CN112351272B - CTID access control equipment detection method and system - Google Patents

CTID access control equipment detection method and system Download PDF

Info

Publication number
CN112351272B
CN112351272B CN202011178626.3A CN202011178626A CN112351272B CN 112351272 B CN112351272 B CN 112351272B CN 202011178626 A CN202011178626 A CN 202011178626A CN 112351272 B CN112351272 B CN 112351272B
Authority
CN
China
Prior art keywords
ctid
detection
access control
control equipment
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011178626.3A
Other languages
Chinese (zh)
Other versions
CN112351272A (en
Inventor
吴太亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Newland Communication Science Technologies Co ltd
Original Assignee
Fujian Newland Communication Science Technologies Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Newland Communication Science Technologies Co ltd filed Critical Fujian Newland Communication Science Technologies Co ltd
Priority to CN202011178626.3A priority Critical patent/CN112351272B/en
Publication of CN112351272A publication Critical patent/CN112351272A/en
Application granted granted Critical
Publication of CN112351272B publication Critical patent/CN112351272B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N17/00Diagnosis, testing or measuring for television systems or their details
    • H04N17/002Diagnosis, testing or measuring for television systems or their details for television cameras
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters
    • H04B17/318Received signal strength
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass

Abstract

The invention provides a CTID access control equipment detection method and a system thereof, belonging to the technical field of access control equipment, wherein the method comprises the following steps: step S10, the CTID access control equipment stores an equipment detection rule comprising a plurality of detection sub-rules; step S20, setting a detection list of the CTID access control equipment through a computer, and packaging the detection list into packaging data by the computer and then sending the packaging data to the CTID access control equipment; step S30, receiving and analyzing the encapsulation data by the CTID access control equipment to obtain a detection list; and step S40, the CTID access control equipment detects equipment based on the equipment detection rule and the detection list. The invention has the advantages that: the CTID access control equipment of different types is dynamically detected, and the detection cost is greatly reduced.

Description

CTID access control equipment detection method and system
Technical Field
The invention relates to the technical field of access control equipment, in particular to a CTID access control equipment detection method and system.
Background
CTID (network identification) refers to network identity authentication credentials, and unique BID values (personal unique identifiers) are generated by authentication of citizens' identity cards and figures through a CTID center (trusted identity authentication platform) and used for user identity recognition. Similar to a pub-rent house and a hotel, a user can display a two-dimensional code or a bar code with BID value to the CTID intelligent door lock through a mobile phone to unlock after identity authentication, namely, the user can track and manage the tenant through the CTID, so that the verification of the house and the person is realized.
Along with the progress of science and technology and the diversification of application scene, the CTID entrance guard equipment of various configurations appears, for example communication module adopts wifi, ethernet or 4G, and equipment form is desktop equipment or hanging equipment, and communication serial port is 232 serial ports or 485 serial ports, and some entrance guard equipment need temperature test module, touch-control or NFC, and some entrance guard equipment does not need, and the different functional module has been integrated based on the difference of application scene to the CTID entrance guard equipment of different types promptly. Before leaving the factory, the CTID access control equipment needs to carry out factory testing on each functional module.
Aiming at factory testing of CTID access control equipment, conventionally, detection software is required to be independently developed aiming at different CTID access control equipment, so that a plurality of versions of the detection software exist, and a large amount of manpower and material resources are required for development and maintenance of the detection software.
Therefore, how to provide a method and a system for detecting CTID access control equipment, so as to realize dynamic detection of different CTID access control equipment, reduce detection cost, and become a problem to be solved urgently.
Disclosure of Invention
The invention aims to solve the technical problem of providing a detection method and a detection system for CTID access control equipment, which can realize dynamic detection of different CTID access control equipment and reduce detection cost.
In a first aspect, the invention provides a method for detecting CTID access control equipment, which comprises the following steps:
step S10, the CTID access control equipment stores an equipment detection rule comprising a plurality of detection sub-rules;
step S20, setting a detection list of the CTID access control equipment through a computer, and packaging the detection list into packaging data by the computer and then sending the packaging data to the CTID access control equipment;
step S30, receiving and analyzing the encapsulation data by the CTID access control equipment to obtain a detection list;
and step S40, the CTID access control equipment detects equipment based on the equipment detection rule and the detection list.
Further, in the step S10, the device detection rule at least includes a communication module detection sub-rule, a camera detection sub-rule, a CTID module detection sub-rule, and an identity authentication module detection sub-rule;
the communication module detection sub-rules specifically include: judging whether an Ethernet, a 4G network, a WIFI network or a Bluetooth network can be searched and connected, and if the signal strength is higher than a preset threshold value, the communication module is qualified; if not, the communication module detects failure;
the camera detection sub-rule specifically comprises: calling a CTID camera to shoot a photo and record a video, storing the photo and the video to a preset path, judging whether the path has the corresponding photo and video, and if so, detecting the CTID camera to be qualified; if not, the CTID camera is unqualified;
the CTID module detection rule is specifically as follows: setting a first time period, displaying the CTID two-dimensional code to the CTID camera through the mobile phone, acquiring the CTID two-dimensional code by the CTID camera, judging whether the CTID module decodes the CTID two-dimensional code in the first time period, and if so, detecting the CTID module to be qualified; if not, the CTID module detects failure;
the identity authentication module detection sub-rules are specifically as follows: setting a second time period, creating identity data of a first line Cheng Douqu identity authentication module, judging whether the identity authentication module returns the identity data in the second time period, and if so, detecting that the identity authentication module is qualified; if not, the identity authentication module is unqualified.
Further, the step S20 specifically includes:
based on the pattern of the CTID access control equipment to be detected, a detection list of the CTID access control equipment is set through a computer, and the computer packages the detection list into package data through a JSON format and then sends the package data to the CTID access control equipment through a serial port.
Further, the step S30 specifically includes:
and the CTID access control equipment receives the encapsulated data in real time, and analyzes the encapsulated data by utilizing an api interface of the JSON library to obtain a detection list.
Further, the step S40 specifically includes:
and the CTID access control equipment selects a corresponding detection sub-rule to carry out equipment detection based on the equipment detection rule and the detection list, generates a detection result in real time, and displays the detection result on a display screen of the CTID access control equipment or sends the detection result to a computer.
In a second aspect, the invention provides a detection system for CTID access control equipment, which comprises the following modules:
the device detection rule storage module is used for storing a device detection rule comprising a plurality of detection sub-rules by the CTID access control device;
the detection list setting module is used for setting a detection list of the CTID access control equipment through a computer, and the computer packages the detection list into package data and sends the package data to the CTID access control equipment;
the detection list analysis module is used for receiving and analyzing the encapsulation data by the CTID access control equipment to obtain a detection list;
and the equipment detection module is used for detecting the equipment by the CTID access control equipment based on the equipment detection rule and the detection list.
Further, in the device detection rule storage module, the device detection rule at least comprises a communication module detection sub-rule, a camera detection sub-rule, a CTID module detection sub-rule and an identity authentication module detection sub-rule;
the communication module detection sub-rules specifically include: judging whether an Ethernet, a 4G network, a WIFI network or a Bluetooth network can be searched and connected, and if the signal strength is higher than a preset threshold value, the communication module is qualified; if not, the communication module detects failure;
the camera detection sub-rule specifically comprises: calling a CTID camera to shoot a photo and record a video, storing the photo and the video to a preset path, judging whether the path has the corresponding photo and video, and if so, detecting the CTID camera to be qualified; if not, the CTID camera is unqualified;
the CTID module detection rule is specifically as follows: setting a first time period, displaying the CTID two-dimensional code to the CTID camera through the mobile phone, acquiring the CTID two-dimensional code by the CTID camera, judging whether the CTID module decodes the CTID two-dimensional code in the first time period, and if so, detecting the CTID module to be qualified; if not, the CTID module detects failure;
the identity authentication module detection sub-rules are specifically as follows: setting a second time period, creating identity data of a first line Cheng Douqu identity authentication module, judging whether the identity authentication module returns the identity data in the second time period, and if so, detecting that the identity authentication module is qualified; if not, the identity authentication module is unqualified.
Further, the detection list setting module specifically includes:
based on the pattern of the CTID access control equipment to be detected, a detection list of the CTID access control equipment is set through a computer, and the computer packages the detection list into package data through a JSON format and then sends the package data to the CTID access control equipment through a serial port.
Further, the detection list analysis module specifically includes:
and the CTID access control equipment receives the encapsulated data in real time, and analyzes the encapsulated data by utilizing an api interface of the JSON library to obtain a detection list.
Further, the device detection module specifically includes:
and the CTID access control equipment selects a corresponding detection sub-rule to carry out equipment detection based on the equipment detection rule and the detection list, generates a detection result in real time, and displays the detection result on a display screen of the CTID access control equipment or sends the detection result to a computer.
The invention has the advantages that:
the device detection rules are stored in the CTID access control device in advance, the device detection rules comprise detection sub-rules of all functional modules of the CTID access control devices of different types, based on the functional modules of the CTID access control device to be detected, a detection list of the CTID access control device is set in a computer and sent to the CTID access control device, the CTID access control device selects the corresponding detection sub-rules to carry out device detection based on the device detection rules and the detection list, namely, the detection functional modules are set according to requirements, dynamic detection of the CTID access control devices of different types is finally achieved, and the development of detection software for the CTID access control devices of different types is not needed unlike the traditional method, so that the opening and maintenance cost of the detection software is greatly reduced, and the detection cost of the CTID access control device is greatly reduced.
Drawings
The invention will be further described with reference to examples of embodiments with reference to the accompanying drawings.
Fig. 1 is a flowchart of a method for detecting a CTID access control device according to the present invention.
Fig. 2 is a schematic structural diagram of a detection system of a CTID access control device.
Detailed Description
According to the technical scheme in the embodiment of the application, the overall thought is as follows: the method comprises the steps that equipment detection rules are stored in the CTID access control equipment in advance, the equipment detection rules comprise detection sub-rules of all functional modules of the CTID access control equipment of different styles, the CTID access control equipment selects corresponding detection sub-rules to carry out equipment detection based on the equipment detection rules and a detection list set by a computer, namely the CTID access control equipment stores the detection sub-rules of all the functional modules in advance, the corresponding detection sub-rules are selected as required during specific detection, and finally dynamic detection of the CTID access control equipment of different styles is achieved, and detection cost is reduced.
Referring to fig. 1 to 2, a preferred embodiment of a detection method for a CTID access control device of the present invention includes the following steps:
step S10, the CTID access control equipment stores an equipment detection rule comprising a plurality of detection sub-rules;
step S20, setting a detection list of the CTID access control equipment through a computer, and packaging the detection list into packaging data by the computer and then sending the packaging data to the CTID access control equipment; selecting detection options of CTID access control equipment through a computer, and generating a detection list;
step S30, receiving and analyzing the encapsulation data by the CTID access control equipment to obtain a detection list; the safety of the detection list transmission can be improved by packaging and then analyzing the detection list;
and step S40, the CTID access control equipment detects equipment based on the equipment detection rule and the detection list. When the method is implemented, the CTID access control equipment automatically starts a monitoring thread when being started, the monitoring thread is used for implementing the encapsulation data sent by the monitoring computer, and when the encapsulation data is received, the CTID access control equipment is automatically analyzed and executed to detect.
In the step S10, the device detection rule at least includes a communication module detection sub-rule, a camera detection sub-rule, a CTID module detection sub-rule, and an identity authentication module detection sub-rule;
the communication module detection sub-rules specifically include: judging whether an Ethernet, a 4G network, a WIFI network or a Bluetooth network can be searched and connected, and if the signal strength is higher than a preset threshold value, the communication module is qualified; if not, the communication module detects failure;
the camera detection sub-rule specifically comprises: calling a CTID camera to shoot a photo and record a video, storing the photo and the video to a preset path, judging whether the path has the corresponding photo and video, and if so, detecting the CTID camera to be qualified; if not, the CTID camera is unqualified;
the CTID module detection rule is specifically as follows: setting a first time period, displaying the CTID two-dimensional code to the CTID camera through the mobile phone, acquiring the CTID two-dimensional code by the CTID camera, judging whether the CTID module decodes the CTID two-dimensional code in the first time period, and if so, detecting the CTID module to be qualified; if not, the CTID module detects failure;
the identity authentication module detection sub-rules are specifically as follows: setting a second time period, creating identity data of a first line Cheng Douqu identity authentication module, judging whether the identity authentication module returns the identity data in the second time period, and if so, detecting that the identity authentication module is qualified; if not, the identity authentication module is unqualified.
In the implementation, the CTID access control equipment can be detected by generating mutually independent detection subroutines based on the detection subroutines.
The step S20 specifically includes:
based on the pattern of the CTID access control equipment to be detected, a detection list of the CTID access control equipment is set through a computer, and the computer packages the detection list into package data through a JSON format and then sends the package data to the CTID access control equipment through a serial port. JSON is a lightweight data exchange format, which is easy for people to read and write, and is easy for machines to analyze and generate, and effectively improves network transmission efficiency.
The step S30 specifically includes:
and the CTID access control equipment receives the encapsulated data in real time, and analyzes the encapsulated data by utilizing an api interface of the JSON library to obtain a detection list.
The step S40 specifically includes:
and the CTID access control equipment selects a corresponding detection sub-rule to perform equipment detection based on the equipment detection rule and the detection list, generates a detection result in real time, and displays the detection result on a display screen of the CTID access control equipment or sends the detection result to a computer through a serial port. And displaying the detection result through a display screen of the CTID access control equipment, and binding with the UI in advance.
The invention relates to a preferred embodiment of a CTID access control equipment detection system, which comprises the following modules:
the device detection rule storage module is used for storing a device detection rule comprising a plurality of detection sub-rules by the CTID access control device;
the detection list setting module is used for setting a detection list of the CTID access control equipment through a computer, and the computer packages the detection list into package data and sends the package data to the CTID access control equipment; selecting detection options of CTID access control equipment through a computer, and generating a detection list;
the detection list analysis module is used for receiving and analyzing the encapsulation data by the CTID access control equipment to obtain a detection list; the safety of the detection list transmission can be improved by packaging and then analyzing the detection list;
and the equipment detection module is used for detecting the equipment by the CTID access control equipment based on the equipment detection rule and the detection list. When the method is implemented, the CTID access control equipment automatically starts a monitoring thread when being started, the monitoring thread is used for implementing the encapsulation data sent by the monitoring computer, and when the encapsulation data is received, the CTID access control equipment is automatically analyzed and executed to detect.
The device detection rule storage module is used for storing device detection rules, wherein the device detection rules at least comprise a communication module detection sub-rule, a camera detection sub-rule, a CTID module detection sub-rule and an identity authentication module detection sub-rule;
the communication module detection sub-rules specifically include: judging whether an Ethernet, a 4G network, a WIFI network or a Bluetooth network can be searched and connected, and if the signal strength is higher than a preset threshold value, the communication module is qualified; if not, the communication module detects failure;
the camera detection sub-rule specifically comprises: calling a CTID camera to shoot a photo and record a video, storing the photo and the video to a preset path, judging whether the path has the corresponding photo and video, and if so, detecting the CTID camera to be qualified; if not, the CTID camera is unqualified;
the CTID module detection rule is specifically as follows: setting a first time period, displaying the CTID two-dimensional code to the CTID camera through the mobile phone, acquiring the CTID two-dimensional code by the CTID camera, judging whether the CTID module decodes the CTID two-dimensional code in the first time period, and if so, detecting the CTID module to be qualified; if not, the CTID module detects failure;
the identity authentication module detection sub-rules are specifically as follows: setting a second time period, creating identity data of a first line Cheng Douqu identity authentication module, judging whether the identity authentication module returns the identity data in the second time period, and if so, detecting that the identity authentication module is qualified; if not, the identity authentication module is unqualified.
In the implementation, the CTID access control equipment can be detected by generating mutually independent detection subroutines based on the detection subroutines.
The detection list setting module specifically comprises:
based on the pattern of the CTID access control equipment to be detected, a detection list of the CTID access control equipment is set through a computer, and the computer packages the detection list into package data through a JSON format and then sends the package data to the CTID access control equipment through a serial port. JSON is a lightweight data exchange format, which is easy for people to read and write, and is easy for machines to analyze and generate, and effectively improves network transmission efficiency.
The detection list analysis module specifically comprises:
and the CTID access control equipment receives the encapsulated data in real time, and analyzes the encapsulated data by utilizing an api interface of the JSON library to obtain a detection list.
The equipment detection module specifically comprises:
and the CTID access control equipment selects a corresponding detection sub-rule to perform equipment detection based on the equipment detection rule and the detection list, generates a detection result in real time, and displays the detection result on a display screen of the CTID access control equipment or sends the detection result to a computer through a serial port. And displaying the detection result through a display screen of the CTID access control equipment, and binding with the UI in advance.
In summary, the invention has the advantages that:
the device detection rules are stored in the CTID access control device in advance, the device detection rules comprise detection sub-rules of all functional modules of the CTID access control devices of different types, based on the functional modules of the CTID access control device to be detected, a detection list of the CTID access control device is set in a computer and sent to the CTID access control device, the CTID access control device selects the corresponding detection sub-rules to carry out device detection based on the device detection rules and the detection list, namely, the detection functional modules are set according to requirements, dynamic detection of the CTID access control devices of different types is finally achieved, and the development of detection software for the CTID access control devices of different types is not needed unlike the traditional method, so that the opening and maintenance cost of the detection software is greatly reduced, and the detection cost of the CTID access control device is greatly reduced.
While specific embodiments of the invention have been described above, it will be appreciated by those skilled in the art that the specific embodiments described are illustrative only and not intended to limit the scope of the invention, and that equivalent modifications and variations of the invention in light of the spirit of the invention will be covered by the claims of the present invention.

Claims (8)

1. A CTID access control equipment detection method is characterized in that: the method comprises the following steps:
step S10, the CTID access control equipment stores an equipment detection rule comprising a detection sub-rule;
step S20, setting a detection list of the CTID access control equipment through a computer, and packaging the detection list into packaging data by the computer and then sending the packaging data to the CTID access control equipment;
step S30, receiving and analyzing the encapsulation data by the CTID access control equipment to obtain a detection list;
step S40, the CTID access control equipment performs equipment detection based on the equipment detection rule and the detection list;
in the step S10, the device detection rule at least includes a communication module detection sub-rule, a camera detection sub-rule, a CTID module detection sub-rule, and an identity authentication module detection sub-rule;
the communication module detection sub-rules specifically include: judging whether an Ethernet, a 4G network, a WIFI network or a Bluetooth network can be searched and connected, and if the signal strength is higher than a preset threshold value, the communication module is qualified; if not, the communication module detects failure;
the camera detection sub-rule specifically comprises: calling a CTID camera to shoot a photo and record a video, storing the photo and the video to a preset path, judging whether the path has the corresponding photo and video, and if so, detecting the CTID camera to be qualified; if not, the CTID camera is unqualified;
the CTID module detection rule is specifically as follows: setting a first time period, displaying the CTID two-dimensional code to the CTID camera through the mobile phone, acquiring the CTID two-dimensional code by the CTID camera, judging whether the CTID module decodes the CTID two-dimensional code in the first time period, and if so, detecting the CTID module to be qualified; if not, the CTID module detects failure;
the identity authentication module detection sub-rules are specifically as follows: setting a second time period, creating identity data of a first line Cheng Douqu identity authentication module, judging whether the identity authentication module returns the identity data in the second time period, and if so, detecting that the identity authentication module is qualified; if not, the identity authentication module is unqualified.
2. The method for detecting the CTID access control equipment as claimed in claim 1, wherein the method comprises the following steps: the step S20 specifically includes:
based on the pattern of the CTID access control equipment to be detected, a detection list of the CTID access control equipment is set through a computer, and the computer packages the detection list into package data through a JSON format and then sends the package data to the CTID access control equipment through a serial port.
3. The method for detecting the CTID access control equipment as claimed in claim 1, wherein the method comprises the following steps: the step S30 specifically includes:
and the CTID access control equipment receives the encapsulated data in real time, and analyzes the encapsulated data by utilizing an api interface of the JSON library to obtain a detection list.
4. The method for detecting the CTID access control equipment as claimed in claim 1, wherein the method comprises the following steps: the step S40 specifically includes:
and the CTID access control equipment selects a corresponding detection sub-rule to carry out equipment detection based on the equipment detection rule and the detection list, generates a detection result in real time, and displays the detection result on a display screen of the CTID access control equipment or sends the detection result to a computer.
5. A CTID access control equipment detecting system is characterized in that: the device comprises the following modules:
the device detection rule storage module is used for storing a device detection rule comprising a detection sub-rule by the CTID access control device;
the detection list setting module is used for setting a detection list of the CTID access control equipment through a computer, and the computer packages the detection list into package data and sends the package data to the CTID access control equipment;
the detection list analysis module is used for receiving and analyzing the encapsulation data by the CTID access control equipment to obtain a detection list;
the device detection module is used for detecting the CTID access control device based on the device detection rule and the detection list;
the device detection rule storage module is used for storing device detection rules, wherein the device detection rules at least comprise a communication module detection sub-rule, a camera detection sub-rule, a CTID module detection sub-rule and an identity authentication module detection sub-rule;
the communication module detection sub-rules specifically include: judging whether an Ethernet, a 4G network, a WIFI network or a Bluetooth network can be searched and connected, and if the signal strength is higher than a preset threshold value, the communication module is qualified; if not, the communication module detects failure;
the camera detection sub-rule specifically comprises: calling a CTID camera to shoot a photo and record a video, storing the photo and the video to a preset path, judging whether the path has the corresponding photo and video, and if so, detecting the CTID camera to be qualified; if not, the CTID camera is unqualified;
the CTID module detection rule is specifically as follows: setting a first time period, displaying the CTID two-dimensional code to the CTID camera through the mobile phone, acquiring the CTID two-dimensional code by the CTID camera, judging whether the CTID module decodes the CTID two-dimensional code in the first time period, and if so, detecting the CTID module to be qualified; if not, the CTID module detects failure;
the identity authentication module detection sub-rules are specifically as follows: setting a second time period, creating identity data of a first line Cheng Douqu identity authentication module, judging whether the identity authentication module returns the identity data in the second time period, and if so, detecting that the identity authentication module is qualified; if not, the identity authentication module is unqualified.
6. The CTID access control device detection system as set forth in claim 5, wherein: the detection list setting module specifically comprises:
based on the pattern of the CTID access control equipment to be detected, a detection list of the CTID access control equipment is set through a computer, and the computer packages the detection list into package data through a JSON format and then sends the package data to the CTID access control equipment through a serial port.
7. The CTID access control device detection system as set forth in claim 5, wherein: the detection list analysis module specifically comprises:
and the CTID access control equipment receives the encapsulated data in real time, and analyzes the encapsulated data by utilizing an api interface of the JSON library to obtain a detection list.
8. The CTID access control device detection system as set forth in claim 5, wherein: the equipment detection module specifically comprises:
and the CTID access control equipment selects a corresponding detection sub-rule to carry out equipment detection based on the equipment detection rule and the detection list, generates a detection result in real time, and displays the detection result on a display screen of the CTID access control equipment or sends the detection result to a computer.
CN202011178626.3A 2020-10-29 2020-10-29 CTID access control equipment detection method and system Active CN112351272B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011178626.3A CN112351272B (en) 2020-10-29 2020-10-29 CTID access control equipment detection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011178626.3A CN112351272B (en) 2020-10-29 2020-10-29 CTID access control equipment detection method and system

Publications (2)

Publication Number Publication Date
CN112351272A CN112351272A (en) 2021-02-09
CN112351272B true CN112351272B (en) 2023-05-12

Family

ID=74356988

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011178626.3A Active CN112351272B (en) 2020-10-29 2020-10-29 CTID access control equipment detection method and system

Country Status (1)

Country Link
CN (1) CN112351272B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116886892B (en) * 2023-09-05 2023-12-29 功道(深圳)科技实业有限公司 Access control management method based on multi-source data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101201887A (en) * 2006-12-15 2008-06-18 王耀 Application method of id card in personal identification system
CN205121666U (en) * 2015-10-10 2016-03-30 王颖 Remote control's intelligent lock
CN108595992A (en) * 2018-04-06 2018-09-28 杨明艳 The cross-platform polygonal color network identification card of one kind reading driver manufacturing method and equipment
CN110002295A (en) * 2019-03-28 2019-07-12 日立电梯(中国)有限公司 Elevator operation control method based on probability data feature

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101201887A (en) * 2006-12-15 2008-06-18 王耀 Application method of id card in personal identification system
CN205121666U (en) * 2015-10-10 2016-03-30 王颖 Remote control's intelligent lock
CN108595992A (en) * 2018-04-06 2018-09-28 杨明艳 The cross-platform polygonal color network identification card of one kind reading driver manufacturing method and equipment
CN110002295A (en) * 2019-03-28 2019-07-12 日立电梯(中国)有限公司 Elevator operation control method based on probability data feature

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于RFID和GSM的汽车防盗报警系统的设计;冯明发等人;《汽车电子》;第第25卷卷(第第8期期);全文 *

Also Published As

Publication number Publication date
CN112351272A (en) 2021-02-09

Similar Documents

Publication Publication Date Title
US9690601B2 (en) Dynamic profile switching based on user identification
CN105450614B (en) A kind of server account logon method, device and system
CN107832226A (en) Report-generating method, device, equipment and computer media based on performance test
CN104346560B (en) A kind of safe verification method and device
CN106878108B (en) Network flow playback test method and device
RU2685693C1 (en) Method and device for providing a signal indicating loss of a terminal
KR100966073B1 (en) Apparatus and method for managing terminal users
CN111782492A (en) Page first screen loading duration testing method and device, computer equipment and medium
CN111432410B (en) Network security protection method of mobile base station of Internet of things and cloud server of Internet of things
US20160299826A1 (en) Device topology definition system
JP2020509622A (en) Wireless network type detection method and apparatus and electronic device
CN112351272B (en) CTID access control equipment detection method and system
CN109726601A (en) The recognition methods of unlawful practice and device, storage medium, computer equipment
CN104063313B (en) Intelligent analytical algorithm test system and method
CN110851148A (en) Analysis system and method for recognizing user behavior data based on intelligent image
US11348171B2 (en) Accessing a financial service using a media device
CN106856585A (en) Set up the method and device of short-distance wireless passage
EP2728472A2 (en) User terminal, reliability management server, and method and program for preventing unauthorized remote operation
CN104125593B (en) A kind of information processing method and electronic equipment
CN110807184A (en) Method for intelligently recording screen and acquiring behavior data of computer and mobile terminal user
CN105677806B (en) A kind of information processing method and electronic equipment
CN106940647A (en) Code administration method and apparatus
CN104134025B (en) Mobile terminal locking method, device and mobile terminal based on SIM card
CN110489253A (en) Data processing method, device, equipment and computer readable storage medium
CN105516069B (en) Data processing method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant