CN112907800B - CTID intelligent access control unlocking method and system - Google Patents

CTID intelligent access control unlocking method and system Download PDF

Info

Publication number
CN112907800B
CN112907800B CN202110075678.6A CN202110075678A CN112907800B CN 112907800 B CN112907800 B CN 112907800B CN 202110075678 A CN202110075678 A CN 202110075678A CN 112907800 B CN112907800 B CN 112907800B
Authority
CN
China
Prior art keywords
ctid
unlocking
access control
mobile phone
authorization information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110075678.6A
Other languages
Chinese (zh)
Other versions
CN112907800A (en
Inventor
吴太亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian New World Huichuang Technology Co.,Ltd.
Original Assignee
Fujian Newland Communication Science Technologies Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Newland Communication Science Technologies Co ltd filed Critical Fujian Newland Communication Science Technologies Co ltd
Priority to CN202110075678.6A priority Critical patent/CN112907800B/en
Publication of CN112907800A publication Critical patent/CN112907800A/en
Application granted granted Critical
Publication of CN112907800B publication Critical patent/CN112907800B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention provides a CTID intelligent entrance guard unlocking method and system in the technical field of intelligent entrance guard, wherein the method comprises the following steps: step S10, creating a UUID and a Bluetooth name when a Bluetooth module of the CTID intelligent access control is initialized; step S20, the mobile phone sends the personal information to the server for verification, and receives the returned verification result and the authorization information; s30, searching and connecting the mobile phone to the CTID intelligent access control based on the authorization information and the Bluetooth name to acquire a UUID; step S40, the mobile phone encapsulates the verification result and the authorization information into an unlocking instruction, and sends the unlocking instruction to the CTID intelligent entrance guard based on the UUID; step S50, the CTID intelligent entrance guard analyzes and verifies the received unlocking instruction to obtain a verification result and authorization information, executes unlocking operation based on the verification result and the authorization information, and sends the execution result to the mobile phone; and step S60, the mobile phone analyzes the received execution result and sends the execution result to the server. The invention has the advantages that: the entrance guard unlocking convenience is greatly improved.

