CN111798603A - Access control method and device, computer equipment and storage medium - Google Patents

Access control method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN111798603A
CN111798603A CN202010933086.9A CN202010933086A CN111798603A CN 111798603 A CN111798603 A CN 111798603A CN 202010933086 A CN202010933086 A CN 202010933086A CN 111798603 A CN111798603 A CN 111798603A
Authority
CN
China
Prior art keywords
characteristic data
entity
registered
registration
scanning
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010933086.9A
Other languages
Chinese (zh)
Inventor
覃竞才
曾波
张波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202010933086.9A priority Critical patent/CN111798603A/en
Publication of CN111798603A publication Critical patent/CN111798603A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/21Individual registration on entry or exit involving the use of a pass having a variable access code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)
  • Alarm Systems (AREA)

Abstract

The application relates to an access control method, an access control device, computer equipment and a storage medium. The method comprises the following steps: when the entity object is in the detection range of the entrance guard detector, entity scanning is carried out through the entrance guard detector; obtaining field characteristic data of the entity article through the entity scanning; acquiring the scanning time of the access control detector for entity scanning; when the field characteristic data is matched with the registered characteristic data and the scanning time is within the service life of the registered characteristic data, controlling an access controller corresponding to the access detector to execute an access opening action; the registration characteristic data is characteristic data obtained by scanning the entity certificate object. By adopting the method, the object used for verifying the identity to open the entrance guard is not easy to be copied or stolen, and the safety of entrance guard control is improved.

Description

Access control method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for controlling an access control, a computer device, and a storage medium.
Background
With the development of computer technology, entrance guard systems are installed at entrances of office buildings or residential districts where people work. The user passes through the entrance guard voucher and gets into office building or district to the people who has not had the authority have been prevented and have got into office building or district, have improved the security.
Traditional entrance guard voucher mainly reaches the purpose of discernment identity through key, entrance guard's card etc. but the object of verification identity is more obvious such as key, entrance guard's card, is easily found to being duplicated or stolen, there is the potential safety hazard.
Disclosure of Invention
In view of the above, it is necessary to provide a method, an apparatus, a computer device and a storage medium for controlling an access, in which an object with an identity verified is not easily copied or stolen.
A method of access control, the method comprising:
when the entity object is in the detection range of the entrance guard detector, entity scanning is carried out through the entrance guard detector;
obtaining field characteristic data of the entity article through the entity scanning;
acquiring the scanning time of the access control detector for entity scanning;
when the field characteristic data is matched with the registered characteristic data and the scanning time is within the service life of the registered characteristic data, the field characteristic data and the registered characteristic data are matched, and the scanning time is within the service life of the registered characteristic data
Controlling an entrance guard controller corresponding to the entrance guard detector to execute entrance guard opening action; the registration characteristic data is characteristic data obtained by scanning the entity certificate object.
An access control device, the device comprising:
the scanning module is used for scanning the entity through the entrance guard detector when the entity object is in the detection range of the entrance guard detector;
an obtaining module, configured to obtain field feature data of the entity item through the entity scanning;
the acquisition module is used for acquiring the scanning time of the access control detector for entity scanning;
the control module is used for controlling the entrance guard controller corresponding to the entrance guard detector to execute entrance guard opening action when the field characteristic data is matched with the registered characteristic data and the scanning time is within the service life of the registered characteristic data; the registration characteristic data is characteristic data obtained by scanning the entity certificate object.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
when the entity object is in the detection range of the entrance guard detector, entity scanning is carried out through the entrance guard detector;
obtaining field characteristic data of the entity article through the entity scanning;
acquiring the scanning time of the access control detector for entity scanning;
when the field characteristic data is matched with the registered characteristic data and the scanning time is within the service life of the registered characteristic data, the field characteristic data and the registered characteristic data are matched, and the scanning time is within the service life of the registered characteristic data
Controlling an entrance guard controller corresponding to the entrance guard detector to execute entrance guard opening action; the registration characteristic data is characteristic data obtained by scanning the entity certificate object.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
when the entity object is in the detection range of the entrance guard detector, entity scanning is carried out through the entrance guard detector;
obtaining field characteristic data of the entity article through the entity scanning;
acquiring the scanning time of the access control detector for entity scanning;
when the field characteristic data is matched with the registered characteristic data and the scanning time is within the service life of the registered characteristic data, the field characteristic data and the registered characteristic data are matched, and the scanning time is within the service life of the registered characteristic data
Controlling an entrance guard controller corresponding to the entrance guard detector to execute entrance guard opening action; the registration characteristic data is characteristic data obtained by scanning the entity certificate object.
According to the access control method, the access control device, the computer equipment and the storage medium, any entity certificate object is registered to serve as a temporary certificate for access control. And performing entity scanning on the entity object to be verified to obtain the characteristics of the entity object, and comparing the characteristics of the entity object with the characteristics of the registered entity certificate object so as to judge whether the entity object is registered. And determining whether the scanning time of the entity item is within the service life of the registration characteristic data so as to determine that the registration information of the entity item is within the valid service life. When the characteristics and the scanning time of the entity object meet the conditions, the entrance guard is opened, and the safety of entrance guard control is improved. Any registered object is used as a temporary certificate, so that the certificate for controlling the opening of the access control system is not easy to be found by people, and the access control certificate is prevented from being copied or stolen. And, the temporary voucher has life, can change the voucher object that is used for access control at indefinite time for access control is safer.
Drawings
Fig. 1 is an application environment diagram of an access control method in one embodiment;
FIG. 2 is a schematic flow chart illustrating a method for controlling access control according to an embodiment;
FIG. 3 is a schematic flow chart illustrating the determination of similarity between field profile and registered profile in one embodiment;
FIG. 4 is a schematic flow chart illustrating authentication of a physical object according to one embodiment;
FIG. 5 is a schematic view of an embodiment of a process for triggering biometric access control;
FIG. 6 is a flow diagram illustrating extending the lifetime of registered feature data, according to one embodiment;
FIG. 7 is a schematic diagram of an interface for extending the lifetime of registered feature data, under an embodiment;
FIG. 8 is a flow diagram that illustrates the registration of a physical credential object, under an embodiment;
FIG. 9 is a schematic flow chart of registering a physical credential object in another embodiment;
FIG. 10 is a schematic flow chart of triggering an alarm in one embodiment;
FIG. 11 is a schematic diagram of a method of access control in one embodiment;
fig. 12 is a block diagram showing the construction of an access control device according to an embodiment;
FIG. 13 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The access control method provided by the application can be applied to the application environment shown in figure 1. The access control device 110 communicates with the server 120 through a network. The server 120 may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a network service, cloud communication, a middleware service, a domain name service, a security service, a CDN, a big data and artificial intelligence platform, and the like. The access control device 110 may be, but is not limited to, a smart access terminal or the like. The access control device 110 and the server 120 may be directly or indirectly connected through wired or wireless communication, and the application is not limited herein.
In this embodiment, when the physical object is in the detection range of the access detector, the access control device 110 performs physical scanning through the access detector. The access control device 110 obtains the field characteristic data of the physical object through physical scanning. Next, the access control device 110 obtains a scanning time of the access detector for entity scanning. The access control device 110 acquires the registered feature data from the server 120, and when the field feature data is matched with the registered feature data and the scanning time is within the service life of the registered feature data, the access control device 110 controls an access controller corresponding to the access detector to execute an access opening action; the registration characteristic data is characteristic data obtained by scanning the entity certificate object. The access control method can register any entity certificate object as a temporary certificate for access control opening, so that the object for controlling access control opening is not easy to be found by people, the access control certificate is prevented from being copied or stolen, and the security of access control is improved. And, the temporary voucher has life, can change the voucher object that is used for access control at indefinite time for access control is safer.
In an embodiment, as shown in fig. 2, an access control method is provided, which is described by taking the access control device in fig. 1 as an example, and includes the following steps:
and 202, when the entity object is in the detection range of the entrance guard detector, entity scanning is carried out through the entrance guard detector.
The physical object is an object having a specific and real shape or structure and capable of being touched and sensed by people. Such as but not limited to, a puzzle, a ring, a doll, a book, a table tennis, etc. The entrance guard detector can scan and measure the object to obtain multi-dimensional characteristic data of the object, such as dimensions of basic physical composition, weight, color, size and shape, internal structure and the like.
Specifically, the user moves the physical object close to the access control device. The entrance guard control equipment detects in the detection range through the entrance guard detector to confirm whether entity article exists in the detection range. And when the entrance guard detector detects the physical object in the detection range, the physical object is physically scanned.
And step 204, obtaining the field characteristic data of the entity article through entity scanning.
Specifically, the entrance guard control equipment performs entity scanning in a detection range through an entrance guard detector to obtain scanning data. And the access control equipment obtains at least one of the characteristic data of each dimension of the entity object, such as color, weight, size, form, internal structure, physical composition and the like according to the scanning data. The entrance guard control equipment takes at least one of dimensional characteristics such as color, weight, size, form, internal structure and physical composition of the entity article as field characteristic data of the entity article.
For example, when the physical object is a magic cube, the weight, size, internal structure, form, etc. of the magic cube are scanned by an access detector, and the color of the magic cube is determined.
And step 206, acquiring the scanning time of the access control detector for entity scanning.
The scanning time refers to a time for performing entity scanning on an entity article, and the scanning time may include a year, a month, a date, a time, and the like. For example, the scanning time is 11 o' clock 20 min at 8/12/2020.
Specifically, when the access control device performs entity scanning on an entity article through the access detector, the scanning time of the entity scanning is recorded. Further, the access control device may use a time when the entity scanning is started as the scanning time, or may use a time when the entity scanning is completed as the scanning time.
208, when the field characteristic data is matched with the registered characteristic data and the scanning time is within the service life of the registered characteristic data, controlling an access controller corresponding to the access detector to execute an access opening action; the registration characteristic data is characteristic data obtained by scanning the entity certificate object.
Specifically, the user registers the entity certificate object to use the registered entity certificate object for controlling access control. And the access control equipment performs entity scanning on the entity certificate object through the access detector to obtain the registration characteristic data of the entity certificate object. And the access control equipment registers the entity certificate object according to the registration characteristic data, sets the service life of the registration characteristic data, and stores the registration characteristic data and the service life in a correlation manner.
And after the access control equipment acquires the field characteristic data of the entity article, acquiring the registration characteristic data corresponding to the entity voucher object. And then, the access control equipment compares the field characteristic data corresponding to the entity article with the registered characteristic data, and compares the scanning time with the service life corresponding to the registered characteristic data. And when the field characteristic data and the registration characteristic data are matched and the scanning time is within the service life of the registration characteristic data, determining that the entity article is a registered certificate object and is within the validity period. And the access control equipment controls the access controller corresponding to the access detector to execute the access opening action so as to open the access.
In this embodiment, the access control device may compare the field characteristic data corresponding to the physical object with the registered characteristic data, and compare the scanning time with the service life corresponding to the registered characteristic data when the field characteristic data matches the registered characteristic data.
In this embodiment, the access control device may compare the scanning time with the service life corresponding to the registration feature data, and compare the field feature data corresponding to the entity article with the registration feature data when the scanning time is within the service life corresponding to the registration feature data.
In this embodiment, the access control device may compare the scanning time with the service life corresponding to the registered feature data, and compare the field feature data corresponding to the physical object with the registered feature data.
In the access control method, any entity certificate object is registered to be used as a temporary certificate for access control. And performing entity scanning on the entity object to be verified to obtain the characteristics of the entity object, and comparing the characteristics of the entity object with the characteristics of the registered entity certificate object so as to judge whether the entity object is registered. And determining whether the scanning time of the entity item is within the service life of the registration characteristic data so as to determine that the registration information of the entity item is within the valid service life. When the characteristics and the scanning time of the entity object meet the conditions, the entrance guard is opened, and the safety of entrance guard control is improved. Any registered object is used as a temporary certificate, so that the certificate for controlling the opening of the access control system is not easy to be found by people, and the access control certificate is prevented from being copied or stolen. And, the temporary voucher has life, can change the voucher object that is used for access control at indefinite time for access control is safer.
In one embodiment, when the physical object is within the detection range of the access detector, the physical scanning is performed by the access detector, including: when the physical object is in the detection range of the entrance guard detector, detecting the object identification of the physical object through the entrance guard detector; and when the article identification is detected and is matched with the registered object identification of the entity voucher object, the entity scanning is carried out on the entity article through the entrance guard detector.
The item identifier refers to a unique identifier for characterizing a single item, such as, but not limited to, characterizing the item identifier by a barcode, a two-dimensional code, and the like.
Specifically, when the access control device detects the physical object in the detection range through the access detector, the access control device detects and scans the object identifier of the physical object through the access detector.
For example, the article identifier may be a barcode, a two-dimensional code, or the like pasted on or imprinted on the surface of the physical article, or may be a chip built in the physical article, such as an NFC (Near Field Communication) chip. The entrance guard detector can obtain the article identification of the entity article by scanning the bar code or the two-dimensional code on the surface of the entity article. Or, the access detector may obtain the item identifier of the physical item by detecting an NFC chip inside the physical item.
And when the access control equipment obtains the object identification of the entity object through the access detector, acquiring the registered object identification of the entity voucher object. The access control device compares the item identification of the entity item with the registered object identification of each entity voucher object. And when the registered object identification of any entity voucher object is the same as the object identification of the entity object and the matching is successful, the access control device triggers the operation of entity scanning on the entity object through the access detector.
In this embodiment, the access control detector detects the item identifier of the entity item, and compares the item identifier with the registered object identifier of the entity voucher object to determine whether the entity item is registered, so as to determine whether to enter the step of entity scanning the item, thereby easily and quickly eliminating the situation that the unregistered entity item is used for controlling access control.
In one embodiment, as shown in fig. 3, after obtaining the field characteristic data of the physical object, the method further comprises:
step 302, converting the field feature data into corresponding field feature vectors.
Specifically, the entrance guard control device converts the field characteristic data of the entity article into a corresponding characteristic vector, and then the field characteristic vector can be obtained. Further, when the field characteristic data of the entity article includes color, size, form, internal structure and physical composition, the access control device converts the color, size, form, internal structure and physical composition into corresponding vectors, thereby obtaining the field characteristic vector of the entity article.
For example, the color, weight, size, shape, internal structure and physical composition of the physical object are converted into the numerical values D1, D2, D3, D4, D5 and D6, and the feature data of the several latitudes can define the field feature vector as D [ D1, D2, D3, D4, D5, D6 ].
And step 304, acquiring a registration feature vector corresponding to the registration feature data.
Specifically, the access control device obtains a registration feature vector corresponding to the entity credential object. Wherein, the entity certificate object refers to the registered entity article.
Step 306, determining the similarity between the field feature vector and the registered feature vector.
Specifically, the access control device may be configured to determine similarity between the field feature vector and the registered feature vector, where the similarity may be cosine similarity, linear similarity, or the like. For example, the entrance guard control device may calculate the similarity between the field feature vector and the registered feature vector by a cosine similarity formula:
Figure 968772DEST_PATH_IMAGE001
wherein the content of the first and second substances,
Figure 246694DEST_PATH_IMAGE002
is the pre-similarity of the physical object and the physical voucher object.
Figure 982569DEST_PATH_IMAGE003
Is the corresponding on-site feature vector of the entity article,
Figure 650311DEST_PATH_IMAGE004
and the corresponding registration feature vector of the entity certificate object.
And step 308, determining a matching result of the field characteristic data and the registered characteristic data according to the similarity.
Specifically, after the entrance guard control device determines the similarity between the field feature vector and the registered feature vector, a similarity threshold value can be obtained, and the similarity threshold value are compared. And determining a matching result of the field characteristic data and the registered characteristic data according to the similarity and the similarity threshold comparison result.
Further, when the similarity is larger than the similarity threshold, the field feature data and the registered feature data are judged to be matched. And when the similarity is less than or equal to the similarity threshold, judging that the field characteristic data and the registered characteristic data are not matched.
In this embodiment, the feature data is converted into corresponding feature vectors, and according to the similarity between the field feature vectors and the registered feature vectors, whether the field feature data and the registered feature data are matched can be accurately determined, so that whether the entity article and the registered entity certificate object are the same object is determined, and corresponding access control operation is executed.
FIG. 4 illustrates a process for authenticating a physical object in one embodiment. When the entity article is in the detection range of the entrance guard detector, the entrance guard control equipment performs entity scanning through the entrance guard detector so as to perform entity scanning. Through entity scanning, the access control equipment obtains the field characteristic data of the entity article. And the access control equipment acquires the scanning time of the access detector for entity scanning. And then, the access control equipment transmits the field characteristic data and the scanning time of the entity article to a background. And the background acquires the stored registered feature data, determines whether the field feature data is matched with the registered feature data, and determines whether the scanning time is within the service life of the registered feature data.
Further, the background converts the field characteristic data into a field characteristic vector, acquires a registration characteristic vector corresponding to the registration characteristic data, and calculates the similarity between the field characteristic vector and the registration characteristic vector. And if the similarity is greater than the similarity threshold, judging that the field characteristic data is matched with the registered characteristic data. And if the similarity is less than or equal to the similarity threshold, judging that the field characteristic data is not matched with the registered characteristic data.
And when the field characteristic data is not matched with the registered characteristic data, keeping the entrance guard locked. And when the scanning time exceeds the service life of the registered feature data, keeping the entrance guard locked.
When the field characteristic data is matched with the registered characteristic data and the scanning time is within the service life of the registered characteristic data, controlling an access controller corresponding to the access detector to execute an access opening action; the registration characteristic data is characteristic data obtained by scanning the entity certificate object.
In one embodiment, the method further comprises: when the field characteristic data is matched with the registered characteristic data and the scanning time exceeds the service life of the registered characteristic data, keeping the entrance guard locked; triggering a sending operation of a registration prompt message, wherein the registration prompt message prompts re-registration of the entity certificate object so as to update the registration characteristic data and the corresponding service life.
Specifically, the access control device compares field characteristic data corresponding to the entity article with registered characteristic data, and compares the scanning time with the service life corresponding to the registered characteristic data. When the field characteristic data is matched with the registered characteristic data and the scanning time exceeds the service life of the registered characteristic data, judging that the registered characteristic data is invalid, namely the registered information of the entity object is invalid, and keeping the entrance guard locking state by the entrance guard control equipment.
And then, the access control equipment triggers the sending operation of a registration prompt message, wherein the registration prompt message is used for prompting the user to re-register the entity certificate object so as to update the registration characteristic data and the corresponding service life. Furthermore, the entrance guard control equipment can send out registration prompt information through voice, or at least one prompt in the registration prompt information is displayed in a display area of the entrance guard control equipment, so that a user is prompted to re-register the entity certificate object.
In this embodiment, when the registration feature data is invalid, indicating that the registration information of the physical object is invalid, the access control is not opened, and the registration prompt information is triggered to prompt the user to update the registration feature data and the corresponding service life, so that the physical object can only be used within the valid service life, and the credential object for access control is replaced at irregular time, or the registration information and the service life are updated, so that the access control is safer.
In one embodiment, the method further comprises: when the field characteristic data is matched with the registered characteristic data and the scanning time exceeds the service life of the registered characteristic data, keeping the entrance guard locked; triggering a prompt message for replacing the physical credential object.
Specifically, when the field characteristic data is matched with the registered characteristic data, but the scanning time exceeds the service life of the registered characteristic data, the access control device judges that the registered characteristic data is invalid, namely the registration information of the entity article is invalid, and the access control device keeps an access locking state. And then, the entrance guard control equipment triggers a prompt message for replacing the entity certificate object. This prompt message is used for prompting the user to use and change entity voucher object in order to register to set up the life of new entity voucher object, with the untimely entity voucher object that is used for access control of changing, thereby can use different entity voucher objects to control access control at different periods, make the voucher that is used for controlling access control more nimble.
In one embodiment, the operation of triggering the sending of the registration prompting message includes: triggering the sending operation of sending the registration prompt message to the user terminal corresponding to the access controller, so that the user terminal displays the registration prompt message, and responding to the triggering operation of the displayed registration prompt message to trigger re-registration of the entity certificate object so as to update the registration characteristic data and the corresponding service life.
Specifically, when the field characteristic data is matched with the registered characteristic data and the scanning time exceeds the service life of the registered characteristic data, the entrance guard control equipment keeps entrance guard locking. Meanwhile, the access control equipment automatically triggers the sending operation of the registration prompt message so as to send the registration prompt message to the user terminal corresponding to the access controller. And the user terminal receives and displays the registration prompt message. The user terminal triggers an operation of re-registering the entity credential object in response to a triggering operation of the displayed registration prompting message. And in the re-registration process, entity scanning is carried out on the entity certificate object to obtain registration characteristic data of the entity certificate object, and the service life of the registration characteristic data is set.
In the embodiment, the newly acquired registration characteristic data of the entity certificate object and the reset service life are stored in association through entity scanning of the entity certificate object in the process of re-registration. The registration profile of the re-registered physical credential object may be different than the revoked registration profile of the physical credential object. For example, the invalidated registration characteristic data of the physical credential object includes color, shape, size, and internal structure. The registration characteristic data for re-registration of the same physical credential object includes, but is not limited to, color weight, shape, size, and internal structure.
In this embodiment, the registration prompt message is sent to the user terminal to prompt the user to re-register the entity certificate object, so as to update the registration feature data of the entity certificate object and the service life of the registration feature data, thereby replacing the registration feature data and the service life of the same entity certificate object, and ensuring the security and reliability of the entity certificate object for controlling the access.
In one embodiment, as shown in fig. 5, the method further comprises:
and 502, when the field characteristic data is matched with the registered characteristic data and the scanning time exceeds the service life of the registered characteristic data, triggering the verification operation of opening the access control through the biological characteristics.
The biological characteristics comprise at least one of face characteristic information, fingerprint characteristic information, iris characteristic information or palm print characteristic information.
Specifically, when the field characteristic data is matched with the registered characteristic data, but the scanning time exceeds the service life of the registered characteristic data, the registered characteristic data is determined to be invalid, that is, the registration information of the entity object is invalid, and the access control device keeps the access locking state.
And then, the access control equipment triggers the verification operation of opening the access by the biological characteristics so as to collect the biological characteristics of the user for verification.
And step 504, acquiring the biological characteristic data of the user through the entrance guard detector or a biological characteristic collector corresponding to the entrance guard controller.
The user biological characteristic data refers to at least one of face characteristic information of a user, fingerprint characteristic information of the user, iris characteristic information of the user or palm print characteristic information of the user.
Specifically, the access control device collects user biometric data through an access detector or a biometric collector corresponding to an access controller.
When the user biological characteristic data comprises user face characteristic information, the entrance guard control equipment acquires a face image of the user through an entrance guard detector or a biological characteristic collector corresponding to an entrance guard controller. Then, the access control device obtains facial features of the user from the face image, where the facial features may include shapes of facial organs, relative position relationships of the facial organs, and size proportional relationships of the facial organs, specifically, grain features such as eye size, distance between two eyes, eye shape, nose shape, lip size, cheek bone height, forehead height, facial grain, and the like.
In another embodiment, when the user biometric data may further include user fingerprint feature information, user iris feature information, or user palm print feature information, the access control device collects the user fingerprint feature information, user iris feature information, or user palm print feature information through the access detector or the biometric collector.
And step 506, when the user biological characteristic data is matched with the registered biological characteristic data, controlling the access controller corresponding to the access detector to execute an access opening action.
Specifically, the access control device compares the collected user biometric data with the registered user biometric data.
Further, when the user biometric data includes the user face feature information, the access control device may calculate a similarity between the collected user face feature information and the registered face feature information. When the similarity between the user face feature information and the registered face feature information is higher than a threshold value, judging that the user biological feature data is matched with the registered biological feature data, and controlling an access controller corresponding to the access detector by the access control equipment to execute an access opening action.
In another embodiment, when the user biometric data may further include user fingerprint feature information, user iris feature information, or user palm print feature information, the access control device performs corresponding comparison between the collected user fingerprint feature information, user iris feature information, or user palm print feature information and registered biometric data, that is, registered fingerprint feature information, registered iris feature information, or registered palm print feature information, to calculate the similarity. And when the similarity between the collected characteristic information of the user and the corresponding registered characteristic information is greater than a threshold value, judging that the biological characteristic data of the user is matched with the registered biological characteristic data, and controlling an access controller corresponding to the access detector by the access control equipment to execute an access opening action.
In this embodiment, when the registration feature data is invalid, the registration information indicating the physical object is invalid, and then the door access is not opened, so that the physical object can only be used within the valid use period. And triggering the biological characteristic verification, and opening the access control when the verification is passed, so that the entity article verification and the user biological characteristic verification are combined, and the access control is safer.
In one embodiment, as shown in fig. 6, the method further comprises:
and step 602, when the field characteristic data is matched with the registered characteristic data and the scanning time is within the service life of the registered characteristic data, displaying the remaining time of the service life of the registered characteristic data.
Specifically, when the field characteristic data is matched with the registration characteristic data and the scanning time is in the service life of the registration characteristic data, the entity object and the registered entity voucher object are determined to be the same entity object, and the access control device controls the access controller corresponding to the access detector to execute an access opening action. Next, the entrance guard control device displays the remaining use time of the use period of the registered feature data in the display area.
And step 604, responding to the trigger operation of the displayed remaining time, and displaying a delay option.
The trigger operation may be touch, long press, click, slide, multi-touch, and the like.
Specifically, the user can trigger the remaining time displayed in the display area by touching, long pressing, clicking, sliding and multi-touch, so as to enter the operation entry of the service life. And when the access control equipment receives the trigger operation of the user on the remaining time displayed in the display area, displaying the delay option of the service life. Next, the user selects or enters the delay time for registering the feature data under the delay option.
And step 606, responding to the delay confirmation operation of the delay option, and triggering to prolong the service life of the registered feature data.
Specifically, the access control device detects the selection operation of the user on the delay time in the delay option, or waits for the modification or confirmation of the user after acquiring the delay time input by the user. When the entrance guard control equipment detects the delay confirmation operation of the user, the service life of the registered feature data is prolonged according to the delay time selected by the user or the delay time input by the user. Further, the entrance guard control device adds a user-selected delay time or a user-input delay time to the lifetime of the registered feature data, thereby updating the lifetime of the registered feature data.
In this embodiment, the use period of the registered physical object is increased by extending the use period of the registered feature data, so that the valid period of the physical object can be flexibly set.
As shown in fig. 7 (a), when the field feature data and the registered feature data match and the scanning time is within the lifetime of the registered feature data, the access control device displays the remaining time of the lifetime of the registered feature data in the display area. The entrance guard control equipment receives the trigger operation of the user on the remaining time of the service life of the display area, and responds to the trigger operation to display the delay option. The user may set the extension time in the extension display interface where the extension option is located, on which the remaining time of the lifetime of the registered feature data, the extension time, and the lifetime after the extension are displayed, as shown in (b) of fig. 7. The access control device acquires the delay time set by the user, and in response to a delay confirmation operation for the delay option, extends the lifetime of the registered feature data, and returns to the display area, as shown in fig. 7 (c).
In one embodiment, the method further comprises: scanning the graphic code by using an access detector or a scanner corresponding to the access detector; and when the current time is within the valid period of the graphic code, the characteristic data obtained by scanning the graphic code is matched with the registered characteristic data, and the current time is within the service life of the registered characteristic data, the access controller corresponding to the access control detector is executed to execute the access control opening action.
Specifically, when the access control device is in the registration mode, the access control device performs entity scanning within a detection range through an access detector to obtain registration characteristic data of the entity certificate object. And then, the access control equipment can generate a corresponding graphic code according to the registration characteristic data of the entity certificate object and send the graphic code to the user terminal. Further, the access control device may set a lifetime for the registered feature data, which is the lifetime for the graphic code.
And then, when the user needs to open the access control, the identity can be verified through the graphic code. The access control equipment scans the graphic code within a preset range through the access detector or a scanner corresponding to the access detector. When the graphic code is scanned in a preset range, the characteristic data in the graphic code is obtained, and the current time for scanning the graphic code is obtained. The access control device may calculate a similarity, such as a cosine similarity, between the feature data and the registered feature data in the graphic code to determine whether the feature data and the registered feature data match. And the access control equipment acquires the service life corresponding to the registration characteristic data and determines whether the current time is in the service life. And when the feature data obtained by scanning the graphic code is matched with the registered feature data and the current time is within the service life of the registered feature data, executing an entrance guard opening action of an entrance guard controller corresponding to the entrance guard control detector.
In this embodiment, when the current time is within the valid time limit of the graphic code, but the feature data obtained by scanning the graphic code is not matched with the registered feature data, the access control device keeps the access lock.
In another embodiment, the service life of the registration feature data set at the time of registration is different from the service life of the graphic code generated by the registration feature data. The access control device obtains the service life of the graphic code and obtains the service life of the registered feature data, the current time is within the valid life of the graphic code, the feature data obtained by scanning the graphic code are matched with the registered feature data, and when the current time is within the service life of the registered feature data, the access controller corresponding to the access detector is controlled to execute the access opening action. When at least one situation that the current time exceeds the valid period of the graphic code, the current time exceeds the service life of the registered feature data, and the feature data obtained by scanning the graphic code and the registered feature data are not matched exists, the entrance guard control equipment keeps entrance guard locking.
In this embodiment, a graphic code corresponding to an entity article is scanned, and the graphic code carries feature data and an expiration date of the graphic code. When the graphic code is in the validity period, the characteristic data in the graphic code is matched with the registered characteristic data and the graphic code is in the validity period, the entrance guard is opened, so that the entrance guard can be opened through the corresponding graphic code when the physical object is not carried, the physical object can be combined with the graphic code to perform entrance guard control, and the flexibility of entrance guard control is improved.
In one embodiment, the graphic code may be sent to a user who needs to open a door via a user terminal. The user who needs to open the entrance guard can carry out authentication through this figure code to open the entrance guard, make the figure code accessible remote transfer that registered entity article corresponds to other users, in order to open the entrance guard, improve the flexibility of using.
In one embodiment, as shown in fig. 8, the method further comprises:
and 802, when the entity certificate object is in the registration mode, when the entity certificate object is in the detection range of the entrance guard detector, entity scanning is carried out through the entrance guard detector.
Specifically, the user may select an arbitrary entity credential object and register the entity credential object. The registered entity certificate object is endowed with temporary authority for controlling the opening of the entrance guard. Further, the user places the physical token object within the detection range of the access detector. The entrance guard control equipment detects in the detection range through the entrance guard detector to confirm whether entity voucher object exists in the detection range. And when the entrance guard detector detects the entity voucher object in the detection range, the entity scanning is carried out on the entity voucher object.
Step 804, obtaining the registration characteristic data of the entity certificate object through entity scanning.
Specifically, the entrance guard control device performs entity scanning within a detection range through an entrance guard detector to obtain multi-dimensional characteristic data of the entity voucher object. Further, the entrance guard control equipment acquires at least one of the characteristic data of each dimension of the color, the weight, the size, the form, the internal structure, the physical composition and the like of the entity article. The entrance guard control equipment takes at least one of the dimensional characteristics of the entity article, such as color, weight, size, form, internal structure, physical composition and the like, as the registration characteristic data of the entity certificate object.
Step 806, registering the entity certificate object according to the registration characteristic data, and setting the service life of the registration characteristic data.
Specifically, the access control device registers the entity certificate object according to the registration feature data so as to be endowed with the authority of the entity certificate object for opening the access control. Further, the user may choose to set a lifetime of the registration feature data, and when the lifetime is exceeded and the registration feature data is invalid, the authority of the entity credential object is invalid. For example, the service life is 1 day, 5 days, 1 month, etc., but is not limited thereto, and may be set as desired.
In this embodiment, the access control device may obtain a default lifetime setting as the lifetime of the entity credential object.
In this embodiment, through carrying out the entity scanning to the entity voucher object, register the entity voucher object according to the registration characteristic data of the entity voucher object that acquires, can use the verification object of control entrance guard in a flexible way for control entrance guard's verification object is difficult for discovering or stolen the security that gets, improves entrance guard and verifies. And the setting of the life of the entity voucher object enables the verification article for controlling the entrance guard to automatically lose efficacy, and the voucher object for controlling the entrance guard can be replaced at irregular time, so that the entrance guard control is safer.
FIG. 9 is a flow diagram illustrating registration of a physical credential object in one embodiment.
When the entity voucher object is in the registration mode, the access control equipment performs entity scanning through the access detector when the entity voucher object is in the detection range of the access detector. Through entity scanning, the access control equipment obtains registration characteristic data of the entity voucher object. The entrance guard control equipment registers the entity certificate object according to the registration characteristic data, stores the registration characteristic data to a background, and sets the service life of the registration characteristic data. And then, the access control equipment generates a corresponding graphic code according to the registration characteristic data, and stores the graphic code, the service life and the registration characteristic data in an associated manner, so that the registration of the entity certificate object is completed.
In one embodiment, as shown in fig. 10, the method further comprises:
step 1002, when the field characteristic data and the registered characteristic data are not matched and continuously occur for a first preset number of times, a risk prompt message is sent to a user terminal corresponding to the access controller.
Specifically, when the similarity is less than or equal to the similarity threshold, it is determined that the live feature data and the registered feature data do not match. When a user continuously places an entity article in the detection range of the access control detector for multiple times within a preset time period, the access control equipment accumulates the times of matching the field characteristic data and the registered characteristic data of the entity article. And when the matching failure (namely mismatching) times of the field characteristic data and the registered characteristic data reach a first preset time, triggering a risk prompt and sending a risk prompt message to a user terminal corresponding to the access controller.
Step 1004, when the field characteristic data and the registered characteristic data are not matched and continuously occur for a second preset number of times, triggering an alarm and informing the user terminal; the second preset times is greater than the first preset times.
Specifically, when the situation that the matching of the field characteristic data and the registered characteristic data of the same entity article fails continuously occurs within a preset time period, the number of times of the continuous matching failure is determined, and when the number of times reaches a second preset number of times, an alarm is triggered, wherein the second preset number of times is greater than the first preset number of times. Meanwhile, the access control equipment informs the user terminal of the information of triggering the alarm so that the user terminal can check whether the potential safety hazard exists in time.
Step 1006, when the user terminal triggers the alarm cancellation operation, the alarm is cancelled.
Specifically, after receiving the prompt message of the trigger information, the user terminal can check the reason for triggering the alarm and perform targeted processing. The user terminal can detect user operation, and when receiving an alarm canceling operation triggered by a user, the user terminal forwards the alarm canceling information to the access control equipment. The entrance guard control equipment responds to the alarm canceling operation and cancels the alarm.
In this embodiment, when the number of times that the field characteristic data and the registered characteristic data are not matched occurs continuously for multiple times, a risk prompt message is triggered to prompt a user or a worker to check the risk prompt message. After the risk prompt is triggered, the number of times that the field characteristic data and the registration characteristic data of the same entity object are not matched still occurs for multiple times, which indicates that a user tries to open the access control by using the entity object all the time, an alarm is triggered to prompt related personnel to process in time, potential safety hazards are eliminated, and the safety of access control is improved.
Fig. 11 is a schematic diagram illustrating a method for controlling access according to an embodiment.
When the entity voucher object is in the registration mode, the access control equipment performs entity scanning through the access detector when the entity voucher object is in the detection range of the access detector. Through entity scanning, the access control equipment obtains registration characteristic data of the entity voucher object. The entrance guard control equipment registers the entity certificate object according to the registration characteristic data, stores the registration characteristic data to a background, and sets the service life of the registration characteristic data. And then, the access control equipment generates a corresponding graphic code according to the registration characteristic data, and stores the graphic code, the service life and the registration characteristic data in an associated manner, so that the registration of the entity certificate object is completed.
And when the access control device is in the verification mode, the access control device performs entity scanning on the entity object in the detection range through the access detector. Through entity scanning, the access control equipment obtains the field characteristic data of the entity article.
The access control equipment acquires the scanning time of the access detector for entity scanning.
And then, the access control equipment transmits the field characteristic data and the scanning time of the entity article to a background. The background acquires the stored registered feature data, the similarity between the field feature data and the registered feature data is calculated through the feature calculating unit to determine whether the field feature data is matched with the registered feature data, and whether the scanning time is within the service life of the registered feature data is determined.
When the field characteristic data is matched with the registered characteristic data and the scanning time is within the service life of the registered characteristic data, the entrance guard control device controls the entrance guard controller corresponding to the entrance guard detector to execute entrance guard opening action.
Through registering arbitrary entity voucher object in order to be regarded as the temporary voucher that entrance guard opened for the object that is used for controlling entrance guard to open is difficult to be discover by the people, thereby avoids entrance guard's voucher to be duplicated or steals, has improved entrance guard control's security. And, the temporary voucher has life, can change the voucher object that is used for access control at indefinite time for access control is safer.
In one embodiment, there is provided an access control comprising:
when the entity certificate object is in the registration mode, the entrance guard control equipment performs entity scanning through the entrance guard detector when the entity certificate object is in the detection range of the entrance guard detector;
the access control equipment obtains registration characteristic data of an entity certificate object through entity scanning;
and then, the access control equipment registers the entity certificate object according to the registration characteristic data and sets the service life of the registration characteristic data. The entrance guard control equipment sets a unique registered object identification for the registered entity certificate object.
Optionally, the access control device may generate a corresponding graphic code according to the registration feature data of the entity credential object, set a lifetime for the registration feature data, and set a lifetime for the graphic code.
When the physical object is in the detection range of the entrance guard detector, the entrance guard control equipment detects the object identification of the physical object through the entrance guard detector;
and when the article identification is detected and is matched with the registered object identification of the entity voucher object, the access control equipment performs entity scanning on the entity object through the access detector.
Then, the access control equipment obtains the field characteristic data of the entity article through entity scanning, and converts the field characteristic data into a corresponding field characteristic vector;
then, the entrance guard control equipment acquires a registration feature vector corresponding to the registration feature data; determining the similarity between the field characteristic vector and the registered characteristic vector;
further, the entrance guard control equipment determines the matching result of the field characteristic data and the registered characteristic data according to the similarity.
Then, the access control equipment acquires the scanning time of the access detector for entity scanning;
optionally, when the field characteristic data is matched with the registered characteristic data and the scanning time is within the service life of the registered characteristic data, the access control device controls an access controller corresponding to the access detector to execute an access opening action; the registration characteristic data is characteristic data obtained by scanning the entity certificate object.
Optionally, when the field characteristic data is matched with the registered characteristic data and the scanning time exceeds the service life of the registered characteristic data, the access control equipment keeps the access locking; the entrance guard control equipment triggers the sending operation of sending the registration prompt message to the user terminal corresponding to the entrance guard controller, so that the user terminal displays the registration prompt message, and triggers the re-registration of the entity certificate object in response to the triggering operation of the displayed registration prompt message, so as to update the registration characteristic data and the corresponding service life.
Optionally, when the field characteristic data is matched with the registered characteristic data and the scanning time exceeds the service life of the registered characteristic data, the access control device triggers a verification operation of opening the access through the biological characteristics; the entrance guard control equipment acquires user biological characteristic data through an entrance guard detector or a biological characteristic collector corresponding to an entrance guard controller; and when the user biological characteristic data is matched with the registered biological characteristic data, the access control equipment controls the access controller corresponding to the access detector to execute an access opening action.
Optionally, the access control device scans the graphic code through an access detector or a scanner corresponding to the access detector; when the current time is within the valid period of the graphic code, the characteristic data obtained by scanning the graphic code is matched with the registered characteristic data, and the current time is within the service life of the registered characteristic data, the access control device executes the access controller corresponding to the access detector to execute the access opening action.
Optionally, when the field characteristic data and the registered characteristic data are not matched and continuously occur for a first preset number of times, the access control device sends a risk prompt message to a user terminal corresponding to the access controller; when the field characteristic data and the registered characteristic data are not matched and continuously occur for a second preset number of times, the entrance guard control equipment triggers an alarm and informs the user terminal; the second preset times are greater than the first preset times; and when the user terminal triggers the alarm canceling operation, the access control equipment cancels the alarm.
In this embodiment, through carrying out entity scanning to arbitrary entity voucher object, register entity voucher object according to the registration feature data that acquires to set up registration feature data's life, thereby regard the entity voucher object of registration as the temporary voucher of control entrance guard, make the difficult discovery of the verification object of control entrance guard or stolen the security of getting, improve entrance guard's verification.
An object identifier is set for the registered entity certificate object to distinguish the registered entity certificate object from the remaining unregistered objects with the same characteristics. And generating a graphic code corresponding to the registration characteristic data, so that the identity can be verified in various ways to open the access control. And can send the graphic code to other users and use to open entrance guard, improve entrance guard's control's flexibility.
When a user uses the entity article to verify identity so as to open the door, the article identification of the entity article is compared with the registered article identification of the entity certificate article to determine whether the entity article is registered. And when the object identifiers are the same, carrying out entity scanning on the entity object, and calculating whether the field characteristic data and the registered characteristic data of the entity object are matched or not and whether the entity object is in the valid use period or not. When the characteristics and the scanning time of the entity object meet the conditions, the entrance guard is opened, and the safety of entrance guard control is improved.
And, the remaining life span and the extension options of the physical object can be displayed, so that the user can extend the life span of the physical object as desired.
And when the physical object is invalid, the access control is not opened, and the access control is opened by verifying the biological characteristic data of the user. Or sending a registration prompt message to the user terminal to re-register and update the registration characteristic data and the corresponding service life. The embodiment provides a plurality of modes for access control based on entity articles, so that the user can flexibly select and meet different users. In this embodiment, regard as interim voucher arbitrary registered object for the voucher that is used for controlling entrance guard to open is difficult to be found by the people, thereby avoids entrance guard's voucher to be duplicated or steals, improves entrance guard's control's security and flexibility. The temporary voucher has a service life, and a voucher object for access control can be replaced at irregular time, so that the access control is safer.
It should be understood that although the various steps in the flowcharts of fig. 2-11 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2-11 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed in turn or alternately with other steps or at least some of the other steps or stages.
In one embodiment, as shown in fig. 12, there is provided an access control apparatus, which may be a part of a computer device using a software module or a hardware module, or a combination of the two, and specifically includes: a scan module 1202, an obtain module 1204, an obtain module 1206, and a control module 1208, wherein:
the scanning module 1202 is configured to perform entity scanning through the access detector when the entity object is within a detection range of the access detector.
An obtaining module 1204 is configured to obtain field characteristic data of the physical object through physical scanning.
The obtaining module 1206 is configured to obtain a scanning time of the access control detector for entity scanning.
The control module 1208 is configured to control the access controller corresponding to the access detector to execute an access opening action when the field characteristic data is matched with the registered characteristic data and the scanning time is within the service life of the registered characteristic data; the registration characteristic data is characteristic data obtained by scanning the entity certificate object.
The access control device registers any entity certificate object as a temporary certificate for access control. And performing entity scanning on the entity object to be verified to obtain the characteristics of the entity object, and comparing the characteristics of the entity object with the characteristics of the registered entity certificate object so as to judge whether the entity object is registered. And determining whether the scanning time of the entity item is within the service life of the registration characteristic data so as to determine that the registration information of the entity item is within the valid service life. When the characteristics and the scanning time of the entity object meet the conditions, the entrance guard is opened, and the safety of entrance guard control is improved. Any registered object is used as a temporary certificate, so that the certificate for controlling the opening of the access control system is not easy to be found by people, and the access control certificate is prevented from being copied or stolen. And, the temporary voucher has life, can change the voucher object that is used for access control at indefinite time for access control is safer.
In one embodiment, the scanning module 1202 is further configured to detect an item identifier of the physical item through the access detector when the physical item is within a detection range of the access detector; and when the article identification is detected and is matched with the registered object identification of the entity voucher object, the entity scanning is carried out on the entity article through the entrance guard detector.
In this embodiment, the access control detector detects the item identifier of the entity item, and compares the item identifier with the registered object identifier of the entity voucher object to determine whether the entity item is registered, so as to determine whether to enter the step of entity scanning the item, thereby easily and quickly eliminating the situation that the unregistered entity item is used for controlling access control.
In one embodiment, the apparatus further comprises a matching module; the matching module is used for converting the field characteristic data into corresponding field characteristic vectors; acquiring a registration feature vector corresponding to the registration feature data; determining the similarity between the field characteristic vector and the registered characteristic vector; and determining a matching result of the field characteristic data and the registered characteristic data according to the similarity.
In this embodiment, the feature data is converted into corresponding feature vectors, and according to the similarity between the field feature vectors and the registered feature vectors, whether the field feature data and the registered feature data are matched can be accurately determined, so that whether the entity article and the registered entity certificate object are the same object is determined, and corresponding access control operation is executed.
In one embodiment, the control module 1208 is further configured to: when the field characteristic data is matched with the registered characteristic data and the scanning time exceeds the service life of the registered characteristic data, keeping the entrance guard locked; triggering a sending operation of a registration prompt message, wherein the registration prompt message prompts re-registration of the entity certificate object so as to update the registration characteristic data and the corresponding service life.
In this embodiment, when the registration feature data is invalid, indicating that the registration information of the physical object is invalid, the access control is not opened, and the registration prompt information is triggered and sent to prompt the user to update the registration feature data and the corresponding service life, so that the physical object can only be used within the valid service life, and the credential object for access control is replaced at irregular time, or the registration information and the service life are updated, so that the access control is safer.
In one embodiment, the control module 1208 is further configured to: triggering the sending operation of sending the registration prompt message to the user terminal corresponding to the access controller, so that the user terminal displays the registration prompt message, and responding to the triggering operation of the displayed registration prompt message to trigger re-registration of the entity certificate object so as to update the registration characteristic data and the corresponding service life.
In this embodiment, the registration prompt message is sent to the user terminal to prompt the user to re-register the entity certificate object, so as to update the registration feature data of the entity certificate object and the service life of the registration feature data, thereby replacing the registration feature data and the service life of the same entity certificate object, and ensuring the security and reliability of the entity certificate object for controlling the access.
In one embodiment, the control module 1208 is further configured to: when the field characteristic data is matched with the registered characteristic data and the scanning time exceeds the service life of the registered characteristic data, triggering the verification operation of opening the access control through the biological characteristics; collecting user biological characteristic data through an entrance guard detector or a biological characteristic collector corresponding to an entrance guard controller; and when the user biological characteristic data is matched with the registered biological characteristic data, controlling the access controller corresponding to the access detector to execute an access opening action.
In this embodiment, when the registration feature data is invalid, the registration information indicating the physical object is invalid, and then the door access is not opened, so that the physical object can only be used within the valid use period. And triggering the biological characteristic verification, and opening the access control when the verification is passed, so that the entity article verification and the user biological characteristic verification are combined, and the access control is safer.
In one embodiment, the apparatus further comprises: and a delay module. The delay module is used for displaying the remaining time of the service life of the registered feature data when the field feature data is matched with the registered feature data and the scanning time is within the service life of the registered feature data; displaying a postponing option in response to a triggering operation on the displayed remaining time; the lifetime of the registered feature data is extended in response to a postponement confirmation operation for the postponement option.
In this embodiment, the use period of the registered physical object is increased by extending the use period of the registered feature data, so that the valid period of the physical object can be flexibly set.
In one embodiment, the scan module 1202 is further configured to: scanning the graphic code by using an access detector or a scanner corresponding to the access detector;
the control module 1208 is further configured to: and when the current time is within the valid period of the graphic code, the characteristic data obtained by scanning the graphic code is matched with the registered characteristic data, and the current time is within the service life of the registered characteristic data, the access controller corresponding to the access control detector is executed to execute the access control opening action.
In this embodiment, a graphic code corresponding to an entity article is scanned, and the graphic code carries feature data and an expiration date of the graphic code. When the graphic code is in the validity period, the characteristic data in the graphic code is matched with the registered characteristic data and the graphic code is in the validity period, the entrance guard is opened, so that the entrance guard can be opened through the corresponding graphic code when the physical object is not carried, the physical object can be combined with the graphic code to perform entrance guard control, and the flexibility of entrance guard control is improved.
In one embodiment, the apparatus further comprises: and registering the module.
The scanning module 1202 is further configured to, when the entity certificate object is in the detection range of the access detector in the registration mode, perform entity scanning by the access detector;
the obtaining module 1204 is further configured to obtain registration feature data of the entity credential object through entity scanning;
the registration module is also used for registering the entity certificate object according to the registration characteristic data and setting the service life of the registration characteristic data.
In this embodiment, through carrying out the entity scanning to the entity voucher object, register the entity voucher object according to the registration characteristic data of the entity voucher object that acquires, can use the verification object of control entrance guard in a flexible way for control entrance guard's verification object is difficult for discovering or stolen the security that gets, improves entrance guard and verifies. And the setting of the life of the entity voucher object enables the verification article for controlling the entrance guard to automatically lose efficacy, and the voucher object for controlling the entrance guard can be replaced at irregular time, so that the entrance guard control is safer.
In one embodiment, the apparatus further comprises a risk reminder module. The risk prompting module is also used for sending a risk prompting message to a user terminal corresponding to the access controller when the field characteristic data and the registered characteristic data are not matched for a first preset number of times; when the field characteristic data and the registered characteristic data are not matched and continuously occur for a second preset number of times, triggering an alarm and informing the user terminal; the second preset times are greater than the first preset times; and when the user terminal triggers the alarm canceling operation, canceling the alarm.
In this embodiment, when the number of times that the field characteristic data and the registered characteristic data are not matched occurs continuously for multiple times, a risk prompt message is triggered to be sent to prompt a user or a worker to check the risk prompt message. After the risk prompt is triggered, the number of times that the field characteristic data and the registration characteristic data of the same entity object are not matched still occurs for multiple times, which indicates that a user tries to open the access control by using the entity object all the time, an alarm is triggered to prompt related personnel to process in time, potential safety hazards are eliminated, and the safety of access control is improved.
For the specific definition of the access control device, reference may be made to the above definition of the access control method, which is not described herein again. All modules in the access control device can be completely or partially realized through software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a door access control device or an intelligent door access control terminal, and its internal structure diagram may be as shown in fig. 13. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement an access control method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 13 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is further provided, which includes a memory and a processor, the memory stores a computer program, and the processor implements the steps of the above method embodiments when executing the computer program.
In an embodiment, a computer-readable storage medium is provided, in which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned method embodiments.
In one embodiment, a computer program product or computer program is provided that includes computer instructions stored in a computer-readable storage medium. The computer instructions are read by a processor of a computer device from a computer-readable storage medium, and the computer instructions are executed by the processor to cause the computer device to perform the steps in the above-mentioned method embodiments.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware related to instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile memory may include Read-only memory (ROM), magnetic tape, floppy disk, flash memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above examples only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (15)

1. An access control method, comprising:
when the entity object is in the detection range of the entrance guard detector, entity scanning is carried out through the entrance guard detector;
obtaining field characteristic data of the entity article through the entity scanning;
acquiring the scanning time of the access control detector for entity scanning;
when the field characteristic data is matched with the registered characteristic data and the scanning time is within the service life of the registered characteristic data, the field characteristic data and the registered characteristic data are matched, and the scanning time is within the service life of the registered characteristic data
Controlling an entrance guard controller corresponding to the entrance guard detector to execute entrance guard opening action; the registration characteristic data is characteristic data obtained by scanning the entity certificate object.
2. The method of claim 1, wherein the performing the physical scan by the access detector when the physical object is within a detection range of the access detector comprises:
when the physical object is in the detection range of the entrance guard detector, detecting the object identification of the physical object through the entrance guard detector;
and when the article identification is detected and is matched with the registered object identification of the entity voucher object, the entity scanning is carried out on the entity object through the entrance guard detector.
3. The method of claim 1, wherein after said obtaining field characterization data for said physical object, said method further comprises:
converting the field characteristic data into corresponding field characteristic vectors;
acquiring a registration characteristic vector corresponding to the registration characteristic data;
determining a similarity between the field feature vector and the registration feature vector;
and determining a matching result of the field characteristic data and the registered characteristic data according to the similarity.
4. The method of claim 1, further comprising:
when the field characteristic data is matched with the registered characteristic data and the scanning time exceeds the service life of the registered characteristic data, keeping the entrance guard locked;
triggering a sending operation of a registration prompt message, wherein the registration prompt message prompts re-registration of the entity certificate object so as to update the registration characteristic data and the corresponding service life.
5. The method of claim 4, wherein the triggering the sending of the registration alert message comprises:
triggering a sending operation of sending a registration prompt message to a user terminal corresponding to the access controller, so that the user terminal displays the registration prompt message, responding to the triggering operation of the displayed registration prompt message, and re-registering the entity certificate object so as to update the registration characteristic data and the corresponding service life.
6. The method of claim 1, further comprising:
when the field characteristic data is matched with the registered characteristic data and the scanning time exceeds the service life of the registered characteristic data, triggering the verification operation of opening the access control through biological characteristics;
collecting user biological characteristic data through the access detector or a biological characteristic collector corresponding to the access controller;
and when the user biological characteristic data is matched with the registered biological characteristic data, controlling the access controller corresponding to the access detector to execute an access opening action.
7. The method of claim 1, further comprising:
when the field characteristic data is matched with the registered characteristic data and the scanning time is within the service life of the registered characteristic data, displaying the remaining time of the service life of the registered characteristic data;
responding to the trigger operation of the remaining time, and displaying a delay option;
and in response to a postponement confirmation operation on the postponement option, prolonging the service life of the registered feature data.
8. The method according to any one of claims 1 to 7, further comprising:
scanning a graphic code through the access control detector or a scanner corresponding to the access control detector;
and when the current time is in the valid period of the graphic code, the characteristic data obtained by scanning the graphic code is matched with the registration characteristic data, and the current time is in the service life of the registration characteristic data, the entrance guard controller corresponding to the entrance guard detector is controlled to execute an entrance guard opening action.
9. The method according to any one of claims 1 to 7, further comprising:
when the entity voucher object is in the registration mode, when the entity voucher object is in the detection range of the entrance guard detector, entity scanning is carried out through the entrance guard detector;
obtaining registration characteristic data of the entity certificate object through the entity scanning;
and registering the entity certificate object according to the registration characteristic data, and setting the service life of the registration characteristic data.
10. The method according to any one of claims 1 to 7, further comprising:
when the field characteristic data and the registered characteristic data are not matched and continuously occur for a first preset number of times, a risk prompt message is sent to a user terminal corresponding to the access controller;
when the field characteristic data and the registered characteristic data are not matched and continuously occur for a second preset number of times, triggering an alarm and informing the user terminal; the second preset times are greater than the first preset times;
and when the user terminal triggers the alarm canceling operation, canceling the alarm.
11. An access control apparatus, comprising:
the scanning module is used for scanning the entity through the entrance guard detector when the entity object is in the detection range of the entrance guard detector;
an obtaining module, configured to obtain field feature data of the entity item through the entity scanning;
the acquisition module is used for acquiring the scanning time of the access control detector for entity scanning;
the control module is used for controlling the entrance guard controller corresponding to the entrance guard detector to execute entrance guard opening action when the field characteristic data is matched with the registered characteristic data and the scanning time is within the service life of the registered characteristic data; the registration characteristic data is characteristic data obtained by scanning the entity certificate object.
12. The apparatus of claim 11, wherein the scanning module is further configured to detect an item identifier of the physical item through the access detector when the physical item is within a detection range of the access detector; and when the article identification is detected and is matched with the registered object identification of the entity voucher object, the entity scanning is carried out on the entity object through the entrance guard detector.
13. The apparatus of claim 11, further comprising a matching module; the matching module is used for converting the field characteristic data into corresponding field characteristic vectors; acquiring a registration characteristic vector corresponding to the registration characteristic data; determining a similarity between the field feature vector and the registration feature vector; and determining a matching result of the field characteristic data and the registered characteristic data according to the similarity.
14. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor realizes the steps of the method of any one of claims 1 to 10 when executing the computer program.
15. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 10.
CN202010933086.9A 2020-09-08 2020-09-08 Access control method and device, computer equipment and storage medium Pending CN111798603A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010933086.9A CN111798603A (en) 2020-09-08 2020-09-08 Access control method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010933086.9A CN111798603A (en) 2020-09-08 2020-09-08 Access control method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111798603A true CN111798603A (en) 2020-10-20

Family

ID=72834211

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010933086.9A Pending CN111798603A (en) 2020-09-08 2020-09-08 Access control method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111798603A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113223224A (en) * 2021-05-12 2021-08-06 支付宝(杭州)信息技术有限公司 Traffic processing method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105931340A (en) * 2016-06-12 2016-09-07 南宁思飞电子科技有限公司 Intelligent visitor access control device applicable to residential community
CN205644704U (en) * 2016-05-11 2016-10-12 王郦安 Two -dimensional code lock system
CN108648319A (en) * 2018-06-20 2018-10-12 睿力集成电路有限公司 The personnel entry/exit management system and method in copper wiring region
CN109727350A (en) * 2018-12-14 2019-05-07 深圳壹账通智能科技有限公司 A kind of Door-access control method and device based on recognition of face
CN110610570A (en) * 2019-09-24 2019-12-24 深圳好逸多科技有限公司 Intelligent cabinet lock system
CN110766839A (en) * 2018-11-01 2020-02-07 上海掌门科技有限公司 Entrance guard device and using method thereof
CN210222865U (en) * 2019-09-20 2020-03-31 云南电网有限责任公司红河供电局 Recognition device is worn to safety helmet

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN205644704U (en) * 2016-05-11 2016-10-12 王郦安 Two -dimensional code lock system
CN105931340A (en) * 2016-06-12 2016-09-07 南宁思飞电子科技有限公司 Intelligent visitor access control device applicable to residential community
CN108648319A (en) * 2018-06-20 2018-10-12 睿力集成电路有限公司 The personnel entry/exit management system and method in copper wiring region
CN110766839A (en) * 2018-11-01 2020-02-07 上海掌门科技有限公司 Entrance guard device and using method thereof
CN109727350A (en) * 2018-12-14 2019-05-07 深圳壹账通智能科技有限公司 A kind of Door-access control method and device based on recognition of face
CN210222865U (en) * 2019-09-20 2020-03-31 云南电网有限责任公司红河供电局 Recognition device is worn to safety helmet
CN110610570A (en) * 2019-09-24 2019-12-24 深圳好逸多科技有限公司 Intelligent cabinet lock system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113223224A (en) * 2021-05-12 2021-08-06 支付宝(杭州)信息技术有限公司 Traffic processing method and device
CN113223224B (en) * 2021-05-12 2023-10-24 支付宝(杭州)信息技术有限公司 Traffic processing method and device

Similar Documents

Publication Publication Date Title
CA2834989C (en) System and method for user access of dispensing unit
US7986817B2 (en) Verification apparatus, verification method and verification program
US7953256B2 (en) Method and system for detecting fingerprint spoofing
US11997087B2 (en) Mobile enrollment using a known biometric
JP6500610B2 (en) Authentication device, authentication method and authentication program
US20130163833A1 (en) Security device with security image update capability
JP7485158B2 (en) Facility management system, facility management method, and computer program
CN110506266A (en) For using the access control of the first and second biometric datas access restriction of domain
US20220414194A1 (en) Method and system for user authentication
CN111798603A (en) Access control method and device, computer equipment and storage medium
CN107615299B (en) For assessing the method and system of fingerprint template
US20100271173A1 (en) Management system and management method
CN113139104B (en) Information processing system and control method
KR101926709B1 (en) Control apparatus for biometric and method thereof
JP2013120454A (en) Information processing system, information processing method, information processing device, control method or control program for the information processing device
JP5276554B2 (en) Biometric information authentication apparatus and biometric information authentication program
JP4175786B2 (en) Personal identification system
JP2009169796A (en) System management device and security system
US20230023944A1 (en) System and method for dynamic multi-factor authentication
JP7375900B1 (en) Entry management system, entry management method, and program
WO2024053045A1 (en) Information processing system, information processing method, and recording medium
JPH05224771A (en) Registered person identifying device
JP2023100064A (en) Authentication system, authentication device, and authentication method
KR20200065731A (en) Program Access management method and system using of biometric recognition
CN118035968A (en) Authorization authentication method, system, equipment and medium for combined biological recognition

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40030085

Country of ref document: HK

RJ01 Rejection of invention patent application after publication

Application publication date: 20201020

RJ01 Rejection of invention patent application after publication