CN112907800B - CTID intelligent access control unlocking method and system - Google Patents
CTID intelligent access control unlocking method and system Download PDFInfo
- Publication number
- CN112907800B CN112907800B CN202110075678.6A CN202110075678A CN112907800B CN 112907800 B CN112907800 B CN 112907800B CN 202110075678 A CN202110075678 A CN 202110075678A CN 112907800 B CN112907800 B CN 112907800B
- Authority
- CN
- China
- Prior art keywords
- ctid
- unlocking
- access control
- mobile phone
- authorization information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention provides a CTID intelligent entrance guard unlocking method and system in the technical field of intelligent entrance guard, wherein the method comprises the following steps: step S10, creating a UUID and a Bluetooth name when a Bluetooth module of the CTID intelligent access control is initialized; step S20, the mobile phone sends the personal information to the server for verification, and receives the returned verification result and the authorization information; s30, searching and connecting the mobile phone to the CTID intelligent access control based on the authorization information and the Bluetooth name to acquire a UUID; step S40, the mobile phone encapsulates the verification result and the authorization information into an unlocking instruction, and sends the unlocking instruction to the CTID intelligent entrance guard based on the UUID; step S50, the CTID intelligent entrance guard analyzes and verifies the received unlocking instruction to obtain a verification result and authorization information, executes unlocking operation based on the verification result and the authorization information, and sends the execution result to the mobile phone; and step S60, the mobile phone analyzes the received execution result and sends the execution result to the server. The invention has the advantages that: the entrance guard unlocking convenience is greatly improved.
Description
Technical Field
The invention relates to the technical field of intelligent access control, in particular to a CTID intelligent access control unlocking method and system.
Background
The entrance guard is a system for controlling an entrance and exit channel, and is developed on the basis of a traditional door lock. The traditional mechanical door lock is only a pure mechanical device, and people can open the door lock by various means no matter how reasonable the structural design is and how firm the material is. In a passage with a lot of people coming in and going out (such as an office building and a hotel room), the management of the key is troublesome, and the lock and the key are replaced together when the key is lost or the people replace the key.
With the progress of science and technology, various intelligent access controls, such as an intelligent access control unlocked by using bluetooth, appear. However, before the traditional intelligent entrance guard is unlocked by using the bluetooth, the intelligent entrance guard and the bluetooth equipment need to be authorized and paired firstly, after the pairing is successful, the subsequent intelligent entrance guard and the bluetooth equipment can be unlocked by using the bluetooth, the intelligent entrance guard is not convenient and fast to use, and particularly for application scenes such as hotels, the residents are replaced at every time, or the residents replace the hotels at every time, the intelligent entrance guard and the bluetooth equipment need to be paired once, so that the user experience is poor.
Therefore, how to provide a CTID intelligent entrance guard unlocking method and system, the convenience of entrance guard unlocking is improved, and the problem to be solved urgently is formed.
Disclosure of Invention
The invention aims to solve the technical problem of providing a CTID intelligent access control unlocking method and system, and achieving the purpose of improving the convenience of access control unlocking.
In a first aspect, the invention provides a CTID intelligent entrance guard unlocking method, which comprises the following steps:
step S10, creating a UUID and a Bluetooth name when a Bluetooth module of the CTID intelligent access control is initialized;
step S20, the mobile phone sends the personal information to the server for verification, and receives the verification result and the authorization information returned by the server;
s30, searching and connecting the mobile phone to the CTID intelligent access control based on the authorization information and the Bluetooth name to obtain the UUID of the CTID intelligent access control;
step S40, the mobile phone encapsulates the verification result and the authorization information into an unlocking instruction according to a preset instruction format, and sends the unlocking instruction to the CTID intelligent entrance guard based on the UUID;
step S50, the CTID intelligent entrance guard analyzes and verifies the received unlocking instruction to obtain a verification result and authorization information, executes unlocking operation based on the verification result and the authorization information, and sends an execution result to a mobile phone based on the instruction format;
and step S60, the mobile phone analyzes the received execution result and sends the execution result to the server for recording, and the unlocking of the CTID intelligent entrance guard is completed.
Further, in the step S20, the personal information at least includes an identification number and a head portrait photo; the verification result is that the verification is passed or not passed; the authorization information at least comprises a Bluetooth name, a mac address of the CTID intelligent access control and unlocking authority; the unlocking authority is permanently effective, effective within the validity period or effective within the effective times.
Further, the step S30 specifically includes:
step S31, the mobile phone searches a device list with the same name in the induction range based on the Bluetooth name in the authorization information;
step S32, the mobile phone verifies the equipment in the equipment list by using the mac address, finds the matched CTID intelligent access control, and connects the CTID intelligent access control through gattconnect;
step S33, the CTID intelligent entrance guard returns a gatt callback carrying the UUID to the mobile phone;
and step S34, the mobile phone monitors the gatt callback to obtain the UUID.
Further, in step S40, the instruction format sequentially includes the following instruction fields: instruction type, message length, command header, message content, CRC16, and terminator; the CRC16 is used to store the calculation result of CRC calculation on the message content.
Further, the step S50 specifically includes:
step S51, analyzing the unlocking instruction by the CTID intelligent entrance guard, and extracting message contents containing verification results and authorization information from the unlocking instruction;
step S52, judging whether the length of the message content is consistent with the message length, if so, entering step S53; if not, ending the flow;
step S53, performing CRC calculation on the message content, judging whether the calculation result is consistent with the content carried by the CRC16, if so, indicating that the content is complete, and entering step S54; if not, the content is incomplete, and the process is ended;
step S54, the CTID intelligent entrance guard judges whether the check result is that the check is passed, if yes, the step S55 is executed; if not, ending the flow;
step S55, the CTID intelligent entrance guard judges whether the authorization information judges that the unlocking authority exists or not, if so, the unlocking operation is executed, and an execution result of successful unlocking is sent to the mobile phone based on the instruction format; if not, the unlocking operation is not executed, and the execution result of the unlocking failure is sent to the mobile phone based on the instruction format.
In a second aspect, the invention provides a CTID intelligent access control unlocking system, which comprises the following modules:
the Bluetooth module initialization module is used for creating a UUID and a Bluetooth name when a Bluetooth module of the CTID intelligent access control is initialized;
the personal information verification module is used for sending the personal information to the server for verification by the mobile phone and receiving a verification result and authorization information returned by the server;
the CTID intelligent access control connection module is used for searching and connecting the CTID intelligent access control based on the authorization information and the Bluetooth name by the mobile phone to obtain the UUID of the CTID intelligent access control;
the unlocking instruction sending module is used for packaging the verification result and the authorization information into an unlocking instruction according to a preset instruction format and sending the unlocking instruction to the CTID intelligent entrance guard based on the UUID;
the unlocking instruction execution module is used for analyzing and verifying the received unlocking instruction by the CTID intelligent access control to obtain a verification result and authorization information, executing unlocking operation based on the verification result and the authorization information, and sending an execution result to the mobile phone based on the instruction format;
and the execution result filing module is used for analyzing the received execution result by the mobile phone and sending the execution result to the server for recording so as to complete the unlocking of the CTID intelligent access control.
Further, in the personal information verification module, the personal information at least comprises an identification number and a head portrait photo; the verification result is that the verification is passed or not passed; the authorization information at least comprises a Bluetooth name, a mac address of the CTID intelligent access control and unlocking authority; the unlocking authority is permanently effective, effective within the validity period or effective within the effective times.
Further, CTID intelligent entrance guard connection module specifically includes:
the Bluetooth searching unit is used for searching a device list with the same name in the induction range by the mobile phone based on the Bluetooth name in the authorization information;
the mac verification unit is used for verifying the equipment in the equipment list by using the mac address through the mobile phone, finding a matched CTID intelligent access control and connecting the CTID intelligent access control through gatt connect;
the gatt callback sending unit is used for returning the gatt callback carrying the UUID to the mobile phone by the CTID intelligent access control;
and the UUID acquisition unit is used for monitoring the gatt callback by the mobile phone to obtain the UUID.
Further, in the unlocking instruction sending module, the instruction format sequentially includes the following instruction fields: instruction type, message length, command header, message content, CRC16, and terminator; the CRC16 is used to store the calculation result of CRC calculation on the message content.
Further, the unlocking instruction execution module specifically includes:
the unlocking instruction analysis unit is used for analyzing the unlocking instruction by the CTID intelligent access control and extracting message contents containing verification results and authorization information from the unlocking instruction;
the message length verification unit is used for judging whether the length of the message content is consistent with the message length or not, and if so, the message length verification unit enters a CRC (Cyclic redundancy check) unit; if not, ending the flow;
the CRC unit is used for performing CRC calculation on the message content, judging whether the calculation result is consistent with the content carried by the CRC16, if so, indicating that the content is complete, and entering the verification result checking unit; if not, the content is incomplete, and the process is ended;
the verification result checking unit is used for the CTID intelligent access control to judge whether the verification result is passed through verification or not, and if yes, the CTID intelligent access control enters the unlocking unit; if not, ending the flow;
the unlocking unit is used for the CTID intelligent access control to judge whether the authorization information judges that the unlocking authority exists or not, if so, the unlocking operation is executed, and an execution result of successful unlocking is sent to the mobile phone based on the instruction format; if not, the unlocking operation is not executed, and the execution result of the unlocking failure is sent to the mobile phone based on the instruction format.
The invention has the advantages that:
1. personal information is sent to a server through a mobile phone to be checked to obtain a checking result and authorization information, the CTID intelligent access control is searched and connected based on the authorization information and a Bluetooth name, a UUID of the CTID intelligent access control is obtained, an unlocking instruction carrying the checking result and the authorization information is sent to the CTID intelligent access control by utilizing the UUID, the CTID intelligent access control analyzes and verifies the unlocking instruction and then executes unlocking operation, namely, a user can complete the unlocking operation of the CTID intelligent access control based on the personal information, the CTID intelligent access control and the mobile phone do not need to be authorized and paired like the prior CTID intelligent access control and the mobile phone, and the convenience of unlocking the access control is greatly improved.
2. The execution result of the CTID intelligent access control is sent to the server for filing, so that the tracing in the later stage and the unlocking record can be inquired, and the safety of the CTID intelligent access control can be improved.
3. By carrying out double check on the message length and CRC calculation on the message content in the unlocking instruction, the safety of the CTID intelligent access control is greatly improved.
Drawings
The invention will be further described with reference to the following examples with reference to the accompanying drawings.
Fig. 1 is a flowchart of a CTID intelligent access control unlocking method of the present invention.
Fig. 2 is a schematic structural diagram of a CTID intelligent access control unlocking system of the present invention.
Detailed Description
The technical scheme in the embodiment of the application has the following general idea: personal information is sent to a server through a mobile phone to be checked to obtain a checking result and authorization information, the CTID intelligent access control is searched and connected based on the authorization information and a Bluetooth name, a UUID of the CTID intelligent access control is obtained, an unlocking instruction carrying the checking result and the authorization information is sent to the CTID intelligent access control by utilizing the UUID, the CTID intelligent access control analyzes and verifies the unlocking instruction and then executes unlocking operation, the CTID intelligent access control and the mobile phone do not need to be subjected to Bluetooth authorization matching, and the convenience of unlocking the access control is improved.
Referring to fig. 1 to 2, a preferred embodiment of a CTID intelligent access control unlocking method according to the present invention includes the following steps:
step S10, creating a UUID (universal unique identification code) and a Bluetooth name when a Bluetooth module of the CTID intelligent access control is initialized; the UUID is provided with a field corresponding to an equipment supporting function, for example, a field with the content of 'write', and the function that the equipment supports data write-in is known after the UUID is acquired;
step S20, the mobile phone sends the personal information to the server for verification, and receives the verification result (bid data) and the authorization information returned by the server; the server compares whether the identity card number is consistent with the head portrait photo based on data pre-stored in a database, generates a verification result, searches authorization information corresponding to the identity card number, and then sends the verification result and the authorization information to the mobile phone;
step S30, the mobile phone searches and connects the CTID intelligent access control based on the authorization information and the Bluetooth name to obtain the UUID of the CTID intelligent access control;
step S40, the mobile phone encapsulates the verification result and the authorization information into an unlocking instruction according to a preset instruction format, and sends the unlocking instruction to the CTID intelligent entrance guard based on the UUID; the unlocking instruction is sent to a Bluetooth module of the CTID intelligent access control through a uuid write interface;
step S50, the CTID intelligent entrance guard analyzes and verifies the received unlocking instruction to obtain a verification result and authorization information, executes unlocking operation based on the verification result and the authorization information, and sends an execution result to a mobile phone based on the instruction format;
step S60, the mobile phone analyzes the received execution result and sends the execution result to a server for recording, and the unlocking of the CTID intelligent access control is completed; and sending the execution result to a server for archiving recording, so that the tracing in the later stage is facilitated, the unlocking record is inquired, and the safety of the CTID intelligent access control is further improved.
During specific implementation, after the CTID intelligent entrance guard is successfully unlocked, the authorization information can be locally stored, and a user can directly use the magnetic card written with the authorization information next time to open the door through NFC induction.
In step S20, the personal information at least includes an identification number and a photo of the head portrait; the verification result is that the verification is passed or not passed; the authorization information at least comprises a Bluetooth name, a mac address of the CTID intelligent access control and unlocking authority; the unlocking authority is permanently effective, effective within the validity period or effective within the effective times; for example, effective within 1 month, or only 5 times.
The step S30 specifically includes:
step S31, the mobile phone searches a device list with the same name in the induction range based on the Bluetooth name in the authorization information;
step S32, the mobile phone verifies the equipment in the equipment list by using the mac address, finds the matched CTID intelligent access control, and is connected with the CTID intelligent access control through gatt connect; gatt connect is a method of connecting BLE devices, which is prior art;
step S33, the CTID intelligent entrance guard returns a gatt callback carrying the UUID to the mobile phone;
and step S34, the mobile phone monitors the gatt callback to obtain the UUID.
In step S40, the instruction format sequentially includes the following instruction fields: instruction type, message length, command header, message content, CRC16, and terminator; the CRC16 is used to store the calculation result of CRC calculation on the message content.
The step S50 specifically includes:
step S51, analyzing the unlocking instruction by the CTID intelligent entrance guard, and extracting message contents containing verification results and authorization information from the unlocking instruction;
step S52, judging whether the length of the message content is consistent with the message length, if so, entering step S53; if not, ending the flow;
step S53, performing CRC calculation on the message content, judging whether the calculation result is consistent with the content carried by the CRC16, if so, indicating that the content is complete, and entering step S54; if not, the content is incomplete, and the process is ended;
step S54, the CTID intelligent entrance guard judges whether the check result is that the check is passed, if yes, the step S55 is executed; if not, ending the flow;
step S55, the CTID intelligent entrance guard judges whether the authorization information has unlocking authority or not, if yes, the unlocking operation is executed, and an execution result of successful unlocking is sent to the mobile phone based on the instruction format; if not, the unlocking operation is not executed, and the execution result of the unlocking failure is sent to the mobile phone based on the instruction format. Namely, judging whether the current time is within the set validity period or not, or judging whether the remaining valid times are greater than 0 or whether the remaining valid times are permanently valid unlocking authority or not, and if so, executing the unlocking operation.
The invention discloses a preferable embodiment of a CTID intelligent access control unlocking system, which comprises the following modules:
the Bluetooth module initialization module is used for creating a UUID (Universal unique identifier) and a Bluetooth name when the Bluetooth module of the CTID intelligent access control is initialized; the UUID is provided with a field corresponding to an equipment supporting function, for example, a field with the content of 'write', and the function that the equipment supports data write-in is known after the UUID is acquired;
the personal information verification module is used for sending the personal information to the server for verification by the mobile phone and receiving a verification result (bid data) and authorization information returned by the server; the server compares whether the identity card number is consistent with the head portrait photo based on data pre-stored in a database, generates a verification result, searches authorization information corresponding to the identity card number, and then sends the verification result and the authorization information to the mobile phone;
the CTID intelligent access control connection module is used for searching and connecting the CTID intelligent access control based on the authorization information and the Bluetooth name by the mobile phone to obtain the UUID of the CTID intelligent access control;
the unlocking instruction sending module is used for packaging the verification result and the authorization information into an unlocking instruction according to a preset instruction format and sending the unlocking instruction to the CTID intelligent entrance guard based on the UUID; sending the unlocking instruction to a Bluetooth module of the CTID intelligent entrance guard through a uuid write interface;
the unlocking instruction execution module is used for analyzing and verifying the received unlocking instruction by the CTID intelligent access control to obtain a verification result and authorization information, executing unlocking operation based on the verification result and the authorization information, and sending an execution result to the mobile phone based on the instruction format;
the execution result archiving module is used for analyzing the received execution result by the mobile phone and sending the execution result to the server for recording so as to complete unlocking of the CTID intelligent access control; and sending the execution result to a server for archiving recording, so that the source tracing and unlocking records in the later period can be conveniently inquired, and the safety of the CTID intelligent access control can be further improved.
During the concrete implementation, CTID intelligent entrance guard unblanks after successful, can locally preserve the authorization information, and the user can directly use the magnetic card that has written the authorization information next time, opens the door through the NFC response.
In the personal information verification module, the personal information at least comprises an identification number and a head portrait photo; the verification result is that the verification is passed or not passed; the authorization information at least comprises a Bluetooth name, a mac address of the CTID intelligent access control and unlocking authority; the unlocking authority is permanently effective, effective within the validity period or effective within the effective times; for example, effective within 1 month, or only 5 times.
CTID intelligent entrance guard connection module specifically includes:
the Bluetooth searching unit is used for searching a device list with the same name in the induction range by the mobile phone based on the Bluetooth name in the authorization information;
the mac verification unit is used for verifying the equipment in the equipment list by using the mac address through the mobile phone, finding a matched CTID intelligent access control and connecting the CTID intelligent access control through gatt connect; gatt connect is a method of connecting BLE devices, which is prior art;
the gatt callback sending unit is used for returning the gatt callback carrying the UUID to the mobile phone by the CTID intelligent access control;
and the UUID acquisition unit is used for monitoring the gatt callback by the mobile phone to obtain the UUID.
In the unlocking instruction sending module, the instruction format sequentially comprises the following instruction fields: instruction type, message length, command header, message content, CRC16, and end symbol; the CRC16 is used to store the calculation result of CRC calculation on the message content.
The unlocking instruction execution module specifically comprises:
the unlocking instruction analysis unit is used for analyzing the unlocking instruction by the CTID intelligent access control and extracting message contents containing verification results and authorization information from the unlocking instruction;
the message length verification unit is used for judging whether the length of the message content is consistent with the message length or not, and if so, entering the CRC (cyclic redundancy check) unit; if not, ending the flow;
a CRC check unit, configured to perform CRC calculation on the message content, determine whether a calculation result is consistent with the content carried by the CRC16, if yes, indicate that the content is complete, and enter a check result check unit; if not, the content is incomplete, and the process is ended;
the verification result checking unit is used for the CTID intelligent access control to judge whether the verification result is passed through verification or not, and if yes, the CTID intelligent access control enters the unlocking unit; if not, ending the flow;
the unlocking unit is used for the CTID intelligent access control to judge whether the authorization information has unlocking authority or not, if so, unlocking operation is executed, and an execution result of successful unlocking is sent to the mobile phone based on the instruction format; and if not, the unlocking operation is not executed, and an execution result of unlocking failure is sent to the mobile phone based on the instruction format. Namely, judging whether the current time is within the set validity period or not, or judging whether the remaining valid times are greater than 0 or whether the remaining valid times are permanently valid unlocking authority or not, and if so, executing the unlocking operation.
In conclusion, the invention has the advantages that:
1. personal information is sent to a server through a mobile phone to be checked to obtain a checking result and authorization information, the CTID intelligent access control is searched and connected based on the authorization information and a Bluetooth name, a UUID of the CTID intelligent access control is obtained, an unlocking instruction carrying the checking result and the authorization information is sent to the CTID intelligent access control by utilizing the UUID, the CTID intelligent access control analyzes and verifies the unlocking instruction and then executes unlocking operation, namely, a user can complete the unlocking operation of the CTID intelligent access control based on the personal information, the CTID intelligent access control and the mobile phone do not need to be authorized and paired like the prior CTID intelligent access control and the mobile phone, and the convenience of unlocking the access control is greatly improved.
2. The execution result of the CTID intelligent access control is sent to the server for filing, so that the tracing in the later stage and the unlocking record can be inquired, and the safety of the CTID intelligent access control can be improved.
3. By carrying out double check on the message length and CRC calculation on the message content in the unlocking instruction, the safety of the CTID intelligent access control is greatly improved.
Although specific embodiments of the invention have been described above, it will be understood by those skilled in the art that the specific embodiments described are illustrative only and are not limiting upon the scope of the invention, and that equivalent modifications and variations can be made by those skilled in the art without departing from the spirit of the invention, which is to be limited only by the appended claims.
Claims (6)
1. A CTID intelligent entrance guard unlocking method is characterized in that: the method comprises the following steps:
step S10, creating a UUID and a Bluetooth name when a Bluetooth module of the CTID intelligent access control is initialized;
step S20, the mobile phone sends the personal information to the server for verification, and receives the verification result and the authorization information returned by the server;
s30, searching and connecting the mobile phone to the CTID intelligent access control based on the authorization information and the Bluetooth name to obtain the UUID of the CTID intelligent access control;
step S40, the mobile phone encapsulates the verification result and the authorization information into an unlocking instruction according to a preset instruction format, and sends the unlocking instruction to the CTID intelligent entrance guard based on the UUID;
the instruction format comprises the following instruction fields in sequence: instruction type, message length, command header, message content, CRC16, and end symbol; the CRC16 is used for storing the calculation result of CRC calculation of the message content;
step S50, the CTID intelligent entrance guard analyzes and verifies the received unlocking instruction to obtain a verification result and authorization information, executes unlocking operation based on the verification result and the authorization information, and sends an execution result to a mobile phone based on the instruction format;
step S60, the mobile phone analyzes the received execution result and sends the execution result to a server for recording, and the unlocking of the CTID intelligent access control is completed;
the step S50 specifically includes:
step S51, analyzing the unlocking instruction by the CTID intelligent entrance guard, and extracting message contents containing verification results and authorization information from the unlocking instruction;
step S52, judging whether the length of the message content is consistent with the message length, if so, entering step S53; if not, ending the flow;
step S53, performing CRC calculation on the message content, judging whether the calculation result is consistent with the content carried by the CRC16, if so, indicating that the content is complete, and entering step S54; if not, the content is incomplete, and the process is ended;
step S54, the CTID intelligent entrance guard judges whether the check result is that the check is passed, if yes, the step S55 is executed; if not, ending the flow;
step S55, the CTID intelligent entrance guard judges whether the authorization information judges that the unlocking authority exists or not, if so, the unlocking operation is executed, and an execution result of successful unlocking is sent to the mobile phone based on the instruction format; if not, the unlocking operation is not executed, and the execution result of the unlocking failure is sent to the mobile phone based on the instruction format.
2. The CTID intelligent entrance guard unlocking method of claim 1, characterized in that: in step S20, the personal information at least includes an identification number and a photo of the head portrait; the verification result is that the verification is passed or not passed; the authorization information at least comprises a Bluetooth name, a mac address of the CTID intelligent access control and unlocking authority; the unlocking authority is permanently effective, effective within the validity period or effective within the effective times.
3. The CTID intelligent entrance guard unlocking method of claim 2, characterized in that: the step S30 specifically includes:
step S31, the mobile phone searches a device list with the same name in the induction range based on the Bluetooth name in the authorization information;
step S32, the mobile phone verifies the equipment in the equipment list by using the mac address, finds the matched CTID intelligent access control, and is connected with the CTID intelligent access control through gatt connect;
step S33, the CTID intelligent entrance guard returns a gatt callback carrying the UUID to the mobile phone;
and step S34, the mobile phone monitors the gatt callback to obtain the UUID.
4. The utility model provides a CTID intelligent entrance guard system of unblanking which characterized in that: the system comprises the following modules:
the Bluetooth module initialization module is used for creating a UUID and a Bluetooth name when a Bluetooth module of the CTID intelligent access control is initialized;
the personal information verification module is used for sending the personal information to the server for verification by the mobile phone and receiving a verification result and authorization information returned by the server;
the CTID intelligent access control connection module is used for searching and connecting the CTID intelligent access control based on the authorization information and the Bluetooth name by the mobile phone to obtain the UUID of the CTID intelligent access control;
the unlocking instruction sending module is used for packaging the verification result and the authorization information into an unlocking instruction according to a preset instruction format and sending the unlocking instruction to the CTID intelligent entrance guard based on the UUID;
the instruction format comprises the following instruction fields in sequence: instruction type, message length, command header, message content, CRC16, and terminator; the CRC16 is used for storing the calculation result of CRC calculation of the message content;
the unlocking instruction execution module is used for analyzing and verifying the received unlocking instruction by the CTID intelligent access control to obtain a verification result and authorization information, executing unlocking operation based on the verification result and the authorization information, and sending an execution result to the mobile phone based on the instruction format;
the execution result archiving module is used for analyzing the received execution result by the mobile phone and sending the execution result to the server for recording so as to complete unlocking of the CTID intelligent access control;
the unlocking instruction execution module specifically comprises:
the unlocking instruction analysis unit is used for analyzing the unlocking instruction by the CTID intelligent access control and extracting message contents containing verification results and authorization information from the unlocking instruction;
the message length verification unit is used for judging whether the length of the message content is consistent with the message length or not, and if so, entering the CRC (cyclic redundancy check) unit; if not, ending the flow;
the CRC unit is used for performing CRC calculation on the message content, judging whether the calculation result is consistent with the content carried by the CRC16, if so, indicating that the content is complete, and entering the verification result checking unit; if not, the content is incomplete, and the process is ended;
the verification result checking unit is used for the CTID intelligent access control to judge whether the verification result is passed through the verification or not, and if yes, the CTID intelligent access control enters the unlocking unit; if not, ending the flow;
the unlocking unit is used for the CTID intelligent access control to judge whether the authorization information judges that the unlocking authority exists or not, if so, the unlocking operation is executed, and an execution result of successful unlocking is sent to the mobile phone based on the instruction format; if not, the unlocking operation is not executed, and the execution result of the unlocking failure is sent to the mobile phone based on the instruction format.
5. The CTID intelligent entrance guard system of unblanking of claim 4, characterized in that: in the personal information verification module, the personal information at least comprises an identification number and a head portrait photo; the verification result is that the verification is passed or not passed; the authorization information at least comprises a Bluetooth name, a mac address of the CTID intelligent access control and unlocking authority; the unlocking authority is permanently effective, effective within the validity period or effective within the effective times.
6. The CTID intelligent entrance guard system of unblanking of claim 5, characterized in that: CTID intelligent entrance guard connection module specifically includes:
the Bluetooth searching unit is used for searching a device list with the same name in the induction range by the mobile phone based on the Bluetooth name in the authorization information;
the mac verification unit is used for verifying the equipment in the equipment list by using the mac address through the mobile phone, finding a matched CTID intelligent access control and connecting the CTID intelligent access control through gatt connect;
the gatt callback sending unit is used for returning the gatt callback carrying the UUID to the mobile phone by the CTID intelligent access control;
and the UUID acquisition unit is used for monitoring the gatt callback by the mobile phone to obtain the UUID.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110075678.6A CN112907800B (en) | 2021-01-20 | 2021-01-20 | CTID intelligent access control unlocking method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110075678.6A CN112907800B (en) | 2021-01-20 | 2021-01-20 | CTID intelligent access control unlocking method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112907800A CN112907800A (en) | 2021-06-04 |
CN112907800B true CN112907800B (en) | 2022-09-20 |
Family
ID=76116733
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110075678.6A Active CN112907800B (en) | 2021-01-20 | 2021-01-20 | CTID intelligent access control unlocking method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112907800B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113487765A (en) * | 2021-06-08 | 2021-10-08 | 福建新大陆通信科技股份有限公司 | CTID (computer telephony integration) access control method and system supporting dynamic encryption |
CN113421362B (en) * | 2021-06-22 | 2023-03-14 | 公安部第一研究所 | CTID-based intelligent door lock real-name authentication method, device and system |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103077256A (en) * | 2013-03-01 | 2013-05-01 | 李凯 | Method for quickly and conveniently examining unlocking records through network |
CN106790089A (en) * | 2016-12-23 | 2017-05-31 | 厦门亿力天龙科技有限公司 | A kind of distribution low-voltage equipment information security certification transmission terminal and its implementation |
US10475264B2 (en) * | 2017-08-14 | 2019-11-12 | Q & K International Group Limited | Application method of Bluetooth low-energy electronic lock based on built-in offline pairing passwords, interactive unlocking method of a Bluetooth electronic lock and electronic lock system |
CN107845169A (en) * | 2017-10-27 | 2018-03-27 | 张荣斌 | A kind of unlocking system and method for unlocking based on dynamic password |
CN108806028A (en) * | 2018-01-29 | 2018-11-13 | 安徽新飞居博士科技有限公司 | A kind of intelligent door lock and control method based on Internet communication technology |
CN110435789A (en) * | 2019-08-13 | 2019-11-12 | 山东爱德邦智能科技有限公司 | A kind of lock control method, device, equipment and the storage medium of bicycle |
CN110738764A (en) * | 2019-10-22 | 2020-01-31 | 佛山市艾温特智能科技有限公司 | Security control system and method based on intelligent lock |
CN111768522B (en) * | 2020-06-10 | 2021-12-21 | 福建新大陆通信科技股份有限公司 | CTID-based intelligent door lock unlocking method and system |
-
2021
- 2021-01-20 CN CN202110075678.6A patent/CN112907800B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN112907800A (en) | 2021-06-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112907800B (en) | CTID intelligent access control unlocking method and system | |
CN105678872B (en) | A kind of access control system and its authorization method and access control terminal equipment | |
EP3069297B1 (en) | Identity authentication by using human biological characteristics | |
WO2019153982A1 (en) | Payment processing method and device, computer apparatus, and storage medium | |
CN105450614B (en) | A kind of server account logon method, device and system | |
CN106355709A (en) | Access control system and door opening method based on dynamic quick response code | |
CN107196922A (en) | Identity identifying method, user equipment and server | |
CN109002875B (en) | Two-dimensional code encryption method, two-dimensional code transmission system and storage medium | |
CN103326989A (en) | Identifying code based on voice recognition | |
CN107957871B (en) | Front-end and back-end synchronous regular checking method based on JSR303 | |
CN113724428A (en) | Gate system for identity recognition and health detection of community owners and management method | |
CN112905437A (en) | Method and device for testing case and storage medium | |
CN111415443A (en) | Remote unlocking method and device | |
CN109257269A (en) | A kind of method of registering based on WIFI positioning | |
US20060089809A1 (en) | Data processing apparatus | |
CN106782567A (en) | Method and device for establishing voiceprint model | |
CN108052811A (en) | Terminal control method and system based on face texture identification | |
CN106570955B (en) | Information collecting method and device based on access control equipment | |
CN111696238A (en) | Method and system for managing entrance and exit of rented house personnel based on intelligent fingerprint lock | |
CN110765431A (en) | Multi-user fingerprint or password login method and management system thereof | |
CN110738759A (en) | fingerprint storage method, identity verification method, device and system | |
CN113312602B (en) | Method and system for realizing fingerprint sharing | |
WO2018113215A1 (en) | Terminal control method, first terminal, second terminal, server, and system | |
CN113888786A (en) | Management method and system for intelligent door lock of rental house | |
CN112491923A (en) | Method for logging in computer application needing identity authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20221215 Address after: 603, Floor 6, Building 30 #, Fuzhou Software Park Phase I (Strait Park), No. 89, Software Avenue, Wufeng Street, Gulou District, Fuzhou City, 350000, Fujian Province Patentee after: Fujian New World Huichuang Technology Co.,Ltd. Address before: 6 # Building and 2 to 4 # Building of 5 # Building, No. 70, Rujiang East Road, Mawei Development Zone, Fuzhou City, Fujian Province, 350000 Patentee before: Fujian Newland Communication Science Technologies Co.,Ltd. |