Description

CTID intelligent access control unlocking method and system
Technical Field
The invention relates to the technical field of intelligent access control, in particular to a CTID intelligent access control unlocking method and system.
Background
The entrance guard is a system for controlling an entrance and exit channel, and is developed on the basis of a traditional door lock. The traditional mechanical door lock is only a pure mechanical device, and people can open the door lock by various means no matter how reasonable the structural design is and how firm the material is. In a passage with a lot of people coming in and going out (such as an office building and a hotel room), the management of the key is troublesome, and the lock and the key are replaced together when the key is lost or the people replace the key.
With the progress of science and technology, various intelligent access controls, such as an intelligent access control unlocked by using bluetooth, appear. However, before the traditional intelligent entrance guard is unlocked by using the bluetooth, the intelligent entrance guard and the bluetooth equipment need to be authorized and paired firstly, after the pairing is successful, the subsequent intelligent entrance guard and the bluetooth equipment can be unlocked by using the bluetooth, the intelligent entrance guard is not convenient and fast to use, and particularly for application scenes such as hotels, the residents are replaced at every time, or the residents replace the hotels at every time, the intelligent entrance guard and the bluetooth equipment need to be paired once, so that the user experience is poor.
Therefore, how to provide a CTID intelligent entrance guard unlocking method and system, the convenience of entrance guard unlocking is improved, and the problem to be solved urgently is formed.
Disclosure of Invention
The invention aims to solve the technical problem of providing a CTID intelligent access control unlocking method and system, and achieving the purpose of improving the convenience of access control unlocking.
In a first aspect, the invention provides a CTID intelligent entrance guard unlocking method, which comprises the following steps:
step S10, creating a UUID and a Bluetooth name when a Bluetooth module of the CTID intelligent access control is initialized;
step S20, the mobile phone sends the personal information to the server for verification, and receives the verification result and the authorization information returned by the server;
s30, searching and connecting the mobile phone to the CTID intelligent access control based on the authorization information and the Bluetooth name to obtain the UUID of the CTID intelligent access control;
step S40, the mobile phone encapsulates the verification result and the authorization information into an unlocking instruction according to a preset instruction format, and sends the unlocking instruction to the CTID intelligent entrance guard based on the UUID;
step S50, the CTID intelligent entrance guard analyzes and verifies the received unlocking instruction to obtain a verification result and authorization information, executes unlocking operation based on the verification result and the authorization information, and sends an execution result to a mobile phone based on the instruction format;
and step S60, the mobile phone analyzes the received execution result and sends the execution result to the server for recording, and the unlocking of the CTID intelligent entrance guard is completed.
Further, in the step S20, the personal information at least includes an identification number and a head portrait photo; the verification result is that the verification is passed or not passed; the authorization information at least comprises a Bluetooth name, a mac address of the CTID intelligent access control and unlocking authority; the unlocking authority is permanently effective, effective within the validity period or effective within the effective times.
Further, the step S30 specifically includes:
step S31, the mobile phone searches a device list with the same name in the induction range based on the Bluetooth name in the authorization information;
step S32, the mobile phone verifies the equipment in the equipment list by using the mac address, finds the matched CTID intelligent access control, and connects the CTID intelligent access control through gattconnect;
step S33, the CTID intelligent entrance guard returns a gatt callback carrying the UUID to the mobile phone;
and step S34, the mobile phone monitors the gatt callback to obtain the UUID.
Further, in step S40, the instruction format sequentially includes the following instruction fields: instruction type, message length, command header, message content, CRC16, and terminator; the CRC16 is used to store the calculation result of CRC calculation on the message content.
Further, the step S50 specifically includes:
step S51, analyzing the unlocking instruction by the CTID intelligent entrance guard, and extracting message contents containing verification results and authorization information from the unlocking instruction;
step S52, judging whether the length of the message content is consistent with the message length, if so, entering step S53; if not, ending the flow;
step S53, performing CRC calculation on the message content, judging whether the calculation result is consistent with the content carried by the CRC16, if so, indicating that the content is complete, and entering step S54; if not, the content is incomplete, and the process is ended;
step S54, the CTID intelligent entrance guard judges whether the check result is that the check is passed, if yes, the step S55 is executed; if not, ending the flow;
step S55, the CTID intelligent entrance guard judges whether the authorization information judges that the unlocking authority exists or not, if so, the unlocking operation is executed, and an execution result of successful unlocking is sent to the mobile phone based on the instruction format; if not, the unlocking operation is not executed, and the execution result of the unlocking failure is sent to the mobile phone based on the instruction format.
In a second aspect, the invention provides a CTID intelligent access control unlocking system, which comprises the following modules:
the Bluetooth module initialization module is used for creating a UUID and a Bluetooth name when a Bluetooth module of the CTID intelligent access control is initialized;
the personal information verification module is used for sending the personal information to the server for verification by the mobile phone and receiving a verification result and authorization information returned by the server;
the CTID intelligent access control connection module is used for searching and connecting the CTID intelligent access control based on the authorization information and the Bluetooth name by the mobile phone to obtain the UUID of the CTID intelligent access control;
the unlocking instruction sending module is used for packaging the verification result and the authorization information into an unlocking instruction according to a preset instruction format and sending the unlocking instruction to the CTID intelligent entrance guard based on the UUID;
the unlocking instruction execution module is used for analyzing and verifying the received unlocking instruction by the CTID intelligent access control to obtain a verification result and authorization information, executing unlocking operation based on the verification result and the authorization information, and sending an execution result to the mobile phone based on the instruction format;
and the execution result filing module is used for analyzing the received execution result by the mobile phone and sending the execution result to the server for recording so as to complete the unlocking of the CTID intelligent access control.
Further, in the personal information verification module, the personal information at least comprises an identification number and a head portrait photo; the verification result is that the verification is passed or not passed; the authorization information at least comprises a Bluetooth name, a mac address of the CTID intelligent access control and unlocking authority; the unlocking authority is permanently effective, effective within the validity period or effective within the effective times.
Further, CTID intelligent entrance guard connection module specifically includes:
the Bluetooth searching unit is used for searching a device list with the same name in the induction range by the mobile phone based on the Bluetooth name in the authorization information;
the mac verification unit is used for verifying the equipment in the equipment list by using the mac address through the mobile phone, finding a matched CTID intelligent access control and connecting the CTID intelligent access control through gatt connect;
the gatt callback sending unit is used for returning the gatt callback carrying the UUID to the mobile phone by the CTID intelligent access control;
and the UUID acquisition unit is used for monitoring the gatt callback by the mobile phone to obtain the UUID.
Further, in the unlocking instruction sending module, the instruction format sequentially includes the following instruction fields: instruction type, message length, command header, message content, CRC16, and terminator; the CRC16 is used to store the calculation result of CRC calculation on the message content.
Further, the unlocking instruction execution module specifically includes:
the unlocking instruction analysis unit is used for analyzing the unlocking instruction by the CTID intelligent access control and extracting message contents containing verification results and authorization information from the unlocking instruction;
the message length verification unit is used for judging whether the length of the message content is consistent with the message length or not, and if so, the message length verification unit enters a CRC (Cyclic redundancy check) unit; if not, ending the flow;
the CRC unit is used for performing CRC calculation on the message content, judging whether the calculation result is consistent with the content carried by the CRC16, if so, indicating that the content is complete, and entering the verification result checking unit; if not, the content is incomplete, and the process is ended;
the verification result checking unit is used for the CTID intelligent access control to judge whether the verification result is passed through verification or not, and if yes, the CTID intelligent access control enters the unlocking unit; if not, ending the flow;
the unlocking unit is used for the CTID intelligent access control to judge whether the authorization information judges that the unlocking authority exists or not, if so, the unlocking operation is executed, and an execution result of successful unlocking is sent to the mobile phone based on the instruction format; if not, the unlocking operation is not executed, and the execution result of the unlocking failure is sent to the mobile phone based on the instruction format.
The invention has the advantages that:
1. personal information is sent to a server through a mobile phone to be checked to obtain a checking result and authorization information, the CTID intelligent access control is searched and connected based on the authorization information and a Bluetooth name, a UUID of the CTID intelligent access control is obtained, an unlocking instruction carrying the checking result and the authorization information is sent to the CTID intelligent access control by utilizing the UUID, the CTID intelligent access control analyzes and verifies the unlocking instruction and then executes unlocking operation, namely, a user can complete the unlocking operation of the CTID intelligent access control based on the personal information, the CTID intelligent access control and the mobile phone do not need to be authorized and paired like the prior CTID intelligent access control and the mobile phone, and the convenience of unlocking the access control is greatly improved.
2. The execution result of the CTID intelligent access control is sent to the server for filing, so that the tracing in the later stage and the unlocking record can be inquired, and the safety of the CTID intelligent access control can be improved.
3. By carrying out double check on the message length and CRC calculation on the message content in the unlocking instruction, the safety of the CTID intelligent access control is greatly improved.
Drawings
The invention will be further described with reference to the following examples with reference to the accompanying drawings.
Fig. 1 is a flowchart of a CTID intelligent access control unlocking method of the present invention.
Fig. 2 is a schematic structural diagram of a CTID intelligent access control unlocking system of the present invention.
Detailed Description
The technical scheme in the embodiment of the application has the following general idea: personal information is sent to a server through a mobile phone to be checked to obtain a checking result and authorization information, the CTID intelligent access control is searched and connected based on the authorization information and a Bluetooth name, a UUID of the CTID intelligent access control is obtained, an unlocking instruction carrying the checking result and the authorization information is sent to the CTID intelligent access control by utilizing the UUID, the CTID intelligent access control analyzes and verifies the unlocking instruction and then executes unlocking operation, the CTID intelligent access control and the mobile phone do not need to be subjected to Bluetooth authorization matching, and the convenience of unlocking the access control is improved.
Referring to fig. 1 to 2, a preferred embodiment of a CTID intelligent access control unlocking method according to the present invention includes the following steps:
step S10, creating a UUID (universal unique identification code) and a Bluetooth name when a Bluetooth module of the CTID intelligent access control is initialized; the UUID is provided with a field corresponding to an equipment supporting function, for example, a field with the content of 'write', and the function that the equipment supports data write-in is known after the UUID is acquired;
step S20, the mobile phone sends the personal information to the server for verification, and receives the verification result (bid data) and the authorization information returned by the server; the server compares whether the identity card number is consistent with the head portrait photo based on data pre-stored in a database, generates a verification result, searches authorization information corresponding to the identity card number, and then sends the verification result and the authorization information to the mobile phone;
step S30, the mobile phone searches and connects the CTID intelligent access control based on the authorization information and the Bluetooth name to obtain the UUID of the CTID intelligent access control;
step S40, the mobile phone encapsulates the verification result and the authorization information into an unlocking instruction according to a preset instruction format, and sends the unlocking instruction to the CTID intelligent entrance guard based on the UUID; the unlocking instruction is sent to a Bluetooth module of the CTID intelligent access control through a uuid write interface;
step S50, the CTID intelligent entrance guard analyzes and verifies the received unlocking instruction to obtain a verification result and authorization information, executes unlocking operation based on the verification result and the authorization information, and sends an execution result to a mobile phone based on the instruction format;
step S60, the mobile phone analyzes the received execution result and sends the execution result to a server for recording, and the unlocking of the CTID intelligent access control is completed; and sending the execution result to a server for archiving recording, so that the tracing in the later stage is facilitated, the unlocking record is inquired, and the safety of the CTID intelligent access control is further improved.
During specific implementation, after the CTID intelligent entrance guard is successfully unlocked, the authorization information can be locally stored, and a user can directly use the magnetic card written with the authorization information next time to open the door through NFC induction.
In step S20, the personal information at least includes an identification number and a photo of the head portrait; the verification result is that the verification is passed or not passed; the authorization information at least comprises a Bluetooth name, a mac address of the CTID intelligent access control and unlocking authority; the unlocking authority is permanently effective, effective within the validity period or effective within the effective times; for example, effective within 1 month, or only 5 times.
The step S30 specifically includes:
step S31, the mobile phone searches a device list with the same name in the induction range based on the Bluetooth name in the authorization information;
step S32, the mobile phone verifies the equipment in the equipment list by using the mac address, finds the matched CTID intelligent access control, and is connected with the CTID intelligent access control through gatt connect; gatt connect is a method of connecting BLE devices, which is prior art;
step S33, the CTID intelligent entrance guard returns a gatt callback carrying the UUID to the mobile phone;
and step S34, the mobile phone monitors the gatt callback to obtain the UUID.
In step S40, the instruction format sequentially includes the following instruction fields: instruction type, message length, command header, message content, CRC16, and terminator; the CRC16 is used to store the calculation result of CRC calculation on the message content.
The step S50 specifically includes:
step S51, analyzing the unlocking instruction by the CTID intelligent entrance guard, and extracting message contents containing verification results and authorization information from the unlocking instruction;
step S52, judging whether the length of the message content is consistent with the message length, if so, entering step S53; if not, ending the flow;
step S53, performing CRC calculation on the message content, judging whether the calculation result is consistent with the content carried by the CRC16, if so, indicating that the content is complete, and entering step S54; if not, the content is incomplete, and the process is ended;
step S54, the CTID intelligent entrance guard judges whether the check result is that the check is passed, if yes, the step S55 is executed; if not, ending the flow;
step S55, the CTID intelligent entrance guard judges whether the authorization information has unlocking authority or not, if yes, the unlocking operation is executed, and an execution result of successful unlocking is sent to the mobile phone based on the instruction format; if not, the unlocking operation is not executed, and the execution result of the unlocking failure is sent to the mobile phone based on the instruction format. Namely, judging whether the current time is within the set validity period or not, or judging whether the remaining valid times are greater than 0 or whether the remaining valid times are permanently valid unlocking authority or not, and if so, executing the unlocking operation.
The invention discloses a preferable embodiment of a CTID intelligent access control unlocking system, which comprises the following modules:
the Bluetooth module initialization module is used for creating a UUID (Universal unique identifier) and a Bluetooth name when the Bluetooth module of the CTID intelligent access control is initialized; the UUID is provided with a field corresponding to an equipment supporting function, for example, a field with the content of 'write', and the function that the equipment supports data write-in is known after the UUID is acquired;
the personal information verification module is used for sending the personal information to the server for verification by the mobile phone and receiving a verification result (bid data) and authorization information returned by the server; the server compares whether the identity card number is consistent with the head portrait photo based on data pre-stored in a database, generates a verification result, searches authorization information corresponding to the identity card number, and then sends the verification result and the authorization information to the mobile phone;
the CTID intelligent access control connection module is used for searching and connecting the CTID intelligent access control based on the authorization information and the Bluetooth name by the mobile phone to obtain the UUID of the CTID intelligent access control;
the unlocking instruction sending module is used for packaging the verification result and the authorization information into an unlocking instruction according to a preset instruction format and sending the unlocking instruction to the CTID intelligent entrance guard based on the UUID; sending the unlocking instruction to a Bluetooth module of the CTID intelligent entrance guard through a uuid write interface;
the unlocking instruction execution module is used for analyzing and verifying the received unlocking instruction by the CTID intelligent access control to obtain a verification result and authorization information, executing unlocking operation based on the verification result and the authorization information, and sending an execution result to the mobile phone based on the instruction format;
the execution result archiving module is used for analyzing the received execution result by the mobile phone and sending the execution result to the server for recording so as to complete unlocking of the CTID intelligent access control; and sending the execution result to a server for archiving recording, so that the source tracing and unlocking records in the later period can be conveniently inquired, and the safety of the CTID intelligent access control can be further improved.
During the concrete implementation, CTID intelligent entrance guard unblanks after successful, can locally preserve the authorization information, and the user can directly use the magnetic card that has written the authorization information next time, opens the door through the NFC response.
In the personal information verification module, the personal information at least comprises an identification number and a head portrait photo; the verification result is that the verification is passed or not passed; the authorization information at least comprises a Bluetooth name, a mac address of the CTID intelligent access control and unlocking authority; the unlocking authority is permanently effective, effective within the validity period or effective within the effective times; for example, effective within 1 month, or only 5 times.
CTID intelligent entrance guard connection module specifically includes:
the Bluetooth searching unit is used for searching a device list with the same name in the induction range by the mobile phone based on the Bluetooth name in the authorization information;
the mac verification unit is used for verifying the equipment in the equipment list by using the mac address through the mobile phone, finding a matched CTID intelligent access control and connecting the CTID intelligent access control through gatt connect; gatt connect is a method of connecting BLE devices, which is prior art;
the gatt callback sending unit is used for returning the gatt callback carrying the UUID to the mobile phone by the CTID intelligent access control;
and the UUID acquisition unit is used for monitoring the gatt callback by the mobile phone to obtain the UUID.
In the unlocking instruction sending module, the instruction format sequentially comprises the following instruction fields: instruction type, message length, command header, message content, CRC16, and end symbol; the CRC16 is used to store the calculation result of CRC calculation on the message content.
The unlocking instruction execution module specifically comprises:
the unlocking instruction analysis unit is used for analyzing the unlocking instruction by the CTID intelligent access control and extracting message contents containing verification results and authorization information from the unlocking instruction;
the message length verification unit is used for judging whether the length of the message content is consistent with the message length or not, and if so, entering the CRC (cyclic redundancy check) unit; if not, ending the flow;
a CRC check unit, configured to perform CRC calculation on the message content, determine whether a calculation result is consistent with the content carried by the CRC16, if yes, indicate that the content is complete, and enter a check result check unit; if not, the content is incomplete, and the process is ended;
the verification result checking unit is used for the CTID intelligent access control to judge whether the verification result is passed through verification or not, and if yes, the CTID intelligent access control enters the unlocking unit; if not, ending the flow;
the unlocking unit is used for the CTID intelligent access control to judge whether the authorization information has unlocking authority or not, if so, unlocking operation is executed, and an execution result of successful unlocking is sent to the mobile phone based on the instruction format; and if not, the unlocking operation is not executed, and an execution result of unlocking failure is sent to the mobile phone based on the instruction format. Namely, judging whether the current time is within the set validity period or not, or judging whether the remaining valid times are greater than 0 or whether the remaining valid times are permanently valid unlocking authority or not, and if so, executing the unlocking operation.
In conclusion, the invention has the advantages that:
1. personal information is sent to a server through a mobile phone to be checked to obtain a checking result and authorization information, the CTID intelligent access control is searched and connected based on the authorization information and a Bluetooth name, a UUID of the CTID intelligent access control is obtained, an unlocking instruction carrying the checking result and the authorization information is sent to the CTID intelligent access control by utilizing the UUID, the CTID intelligent access control analyzes and verifies the unlocking instruction and then executes unlocking operation, namely, a user can complete the unlocking operation of the CTID intelligent access control based on the personal information, the CTID intelligent access control and the mobile phone do not need to be authorized and paired like the prior CTID intelligent access control and the mobile phone, and the convenience of unlocking the access control is greatly improved.
2. The execution result of the CTID intelligent access control is sent to the server for filing, so that the tracing in the later stage and the unlocking record can be inquired, and the safety of the CTID intelligent access control can be improved.
3. By carrying out double check on the message length and CRC calculation on the message content in the unlocking instruction, the safety of the CTID intelligent access control is greatly improved.
Although specific embodiments of the invention have been described above, it will be understood by those skilled in the art that the specific embodiments described are illustrative only and are not limiting upon the scope of the invention, and that equivalent modifications and variations can be made by those skilled in the art without departing from the spirit of the invention, which is to be limited only by the appended claims.

Claims (6)

1. A CTID intelligent entrance guard unlocking method is characterized in that: the method comprises the following steps:
step S10, creating a UUID and a Bluetooth name when a Bluetooth module of the CTID intelligent access control is initialized;
step S20, the mobile phone sends the personal information to the server for verification, and receives the verification result and the authorization information returned by the server;
s30, searching and connecting the mobile phone to the CTID intelligent access control based on the authorization information and the Bluetooth name to obtain the UUID of the CTID intelligent access control;
step S40, the mobile phone encapsulates the verification result and the authorization information into an unlocking instruction according to a preset instruction format, and sends the unlocking instruction to the CTID intelligent entrance guard based on the UUID;
the instruction format comprises the following instruction fields in sequence: instruction type, message length, command header, message content, CRC16, and end symbol; the CRC16 is used for storing the calculation result of CRC calculation of the message content;
step S50, the CTID intelligent entrance guard analyzes and verifies the received unlocking instruction to obtain a verification result and authorization information, executes unlocking operation based on the verification result and the authorization information, and sends an execution result to a mobile phone based on the instruction format;
step S60, the mobile phone analyzes the received execution result and sends the execution result to a server for recording, and the unlocking of the CTID intelligent access control is completed;
the step S50 specifically includes:
step S51, analyzing the unlocking instruction by the CTID intelligent entrance guard, and extracting message contents containing verification results and authorization information from the unlocking instruction;
step S52, judging whether the length of the message content is consistent with the message length, if so, entering step S53; if not, ending the flow;
step S53, performing CRC calculation on the message content, judging whether the calculation result is consistent with the content carried by the CRC16, if so, indicating that the content is complete, and entering step S54; if not, the content is incomplete, and the process is ended;
step S54, the CTID intelligent entrance guard judges whether the check result is that the check is passed, if yes, the step S55 is executed; if not, ending the flow;
step S55, the CTID intelligent entrance guard judges whether the authorization information judges that the unlocking authority exists or not, if so, the unlocking operation is executed, and an execution result of successful unlocking is sent to the mobile phone based on the instruction format; if not, the unlocking operation is not executed, and the execution result of the unlocking failure is sent to the mobile phone based on the instruction format.
2. The CTID intelligent entrance guard unlocking method of claim 1, characterized in that: in step S20, the personal information at least includes an identification number and a photo of the head portrait; the verification result is that the verification is passed or not passed; the authorization information at least comprises a Bluetooth name, a mac address of the CTID intelligent access control and unlocking authority; the unlocking authority is permanently effective, effective within the validity period or effective within the effective times.
3. The CTID intelligent entrance guard unlocking method of claim 2, characterized in that: the step S30 specifically includes:
step S31, the mobile phone searches a device list with the same name in the induction range based on the Bluetooth name in the authorization information;
step S32, the mobile phone verifies the equipment in the equipment list by using the mac address, finds the matched CTID intelligent access control, and is connected with the CTID intelligent access control through gatt connect;
step S33, the CTID intelligent entrance guard returns a gatt callback carrying the UUID to the mobile phone;
and step S34, the mobile phone monitors the gatt callback to obtain the UUID.
4. The utility model provides a CTID intelligent entrance guard system of unblanking which characterized in that: the system comprises the following modules:
the Bluetooth module initialization module is used for creating a UUID and a Bluetooth name when a Bluetooth module of the CTID intelligent access control is initialized;
the personal information verification module is used for sending the personal information to the server for verification by the mobile phone and receiving a verification result and authorization information returned by the server;
the CTID intelligent access control connection module is used for searching and connecting the CTID intelligent access control based on the authorization information and the Bluetooth name by the mobile phone to obtain the UUID of the CTID intelligent access control;
the unlocking instruction sending module is used for packaging the verification result and the authorization information into an unlocking instruction according to a preset instruction format and sending the unlocking instruction to the CTID intelligent entrance guard based on the UUID;
the instruction format comprises the following instruction fields in sequence: instruction type, message length, command header, message content, CRC16, and terminator; the CRC16 is used for storing the calculation result of CRC calculation of the message content;
the unlocking instruction execution module is used for analyzing and verifying the received unlocking instruction by the CTID intelligent access control to obtain a verification result and authorization information, executing unlocking operation based on the verification result and the authorization information, and sending an execution result to the mobile phone based on the instruction format;
the execution result archiving module is used for analyzing the received execution result by the mobile phone and sending the execution result to the server for recording so as to complete unlocking of the CTID intelligent access control;
the unlocking instruction execution module specifically comprises:
the unlocking instruction analysis unit is used for analyzing the unlocking instruction by the CTID intelligent access control and extracting message contents containing verification results and authorization information from the unlocking instruction;
the message length verification unit is used for judging whether the length of the message content is consistent with the message length or not, and if so, entering the CRC (cyclic redundancy check) unit; if not, ending the flow;
the CRC unit is used for performing CRC calculation on the message content, judging whether the calculation result is consistent with the content carried by the CRC16, if so, indicating that the content is complete, and entering the verification result checking unit; if not, the content is incomplete, and the process is ended;
the verification result checking unit is used for the CTID intelligent access control to judge whether the verification result is passed through the verification or not, and if yes, the CTID intelligent access control enters the unlocking unit; if not, ending the flow;
the unlocking unit is used for the CTID intelligent access control to judge whether the authorization information judges that the unlocking authority exists or not, if so, the unlocking operation is executed, and an execution result of successful unlocking is sent to the mobile phone based on the instruction format; if not, the unlocking operation is not executed, and the execution result of the unlocking failure is sent to the mobile phone based on the instruction format.
5. The CTID intelligent entrance guard system of unblanking of claim 4, characterized in that: in the personal information verification module, the personal information at least comprises an identification number and a head portrait photo; the verification result is that the verification is passed or not passed; the authorization information at least comprises a Bluetooth name, a mac address of the CTID intelligent access control and unlocking authority; the unlocking authority is permanently effective, effective within the validity period or effective within the effective times.
6. The CTID intelligent entrance guard system of unblanking of claim 5, characterized in that: CTID intelligent entrance guard connection module specifically includes:
the Bluetooth searching unit is used for searching a device list with the same name in the induction range by the mobile phone based on the Bluetooth name in the authorization information;
the mac verification unit is used for verifying the equipment in the equipment list by using the mac address through the mobile phone, finding a matched CTID intelligent access control and connecting the CTID intelligent access control through gatt connect;
the gatt callback sending unit is used for returning the gatt callback carrying the UUID to the mobile phone by the CTID intelligent access control;
and the UUID acquisition unit is used for monitoring the gatt callback by the mobile phone to obtain the UUID.
CN202110075678.6A 2021-01-20 2021-01-20 CTID intelligent access control unlocking method and system Active CN112907800B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110075678.6A CN112907800B (en) 2021-01-20 2021-01-20 CTID intelligent access control unlocking method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110075678.6A CN112907800B (en) 2021-01-20 2021-01-20 CTID intelligent access control unlocking method and system

Publications (2)

Publication Number Publication Date
CN112907800A CN112907800A (en) 2021-06-04
CN112907800B true CN112907800B (en) 2022-09-20

Family

ID=76116733

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110075678.6A Active CN112907800B (en) 2021-01-20 2021-01-20 CTID intelligent access control unlocking method and system

Country Status (1)

Country Link
CN (1) CN112907800B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113487765A (en) * 2021-06-08 2021-10-08 福建新大陆通信科技股份有限公司 CTID (computer telephony integration) access control method and system supporting dynamic encryption
CN113421362B (en) * 2021-06-22 2023-03-14 公安部第一研究所 CTID-based intelligent door lock real-name authentication method, device and system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103077256A (en) * 2013-03-01 2013-05-01 李凯 Method for quickly and conveniently examining unlocking records through network
CN106790089A (en) * 2016-12-23 2017-05-31 厦门亿力天龙科技有限公司 A kind of distribution low-voltage equipment information security certification transmission terminal and its implementation
US10475264B2 (en) * 2017-08-14 2019-11-12 Q & K International Group Limited Application method of Bluetooth low-energy electronic lock based on built-in offline pairing passwords, interactive unlocking method of a Bluetooth electronic lock and electronic lock system
CN107845169A (en) * 2017-10-27 2018-03-27 张荣斌 A kind of unlocking system and method for unlocking based on dynamic password
CN108806028A (en) * 2018-01-29 2018-11-13 安徽新飞居博士科技有限公司 A kind of intelligent door lock and control method based on Internet communication technology
CN110435789A (en) * 2019-08-13 2019-11-12 山东爱德邦智能科技有限公司 A kind of lock control method, device, equipment and the storage medium of bicycle
CN110738764A (en) * 2019-10-22 2020-01-31 佛山市艾温特智能科技有限公司 Security control system and method based on intelligent lock
CN111768522B (en) * 2020-06-10 2021-12-21 福建新大陆通信科技股份有限公司 CTID-based intelligent door lock unlocking method and system

Also Published As

Publication number Publication date
CN112907800A (en) 2021-06-04

Similar Documents

Publication Publication Date Title
CN112907800B (en) CTID intelligent access control unlocking method and system
CN105678872B (en) A kind of access control system and its authorization method and access control terminal equipment
EP3069297B1 (en) Identity authentication by using human biological characteristics
WO2019153982A1 (en) Payment processing method and device, computer apparatus, and storage medium
CN105450614B (en) A kind of server account logon method, device and system
CN106355709A (en) Access control system and door opening method based on dynamic quick response code
CN107196922A (en) Identity identifying method, user equipment and server
CN109002875B (en) Two-dimensional code encryption method, two-dimensional code transmission system and storage medium
CN103326989A (en) Identifying code based on voice recognition
CN107957871B (en) Front-end and back-end synchronous regular checking method based on JSR303
CN113724428A (en) Gate system for identity recognition and health detection of community owners and management method
CN112905437A (en) Method and device for testing case and storage medium
CN111415443A (en) Remote unlocking method and device
CN109257269A (en) A kind of method of registering based on WIFI positioning
US20060089809A1 (en) Data processing apparatus
CN106782567A (en) Method and device for establishing voiceprint model
CN108052811A (en) Terminal control method and system based on face texture identification
CN106570955B (en) Information collecting method and device based on access control equipment
CN111696238A (en) Method and system for managing entrance and exit of rented house personnel based on intelligent fingerprint lock
CN110765431A (en) Multi-user fingerprint or password login method and management system thereof
CN110738759A (en) fingerprint storage method, identity verification method, device and system
CN113312602B (en) Method and system for realizing fingerprint sharing
WO2018113215A1 (en) Terminal control method, first terminal, second terminal, server, and system
CN113888786A (en) Management method and system for intelligent door lock of rental house
CN112491923A (en) Method for logging in computer application needing identity authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20221215

Address after: 603, Floor 6, Building 30 #, Fuzhou Software Park Phase I (Strait Park), No. 89, Software Avenue, Wufeng Street, Gulou District, Fuzhou City, 350000, Fujian Province

Patentee after: Fujian New World Huichuang Technology Co.,Ltd.

Address before: 6 # Building and 2 to 4 # Building of 5 # Building, No. 70, Rujiang East Road, Mawei Development Zone, Fuzhou City, Fujian Province, 350000

Patentee before: Fujian Newland Communication Science Technologies Co.,Ltd.