CN112907800A - CTID intelligent access control unlocking method and system - Google Patents

CTID intelligent access control unlocking method and system Download PDF

Info

Publication number
CN112907800A
CN112907800A CN202110075678.6A CN202110075678A CN112907800A CN 112907800 A CN112907800 A CN 112907800A CN 202110075678 A CN202110075678 A CN 202110075678A CN 112907800 A CN112907800 A CN 112907800A
Authority
CN
China
Prior art keywords
ctid
unlocking
access control
mobile phone
intelligent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110075678.6A
Other languages
Chinese (zh)
Other versions
CN112907800B (en
Inventor
吴太亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian New World Huichuang Technology Co.,Ltd.
Original Assignee
Fujian Newland Communication Science Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Newland Communication Science Technology Co Ltd filed Critical Fujian Newland Communication Science Technology Co Ltd
Priority to CN202110075678.6A priority Critical patent/CN112907800B/en
Publication of CN112907800A publication Critical patent/CN112907800A/en
Application granted granted Critical
Publication of CN112907800B publication Critical patent/CN112907800B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention provides a CTID intelligent entrance guard unlocking method and system in the technical field of intelligent entrance guard, wherein the method comprises the following steps: step S10, creating a UUID and a Bluetooth name when a Bluetooth module of the CTID intelligent access control is initialized; step S20, the mobile phone sends the personal information to the server for verification, and receives the returned verification result and the authorization information; s30, searching and connecting the mobile phone to the CTID intelligent access control based on the authorization information and the Bluetooth name to acquire a UUID; step S40, the mobile phone encapsulates the verification result and the authorization information into an unlocking instruction, and sends the unlocking instruction to the CTID intelligent entrance guard based on the UUID; step S50, the CTID intelligent entrance guard analyzes and verifies the received unlocking instruction to obtain a verification result and authorization information, executes unlocking operation based on the verification result and the authorization information, and sends the execution result to the mobile phone; step S60, the mobile phone analyzes the received execution result and sends it to the server. The invention has the advantages that: the entrance guard unlocking convenience is greatly improved.

Description

CTID intelligent access control unlocking method and system
Technical Field
The invention relates to the technical field of intelligent access control, in particular to a CTID intelligent access control unlocking method and system.
Background
The entrance guard is a system for controlling an entrance and exit channel, and is developed on the basis of a traditional door lock. The traditional mechanical door lock is only a pure mechanical device, and people can open the door lock by various means no matter how reasonable the structural design is and how firm the material is. In a passage with a lot of people coming in and going out (such as an office building and a hotel room), the management of the key is troublesome, and the lock and the key are replaced together when the key is lost or the people replace the key.
With the progress of science and technology, various intelligent access controls, such as an intelligent access control unlocked by using bluetooth, appear. However, before the traditional intelligent access control is unlocked by using the bluetooth, the intelligent access control and the bluetooth equipment need to be authorized and paired firstly, and after the pairing is successful, the bluetooth can be subsequently used for unlocking, so that the intelligent access control is not convenient and fast to use, and particularly for application scenes such as hotels, the residents are replaced at every time, or the residents replace the hotels every time, and the pairing needs to be performed, so that the user experience is poor.
Therefore, how to provide a CTID intelligent entrance guard unlocking method and system, the convenience of entrance guard unlocking is improved, and the problem to be solved urgently is formed.
Disclosure of Invention
The invention aims to solve the technical problem of providing a CTID intelligent access control unlocking method and system, and achieving the purpose of improving the convenience of access control unlocking.
In a first aspect, the invention provides a CTID intelligent entrance guard unlocking method, which comprises the following steps:
step S10, creating a UUID and a Bluetooth name when a Bluetooth module of the CTID intelligent access control is initialized;
step S20, the mobile phone sends the personal information to the server for verification, and receives the verification result and the authorization information returned by the server;
s30, searching and connecting the mobile phone to the CTID intelligent access control based on the authorization information and the Bluetooth name to obtain the UUID of the CTID intelligent access control;
step S40, the mobile phone encapsulates the verification result and the authorization information into an unlocking instruction according to a preset instruction format, and sends the unlocking instruction to the CTID intelligent entrance guard based on the UUID;
step S50, the CTID intelligent entrance guard analyzes and verifies the received unlocking instruction to obtain a verification result and authorization information, executes unlocking operation based on the verification result and the authorization information, and sends an execution result to a mobile phone based on the instruction format;
and step S60, the mobile phone analyzes the received execution result and sends the execution result to the server for recording, and unlocking of the CTID intelligent access control is completed.
Further, in the step S20, the personal information at least includes an identification number and a photo of the head portrait; the verification result is that the verification is passed or not passed; the authorization information at least comprises a Bluetooth name, a mac address of the CTID intelligent access control and unlocking authority; the unlocking authority is permanently effective, effective within the validity period or effective within the effective times.
Further, the step S30 specifically includes:
step S31, the mobile phone searches a device list with the same name in the induction range based on the Bluetooth name in the authorization information;
step S32, the mobile phone verifies the equipment in the equipment list by using the mac address, finds the matched CTID intelligent access control, and connects the CTID intelligent access control through gattconnect;
step S33, the CTID intelligent entrance guard returns a gatt callback carrying the UUID to the mobile phone;
and step S34, the mobile phone monitors the gatt callback to obtain the UUID.
Further, in step S40, the instruction format sequentially includes the following instruction fields: instruction type, message length, command header, message content, CRC16, and terminator; the CRC16 is used to store the calculation result of CRC calculation on the message content.
Further, the step S50 specifically includes:
step S51, analyzing the unlocking instruction by the CTID intelligent entrance guard, and extracting message contents containing verification results and authorization information from the unlocking instruction;
step S52, judging whether the length of the message content is consistent with the message length, if so, entering step S53; if not, ending the flow;
step S53, performing CRC calculation on the message content, judging whether the calculation result is consistent with the content carried by the CRC16, if so, indicating that the content is complete, and entering step S54; if not, the content is incomplete, and the process is ended;
step S54, the CTID intelligent entrance guard judges whether the check result is that the check is passed, if yes, the step S55 is executed; if not, ending the flow;
step S55, the CTID intelligent entrance guard judges whether the authorization information judges that the unlocking authority exists or not, if so, the unlocking operation is executed, and an execution result of successful unlocking is sent to the mobile phone based on the instruction format; if not, the unlocking operation is not executed, and the execution result of the unlocking failure is sent to the mobile phone based on the instruction format.
In a second aspect, the invention provides a CTID intelligent access control unlocking system, which comprises the following modules:
the Bluetooth module initialization module is used for creating a UUID and a Bluetooth name when a Bluetooth module of the CTID intelligent access control is initialized;
the personal information verification module is used for sending the personal information to the server for verification by the mobile phone and receiving a verification result and authorization information returned by the server;
the CTID intelligent access control connection module is used for searching and connecting the CTID intelligent access control based on the authorization information and the Bluetooth name by the mobile phone to obtain the UUID of the CTID intelligent access control;
the unlocking instruction sending module is used for packaging the verification result and the authorization information into an unlocking instruction according to a preset instruction format and sending the unlocking instruction to the CTID intelligent entrance guard based on the UUID;
the unlocking instruction execution module is used for analyzing and verifying the received unlocking instruction by the CTID intelligent access control to obtain a verification result and authorization information, executing unlocking operation based on the verification result and the authorization information, and sending an execution result to the mobile phone based on the instruction format;
and the execution result filing module is used for analyzing the received execution result by the mobile phone and sending the execution result to the server for recording so as to complete unlocking of the CTID intelligent access control.
Further, in the personal information verification module, the personal information at least comprises an identification number and a head portrait photo; the verification result is that the verification is passed or not passed; the authorization information at least comprises a Bluetooth name, a mac address of the CTID intelligent access control and unlocking authority; the unlocking authority is permanently effective, effective within the validity period or effective within the effective times.
Further, CTID intelligent entrance guard connection module specifically includes:
the Bluetooth searching unit is used for searching a device list with the same name in the induction range by the mobile phone based on the Bluetooth name in the authorization information;
the mac verification unit is used for verifying the equipment in the equipment list by using the mac address through the mobile phone, finding a matched CTID intelligent access control and connecting the CTID intelligent access control through gatt connect;
the gatt callback sending unit is used for returning the gatt callback carrying the UUID to the mobile phone by the CTID intelligent access control;
and the UUID acquisition unit is used for monitoring the gatt callback by the mobile phone to obtain the UUID.
Further, in the unlocking instruction sending module, the instruction format sequentially includes the following instruction fields: instruction type, message length, command header, message content, CRC16, and terminator; the CRC16 is used to store the calculation result of CRC calculation on the message content.
Further, the unlocking instruction execution module specifically includes:
the unlocking instruction analysis unit is used for analyzing the unlocking instruction by the CTID intelligent access control and extracting message contents containing verification results and authorization information from the unlocking instruction;
the message length verification unit is used for judging whether the length of the message content is consistent with the message length or not, and if so, entering the CRC (cyclic redundancy check) unit; if not, ending the flow;
the CRC unit is used for performing CRC calculation on the message content, judging whether the calculation result is consistent with the content carried by the CRC16, if so, indicating that the content is complete, and entering the verification result checking unit; if not, the content is incomplete, and the process is ended;
the verification result checking unit is used for the CTID intelligent access control to judge whether the verification result is passed through verification or not, and if yes, the CTID intelligent access control enters the unlocking unit; if not, ending the flow;
the unlocking unit is used for the CTID intelligent access control to judge whether the authorization information judges that the unlocking authority exists or not, if so, the unlocking operation is executed, and an execution result of successful unlocking is sent to the mobile phone based on the instruction format; if not, the unlocking operation is not executed, and the execution result of the unlocking failure is sent to the mobile phone based on the instruction format.
The invention has the advantages that:
1. personal information is sent to a server through a mobile phone to be checked to obtain a checking result and authorization information, the CTID intelligent access control is searched and connected based on the authorization information and a Bluetooth name, a UUID of the CTID intelligent access control is obtained, an unlocking instruction carrying the checking result and the authorization information is sent to the CTID intelligent access control by utilizing the UUID, the CTID intelligent access control analyzes and verifies the unlocking instruction and then executes unlocking operation, namely, a user can complete the unlocking operation of the CTID intelligent access control based on the personal information, the CTID intelligent access control and the mobile phone do not need to be authorized and paired like the prior CTID intelligent access control and the mobile phone, and the convenience of unlocking the access control is greatly improved.
2. The execution result of the CTID intelligent access control is sent to the server for filing, so that the tracing in the later stage and the unlocking record can be inquired, and the safety of the CTID intelligent access control can be improved.
3. By carrying out double check on the message length and CRC calculation on the message content in the unlocking instruction, the safety of the CTID intelligent access control is greatly improved.
Drawings
The invention will be further described with reference to the following examples with reference to the accompanying drawings.
Fig. 1 is a flowchart of a CTID intelligent access control unlocking method of the present invention.
Fig. 2 is a schematic structural diagram of a CTID intelligent access control unlocking system of the present invention.
Detailed Description
The technical scheme in the embodiment of the application has the following general idea: personal information is sent to a server through a mobile phone to be checked to obtain a checking result and authorization information, the CTID intelligent access control is searched and connected based on the authorization information and a Bluetooth name, a UUID of the CTID intelligent access control is obtained, an unlocking instruction carrying the checking result and the authorization information is sent to the CTID intelligent access control by utilizing the UUID, the CTID intelligent access control analyzes and verifies the unlocking instruction and then executes unlocking operation, the CTID intelligent access control and the mobile phone do not need to be subjected to Bluetooth authorization matching, and the convenience of unlocking the access control is improved.
Referring to fig. 1 to 2, a preferred embodiment of a CTID intelligent access control unlocking method according to the present invention includes the following steps:
step S10, creating a UUID (universal unique identification code) and a Bluetooth name when a Bluetooth module of the CTID intelligent access control is initialized; the UUID is provided with a field corresponding to an equipment supporting function, for example, a field with the content of 'write', and the function that the equipment supports data write-in is known after the UUID is acquired;
step S20, the mobile phone sends the personal information to the server for verification, and receives the verification result (bid data) and the authorization information returned by the server; the server compares whether the identity card number is consistent with the head portrait photo based on data pre-stored in a database, generates a verification result, searches authorization information corresponding to the identity card number, and then sends the verification result and the authorization information to the mobile phone;
s30, searching and connecting the mobile phone to the CTID intelligent access control based on the authorization information and the Bluetooth name to obtain the UUID of the CTID intelligent access control;
step S40, the mobile phone encapsulates the verification result and the authorization information into an unlocking instruction according to a preset instruction format, and sends the unlocking instruction to the CTID intelligent entrance guard based on the UUID; the unlocking instruction is sent to a Bluetooth module of the CTID intelligent access control through a uuid write interface;
step S50, the CTID intelligent entrance guard analyzes and verifies the received unlocking instruction to obtain a verification result and authorization information, executes unlocking operation based on the verification result and the authorization information, and sends an execution result to a mobile phone based on the instruction format;
step S60, the mobile phone analyzes the received execution result and sends the execution result to a server for recording, and unlocking of the CTID intelligent access control is completed; and sending the execution result to a server for archiving recording, so that the tracing in the later stage is facilitated, the unlocking record is inquired, and the safety of the CTID intelligent access control is further improved.
During the concrete implementation, CTID intelligent entrance guard unblanks after successful, can locally preserve the authorization information, and the user can directly use the magnetic card that has written the authorization information next time, opens the door through the NFC response.
In step S20, the personal information at least includes an identification number and a photo of the head portrait; the verification result is that the verification is passed or not passed; the authorization information at least comprises a Bluetooth name, a mac address of the CTID intelligent access control and unlocking authority; the unlocking authority is permanently effective, effective within the validity period or effective within the effective times; for example, effective within 1 month, or only 5 times.
The step S30 specifically includes:
step S31, the mobile phone searches a device list with the same name in the induction range based on the Bluetooth name in the authorization information;
step S32, the mobile phone verifies the equipment in the equipment list by using the mac address, finds the matched CTID intelligent access control, and is connected with the CTID intelligent access control through gatt connect; gatt connect is a method of connecting BLE devices, which is prior art;
step S33, the CTID intelligent entrance guard returns a gatt callback carrying the UUID to the mobile phone;
and step S34, the mobile phone monitors the gatt callback to obtain the UUID.
In step S40, the instruction format sequentially includes the following instruction fields: instruction type, message length, command header, message content, CRC16, and terminator; the CRC16 is used to store the calculation result of CRC calculation on the message content.
The step S50 specifically includes:
step S51, analyzing the unlocking instruction by the CTID intelligent entrance guard, and extracting message contents containing verification results and authorization information from the unlocking instruction;
step S52, judging whether the length of the message content is consistent with the message length, if so, entering step S53; if not, ending the flow;
step S53, performing CRC calculation on the message content, judging whether the calculation result is consistent with the content carried by the CRC16, if so, indicating that the content is complete, and entering step S54; if not, the content is incomplete, and the process is ended;
step S54, the CTID intelligent entrance guard judges whether the check result is that the check is passed, if yes, the step S55 is executed; if not, ending the flow;
step S55, the CTID intelligent entrance guard judges whether the authorization information judges that the unlocking authority exists or not, if so, the unlocking operation is executed, and an execution result of successful unlocking is sent to the mobile phone based on the instruction format; if not, the unlocking operation is not executed, and the execution result of the unlocking failure is sent to the mobile phone based on the instruction format. Namely, judging whether the current time is within the set validity period or not, or judging whether the remaining valid times are greater than 0 or whether the remaining valid times are permanently valid unlocking authority or not, and if so, executing the unlocking operation.
The invention discloses a preferable embodiment of a CTID intelligent access control unlocking system, which comprises the following modules:
the Bluetooth module initialization module is used for creating a UUID (Universal unique identification code) and a Bluetooth name when a Bluetooth module of the CTID intelligent access control is initialized; the UUID is provided with a field corresponding to an equipment supporting function, for example, a field with the content of 'write', and the function that the equipment supports data write-in is known after the UUID is acquired;
the personal information verification module is used for sending the personal information to the server for verification by the mobile phone and receiving a verification result (bid data) and authorization information returned by the server; the server compares whether the identity card number is consistent with the head portrait photo based on data pre-stored in a database, generates a verification result, searches authorization information corresponding to the identity card number, and then sends the verification result and the authorization information to the mobile phone;
the CTID intelligent access control connection module is used for searching and connecting the CTID intelligent access control based on the authorization information and the Bluetooth name by the mobile phone to obtain the UUID of the CTID intelligent access control;
the unlocking instruction sending module is used for packaging the verification result and the authorization information into an unlocking instruction according to a preset instruction format and sending the unlocking instruction to the CTID intelligent entrance guard based on the UUID; the unlocking instruction is sent to a Bluetooth module of the CTID intelligent access control through a uuid write interface;
the unlocking instruction execution module is used for analyzing and verifying the received unlocking instruction by the CTID intelligent access control to obtain a verification result and authorization information, executing unlocking operation based on the verification result and the authorization information, and sending an execution result to the mobile phone based on the instruction format;
the execution result archiving module is used for analyzing the received execution result by the mobile phone and sending the execution result to the server for recording so as to complete unlocking of the CTID intelligent access control; and sending the execution result to a server for archiving recording, so that the tracing in the later stage is facilitated, the unlocking record is inquired, and the safety of the CTID intelligent access control is further improved.
During the concrete implementation, CTID intelligent entrance guard unblanks after successful, can locally preserve the authorization information, and the user can directly use the magnetic card that has written the authorization information next time, opens the door through the NFC response.
In the personal information verification module, the personal information at least comprises an identification number and a head portrait photo; the verification result is that the verification is passed or not passed; the authorization information at least comprises a Bluetooth name, a mac address of the CTID intelligent access control and unlocking authority; the unlocking authority is permanently effective, effective within the validity period or effective within the effective times; for example, effective within 1 month, or only 5 times.
CTID intelligent entrance guard connection module specifically includes:
the Bluetooth searching unit is used for searching a device list with the same name in the induction range by the mobile phone based on the Bluetooth name in the authorization information;
the mac verification unit is used for verifying the equipment in the equipment list by using the mac address through the mobile phone, finding a matched CTID intelligent access control and connecting the CTID intelligent access control through gatt connect; gatt connect is a method of connecting BLE devices, which is prior art;
the gatt callback sending unit is used for returning the gatt callback carrying the UUID to the mobile phone by the CTID intelligent access control;
and the UUID acquisition unit is used for monitoring the gatt callback by the mobile phone to obtain the UUID.
In the unlocking instruction sending module, the instruction format sequentially comprises the following instruction fields: instruction type, message length, command header, message content, CRC16, and terminator; the CRC16 is used to store the calculation result of CRC calculation on the message content.
The unlocking instruction execution module specifically comprises:
the unlocking instruction analysis unit is used for analyzing the unlocking instruction by the CTID intelligent access control and extracting message contents containing verification results and authorization information from the unlocking instruction;
the message length verification unit is used for judging whether the length of the message content is consistent with the message length or not, and if so, entering the CRC (cyclic redundancy check) unit; if not, ending the flow;
the CRC unit is used for performing CRC calculation on the message content, judging whether the calculation result is consistent with the content carried by the CRC16, if so, indicating that the content is complete, and entering the verification result checking unit; if not, the content is incomplete, and the process is ended;
the verification result checking unit is used for the CTID intelligent access control to judge whether the verification result is passed through verification or not, and if yes, the CTID intelligent access control enters the unlocking unit; if not, ending the flow;
the unlocking unit is used for the CTID intelligent access control to judge whether the authorization information judges that the unlocking authority exists or not, if so, the unlocking operation is executed, and an execution result of successful unlocking is sent to the mobile phone based on the instruction format; if not, the unlocking operation is not executed, and the execution result of the unlocking failure is sent to the mobile phone based on the instruction format. Namely, judging whether the current time is within the set validity period or not, or judging whether the remaining valid times are greater than 0 or whether the remaining valid times are permanently valid unlocking authority or not, and if so, executing the unlocking operation.
In summary, the invention has the advantages that:
1. personal information is sent to a server through a mobile phone to be checked to obtain a checking result and authorization information, the CTID intelligent access control is searched and connected based on the authorization information and a Bluetooth name, a UUID of the CTID intelligent access control is obtained, an unlocking instruction carrying the checking result and the authorization information is sent to the CTID intelligent access control by utilizing the UUID, the CTID intelligent access control analyzes and verifies the unlocking instruction and then executes unlocking operation, namely, a user can complete the unlocking operation of the CTID intelligent access control based on the personal information, the CTID intelligent access control and the mobile phone do not need to be authorized and paired like the prior CTID intelligent access control and the mobile phone, and the convenience of unlocking the access control is greatly improved.
2. The execution result of the CTID intelligent access control is sent to the server for filing, so that the tracing in the later stage and the unlocking record can be inquired, and the safety of the CTID intelligent access control can be improved.
3. By carrying out double check on the message length and CRC calculation on the message content in the unlocking instruction, the safety of the CTID intelligent access control is greatly improved.
Although specific embodiments of the invention have been described above, it will be understood by those skilled in the art that the specific embodiments described are illustrative only and are not limiting upon the scope of the invention, and that equivalent modifications and variations can be made by those skilled in the art without departing from the spirit of the invention, which is to be limited only by the appended claims.

Claims (10)

1. A CTID intelligent entrance guard unlocking method is characterized in that: the method comprises the following steps:
step S10, creating a UUID and a Bluetooth name when a Bluetooth module of the CTID intelligent access control is initialized;
step S20, the mobile phone sends the personal information to the server for verification, and receives the verification result and the authorization information returned by the server;
s30, searching and connecting the mobile phone to the CTID intelligent access control based on the authorization information and the Bluetooth name to obtain the UUID of the CTID intelligent access control;
step S40, the mobile phone encapsulates the verification result and the authorization information into an unlocking instruction according to a preset instruction format, and sends the unlocking instruction to the CTID intelligent entrance guard based on the UUID;
step S50, the CTID intelligent entrance guard analyzes and verifies the received unlocking instruction to obtain a verification result and authorization information, executes unlocking operation based on the verification result and the authorization information, and sends an execution result to a mobile phone based on the instruction format;
and step S60, the mobile phone analyzes the received execution result and sends the execution result to the server for recording, and unlocking of the CTID intelligent access control is completed.
2. The CTID intelligent entrance guard unlocking method of claim 1, characterized in that: in step S20, the personal information at least includes an identification number and a photo of the head portrait; the verification result is that the verification is passed or not passed; the authorization information at least comprises a Bluetooth name, a mac address of the CTID intelligent access control and unlocking authority; the unlocking authority is permanently effective, effective within the validity period or effective within the effective times.
3. The CTID intelligent entrance guard unlocking method of claim 2, characterized in that: the step S30 specifically includes:
step S31, the mobile phone searches a device list with the same name in the induction range based on the Bluetooth name in the authorization information;
step S32, the mobile phone verifies the equipment in the equipment list by using the mac address, finds the matched CTID intelligent access control, and is connected with the CTID intelligent access control through gatt connect;
step S33, the CTID intelligent entrance guard returns a gatt callback carrying the UUID to the mobile phone;
and step S34, the mobile phone monitors the gatt callback to obtain the UUID.
4. The CTID intelligent entrance guard unlocking method of claim 1, characterized in that: in step S40, the instruction format sequentially includes the following instruction fields: instruction type, message length, command header, message content, CRC16, and terminator; the CRC16 is used to store the calculation result of CRC calculation on the message content.
5. The CTID intelligent entrance guard unlocking method of claim 4, characterized in that: the step S50 specifically includes:
step S51, analyzing the unlocking instruction by the CTID intelligent entrance guard, and extracting message contents containing verification results and authorization information from the unlocking instruction;
step S52, judging whether the length of the message content is consistent with the message length, if so, entering step S53; if not, ending the flow;
step S53, performing CRC calculation on the message content, judging whether the calculation result is consistent with the content carried by the CRC16, if so, indicating that the content is complete, and entering step S54; if not, the content is incomplete, and the process is ended;
step S54, the CTID intelligent entrance guard judges whether the check result is that the check is passed, if yes, the step S55 is executed; if not, ending the flow;
step S55, the CTID intelligent entrance guard judges whether the authorization information judges that the unlocking authority exists or not, if so, the unlocking operation is executed, and an execution result of successful unlocking is sent to the mobile phone based on the instruction format; if not, the unlocking operation is not executed, and the execution result of the unlocking failure is sent to the mobile phone based on the instruction format.
6. The utility model provides a CTID intelligent entrance guard system of unblanking which characterized in that: the system comprises the following modules:
the Bluetooth module initialization module is used for creating a UUID and a Bluetooth name when a Bluetooth module of the CTID intelligent access control is initialized;
the personal information verification module is used for sending the personal information to the server for verification by the mobile phone and receiving a verification result and authorization information returned by the server;
the CTID intelligent access control connection module is used for searching and connecting the CTID intelligent access control based on the authorization information and the Bluetooth name by the mobile phone to obtain the UUID of the CTID intelligent access control;
the unlocking instruction sending module is used for packaging the verification result and the authorization information into an unlocking instruction according to a preset instruction format and sending the unlocking instruction to the CTID intelligent entrance guard based on the UUID;
the unlocking instruction execution module is used for analyzing and verifying the received unlocking instruction by the CTID intelligent access control to obtain a verification result and authorization information, executing unlocking operation based on the verification result and the authorization information, and sending an execution result to the mobile phone based on the instruction format;
and the execution result filing module is used for analyzing the received execution result by the mobile phone and sending the execution result to the server for recording so as to complete unlocking of the CTID intelligent access control.
7. The CTID intelligent entrance guard system of unblanking of claim 6, characterized in that: in the personal information verification module, the personal information at least comprises an identification number and a head portrait photo; the verification result is that the verification is passed or not passed; the authorization information at least comprises a Bluetooth name, a mac address of the CTID intelligent access control and unlocking authority; the unlocking authority is permanently effective, effective within the validity period or effective within the effective times.
8. The CTID intelligent entrance guard system of unblanking of claim 7, characterized in that: CTID intelligent entrance guard connection module specifically includes:
the Bluetooth searching unit is used for searching a device list with the same name in the induction range by the mobile phone based on the Bluetooth name in the authorization information;
the mac verification unit is used for verifying the equipment in the equipment list by using the mac address through the mobile phone, finding a matched CTID intelligent access control and connecting the CTID intelligent access control through gatt connect;
the gatt callback sending unit is used for returning the gatt callback carrying the UUID to the mobile phone by the CTID intelligent access control;
and the UUID acquisition unit is used for monitoring the gatt callback by the mobile phone to obtain the UUID.
9. The CTID intelligent entrance guard system of unblanking of claim 6, characterized in that: in the unlocking instruction sending module, the instruction format sequentially comprises the following instruction fields: instruction type, message length, command header, message content, CRC16, and terminator; the CRC16 is used to store the calculation result of CRC calculation on the message content.
10. The CTID intelligent entrance guard system of unblanking of claim 9, characterized in that: the unlocking instruction execution module specifically comprises:
the unlocking instruction analysis unit is used for analyzing the unlocking instruction by the CTID intelligent access control and extracting message contents containing verification results and authorization information from the unlocking instruction;
the message length verification unit is used for judging whether the length of the message content is consistent with the message length or not, and if so, entering the CRC (cyclic redundancy check) unit; if not, ending the flow;
the CRC unit is used for performing CRC calculation on the message content, judging whether the calculation result is consistent with the content carried by the CRC16, if so, indicating that the content is complete, and entering the verification result checking unit; if not, the content is incomplete, and the process is ended;
the verification result checking unit is used for the CTID intelligent access control to judge whether the verification result is passed through verification or not, and if yes, the CTID intelligent access control enters the unlocking unit; if not, ending the flow;
the unlocking unit is used for the CTID intelligent access control to judge whether the authorization information judges that the unlocking authority exists or not, if so, the unlocking operation is executed, and an execution result of successful unlocking is sent to the mobile phone based on the instruction format; if not, the unlocking operation is not executed, and the execution result of the unlocking failure is sent to the mobile phone based on the instruction format.
CN202110075678.6A 2021-01-20 2021-01-20 CTID intelligent access control unlocking method and system Active CN112907800B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110075678.6A CN112907800B (en) 2021-01-20 2021-01-20 CTID intelligent access control unlocking method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110075678.6A CN112907800B (en) 2021-01-20 2021-01-20 CTID intelligent access control unlocking method and system

Publications (2)

Publication Number Publication Date
CN112907800A true CN112907800A (en) 2021-06-04
CN112907800B CN112907800B (en) 2022-09-20

Family

ID=76116733

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110075678.6A Active CN112907800B (en) 2021-01-20 2021-01-20 CTID intelligent access control unlocking method and system

Country Status (1)

Country Link
CN (1) CN112907800B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113421362A (en) * 2021-06-22 2021-09-21 公安部第一研究所 CTID-based intelligent door lock real-name authentication method, device and system
CN113487765A (en) * 2021-06-08 2021-10-08 福建新大陆通信科技股份有限公司 CTID (computer telephony integration) access control method and system supporting dynamic encryption

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103077256A (en) * 2013-03-01 2013-05-01 李凯 Method for quickly and conveniently examining unlocking records through network
CN106790089A (en) * 2016-12-23 2017-05-31 厦门亿力天龙科技有限公司 A kind of distribution low-voltage equipment information security certification transmission terminal and its implementation
CN107845169A (en) * 2017-10-27 2018-03-27 张荣斌 A kind of unlocking system and method for unlocking based on dynamic password
CN108806028A (en) * 2018-01-29 2018-11-13 安徽新飞居博士科技有限公司 A kind of intelligent door lock and control method based on Internet communication technology
US20190172285A1 (en) * 2017-08-14 2019-06-06 Q & K International Group Limited Application Method of Bluetooth Low-energy Electronic Lock Based on Built-in Offline Pairing Passwords, Interactive Unlocking Method of a Bluetooth Electronic Lock and Electronic Lock System
CN110435789A (en) * 2019-08-13 2019-11-12 山东爱德邦智能科技有限公司 A kind of lock control method, device, equipment and the storage medium of bicycle
CN110738764A (en) * 2019-10-22 2020-01-31 佛山市艾温特智能科技有限公司 Security control system and method based on intelligent lock
CN111768522A (en) * 2020-06-10 2020-10-13 福建新大陆通信科技股份有限公司 CTID-based intelligent door lock unlocking method and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103077256A (en) * 2013-03-01 2013-05-01 李凯 Method for quickly and conveniently examining unlocking records through network
CN106790089A (en) * 2016-12-23 2017-05-31 厦门亿力天龙科技有限公司 A kind of distribution low-voltage equipment information security certification transmission terminal and its implementation
US20190172285A1 (en) * 2017-08-14 2019-06-06 Q & K International Group Limited Application Method of Bluetooth Low-energy Electronic Lock Based on Built-in Offline Pairing Passwords, Interactive Unlocking Method of a Bluetooth Electronic Lock and Electronic Lock System
CN107845169A (en) * 2017-10-27 2018-03-27 张荣斌 A kind of unlocking system and method for unlocking based on dynamic password
CN108806028A (en) * 2018-01-29 2018-11-13 安徽新飞居博士科技有限公司 A kind of intelligent door lock and control method based on Internet communication technology
CN110435789A (en) * 2019-08-13 2019-11-12 山东爱德邦智能科技有限公司 A kind of lock control method, device, equipment and the storage medium of bicycle
CN110738764A (en) * 2019-10-22 2020-01-31 佛山市艾温特智能科技有限公司 Security control system and method based on intelligent lock
CN111768522A (en) * 2020-06-10 2020-10-13 福建新大陆通信科技股份有限公司 CTID-based intelligent door lock unlocking method and system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113487765A (en) * 2021-06-08 2021-10-08 福建新大陆通信科技股份有限公司 CTID (computer telephony integration) access control method and system supporting dynamic encryption
CN113421362A (en) * 2021-06-22 2021-09-21 公安部第一研究所 CTID-based intelligent door lock real-name authentication method, device and system
CN113421362B (en) * 2021-06-22 2023-03-14 公安部第一研究所 CTID-based intelligent door lock real-name authentication method, device and system

Also Published As

Publication number Publication date
CN112907800B (en) 2022-09-20

Similar Documents

Publication Publication Date Title
CN112907800B (en) CTID intelligent access control unlocking method and system
CN105678872B (en) A kind of access control system and its authorization method and access control terminal equipment
EP3069297B1 (en) Identity authentication by using human biological characteristics
CN101120350B (en) User verification with a multimodal web-based interface
CN105450614B (en) A kind of server account logon method, device and system
CN106355709A (en) Access control system and door opening method based on dynamic quick response code
CN102027511A (en) Physical access control using dynamic inputs from a portable communications device
CN109002875B (en) Two-dimensional code encryption method, two-dimensional code transmission system and storage medium
CN206179048U (en) Personal identification device
CN103326989A (en) Identifying code based on voice recognition
CN113724428A (en) Gate system for identity recognition and health detection of community owners and management method
CN107911340A (en) Login validation method, device, equipment and the storage medium of application program
CN109067881A (en) Remote-authorization method and its device, equipment and storage medium
CN111415443A (en) Remote unlocking method and device
KR101891781B1 (en) Time and attendance management apparatus based on mac address verification and operating method thereof
WO2018137309A1 (en) Wireless communication processing method and device
CN106782567A (en) Method and device for establishing voiceprint model
CN211956596U (en) Bluetooth access control system
CN108052811A (en) Terminal control method and system based on face texture identification
CN110765431B (en) Multi-user fingerprint or password login method and management system thereof
CN106452766B (en) Password retrieving method and device
CN107276962A (en) A kind of dynamic password voice Verification System and method with reference to any gesture
CN112491923A (en) Method for logging in computer application needing identity authentication
CN110910536A (en) Control method of intelligent door lock, related device and storage medium
CN111768527A (en) Method and device for inputting user fingerprint of intelligent lock, intelligent lock and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20221215

Address after: 603, Floor 6, Building 30 #, Fuzhou Software Park Phase I (Strait Park), No. 89, Software Avenue, Wufeng Street, Gulou District, Fuzhou City, 350000, Fujian Province

Patentee after: Fujian New World Huichuang Technology Co.,Ltd.

Address before: 6 # Building and 2 to 4 # Building of 5 # Building, No. 70, Rujiang East Road, Mawei Development Zone, Fuzhou City, Fujian Province, 350000

Patentee before: Fujian Newland Communication Science Technologies Co.,Ltd.

TR01 Transfer of patent right