a user interface, so that the target user can be registered according to the address information selected by the target user terminal in the user interface. In an embodiment, when the control server performs registration processing on the target user, the control server further needs to acquire identification information of the target user (that is, user information of the target user), so that registration processing may be performed on the target user based on the identification information of the target user and address information selected by the target user, so that when receiving an access authentication request sent by the target user, it may be determined that the access authentication request of the target user is verified based on the information registered by the target user, and when determining that the target user is a registered user, the control authentication request is received, and a corresponding access code is sent to a terminal corresponding to the target user, so that the target user terminal generates a graphic code for performing access control based on the access code.
In an embodiment, when there is a need for access control, the target user terminal may first send an address information obtaining instruction to the control server, so as to obtain all address information in the access area, and then execute step S302.
S302, the target user terminal receives the address information list sent by the control server and displays the address information associated with the target user on a user interface.
In an embodiment, after receiving an address information list sent by the control server, a target user terminal may screen address information related to a target user from the address information list and display the address information to a user interface, where the address information related to the target user refers to address information that is registered by the target user in the control server in advance, the address information displayed on the user interface and related to the target user may be as shown in fig. 4a, and the target user may select, from the displayed address information, address information corresponding to a target address that the target user desires to reach, such as selectable address information: after the target user selects the address information, cell a 1/1 unit 101 sends an access authentication request to the control server based on the address information selected by the target user, that is, proceeds to step S303.
In one embodiment, before the target terminal sends the access authentication request to the control server based on the address information selected by the target user, prompt information is output on a user interface to ensure that the user does not leak the graphic code, and when the target user terminal receives a confirmation operation of the target user, the operation of sending the access authentication request to the control server is triggered to be executed, wherein the confirmation operation of the target user may be a selection operation of a confirmation key, for example. The prompt information output on the user interface may be as shown in fig. 4b, and the confirmation operation of the corresponding target user may be, for example, a selection operation of a "good" key.
And S303, the target user terminal sends an entrance guard authentication request to the control server.
S304, the control server receives an entrance guard authentication request sent by a target user terminal, wherein the entrance guard authentication request comprises identification information and a destination address of a target user.
In an embodiment, the detailed implementation of step S303 and step S304 can refer to the descriptions of step S201 and step S202 in the above embodiments, and are not described herein again.
S305, the control server acquires the access control equipment set associated with the identification information and the destination address, and generates a unique opening code based on each access control equipment in the access control equipment set.
S306, the control server sends the door opening code to the target user terminal.
In steps S305 and S306, when the control server obtains the set of access control devices associated with the identification information and the destination address, at least one access control device that passes through from outside the access control area to the destination location indicated by the destination address may be determined, where the control server may determine at least one route from outside the access control area to the destination location, so as to determine an access control device on any route in the at least one route, and further, the access control device on each route may be used as at least one access control device that passes through from outside the access control area to the destination location. After the control server determines at least one access control device, the determined at least one access control device can be used as an access control device set associated with the identification information.
When the control server acquires the door opening code used for checking each access control device in the access control device set, the equipment information of each access control device in the access control device set can be sent to the access control platform, and the access control platform is used for controlling each access control device in the restricted area. Specifically, entrance guard's control platform includes entrance guard's equipment and encryption equipment, control server can with the equipment information of each entrance guard's equipment sends entrance guard's control platform's encryption equipment receives behind the equipment information of each entrance guard's equipment, can receive encryption equipment is based on the code of opening door that the equipment information of each entrance guard's equipment generated, it is right to open a door the code is used for each entrance guard's equipment carries out the check-up. In one embodiment, the encryption device may process device information of all the access control devices to generate a corresponding one of the opening codes, where the opening code may be, for example, an encryption character string. Further, the control server may directly send the generated access code to the target user terminal, or may send a notification message to the target user terminal after generating the notification message according to the access code, so that the target user terminal generates the graphic code based on the access code, that is, the target user terminal may perform step S307 and step S308.
S307, the target user terminal receives the door opening code sent by the control server.
And S308, the target user terminal generates a graphic code based on the door opening code and displays the graphic code on a user interface, wherein the graphic code is used for controlling the door access.
In steps S307 and S308, after receiving the notification message sent by the control server, the target user terminal may analyze the notification message to obtain an open code generated by the control server based on each access control device, and may generate a graphic code based on the open code and display the graphic code in a user interface, so that any access control device in the access control device set decodes the graphic code to obtain decryption information, verifies the open code based on the decryption information, determines whether any access control device passes the authentication code, and opens any access control device when the access control device passes the authentication code. In an embodiment, the graphic code displayed on the user interface by the target user terminal may be a two-dimensional code as shown in fig. 4c, and the user may display the two-dimensional code on the access control device for scanning, and if the decoded information obtained by scanning and decoding checks the access control code, and it is determined that the check is passed, the access control device is opened. After the access control equipment receives the scanning information of the graphic code and opens the corresponding access control equipment, failure processing can be carried out on the graphic code, so that the safety of the access control area can be ensured under the condition that the graphic code leaks, if the graphic code leaks before failure, the source of leakage can be determined based on the graphic code because the graphic code is generated based on the identification information of a user, the leakage factor can be found, and subsequent graphic code leakage can be avoided.
The method comprises the steps that a target user terminal can output a visitor reservation key while displaying a graphic code in a user interface, invite a family key and an owner card key, and when a click instruction of the visitor reservation key is detected, the target user terminal can receive visitor information of a visitor input by a target user, and further can send the visitor information of the visitor to a control server, so that the control server can generate registration information of the visitor based on the visitor information and store the registration information in the registration information; wherein the visitor information includes a visiting time and identification information of a visiting user.
When a visiting user performs access control, the control server can receive an access request sent by a visiting user terminal, wherein the access request comprises registration information requesting access, and the registration information comprises visiting time and an access address of the visiting user; further, the control server may determine whether the registration information exists in registration information stored in advance; if so, acquiring an access equipment set associated with the access address of the access user, determining an access opening code, and sending the determined access opening code to the access user terminal, wherein the access opening code is used for verifying each access equipment in the access equipment set associated with the access address of the access user. In an embodiment, the target user terminal may further output a family invitation key, and based on the family invitation key, the family or the tenant may be invited to perform user registration, so as to subsequently obtain a graphic code for performing access control. The target user terminal may further output a my owner card key, and when a selection instruction of the target user for the my owner card key is detected, may jump to the user interface as shown in fig. 4a, and display address information associated with the target user in the user interface.
In the embodiment of the present invention, a target user terminal may first send an address information acquisition instruction to a control server, further, after the target user terminal receives an address information list sent by the control server, and after a user interface displays address information associated with the target user, based on a user selection operation on the address information in the user interface, the target user terminal may send an access authentication request to the control server, based on the access authentication request, the control server may acquire an access device set associated with the address information and acquire an access code for verifying each access device in the access device set, so that the access code may be sent to the target user terminal, and after the target user terminal receives the access code sent by the control server, a graphic code may be generated based on the access code, and the graphic code is displayed on a user interface so as to realize the control of the access control equipment in the access control equipment set, effectively improve the safety of each user in the access control area and ensure the effective supervision of the personnel flow in the access control area.
In an embodiment, reference may be made to an access control method shown in fig. 5, where the access control method may be applied to an access control system shown in fig. 1, and includes a target user terminal, an access control device, a control server, and an encryption device. The developer may store in advance the destination address of each user, the access control device corresponding to each destination address, and the device information of each access control device in the control server based on the association between the address information and the access control device. The target user can send an address information acquisition instruction to the control server through the target user terminal so as to acquire the address information associated with the target user, and the control server returns the address information associated with the target user after receiving the address information acquisition instruction. Further, the target user may select address information from the returned address information to request a graphic code for access control. When the target user terminal requests to perform the access control graphic code, an access authentication request can be sent to the control server based on the address information selected by the target user, wherein the access authentication request comprises the address information selected by the target user.
After receiving an access authentication request sent by a target user terminal, a control server may check whether the target user has an access control authority of selecting the address information, that is, the control server needs to determine whether the target user is a pre-registered user, in one embodiment, the control server may determine whether the target user is a registered user by determining whether identification information of the target user is included in user information of the registered user, if so, the control server determines whether a destination address of the target user requesting access authentication is always identical to the registered address information, and if so, determines that the target user has an access control authority of controlling access equipment associated with the address information. After the control server determines the access control authority of the target user, the access control equipment set associated with the destination address included in the access control authentication request can be determined, and the equipment information corresponding to each access control equipment in the access control equipment set can be obtained. In one embodiment, where the access area is a residential area, the device information may be, for example, one or more of a gate, a building door, or a unit door of the access area.
After the control server acquires the equipment information of each access control equipment in the access control equipment set, the equipment information can be sent to the encryption equipment, the encryption equipment can generate an encryption character string based on the equipment information of each access control equipment, and the encryption character string is encrypted to generate an opening code. In an embodiment, when the encryption device generates the door opening code based on the device information sent by the control server, further, the encryption device may combine the identification information included in the sent access authentication request, so that even if the users on the same path are different, the generated door opening codes are different due to different corresponding identification information, and further, when the user terminal generates the graphic code based on the door opening code, the user terminal may obtain different graphic codes. For example, when the access control area is a residential area, the paths determined by the control server according to the identification information of the cell 1/1 unit 101 and the cell 1/1 unit 102 are the same path, and the access control device sets determined based on the identification information are also the same, so that if the encryption device generates an access code based on the device information of each access control device in the access control device set, the same two-dimensional code is generated based on the different identification information without referring to the identification information, and the same graphic code is generated correspondingly at the user terminal, the user authority cannot be finely managed, so that the user who opens the access control device cannot be traced back according to the access record when a security problem occurs, thereby affecting the security of the user.
In one embodiment, in order to distinguish the control states of different users in the same path on the access control devices, when the encryption device generates an opening code based on the device information of each access control device in the access control device set, the identification information can be further referred to, so that when the access control equipment encrypts the identification information and the equipment information to generate an open code due to different identification information of users in the same path, the obtained door opening codes for performing door access control on each user are different, the accuracy of user authority management is improved, meanwhile, based on the record of the access control device after each opening, the control dynamic of each user on the access control device can be inquired, and the user corresponding to the opening of the access control device can be determined when the safety problem occurs, therefore, the source of the safety problem is accurately positioned, the safety problem can be treated from the source, and the safety of users in an access control area is ensured.
In one embodiment, when the encryption device generates the opening code based on the device information of each access control device, since only the information of the access control device is concerned, the exposure of the user information can be avoided. After the encryption equipment determines the door opening code, the generated door opening code can be returned to the control server, the control server further sends the door opening code to the target user terminal, the target user terminal can generate the graphic code based on the received door opening code and display the generated graphic code on a user interface, and the target user terminal is only used for generating the graphic code and does not relate to the encryption and decryption processes, so that the method can be suitable for different encryption and decryption access control equipment. In one embodiment, after the target user terminal displays the graphic code on a user interface, a user can scan the graphic code through the access control equipment, the access control equipment can decrypt offline to obtain decryption information after acquiring the information in the graphic code, and check the access code through the decryption information, if the verification is passed, the access control equipment is opened, because the access control equipment and the encryption equipment can perform encryption and decryption processes based on offline, the safety of an access control management area is improved, and the access control equipment can upload an opening record after scanning the code at every time, so that a manager can know the opening state at any time, and can trace back the opening record uploaded by the access control equipment to a source of safety problem occurrence after the safety problem occurs, thereby realizing intelligent and safe management of each access control equipment in the access control area.
Based on the description of the embodiment of the access control method, an embodiment of the present invention further provides an access control device, which may be a computer program (including a program code) running in the control server. Referring to fig. 6, the access control device may include: a receiving unit 601, an acquiring unit 602, and a transmitting unit 603.
A receiving unit 601, configured to receive an access authentication request sent by a target user terminal, where the access authentication request includes identification information and a destination address of a target user;
an obtaining unit 602, configured to obtain an access control device set associated with the identification information and the destination address, and generate a unique opening code based on each access control device in the access control device set;
a sending unit 603, configured to send the door opening code to the target user terminal, where the target user terminal generates a graphic code based on the door opening code, and the graphic code is used for performing access control.
In one embodiment, the apparatus further comprises: a registration unit 604.
The obtaining unit 602 is further configured to obtain address information associated with each access control device in the access control area;
the receiving unit 601 is further configured to receive an address information obtaining instruction sent by the target user terminal, and generate an address information list based on the address information associated with each access control device;
the sending unit 603 is further configured to send the address information list to the target user terminal, and display the address information list on a user interface;
a registering unit 604, configured to perform registration processing on the target user according to the address information selected by the target user terminal in the user interface.
In an embodiment, the obtaining unit 602 is specifically configured to:
determining at least one access control device passing from the outside of the access control area to the destination address;
and taking the determined at least one access control device as an access control device set associated with the identification information and the destination address.
In one embodiment, the apparatus further comprises: a judgment unit 605.
The receiving unit 601 is further configured to receive an access request sent by a visiting user terminal, where the access request includes registration information requesting access, and the registration information includes a visiting time and an access address of an accessing user;
a judging unit 605 configured to judge whether or not the registration information exists in registration information stored in advance;
the obtaining unit 602 is further configured to, if the determining unit 605 determines that the access address of the access user is the access address, obtain an access entry code associated with the access address of the access user, determine an access entry code, and send the access entry code to the access user terminal, where the access entry code is used to check each access device in the access entry device set associated with the access address of the access user.
In an embodiment, the obtaining unit 602 is specifically configured to:
sending the equipment information of each access control equipment in the access control equipment set to an access control platform, wherein the access control platform is used for controlling each access control equipment in an access restricted area;
and receiving an unique door opening code generated by the access control platform based on the equipment information of each access control equipment, wherein the unique door opening code is used for verifying each access control equipment.
In the embodiment of the present invention, after receiving an access authentication request sent by a target user terminal, the receiving unit 601 may obtain an access device set associated with identification information and a destination address included in the access authentication request, so as to obtain an access code for checking each access device in the access device set, further, the sending unit 603 may send the access code to the target user terminal to instruct the target user terminal to generate a graphic code based on the access code, so that a user may perform access authentication based on the graphic code, and may realize intelligent control over each access device in an access restricted area.
Based on the description of the above embodiment of the access control method, an embodiment of the present invention further provides an access control device, which may be a computer program (including a program code) running in the target user terminal. Referring to fig. 7, the access control device may include: a transmitting unit 701, a receiving unit 702, a generating unit 703, and a display unit 704.
A sending unit 701, configured to send an access authentication request to a control server, so that the control server obtains an access device set associated with identification information and a destination address included in the access authentication request;
a receiving unit 702, configured to receive an opening code sent by the control server, where the opening code is a unique opening code generated by the control server based on each access control device in the access control device set;
a generating unit 703, configured to generate a graphic code based on the door opening code;
and the display unit 704 is used for displaying the graphic code on a user interface, and the graphic code is used for performing access control.
In an embodiment, the sending unit 701 is further configured to send an address information obtaining instruction to the control server, where the address information obtaining instruction is used to obtain address information associated with each access control device in the access control area;
the receiving unit 702 is further configured to receive an address information list sent by the control server, and display, on a user interface, address information associated with the target user, where the address information list is generated by the control server based on address information associated with each access control device in the access control area.
In one embodiment, the sending unit 701 is further configured to send visitor information of a visiting user to the control server, so that the control server generates registration information of the visiting user based on the visitor information and stores the registration information in the registration information;
wherein the visitor information includes a visiting time and an access address of a visiting user.
In the embodiment of the present invention, the sending unit 701 may send an access control authentication request to the control server when the user has an access control requirement, so that the control server may obtain an access control device set associated with identification information and a destination address included in the access control authentication request, further, the receiving unit 702 may receive an access code sent by the control server and based on verification of each access control device, so that the generating unit 703 may generate a graphic code according to the access code, the display unit 704 may display the display code on a user interface, and the access control device may implement control over the access control device when scanning the graphic code, may implement real-time generation of the graphic code, and may effectively improve accuracy of user right management in an access control area, and may improve security of the user in the access control area.
Fig. 8 is a schematic block diagram of a structure of a server according to an embodiment of the present invention, where the server is the control server. The server in the present embodiment as shown in fig. 8 may include: one or more processors 801; one or more input devices 802, one or more output devices 803, and memory 804. The processor 801, the input device 802, the output device 803, and the memory 804 described above are connected by a bus 805. The memory 804 is used for storing a computer program comprising program instructions, and the processor 801 is used for executing the program instructions stored by the memory 804.
The memory 804 may include a volatile memory (volatile memory), such as a random-access memory (RAM); the memory 804 may also include a non-volatile memory (non-volatile memory), such as a flash memory (flash memory), a solid-state drive (SSD), etc.; the memory 804 may also comprise a combination of the above-described types of memory.
The processor 801 may be a Central Processing Unit (CPU). The processor 801 may further include a hardware chip. The hardware chip may be an application-specific integrated circuit (ASIC), a Programmable Logic Device (PLD), or the like. The PLD may be a field-programmable gate array (FPGA), a General Array Logic (GAL), or the like. The processor 801 may also be a combination of the above structures.
In the embodiment of the present invention, the memory 804 is used for storing a computer program, the computer program includes program instructions, and the processor 801 is used for executing the program instructions stored in the memory 804, so as to implement the steps executed by the control server in fig. 2 and 3.
In one embodiment, the processor 801 is configured to call the program instructions for performing:
receiving an access control authentication request sent by a target user terminal, wherein the access control authentication request comprises identification information and a destination address of a target user;
acquiring an access control equipment set associated with the identification information and the destination address, and generating a unique opening code based on each access control equipment in the access control equipment set;
and sending the door opening code to the target user terminal, wherein the target user terminal generates a graphic code based on the door opening code, and the graphic code is used for carrying out access control.
In one embodiment, the processor 801 is further configured to call the program instructions for performing:
acquiring address information associated with each access control device in an access control area;
receiving an address information acquisition instruction sent by the target user terminal, and generating an address information list based on the address information associated with each access control device;
sending the address information list to the target user terminal, and displaying the address information list to a user interface;
and according to the address information selected by the target user terminal in the user interface, registering the target user.
In one embodiment, the processor 801 is further configured to call the program instructions for performing:
determining at least one access control device passing from the outside of the access control area to the destination address;
and taking the determined at least one access control device as an access control device set associated with the identification information and the destination address.
In one embodiment, the processor 801 is further configured to call the program instructions for performing:
receiving an access request sent by a visiting user terminal, wherein the access request comprises registration information requesting access, and the registration information comprises visiting time and an access address of an accessing user;
judging whether the registration information exists in the pre-stored registration information;
if so, acquiring an access equipment set associated with the access address of the access user, determining an access opening code, and sending the determined access opening code to the access user terminal, wherein the access opening code is used for verifying each access equipment in the access equipment set associated with the access address of the access user.
In one embodiment, the processor 801 is further configured to call the program instructions for performing:
sending the equipment information of each access control equipment in the access control equipment set to an access control platform, wherein the access control platform is used for controlling each access control equipment in an access restricted area;
and receiving an unique door opening code generated by the access control platform based on the equipment information of each access control equipment, wherein the unique door opening code is used for verifying each access control equipment.
Referring to fig. 9, which is a schematic block diagram of a structure of an intelligent terminal according to an embodiment of the present invention, the intelligent terminal according to the embodiment of the present invention shown in fig. 9 may include: one or more processors 901; one or more input devices 902, one or more output devices 903, and memory 904. The processor 901, the input device 902, the output device 903, and the memory 904 are connected by a bus 905. The memory 902 is used to store a computer program comprising program instructions, and the processor 901 is used to execute the program instructions stored by the memory 902.
The memory 904 may include volatile memory (volatile memory), such as random-access memory (RAM); the memory 904 may also include a non-volatile memory (non-volatile memory), such as a flash memory (flash memory), a solid-state drive (SSD), etc.; the memory 904 may also comprise a combination of the above-described types of memory.
The processor 901 may be a Central Processing Unit (CPU). The processor 901 may further include a hardware chip. The hardware chip may be an application-specific integrated circuit (ASIC), a Programmable Logic Device (PLD), or the like. The PLD may be a field-programmable gate array (FPGA), a General Array Logic (GAL), or the like. The processor 901 may also be a combination of the above structures.
In one embodiment, the processor 901 is configured to call the program instructions to perform:
sending an access control authentication request to a control server so that the control server acquires an access control equipment set associated with identification information and a destination address included in the access control authentication request;
receiving an opening code sent by the control server, wherein the opening code is a unique opening code generated by the control server based on each access control device in the access control device set;
and generating a graphic code based on the door opening code, and displaying the graphic code on a user interface, wherein the graphic code is used for controlling the access control.
In one embodiment, the processor 901 is further configured to call the program instructions to perform:
sending an address information acquisition instruction to a control server, wherein the address information acquisition instruction is used for acquiring address information associated with each access control device in an access control area;
and receiving an address information list sent by the control server, and displaying address information associated with the target user on a user interface, wherein the address information list is generated by the control server based on the address information associated with each access control device in the access control area.
In one embodiment, the processor 901 is further configured to call the program instructions to perform:
sending visitor information of a visiting user to the control server so that the control server generates registration information of the visiting user based on the visitor information and stores the registration information in the registration information;
wherein the visitor information includes a visiting time and an access address of a visiting user.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
While the invention has been described with reference to a particular embodiment, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (13)

1. An access control method, comprising:
receiving an access control authentication request sent by a target user terminal, wherein the access control authentication request comprises identification information and a destination address of a target user;
acquiring an access control equipment set associated with the identification information and the destination address, and generating a unique opening code based on each access control equipment in the access control equipment set;
and sending the door opening code to the target user terminal, wherein the target user terminal generates a graphic code based on the door opening code, and the graphic code is used for carrying out access control.
2. The method of claim 1, wherein before receiving the access authentication request sent by the target user terminal, the method further comprises:
acquiring address information associated with each access control device in an access control area;
receiving an address information acquisition instruction sent by the target user terminal, and generating an address information list based on the address information associated with each access control device;
sending the address information list to the target user terminal, and displaying the address information list to a user interface;
and according to the address information selected by the target user terminal in the user interface, registering the target user.
3. The method of claim 1, wherein obtaining the set of access control devices associated with the identification information and the destination address comprises:
determining at least one access control device passing from the outside of the access control area to the destination address;
and taking the determined at least one access control device as an access control device set associated with the identification information and the destination address.
4. The method of claim 1, further comprising:
receiving an access request sent by a visiting user terminal, wherein the access request comprises registration information requesting access, and the registration information comprises visiting time and an access address of an accessing user;
judging whether the registration information exists in the pre-stored registration information;
if so, acquiring an access equipment set associated with the access address of the access user, determining an access opening code, and sending the determined access opening code to the access user terminal, wherein the access opening code is used for verifying each access equipment in the access equipment set associated with the access address of the access user.
5. The method of claim 1, wherein generating a unique opening code based on each access control device in the set of access control devices comprises:
sending the equipment information of each access control equipment in the access control equipment set to an access control platform, wherein the access control platform is used for controlling each access control equipment in an access restricted area;
and receiving an unique door opening code generated by the access control platform based on the equipment information of each access control equipment, wherein the unique door opening code is used for verifying each access control equipment.
6. An access control method, comprising:
sending an access control authentication request to a control server so that the control server acquires an access control equipment set associated with identification information and a destination address included in the access control authentication request;
receiving an opening code sent by the control server, wherein the opening code is a unique opening code generated by the control server based on each access control device in the access control device set;
and generating a graphic code based on the door opening code, and displaying the graphic code on a user interface, wherein the graphic code is used for controlling the access control.
7. The method of claim 6, wherein before sending the access authentication request to the control server, the method further comprises:
sending an address information acquisition instruction to a control server, wherein the address information acquisition instruction is used for acquiring address information associated with each access control device in an access control area;
and receiving a mark address information list sent by the control server, and displaying address information associated with the target user on a user interface, wherein the address information list is generated by the control server based on the address information associated with each access control device in the access control area.
8. The method of claim 6, further comprising:
sending visitor information of a visiting user to the control server so that the control server generates registration information of the visiting user based on the visitor information and stores the registration information in the registration information;
wherein the visitor information includes a visiting time and an access address of a visiting user.
9. An access control device, comprising:
the system comprises a receiving unit, a processing unit and a processing unit, wherein the receiving unit is used for receiving an access control authentication request sent by a target user terminal, and the access control authentication request comprises identification information and a destination address of a target user;
the acquisition unit is used for acquiring an access control equipment set associated with the identification information and the destination address and generating a unique opening code based on each access control equipment in the access control equipment set;
and the sending unit is used for sending the door opening code to the target user terminal, and the target user terminal generates a graphic code based on the door opening code, wherein the graphic code is used for carrying out access control.
10. An access control device, comprising:
the access control system comprises a sending unit, a receiving unit and a processing unit, wherein the sending unit is used for sending an access control authentication request to a control server so that the control server can acquire an access control equipment set associated with identification information and a destination address included in the access control authentication request;
the receiving unit is used for receiving an opening code sent by the control server, wherein the opening code is a unique opening code generated by the control server based on each access control device in the access control device set;
the generating unit is used for generating a graphic code based on the door opening code;
and the display unit is used for displaying the graphic code on a user interface, and the graphic code is used for carrying out access control.
11. A server, comprising a processor, a memory, and a communication interface, the processor, the memory, and the communication interface being interconnected, wherein the memory is configured to store computer program instructions and the processor is configured to execute the program instructions to implement the method of any one of claims 1-5.
12. An intelligent terminal, comprising a processor, an input device, an output device and a memory, the processor, the input device, the output device and the memory being interconnected, wherein the memory is configured to store a computer program comprising program instructions, the processor being configured to invoke the program instructions to perform the method according to any one of claims 6 to 8.
13. A computer-readable storage medium, having stored therein first computer program instructions for executing the access control method of any of claims 1-5 when executed by a processor, and second computer program instructions for executing the access control method of any of claims 6-8 when executed by a processor.
CN201910831143.XA 2019-09-02 2019-09-02 Access control method and device, intelligent terminal, server and storage medium Active CN111199601B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910831143.XA CN111199601B (en) 2019-09-02 2019-09-02 Access control method and device, intelligent terminal, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910831143.XA CN111199601B (en) 2019-09-02 2019-09-02 Access control method and device, intelligent terminal, server and storage medium

Publications (2)

Publication Number Publication Date
CN111199601A true CN111199601A (en) 2020-05-26
CN111199601B CN111199601B (en) 2022-06-14

Family

ID=70745783

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910831143.XA Active CN111199601B (en) 2019-09-02 2019-09-02 Access control method and device, intelligent terminal, server and storage medium

Country Status (1)

Country Link
CN (1) CN111199601B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111652781A (en) * 2020-06-01 2020-09-11 阿里巴巴集团控股有限公司 Service processing method, device, equipment and storage medium based on community codes
CN111723889A (en) * 2020-07-31 2020-09-29 腾讯科技(深圳)有限公司 Code scanning login method, graphic code display method, device, equipment and storage medium
CN112905128A (en) * 2021-03-31 2021-06-04 浙江大华技术股份有限公司 Access control user data management method and device, storage medium and electronic equipment
CN114360100A (en) * 2020-09-27 2022-04-15 比亚迪半导体股份有限公司 Control method, device, system and medium for intelligent door lock
CN114863597A (en) * 2022-07-04 2022-08-05 成都桐领智能科技有限公司 Access management method, system and device based on trusted bar code
CN114882630A (en) * 2022-04-27 2022-08-09 广东职业技术学院 Internet of things access control system and control method thereof
CN114999040A (en) * 2020-09-09 2022-09-02 支付宝(杭州)信息技术有限公司 Service passing processing method and device
CN117831171A (en) * 2024-01-22 2024-04-05 北京摇光智能科技有限公司 Intelligent lock combination control method, device, equipment and storage medium
CN114999040B (en) * 2020-09-09 2024-05-31 支付宝(杭州)信息技术有限公司 Service traffic processing method and device

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120091202A1 (en) * 2000-06-09 2012-04-19 Flash Seats, Llc Mobile application bar code identification method and system
CN104135480A (en) * 2014-08-05 2014-11-05 上海众人科技有限公司 Entrance guard authorization system and entrance guard authorization method
JP2016001429A (en) * 2014-06-12 2016-01-07 日本電気株式会社 Passage management system
CN205644720U (en) * 2016-05-21 2016-10-12 杭州道盈信息科技有限公司 Access control system based on internet
CN106097498A (en) * 2016-06-12 2016-11-09 南宁思飞电子科技有限公司 It is applied to the intelligent caller gate control system of community
CN106340103A (en) * 2016-08-30 2017-01-18 厦门狄耐克电子科技有限公司 Community access control method and community access control system
KR101719511B1 (en) * 2016-08-04 2017-04-05 주식회사 에어큐브 Method for approving access to gate through network, and server and computer-readable recording media using the same
CN106652135A (en) * 2016-12-22 2017-05-10 深圳市麦驰安防技术有限公司 Access control method and system based on cloud technology and two-dimensional code technology
WO2018006333A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Mobile terminal-based authentication method and system for intelligent access control
CN107798750A (en) * 2017-09-01 2018-03-13 北京佳阳科技有限公司 A kind of intelligent unlocking method and apparatus and move in and handle method and apparatus
CN107945331A (en) * 2017-11-21 2018-04-20 广州思加特科技有限公司 A kind of access control method, apparatus and system
CN109300211A (en) * 2018-09-21 2019-02-01 腾讯科技(深圳)有限公司 A kind of access control method, apparatus and system

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120091202A1 (en) * 2000-06-09 2012-04-19 Flash Seats, Llc Mobile application bar code identification method and system
JP2016001429A (en) * 2014-06-12 2016-01-07 日本電気株式会社 Passage management system
CN104135480A (en) * 2014-08-05 2014-11-05 上海众人科技有限公司 Entrance guard authorization system and entrance guard authorization method
CN205644720U (en) * 2016-05-21 2016-10-12 杭州道盈信息科技有限公司 Access control system based on internet
CN106097498A (en) * 2016-06-12 2016-11-09 南宁思飞电子科技有限公司 It is applied to the intelligent caller gate control system of community
WO2018006333A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Mobile terminal-based authentication method and system for intelligent access control
KR101719511B1 (en) * 2016-08-04 2017-04-05 주식회사 에어큐브 Method for approving access to gate through network, and server and computer-readable recording media using the same
CN106340103A (en) * 2016-08-30 2017-01-18 厦门狄耐克电子科技有限公司 Community access control method and community access control system
CN106652135A (en) * 2016-12-22 2017-05-10 深圳市麦驰安防技术有限公司 Access control method and system based on cloud technology and two-dimensional code technology
CN107798750A (en) * 2017-09-01 2018-03-13 北京佳阳科技有限公司 A kind of intelligent unlocking method and apparatus and move in and handle method and apparatus
CN107945331A (en) * 2017-11-21 2018-04-20 广州思加特科技有限公司 A kind of access control method, apparatus and system
CN109300211A (en) * 2018-09-21 2019-02-01 腾讯科技(深圳)有限公司 A kind of access control method, apparatus and system

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111652781A (en) * 2020-06-01 2020-09-11 阿里巴巴集团控股有限公司 Service processing method, device, equipment and storage medium based on community codes
CN111723889A (en) * 2020-07-31 2020-09-29 腾讯科技(深圳)有限公司 Code scanning login method, graphic code display method, device, equipment and storage medium
CN114999040A (en) * 2020-09-09 2022-09-02 支付宝(杭州)信息技术有限公司 Service passing processing method and device
CN114999040B (en) * 2020-09-09 2024-05-31 支付宝(杭州)信息技术有限公司 Service traffic processing method and device
CN114360100A (en) * 2020-09-27 2022-04-15 比亚迪半导体股份有限公司 Control method, device, system and medium for intelligent door lock
CN112905128A (en) * 2021-03-31 2021-06-04 浙江大华技术股份有限公司 Access control user data management method and device, storage medium and electronic equipment
CN114882630A (en) * 2022-04-27 2022-08-09 广东职业技术学院 Internet of things access control system and control method thereof
CN114863597A (en) * 2022-07-04 2022-08-05 成都桐领智能科技有限公司 Access management method, system and device based on trusted bar code
CN114863597B (en) * 2022-07-04 2022-10-11 成都桐领智能科技有限公司 Access management method, system and device based on trusted bar code
CN117831171A (en) * 2024-01-22 2024-04-05 北京摇光智能科技有限公司 Intelligent lock combination control method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN111199601B (en) 2022-06-14

Similar Documents

Publication Publication Date Title
CN111199601B (en) Access control method and device, intelligent terminal, server and storage medium
US11270532B2 (en) Lock control device, information processing method, program, and communication terminal
CN106304074B (en) Auth method and system towards mobile subscriber
US8429732B2 (en) Data communication method and data communication system
US10445487B2 (en) Methods and apparatus for authentication of joint account login
US9780950B1 (en) Authentication of PKI credential by use of a one time password and pin
CN111556069A (en) Visitor identity authentication method, system, device, computer equipment and storage medium
US8421594B2 (en) Tag-based personalization
CN105788047A (en) Bluetooth access control device, Bluetooth access control management system and Bluetooth access control management method
US11129025B1 (en) Phone alert for unauthorized SMS
CN104519042A (en) Detecting and preventing man-in-the-middle attacks on encrypted connection
CN103765811A (en) Method and device for securely sharing images across untrusted channels
CN109992949A (en) A kind of equipment authentication method, air card-writing method and apparatus authentication device
CN114266033A (en) Verification code generation method and device, verification code login system and electronic equipment
CN109472903A (en) A kind of control of bluetooth access control method and its device
US20210211293A1 (en) Systems and methods for out-of-band authenticity verification of mobile applications
CN111310233A (en) Application interface display method, device, equipment and storage medium
CN112912875A (en) Authentication system, authentication method, application providing device, authentication device, and authentication program
CN111583482A (en) Access control system based on two-dimensional code and control method thereof
CN107453871A (en) Password generated method, password authentication method, method of payment and device
CN105024813A (en) Server, user equipment and interactive method of the user equipment and the server
CN112995357B (en) Domain name management method, device, medium and electronic equipment based on cloud hosting service
CN113243093A (en) System and method for message transmission and retrieval using blockchains
CN115378609A (en) Electronic certificate display method, verification method, terminal and server
JP2009251656A (en) User authentication system, user authentication method, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant