CN112351272B - CTID access control equipment detection method and system - Google Patents
CTID access control equipment detection method and system Download PDFInfo
- Publication number
- CN112351272B CN112351272B CN202011178626.3A CN202011178626A CN112351272B CN 112351272 B CN112351272 B CN 112351272B CN 202011178626 A CN202011178626 A CN 202011178626A CN 112351272 B CN112351272 B CN 112351272B
- Authority
- CN
- China
- Prior art keywords
- ctid
- detection
- access control
- control equipment
- rule
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N17/00—Diagnosis, testing or measuring for television systems or their details
- H04N17/002—Diagnosis, testing or measuring for television systems or their details for television cameras
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B17/00—Monitoring; Testing
- H04B17/30—Monitoring; Testing of propagation channels
- H04B17/309—Measuring or estimating channel quality parameters
- H04B17/318—Received signal strength
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
Abstract
The invention provides a CTID access control equipment detection method and a system thereof, belonging to the technical field of access control equipment, wherein the method comprises the following steps: step S10, the CTID access control equipment stores an equipment detection rule comprising a plurality of detection sub-rules; step S20, setting a detection list of the CTID access control equipment through a computer, and packaging the detection list into packaging data by the computer and then sending the packaging data to the CTID access control equipment; step S30, receiving and analyzing the encapsulation data by the CTID access control equipment to obtain a detection list; and step S40, the CTID access control equipment detects equipment based on the equipment detection rule and the detection list. The invention has the advantages that: the CTID access control equipment of different types is dynamically detected, and the detection cost is greatly reduced.
Description
Technical Field
The invention relates to the technical field of access control equipment, in particular to a CTID access control equipment detection method and system.
Background
CTID (network identification) refers to network identity authentication credentials, and unique BID values (personal unique identifiers) are generated by authentication of citizens' identity cards and figures through a CTID center (trusted identity authentication platform) and used for user identity recognition. Similar to a pub-rent house and a hotel, a user can display a two-dimensional code or a bar code with BID value to the CTID intelligent door lock through a mobile phone to unlock after identity authentication, namely, the user can track and manage the tenant through the CTID, so that the verification of the house and the person is realized.
Along with the progress of science and technology and the diversification of application scene, the CTID entrance guard equipment of various configurations appears, for example communication module adopts wifi, ethernet or 4G, and equipment form is desktop equipment or hanging equipment, and communication serial port is 232 serial ports or 485 serial ports, and some entrance guard equipment need temperature test module, touch-control or NFC, and some entrance guard equipment does not need, and the different functional module has been integrated based on the difference of application scene to the CTID entrance guard equipment of different types promptly. Before leaving the factory, the CTID access control equipment needs to carry out factory testing on each functional module.
Aiming at factory testing of CTID access control equipment, conventionally, detection software is required to be independently developed aiming at different CTID access control equipment, so that a plurality of versions of the detection software exist, and a large amount of manpower and material resources are required for development and maintenance of the detection software.
Therefore, how to provide a method and a system for detecting CTID access control equipment, so as to realize dynamic detection of different CTID access control equipment, reduce detection cost, and become a problem to be solved urgently.
Disclosure of Invention
The invention aims to solve the technical problem of providing a detection method and a detection system for CTID access control equipment, which can realize dynamic detection of different CTID access control equipment and reduce detection cost.
In a first aspect, the invention provides a method for detecting CTID access control equipment, which comprises the following steps:
step S10, the CTID access control equipment stores an equipment detection rule comprising a plurality of detection sub-rules;
step S20, setting a detection list of the CTID access control equipment through a computer, and packaging the detection list into packaging data by the computer and then sending the packaging data to the CTID access control equipment;
step S30, receiving and analyzing the encapsulation data by the CTID access control equipment to obtain a detection list;
and step S40, the CTID access control equipment detects equipment based on the equipment detection rule and the detection list.
Further, in the step S10, the device detection rule at least includes a communication module detection sub-rule, a camera detection sub-rule, a CTID module detection sub-rule, and an identity authentication module detection sub-rule;
the communication module detection sub-rules specifically include: judging whether an Ethernet, a 4G network, a WIFI network or a Bluetooth network can be searched and connected, and if the signal strength is higher than a preset threshold value, the communication module is qualified; if not, the communication module detects failure;
the camera detection sub-rule specifically comprises: calling a CTID camera to shoot a photo and record a video, storing the photo and the video to a preset path, judging whether the path has the corresponding photo and video, and if so, detecting the CTID camera to be qualified; if not, the CTID camera is unqualified;
the CTID module detection rule is specifically as follows: setting a first time period, displaying the CTID two-dimensional code to the CTID camera through the mobile phone, acquiring the CTID two-dimensional code by the CTID camera, judging whether the CTID module decodes the CTID two-dimensional code in the first time period, and if so, detecting the CTID module to be qualified; if not, the CTID module detects failure;
the identity authentication module detection sub-rules are specifically as follows: setting a second time period, creating identity data of a first line Cheng Douqu identity authentication module, judging whether the identity authentication module returns the identity data in the second time period, and if so, detecting that the identity authentication module is qualified; if not, the identity authentication module is unqualified.
Further, the step S20 specifically includes:
based on the pattern of the CTID access control equipment to be detected, a detection list of the CTID access control equipment is set through a computer, and the computer packages the detection list into package data through a JSON format and then sends the package data to the CTID access control equipment through a serial port.
Further, the step S30 specifically includes:
and the CTID access control equipment receives the encapsulated data in real time, and analyzes the encapsulated data by utilizing an api interface of the JSON library to obtain a detection list.
Further, the step S40 specifically includes:
and the CTID access control equipment selects a corresponding detection sub-rule to carry out equipment detection based on the equipment detection rule and the detection list, generates a detection result in real time, and displays the detection result on a display screen of the CTID access control equipment or sends the detection result to a computer.
In a second aspect, the invention provides a detection system for CTID access control equipment, which comprises the following modules:
the device detection rule storage module is used for storing a device detection rule comprising a plurality of detection sub-rules by the CTID access control device;
the detection list setting module is used for setting a detection list of the CTID access control equipment through a computer, and the computer packages the detection list into package data and sends the package data to the CTID access control equipment;
the detection list analysis module is used for receiving and analyzing the encapsulation data by the CTID access control equipment to obtain a detection list;
and the equipment detection module is used for detecting the equipment by the CTID access control equipment based on the equipment detection rule and the detection list.
Further, in the device detection rule storage module, the device detection rule at least comprises a communication module detection sub-rule, a camera detection sub-rule, a CTID module detection sub-rule and an identity authentication module detection sub-rule;
the communication module detection sub-rules specifically include: judging whether an Ethernet, a 4G network, a WIFI network or a Bluetooth network can be searched and connected, and if the signal strength is higher than a preset threshold value, the communication module is qualified; if not, the communication module detects failure;
the camera detection sub-rule specifically comprises: calling a CTID camera to shoot a photo and record a video, storing the photo and the video to a preset path, judging whether the path has the corresponding photo and video, and if so, detecting the CTID camera to be qualified; if not, the CTID camera is unqualified;
the CTID module detection rule is specifically as follows: setting a first time period, displaying the CTID two-dimensional code to the CTID camera through the mobile phone, acquiring the CTID two-dimensional code by the CTID camera, judging whether the CTID module decodes the CTID two-dimensional code in the first time period, and if so, detecting the CTID module to be qualified; if not, the CTID module detects failure;
the identity authentication module detection sub-rules are specifically as follows: setting a second time period, creating identity data of a first line Cheng Douqu identity authentication module, judging whether the identity authentication module returns the identity data in the second time period, and if so, detecting that the identity authentication module is qualified; if not, the identity authentication module is unqualified.
Further, the detection list setting module specifically includes:
based on the pattern of the CTID access control equipment to be detected, a detection list of the CTID access control equipment is set through a computer, and the computer packages the detection list into package data through a JSON format and then sends the package data to the CTID access control equipment through a serial port.
Further, the detection list analysis module specifically includes:
and the CTID access control equipment receives the encapsulated data in real time, and analyzes the encapsulated data by utilizing an api interface of the JSON library to obtain a detection list.
Further, the device detection module specifically includes:
and the CTID access control equipment selects a corresponding detection sub-rule to carry out equipment detection based on the equipment detection rule and the detection list, generates a detection result in real time, and displays the detection result on a display screen of the CTID access control equipment or sends the detection result to a computer.
The invention has the advantages that:
the device detection rules are stored in the CTID access control device in advance, the device detection rules comprise detection sub-rules of all functional modules of the CTID access control devices of different types, based on the functional modules of the CTID access control device to be detected, a detection list of the CTID access control device is set in a computer and sent to the CTID access control device, the CTID access control device selects the corresponding detection sub-rules to carry out device detection based on the device detection rules and the detection list, namely, the detection functional modules are set according to requirements, dynamic detection of the CTID access control devices of different types is finally achieved, and the development of detection software for the CTID access control devices of different types is not needed unlike the traditional method, so that the opening and maintenance cost of the detection software is greatly reduced, and the detection cost of the CTID access control device is greatly reduced.
Drawings
The invention will be further described with reference to examples of embodiments with reference to the accompanying drawings.
Fig. 1 is a flowchart of a method for detecting a CTID access control device according to the present invention.
Fig. 2 is a schematic structural diagram of a detection system of a CTID access control device.
Detailed Description
According to the technical scheme in the embodiment of the application, the overall thought is as follows: the method comprises the steps that equipment detection rules are stored in the CTID access control equipment in advance, the equipment detection rules comprise detection sub-rules of all functional modules of the CTID access control equipment of different styles, the CTID access control equipment selects corresponding detection sub-rules to carry out equipment detection based on the equipment detection rules and a detection list set by a computer, namely the CTID access control equipment stores the detection sub-rules of all the functional modules in advance, the corresponding detection sub-rules are selected as required during specific detection, and finally dynamic detection of the CTID access control equipment of different styles is achieved, and detection cost is reduced.
Referring to fig. 1 to 2, a preferred embodiment of a detection method for a CTID access control device of the present invention includes the following steps:
step S10, the CTID access control equipment stores an equipment detection rule comprising a plurality of detection sub-rules;
step S20, setting a detection list of the CTID access control equipment through a computer, and packaging the detection list into packaging data by the computer and then sending the packaging data to the CTID access control equipment; selecting detection options of CTID access control equipment through a computer, and generating a detection list;
step S30, receiving and analyzing the encapsulation data by the CTID access control equipment to obtain a detection list; the safety of the detection list transmission can be improved by packaging and then analyzing the detection list;
and step S40, the CTID access control equipment detects equipment based on the equipment detection rule and the detection list. When the method is implemented, the CTID access control equipment automatically starts a monitoring thread when being started, the monitoring thread is used for implementing the encapsulation data sent by the monitoring computer, and when the encapsulation data is received, the CTID access control equipment is automatically analyzed and executed to detect.
In the step S10, the device detection rule at least includes a communication module detection sub-rule, a camera detection sub-rule, a CTID module detection sub-rule, and an identity authentication module detection sub-rule;
the communication module detection sub-rules specifically include: judging whether an Ethernet, a 4G network, a WIFI network or a Bluetooth network can be searched and connected, and if the signal strength is higher than a preset threshold value, the communication module is qualified; if not, the communication module detects failure;
the camera detection sub-rule specifically comprises: calling a CTID camera to shoot a photo and record a video, storing the photo and the video to a preset path, judging whether the path has the corresponding photo and video, and if so, detecting the CTID camera to be qualified; if not, the CTID camera is unqualified;
the CTID module detection rule is specifically as follows: setting a first time period, displaying the CTID two-dimensional code to the CTID camera through the mobile phone, acquiring the CTID two-dimensional code by the CTID camera, judging whether the CTID module decodes the CTID two-dimensional code in the first time period, and if so, detecting the CTID module to be qualified; if not, the CTID module detects failure;
the identity authentication module detection sub-rules are specifically as follows: setting a second time period, creating identity data of a first line Cheng Douqu identity authentication module, judging whether the identity authentication module returns the identity data in the second time period, and if so, detecting that the identity authentication module is qualified; if not, the identity authentication module is unqualified.
In the implementation, the CTID access control equipment can be detected by generating mutually independent detection subroutines based on the detection subroutines.
The step S20 specifically includes:
based on the pattern of the CTID access control equipment to be detected, a detection list of the CTID access control equipment is set through a computer, and the computer packages the detection list into package data through a JSON format and then sends the package data to the CTID access control equipment through a serial port. JSON is a lightweight data exchange format, which is easy for people to read and write, and is easy for machines to analyze and generate, and effectively improves network transmission efficiency.
The step S30 specifically includes:
and the CTID access control equipment receives the encapsulated data in real time, and analyzes the encapsulated data by utilizing an api interface of the JSON library to obtain a detection list.
The step S40 specifically includes:
and the CTID access control equipment selects a corresponding detection sub-rule to perform equipment detection based on the equipment detection rule and the detection list, generates a detection result in real time, and displays the detection result on a display screen of the CTID access control equipment or sends the detection result to a computer through a serial port. And displaying the detection result through a display screen of the CTID access control equipment, and binding with the UI in advance.
The invention relates to a preferred embodiment of a CTID access control equipment detection system, which comprises the following modules:
the device detection rule storage module is used for storing a device detection rule comprising a plurality of detection sub-rules by the CTID access control device;
the detection list setting module is used for setting a detection list of the CTID access control equipment through a computer, and the computer packages the detection list into package data and sends the package data to the CTID access control equipment; selecting detection options of CTID access control equipment through a computer, and generating a detection list;
the detection list analysis module is used for receiving and analyzing the encapsulation data by the CTID access control equipment to obtain a detection list; the safety of the detection list transmission can be improved by packaging and then analyzing the detection list;
and the equipment detection module is used for detecting the equipment by the CTID access control equipment based on the equipment detection rule and the detection list. When the method is implemented, the CTID access control equipment automatically starts a monitoring thread when being started, the monitoring thread is used for implementing the encapsulation data sent by the monitoring computer, and when the encapsulation data is received, the CTID access control equipment is automatically analyzed and executed to detect.
The device detection rule storage module is used for storing device detection rules, wherein the device detection rules at least comprise a communication module detection sub-rule, a camera detection sub-rule, a CTID module detection sub-rule and an identity authentication module detection sub-rule;
the communication module detection sub-rules specifically include: judging whether an Ethernet, a 4G network, a WIFI network or a Bluetooth network can be searched and connected, and if the signal strength is higher than a preset threshold value, the communication module is qualified; if not, the communication module detects failure;
the camera detection sub-rule specifically comprises: calling a CTID camera to shoot a photo and record a video, storing the photo and the video to a preset path, judging whether the path has the corresponding photo and video, and if so, detecting the CTID camera to be qualified; if not, the CTID camera is unqualified;
the CTID module detection rule is specifically as follows: setting a first time period, displaying the CTID two-dimensional code to the CTID camera through the mobile phone, acquiring the CTID two-dimensional code by the CTID camera, judging whether the CTID module decodes the CTID two-dimensional code in the first time period, and if so, detecting the CTID module to be qualified; if not, the CTID module detects failure;
the identity authentication module detection sub-rules are specifically as follows: setting a second time period, creating identity data of a first line Cheng Douqu identity authentication module, judging whether the identity authentication module returns the identity data in the second time period, and if so, detecting that the identity authentication module is qualified; if not, the identity authentication module is unqualified.
In the implementation, the CTID access control equipment can be detected by generating mutually independent detection subroutines based on the detection subroutines.
The detection list setting module specifically comprises:
based on the pattern of the CTID access control equipment to be detected, a detection list of the CTID access control equipment is set through a computer, and the computer packages the detection list into package data through a JSON format and then sends the package data to the CTID access control equipment through a serial port. JSON is a lightweight data exchange format, which is easy for people to read and write, and is easy for machines to analyze and generate, and effectively improves network transmission efficiency.
The detection list analysis module specifically comprises:
and the CTID access control equipment receives the encapsulated data in real time, and analyzes the encapsulated data by utilizing an api interface of the JSON library to obtain a detection list.
The equipment detection module specifically comprises:
and the CTID access control equipment selects a corresponding detection sub-rule to perform equipment detection based on the equipment detection rule and the detection list, generates a detection result in real time, and displays the detection result on a display screen of the CTID access control equipment or sends the detection result to a computer through a serial port. And displaying the detection result through a display screen of the CTID access control equipment, and binding with the UI in advance.
In summary, the invention has the advantages that:
the device detection rules are stored in the CTID access control device in advance, the device detection rules comprise detection sub-rules of all functional modules of the CTID access control devices of different types, based on the functional modules of the CTID access control device to be detected, a detection list of the CTID access control device is set in a computer and sent to the CTID access control device, the CTID access control device selects the corresponding detection sub-rules to carry out device detection based on the device detection rules and the detection list, namely, the detection functional modules are set according to requirements, dynamic detection of the CTID access control devices of different types is finally achieved, and the development of detection software for the CTID access control devices of different types is not needed unlike the traditional method, so that the opening and maintenance cost of the detection software is greatly reduced, and the detection cost of the CTID access control device is greatly reduced.
While specific embodiments of the invention have been described above, it will be appreciated by those skilled in the art that the specific embodiments described are illustrative only and not intended to limit the scope of the invention, and that equivalent modifications and variations of the invention in light of the spirit of the invention will be covered by the claims of the present invention.
Claims (8)
1. A CTID access control equipment detection method is characterized in that: the method comprises the following steps:
step S10, the CTID access control equipment stores an equipment detection rule comprising a detection sub-rule;
step S20, setting a detection list of the CTID access control equipment through a computer, and packaging the detection list into packaging data by the computer and then sending the packaging data to the CTID access control equipment;
step S30, receiving and analyzing the encapsulation data by the CTID access control equipment to obtain a detection list;
step S40, the CTID access control equipment performs equipment detection based on the equipment detection rule and the detection list;
in the step S10, the device detection rule at least includes a communication module detection sub-rule, a camera detection sub-rule, a CTID module detection sub-rule, and an identity authentication module detection sub-rule;
the communication module detection sub-rules specifically include: judging whether an Ethernet, a 4G network, a WIFI network or a Bluetooth network can be searched and connected, and if the signal strength is higher than a preset threshold value, the communication module is qualified; if not, the communication module detects failure;
the camera detection sub-rule specifically comprises: calling a CTID camera to shoot a photo and record a video, storing the photo and the video to a preset path, judging whether the path has the corresponding photo and video, and if so, detecting the CTID camera to be qualified; if not, the CTID camera is unqualified;
the CTID module detection rule is specifically as follows: setting a first time period, displaying the CTID two-dimensional code to the CTID camera through the mobile phone, acquiring the CTID two-dimensional code by the CTID camera, judging whether the CTID module decodes the CTID two-dimensional code in the first time period, and if so, detecting the CTID module to be qualified; if not, the CTID module detects failure;
the identity authentication module detection sub-rules are specifically as follows: setting a second time period, creating identity data of a first line Cheng Douqu identity authentication module, judging whether the identity authentication module returns the identity data in the second time period, and if so, detecting that the identity authentication module is qualified; if not, the identity authentication module is unqualified.
2. The method for detecting the CTID access control equipment as claimed in claim 1, wherein the method comprises the following steps: the step S20 specifically includes:
based on the pattern of the CTID access control equipment to be detected, a detection list of the CTID access control equipment is set through a computer, and the computer packages the detection list into package data through a JSON format and then sends the package data to the CTID access control equipment through a serial port.
3. The method for detecting the CTID access control equipment as claimed in claim 1, wherein the method comprises the following steps: the step S30 specifically includes:
and the CTID access control equipment receives the encapsulated data in real time, and analyzes the encapsulated data by utilizing an api interface of the JSON library to obtain a detection list.
4. The method for detecting the CTID access control equipment as claimed in claim 1, wherein the method comprises the following steps: the step S40 specifically includes:
and the CTID access control equipment selects a corresponding detection sub-rule to carry out equipment detection based on the equipment detection rule and the detection list, generates a detection result in real time, and displays the detection result on a display screen of the CTID access control equipment or sends the detection result to a computer.
5. A CTID access control equipment detecting system is characterized in that: the device comprises the following modules:
the device detection rule storage module is used for storing a device detection rule comprising a detection sub-rule by the CTID access control device;
the detection list setting module is used for setting a detection list of the CTID access control equipment through a computer, and the computer packages the detection list into package data and sends the package data to the CTID access control equipment;
the detection list analysis module is used for receiving and analyzing the encapsulation data by the CTID access control equipment to obtain a detection list;
the device detection module is used for detecting the CTID access control device based on the device detection rule and the detection list;
the device detection rule storage module is used for storing device detection rules, wherein the device detection rules at least comprise a communication module detection sub-rule, a camera detection sub-rule, a CTID module detection sub-rule and an identity authentication module detection sub-rule;
the communication module detection sub-rules specifically include: judging whether an Ethernet, a 4G network, a WIFI network or a Bluetooth network can be searched and connected, and if the signal strength is higher than a preset threshold value, the communication module is qualified; if not, the communication module detects failure;
the camera detection sub-rule specifically comprises: calling a CTID camera to shoot a photo and record a video, storing the photo and the video to a preset path, judging whether the path has the corresponding photo and video, and if so, detecting the CTID camera to be qualified; if not, the CTID camera is unqualified;
the CTID module detection rule is specifically as follows: setting a first time period, displaying the CTID two-dimensional code to the CTID camera through the mobile phone, acquiring the CTID two-dimensional code by the CTID camera, judging whether the CTID module decodes the CTID two-dimensional code in the first time period, and if so, detecting the CTID module to be qualified; if not, the CTID module detects failure;
the identity authentication module detection sub-rules are specifically as follows: setting a second time period, creating identity data of a first line Cheng Douqu identity authentication module, judging whether the identity authentication module returns the identity data in the second time period, and if so, detecting that the identity authentication module is qualified; if not, the identity authentication module is unqualified.
6. The CTID access control device detection system as set forth in claim 5, wherein: the detection list setting module specifically comprises:
based on the pattern of the CTID access control equipment to be detected, a detection list of the CTID access control equipment is set through a computer, and the computer packages the detection list into package data through a JSON format and then sends the package data to the CTID access control equipment through a serial port.
7. The CTID access control device detection system as set forth in claim 5, wherein: the detection list analysis module specifically comprises:
and the CTID access control equipment receives the encapsulated data in real time, and analyzes the encapsulated data by utilizing an api interface of the JSON library to obtain a detection list.
8. The CTID access control device detection system as set forth in claim 5, wherein: the equipment detection module specifically comprises:
and the CTID access control equipment selects a corresponding detection sub-rule to carry out equipment detection based on the equipment detection rule and the detection list, generates a detection result in real time, and displays the detection result on a display screen of the CTID access control equipment or sends the detection result to a computer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011178626.3A CN112351272B (en) | 2020-10-29 | 2020-10-29 | CTID access control equipment detection method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011178626.3A CN112351272B (en) | 2020-10-29 | 2020-10-29 | CTID access control equipment detection method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112351272A CN112351272A (en) | 2021-02-09 |
CN112351272B true CN112351272B (en) | 2023-05-12 |
Family
ID=74356988
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011178626.3A Active CN112351272B (en) | 2020-10-29 | 2020-10-29 | CTID access control equipment detection method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112351272B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116886892B (en) * | 2023-09-05 | 2023-12-29 | 功道(深圳)科技实业有限公司 | Access control management method based on multi-source data |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101201887A (en) * | 2006-12-15 | 2008-06-18 | 王耀 | Application method of id card in personal identification system |
CN205121666U (en) * | 2015-10-10 | 2016-03-30 | 王颖 | Remote control's intelligent lock |
CN108595992A (en) * | 2018-04-06 | 2018-09-28 | 杨明艳 | The cross-platform polygonal color network identification card of one kind reading driver manufacturing method and equipment |
CN110002295A (en) * | 2019-03-28 | 2019-07-12 | 日立电梯(中国)有限公司 | Elevator operation control method based on probability data feature |
-
2020
- 2020-10-29 CN CN202011178626.3A patent/CN112351272B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101201887A (en) * | 2006-12-15 | 2008-06-18 | 王耀 | Application method of id card in personal identification system |
CN205121666U (en) * | 2015-10-10 | 2016-03-30 | 王颖 | Remote control's intelligent lock |
CN108595992A (en) * | 2018-04-06 | 2018-09-28 | 杨明艳 | The cross-platform polygonal color network identification card of one kind reading driver manufacturing method and equipment |
CN110002295A (en) * | 2019-03-28 | 2019-07-12 | 日立电梯(中国)有限公司 | Elevator operation control method based on probability data feature |
Non-Patent Citations (1)
Title |
---|
基于RFID和GSM的汽车防盗报警系统的设计;冯明发等人;《汽车电子》;第第25卷卷(第第8期期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN112351272A (en) | 2021-02-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9690601B2 (en) | Dynamic profile switching based on user identification | |
CN105450614B (en) | A kind of server account logon method, device and system | |
CN107832226A (en) | Report-generating method, device, equipment and computer media based on performance test | |
CN104346560B (en) | A kind of safe verification method and device | |
CN106878108B (en) | Network flow playback test method and device | |
RU2685693C1 (en) | Method and device for providing a signal indicating loss of a terminal | |
KR100966073B1 (en) | Apparatus and method for managing terminal users | |
CN111782492A (en) | Page first screen loading duration testing method and device, computer equipment and medium | |
CN111432410B (en) | Network security protection method of mobile base station of Internet of things and cloud server of Internet of things | |
US20160299826A1 (en) | Device topology definition system | |
JP2020509622A (en) | Wireless network type detection method and apparatus and electronic device | |
CN112351272B (en) | CTID access control equipment detection method and system | |
CN109726601A (en) | The recognition methods of unlawful practice and device, storage medium, computer equipment | |
CN104063313B (en) | Intelligent analytical algorithm test system and method | |
CN110851148A (en) | Analysis system and method for recognizing user behavior data based on intelligent image | |
US11348171B2 (en) | Accessing a financial service using a media device | |
CN106856585A (en) | Set up the method and device of short-distance wireless passage | |
EP2728472A2 (en) | User terminal, reliability management server, and method and program for preventing unauthorized remote operation | |
CN104125593B (en) | A kind of information processing method and electronic equipment | |
CN110807184A (en) | Method for intelligently recording screen and acquiring behavior data of computer and mobile terminal user | |
CN105677806B (en) | A kind of information processing method and electronic equipment | |
CN106940647A (en) | Code administration method and apparatus | |
CN104134025B (en) | Mobile terminal locking method, device and mobile terminal based on SIM card | |
CN110489253A (en) | Data processing method, device, equipment and computer readable storage medium | |
CN105516069B (en) | Data processing method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |