CN113256858A - Access control equipment, unlocking method and device and storage medium - Google Patents

Access control equipment, unlocking method and device and storage medium Download PDF

Info

Publication number
CN113256858A
CN113256858A CN202010084743.7A CN202010084743A CN113256858A CN 113256858 A CN113256858 A CN 113256858A CN 202010084743 A CN202010084743 A CN 202010084743A CN 113256858 A CN113256858 A CN 113256858A
Authority
CN
China
Prior art keywords
unlocking
information
mode
authenticated
access control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010084743.7A
Other languages
Chinese (zh)
Inventor
王彦腾
孙长宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN202010084743.7A priority Critical patent/CN113256858A/en
Publication of CN113256858A publication Critical patent/CN113256858A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Lock And Its Accessories (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The disclosure relates to an access control device, an unlocking method, an unlocking device and a storage medium; wherein, entrance guard's equipment includes: the wireless electric energy receiving module is used for receiving wireless charging energy; the processing module is connected with the wireless power receiving module and used for acquiring information to be authenticated after the wireless charging energy is acquired, authenticating the information to be authenticated and generating a first control signal after the authentication is successful; and the unlocking module is connected with the processing module and used for unlocking based on the first control signal. Therefore, safe unlocking can be realized on the basis of obtaining electric energy through the wireless electric energy receiving module.

Description

Access control equipment, unlocking method and device and storage medium
Technical Field
The present disclosure relates to the field of information processing, and in particular, to an access control device, an unlocking method, an unlocking apparatus, and a storage medium.
Background
With the rapid development of science and technology, the entrance guard equipment is continuously upgraded along with the change of the times, and the entrance guard equipment is from a common anti-theft lock to the current intelligent lock. The intelligent lock is different from a traditional mechanical lock, and is a lock which is more intelligent in the aspects of user identification, safety and manageability. The current intelligent lock is generally an induction lock or a coded lock, and is powered by a dry battery or a lithium battery. Considering the problem of unblock at any time, the user need pay attention to the electric quantity of battery constantly, in time changes the battery, when not in time changing the battery, can cause and can't open the door, and user experience is not good.
Disclosure of Invention
The disclosure provides an access control device, an unlocking method, an unlocking device and a storage medium.
According to a first aspect of the embodiments of the present disclosure, there is provided an access control apparatus, including:
the wireless electric energy receiving module is used for receiving wireless charging energy;
the processing module is connected with the wireless power receiving module and used for acquiring information to be authenticated after the wireless charging energy is acquired, authenticating the information to be authenticated and generating a first control signal after the authentication is successful;
and the unlocking module is connected with the processing module and used for unlocking based on the first control signal.
Optionally, the unlocking mode of entrance guard's equipment includes:
a first mode;
the processing module is configured to extract the information to be authenticated from the wireless charging energy in the first mode.
Optionally, its characterized in that, entrance guard's equipment's unblock mode still includes: a second mode;
entrance guard's equipment still includes:
and the input module is connected with the processing module and used for receiving the information to be authenticated and sending the information to be authenticated to the processing module in the second mode.
Optionally, the processing module is further configured to determine that the information to be authenticated is not extracted from the wireless charging energy in the first mode, or switch the unlocking mode of the access control device from the first mode to the second mode when the information to be authenticated extracted from the wireless charging energy fails to be authenticated in authentication for a preset number of times.
Optionally, the processing module is further configured to generate a second control signal when the authentication fails;
entrance guard's equipment still includes:
and the locking module is connected with the processing module and used for locking based on the second control signal.
Optionally, the information to be authenticated includes at least one of:
fingerprint information;
face information;
keying password information;
and sending the identification information of the unlocking device of the wireless charging energy.
According to a second aspect of the embodiments of the present disclosure, there is provided an unlocking method applied to a mobile terminal, including:
determining an unlocking mode used for unlocking the access control equipment;
receiving input information to be authenticated when the access control equipment is unlocked in a first mode;
and loading the information to be authenticated to a radio wave for providing wireless charging energy for the access control equipment and sending the information.
Optionally, the method further comprises:
and when the access control device is unlocked in the second mode, sending radio waves for providing wireless charging energy to the access control device.
Optionally, the method further comprises:
and receiving prompt information which is returned by the access control equipment and used for representing whether unlocking is successful.
Optionally, the method further comprises:
and after the prompt information representing unlocking failure of the door control equipment for preset times is received, switching an unlocking mode for unlocking the door control equipment from a first mode to a second mode.
According to a third aspect of the embodiments of the present disclosure, there is provided an unlocking device including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to: the method of any of the second aspects above is implemented when executable instructions stored in the memory are executed.
According to a fourth aspect of embodiments of the present disclosure, there is provided a non-transitory computer-readable storage medium having instructions which, when executed by a processor of an unlocking device, enable the unlocking device to perform the method of any one of the above second aspects.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
because entrance guard's equipment possesses wireless power receiving module, can receive the wireless charging energy that other electronic equipment (like unblock equipment) sent through wireless power receiving module, and then can make the processing module can obtain wireless charging energy after, realize the safety certification when unblock through obtaining the information of waiting to authenticate. So, just can entrance guard's equipment does not have the electric quantity or when not possessing the energy storage module, also can carry out authentication work equally, has guaranteed the safety of unblock, has also reduced the user and need concern battery electric quantity constantly, and need in time change the battery and for the inconvenience that the user caused, improved user experience.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 is a first block diagram illustrating the structure of an access control device according to an exemplary embodiment.
Fig. 2 is a block diagram illustrating a structure of an access control device according to an exemplary embodiment.
Fig. 3 is a block diagram illustrating a structure of an access control device according to an exemplary embodiment.
Fig. 4 is a block diagram illustrating a fourth configuration of an access control device according to an example embodiment.
Fig. 5 is a block diagram illustrating a fifth configuration of an access control device, according to an example embodiment.
Fig. 6 is a first flowchart illustrating an unlocking method according to an exemplary embodiment.
Fig. 7 is a flowchart illustrating an unlocking method according to an exemplary embodiment.
FIG. 8 is a block diagram illustrating an unlocking device according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The unlocking mode of electronic access control devices generally adopts an induction mode or a password mode. The induction mode is a mode of unlocking by using a magnetic strip card or a Radio Frequency (RFID) card; the password mode is unlocking realized by modes such as electronic passwords, virtual-bit password locks, fingerprint locks or face recognition unlocking. These unlocking methods all need to guarantee that possess the electric energy in the access control equipment. The current access control equipment is powered by an internal battery, so that the access control equipment is guaranteed to have electric energy, the battery is required to be replaced periodically by the aid of the power supply mode, and input passwords or induction information cannot be authenticated when the battery is not powered, so that the access control equipment cannot be opened safely.
In order to realize that an access control device can be safely opened without electric quantity, an embodiment of the present disclosure provides an access control device, fig. 1 is a first structural block diagram of an access control device according to an exemplary embodiment, and as shown in fig. 1, the access control device 100 includes:
a wireless power receiving module 101 for receiving wireless charging energy;
the processing module 102 is connected to the wireless power receiving module 101, and configured to obtain information to be authenticated after the wireless charging energy is obtained, authenticate the information to be authenticated, and generate a first control signal after the authentication is successful;
and the unlocking module 103 is connected with the processing module 102 and used for unlocking based on the first control signal.
It should be noted that the access control device is an electronic access control device, and includes: an electronic door lock, an electronic guard rail, or an electronic gate. The access control equipment needs to be opened after the acquired information to be authenticated passes the authentication, so that the unlocking safety is ensured. The processing module comprises: a processor.
The wireless power receiving module 101 includes a radio frequency antenna for receiving a radio frequency wireless signal, or a near field feed antenna. The wireless power receiving module 101 is configured to obtain wireless charging energy based on a radio frequency antenna or a near field feed antenna.
The radio frequency antenna is used for receiving radio frequency wireless signals, the radio frequency wireless signals are electromagnetic waves with high frequency alternating current change, and the frequency range is 300 kHz-300 GHz. Here, since the electromagnetic wave with frequency higher than 100khz can propagate in the air and is reflected by the ionosphere at the outer edge of the atmosphere, and has the capability of long-distance transmission, long-distance wireless charging can be realized through the radio frequency antenna. In addition, high frequency electromagnetic waves have the ability to penetrate non-metallic objects due to their high frequency and short wavelength. Therefore, in the embodiment of the present disclosure, when the receiving antenna is a radio frequency antenna, remote and shielded wireless charging can be achieved through a received radio frequency wireless signal.
The near-field feed antenna is used for realizing near-field feed. The near field feeding mode comprises the following steps: near Field Communication (NFC) and wireless charging standard (QI) developed by the wireless charging alliance. The near-field feed antenna transmits information in an inductive coupling mode, and due to the coupling mode, the distance between the two near-field feed antennas with mutual inductance cannot be too far during information transmission, otherwise, the energy is rapidly attenuated to 0. Therefore, the near-field feed antenna is an antenna for short-range communication. Thus, in the embodiments of the present disclosure, when the receiving antenna is a near-field feeding antenna, wireless charging can be achieved over a short distance by a received wireless signal.
In the embodiment of the present disclosure, no matter which antenna is used, the wireless charging energy received by the wireless power receiving module may be: the method comprises the steps of receiving a wireless signal through a radio frequency antenna or a near field feed antenna, converting the wireless signal into an electric signal, and acquiring line charging energy based on a rectifying circuit and a filtering circuit. The wireless signal may be transmitted in the form of radio waves.
Here, the electrical signal converted by the wireless signal is an alternating current signal, and it needs to be rectified by a rectifying circuit to be converted into a direct current signal, and then the direct current signal is smoothed by a filtering circuit to obtain a direct current signal with a flat waveform to supply power to each module.
Thus, still include in the wireless power receiving module: a rectifying circuit and a filter circuit. The rectifying circuit is connected with the radio frequency antenna or the near field feed antenna in a receiving mode and used for converting the electric signal into a first direct current signal; and the filter circuit is used for smoothing the first direct current signal to obtain a second direct current signal. The second dc signal is a wireless charging energy for charging, i.e., electric energy.
After the processing module in the access control equipment acquires the electric energy, if unlocking is needed, the processing module can further acquire information to be authenticated, authenticates the information to be authenticated, and generates a first control signal after authentication is successful, so that the unlocking module can be used for unlocking based on the first control signal.
Here, the implementation that the processing module authenticates the information to be authenticated and generates the first control signal after the authentication is successful may be: matching the information to be authenticated with preset authentication information to obtain a matching result; and when the matching result represents that the authentication is successful, generating the first control signal. The preset authentication information refers to information stored in the access control device and used for verifying the identity of an unlocking person, and for example, the preset authentication information may be fingerprint information or key password information. The unlocking person refers to a person needing to open the access control equipment.
The information to be authenticated refers to information to be authenticated during unlocking, and specifically may be: information for characterizing the identity of the unlocking person. When the access control equipment needs to be opened, in order to guarantee the opening safety, the identity of an unlocking person needs to be verified. And then authenticating the information to be authenticated, namely authenticating the identity of the unlocking person. In the embodiment of the disclosure, the first control signal is generated after the authentication is successful, so that the unlocking module can be unlocked based on the first control signal.
So, even do not have the electricity in the access control equipment when will opening access control equipment, also can acquire the electric energy through wireless power receiving module, and then under the support of the electric energy that acquires, when needs are unblanked, to the authentication information of treating of acquireing authenticate, realize realizing the unblock of access control equipment in the control after the authentication succeeds. Then, through the mode that sets up wireless power receiving module on entrance guard's equipment, can realize even entrance guard's equipment does not have the electric quantity, opening that also can be safe, reduced the user and need in time change the battery and the inconvenience that causes, improved user experience.
It should be noted that, because entrance guard's equipment can obtain the electric energy through wireless power receiving module, consequently, entrance guard's equipment can be do not have power module, power module specifically indicates the battery module that possesses the energy storage function.
In an embodiment of the present disclosure, the information to be authenticated includes at least one of:
fingerprint information;
face information;
keying password information;
and sending the identification information of the unlocking device of the wireless charging energy.
Here, the fingerprint information specifically refers to fingerprint information of an unlocking person, and can be acquired by a fingerprint acquirer. The face information specifically refers to face information of an unlocking person and can be acquired through a face acquisition device. The key password information refers to secret information in a character string form, and can be determined by detecting input on a collector. Generally, the key password information includes at least one of a number, a letter, or a symbol.
The unlocking device is used for opening the access control device; such as a smart phone or smart card. The smart phone or the smart card has unique identification information for representing the identity of the smart phone or the smart card, such as a card number of the smart card, a serial number of the smart phone, and the like.
In the embodiment of the disclosure, the authentication information is authenticated, and the unlocking is performed after the authentication is successful, so that the unlocking safety can be ensured.
In some embodiments, the unlocking mode of the access control device includes: a first mode;
the processing module is configured to extract the information to be authenticated from the wireless charging energy in the first mode.
It should be noted that the first mode is an intelligent unlocking mode, that is, the unlocking device sends the wireless charging energy for charging the access control device, and also sends the information to be authenticated. The wireless charging energy is transmitted in the form of a signal from which the information to be authenticated can be extracted.
Here, taking the unlocking device as a smart phone as an example, an application program for controlling unlocking may be installed on the smart phone, where the application program may include an option of the first mode, that is, when it is detected that the first mode is selected, the unlocking device sends a wireless signal for modulating or loading information to be authenticated to the access control device. Therefore, the smart phone can be considered to have the reverse wireless charging function and the intelligent unlocking function at the same time.
In practical application, the information to be authenticated can be modulated on the wireless signal for providing wireless charging energy and transmitted to the access control device through the antenna, so that after receiving the wireless signal, the access control device can obtain electric energy based on an electric signal converted by the wireless signal and can also obtain the information to be authenticated modulated on the wireless signal. In this way, in the first mode, the information to be authenticated acquired by the processing module is extracted from the received wireless charging energy.
It should be noted that, in the first mode, the information to be authenticated sent by the unlocking device may be fingerprint information, face information, key password information, or identification information of the unlocking device that sends the wireless signal. The authentication information may be encrypted fingerprint information, face information, key password information, or identification information of an unlocking device that sends the wireless signal, that is, the unlocking device encodes the authentication information after acquiring the authentication information to obtain encoded information (for example, composed of 0 and/or 1), processes the encoded information by an encryption algorithm to obtain a character string composed of short random letters and/or numbers, and sends the character string to the access control device. Here, the information to be authenticated is encrypted, so that the information to be authenticated is not easily intercepted or tampered by others, and the unlocking security is further improved.
The unlocking using the character string may be: and after receiving the character string, the wireless power receiving module of the access control equipment sends the character string to the processing module, the processing module decrypts the character string to obtain the information to be authenticated, and then the obtained information to be authenticated is matched with preset authentication information stored in the access control equipment. If the matching result represents that the encryption authentication is passed, the processing module controls the unlocking module to unlock, namely, the door lock is opened; and returns a success message to the unlocking device. And if the encryption authentication is not passed, the processing module returns failure information to the unlocking equipment.
In the embodiment of the present disclosure, the Encryption manner between the unlocking device and the access control device may be implemented by an Advanced Encryption Standard (AES), such as AES256 or a Secure Hash Algorithm (SHA), such as HA 256.
In the embodiment of the present disclosure, extracting the information to be authenticated from the wireless charging energy may be implemented by a demodulation circuit, that is, the processing module includes a demodulation circuit; the demodulation circuit is used for demodulating the wireless charging energy to obtain the information to be authenticated. If the information to be authenticated is obtained through the processing of the demodulation circuit, the processing module can further authenticate the information to be authenticated, and a first control signal is generated after the authentication is successful.
Therefore, when unlocking is carried out through the first mode of the access control equipment, the electric energy can be acquired only through the wireless electric energy receiving module, and the information to be authenticated is acquired. Therefore, for a user, the access control equipment can acquire electric energy and perform safety certification only by inputting the information to be authenticated on the unlocking equipment, so that the user can operate conveniently.
In some embodiments, the unlocking mode of the access control device further includes: and a second mode.
Fig. 2 is a block diagram illustrating a second configuration of an access control device according to an exemplary embodiment, as shown in fig. 2,
entrance guard's equipment 100 still includes:
and the input module 104 is connected to the processing module 102, and configured to receive the information to be authenticated in the second mode, and send the information to be authenticated to the processing module 102.
It should be noted that the second mode specifically refers to a common unlocking mode, that is, the entrance guard device 100 includes the input module 104, and the information to be authenticated is obtained by detecting the input information on the input module 104. In other words, the second mode is unlocking performed by an unlocking person inputting on an input module of the access control device before the access control device.
The input module can be a key device, a fingerprint collector, a human face collector or an identification information collector and the like. Here, the identification information collector may be a collection device of a bluetooth signal, a collection device of an NFC signal, a collection device of a radio frequency signal, or the like.
Taking a specific application scenario as an example, that is, one or more of the input modules are arranged on the access control device, when an unlocking person needs to unlock, the input module inputs (for example, inputs password information), receives the password information, and sends the password information to the processing module for authentication.
Here, taking the unlocking device as a smart phone as an example, an application program for controlling unlocking may be installed on the smart phone, and the application program may include an option of the second mode, that is, when it is detected that the second mode is selected, the unlocking device sends a wireless signal for providing wireless charging energy without modulating information to be authenticated to the access control device. Thus, the smart phone can be considered to have only a reverse wireless charging function.
So, when passing through entrance guard's equipment the unblock is gone to the second mode, just can realize safe unblock under the cooperation of the input module that sets up on receiving antenna and entrance guard's equipment.
In some embodiments, the processing module is further configured to determine that the information to be authenticated is not extracted from the wireless charging energy in the first mode, or switch the unlocking mode of the access control device from the first mode to the second mode when the information to be authenticated extracted from the wireless charging energy fails to be authenticated in a preset number of authentications.
Here, as described above, the unlocking mode of the access control device includes 2 types: said first and said second. In the embodiment of the disclosure, in some cases, the unlocking mode of the access control device may be switched from the first mode to the second mode. The some cases include: when the information to be authenticated extracted from the wireless charging energy fails to be authenticated in authentication for a preset number of times, or it is determined that the information to be authenticated is not extracted from the wireless charging energy.
The determining that the information to be authenticated is not extracted from the wireless charging energy includes: the information to be authenticated is not modulated in the wireless signal sent by the unlocking device, or the information is modulated in the wireless signal sent by the unlocking device, but the modulated information is empty information or information which does not accord with the regulation, so that the information to be authenticated is not extracted from the wireless charging energy received by the wireless power receiving module at the access control device side.
Here, for the case where the information to be authenticated is not modulated in the wireless signal transmitted by the unlocking apparatus, it may be: the unlocking device determines that the unlocking is performed through the first mode, but does not transmit the authentication information. Therefore, the processing module on the access control equipment side demodulates the wireless charging energy obtained by converting the wireless signal and cannot extract the information to be authenticated.
For the case where information is modulated in the wireless signal transmitted by the unlocking device, but the modulated information is null information or information that does not meet the specification, the following may be the case: the unlocking device determines that the unlocking is carried out through the first mode, and modulates information while sending a wireless signal, but because an unlocking person may not know correct information to be authenticated, the unlocking person randomly or arbitrarily inputs some information which does not meet the regulation. Therefore, the processing module on the access control equipment side demodulates the wireless charging energy obtained by converting the wireless signal and cannot extract the information to be authenticated.
The authentication failure of the information to be authenticated extracted from the wireless charging energy in the authentication of the preset times refers to that: the unlocking device determines that the unlocking is carried out through the first mode, but in the authentication for the preset times, the information to be authenticated cannot be matched with the preset authentication information stored in the access control device, so that the unlocking mode is automatically switched to the second mode.
The preset number of times may be set as required, for example, 3 times, that is, if all 3 authentications fail, the first mode is prohibited from being used for unlocking within a period of time, and at this time, only the second mode may be used for unlocking.
Therefore, the information to be authenticated is determined not to be extracted from the wireless charging energy, or when the information to be authenticated extracted from the wireless charging energy fails to be authenticated in authentication for the preset times, the unlocking mode is switched from the first mode to the second mode, so that unlocking can be performed through the second mode when unlocking of the first mode fails, the trouble that the door control equipment cannot be opened due to the fact that unlocking of the user cannot be performed under the condition that unlocking of the first mode fails is reduced, and user experience is further improved.
In some embodiments, the processing module is further configured to generate a second control signal when the authentication fails.
Based on this, fig. 3 is a block diagram of a third structure of the access control device according to an exemplary embodiment, and as shown in fig. 3, the access control device 100 further includes:
and a locking module 105 connected to the processing module 102, for locking based on the second control signal.
Here, as described above, since the processing module needs to authenticate the acquired authentication information, and the authentication is successful or failed, when the authentication fails, the processing module generates a second control signal, and the locking module in the access control device can lock based on the second control signal. Namely, the authentication fails, and the access control device cannot be opened.
The implementation principle of determining authentication failure is as described above, and is not described herein again.
Therefore, the access control equipment is locked when the authentication failure is determined through the authentication of the authentication information, and the unlocking safety is ensured.
In some embodiments, fig. 4 is a block diagram illustrating a fourth structure of an access control device according to an exemplary embodiment, and as shown in fig. 4, the access control device 100 further includes:
the power module 106 is connected to the processing module 102, and configured to provide electric energy when the processing module 102 fails to obtain wireless charging energy and needs to authenticate the obtained information to be authenticated.
Here, the power module 106 includes: an energy storage battery.
It should be noted that, for the embodiment of the present disclosure, the power module 106 only needs to provide electric energy for each functional module of the access control device when the processing module fails to obtain the wireless charging energy and needs to authenticate the obtained information to be authenticated.
The processing module failing to acquire wireless charging energy comprises: the wireless charging energy can not be received by the wireless electric energy receiving module, or the wireless charging energy receiving antenna receives a wireless signal, but the wireless signal can not be converted into an electric signal due to a fault, or the electric signal converted by the wireless signal can not be obtained due to faults in links such as a rectifying circuit in the access control equipment, namely the electric energy can not be obtained.
Thus, when the processing module 102 fails to acquire the wireless charging energy and needs to authenticate the acquired information to be authenticated, the normal operation of the access control device can be ensured based on the electric quantity provided by the power supply module of the access control device, so that the user can also unlock normally under the special condition; based on this, guaranteed under various scenes, safe unblock's possibility.
In some embodiments, fig. 5 is a block diagram illustrating a structure of an access control device according to an exemplary embodiment, and as shown in fig. 5, the access control device 100 further includes:
and the display module 107 is used for displaying prompt information of unlocking success or unlocking failure.
Here, the display module 107 includes: a display.
And after the authentication of the authentication information is finished every time, outputting prompt information for the success and the failure of the authentication. The prompt message of successful unlocking may be: unlocking is successful or authentication is successful; the prompt message of the unlocking failure may be: failure to unlock or authentication.
So, through at the in-process of authentication at every turn, all carry out the mode that shows to the result of authentication, can make the user can see the result of authentication directly perceivedly through the demonstration of display module assembly, the user of being convenient for learns the result very first time, improves user experience.
It should be noted that, in the embodiment of the present disclosure, no matter whether the authentication is successful or failed, in addition to displaying the prompt information on the display module on the side of the access control device, the method may further include: after the prompt message of successful unlocking is displayed through the display module, the access control equipment also returns the message of successful unlocking to the unlocking equipment; and after the unlocking equipment receives the prompt message of successful unlocking, the prompt message is also displayed on a display of the unlocking equipment, and other information such as the time for opening the access control equipment is recorded.
Correspondingly, after the prompt message of the unlocking failure is displayed through the display module, the access control equipment also returns the information of the authentication failure to the unlocking equipment; and after the unlocking equipment receives the prompt message of the unlocking failure, the prompt message is also displayed on a display of the unlocking equipment, and other information such as the time of the failure of opening the access control equipment is recorded.
Therefore, the user can directly know the authentication result on the unlocking equipment, another scheme is provided for obtaining the unlocking result, and the user can also watch the authentication result in a mode of displaying the prompt message on the unlocking equipment without approaching the door lock.
In order to achieve that the access control device can be safely opened without electric quantity, an embodiment of the present disclosure further provides an unlocking method applied to the access control device, where fig. 6 is a first flowchart illustrating an unlocking method according to an exemplary embodiment, and as shown in fig. 6, the method includes:
601, receiving wireless charging energy based on a wireless power receiving module;
step 602, after acquiring the wireless charging energy, acquiring information to be authenticated, authenticating the information to be authenticated, and generating a first control signal after the authentication is successful;
step 603, unlocking based on the first control signal.
It should be noted that the access control device includes: the device comprises a wireless power receiving module, a processing module and an unlocking module.
In step 602, after the wireless charging energy is acquired, information to be authenticated is acquired, the information to be authenticated is authenticated, and after the authentication is successful, a first control signal is generated and executed by the processing module.
The unlocking based on the first control signal in the step 603 is performed by the unlocking module; namely, the unlocking module unlocks based on the first control signal.
So, even if there is not electricity in the access control equipment when will opening access control equipment, also can obtain the electric energy through receiving the wireless signal that is used for providing wireless charging energy that the unblock equipment sent, and then under the support of the electric energy that obtains, when needs are unblanked, to the information of waiting to authenticate of obtaining, realize the control realization access control equipment unblock after the authentication succeeds. Therefore, by means of the mode of arranging the receiving antenna on the access control equipment, the access control equipment can be safely opened even if no electric quantity exists, inconvenience caused by the fact that a user needs to replace a battery in time is reduced, and user experience is improved.
In some embodiments, the unlocking mode of the access control device includes: a first mode;
the method further comprises the following steps:
in the first mode, the information to be authenticated is extracted from the wireless charging energy.
It should be noted that the first mode is an intelligent unlocking mode, that is, the unlocking device sends the wireless charging energy for charging the access control device, and also sends the information to be authenticated.
In the first mode, the processing module extracts the information to be authenticated from the wireless charging energy and executes the information to be authenticated; namely, the processing module extracts the information to be authenticated from the wireless charging energy in the first mode.
In some embodiments, the unlocking mode of the access control device further includes: a second mode;
the method further comprises the following steps:
and in the second mode, receiving the information to be authenticated through an input module in the access control equipment, and sending the information to be authenticated to a processing module in the access control equipment.
It should be noted that the second mode specifically refers to a common unlocking mode, that is, the access control device includes an input module, and the information to be authenticated is obtained by detecting input information on the input module.
In the second mode, receiving the information to be authenticated through an input module in the access control equipment, and sending the information to be authenticated to a processing module in the access control equipment for execution by the input module; namely, the input module receives the information to be authenticated through the input module in the access control equipment in the second mode, and sends the information to be authenticated to the processing module in the access control equipment.
In some embodiments, the method further comprises:
in the first mode, it is determined that the information to be authenticated is not extracted from the wireless charging energy, or when the information to be authenticated extracted from the wireless charging energy fails to be authenticated in authentication for a preset number of times, the unlocking mode of the access control device is switched from the first mode to the second mode.
The step of switching the unlocking mode is also executed by the processing module.
Therefore, the information to be authenticated is determined not to be extracted from the wireless charging energy, or when the information to be authenticated extracted from the wireless charging energy fails to be authenticated in authentication for the preset times, the unlocking mode is switched from the first mode to the second mode, so that unlocking can be performed through the second mode when unlocking of the first mode fails, the trouble that the door control equipment cannot be opened due to the fact that unlocking of the user cannot be performed under the condition that unlocking of the first mode fails is reduced, and user experience is further improved.
In some embodiments, the authenticating the information to be authenticated and generating the first control signal after the authentication is successful include:
when the unlocking mode of the access control equipment is the first mode, demodulating the wireless charging energy to obtain the information to be authenticated;
matching the information to be authenticated with preset authentication information to obtain a matching result;
and when the matching result represents that the authentication is successful, generating the first control signal.
It should be noted that, the processing module of the access control device may further include: demodulation circuit, matching circuit and generating circuit.
The demodulation circuit is used for demodulating the wireless charging energy to obtain the information to be authenticated when the unlocking mode of the access control equipment is the first mode. The matching circuit is used for matching the information to be authenticated with preset authentication information to obtain a matching result. The generating circuit is used for generating the first control signal when the matching result represents that the authentication is successful.
In some embodiments, the method further comprises:
generating a second control signal when the authentication fails;
locking based on the second control signal.
Here, the processing module generates a second control signal when authentication fails; and the locking module locks based on the second control signal.
In some embodiments, the method further comprises:
when the processing module fails to acquire electric energy based on the wireless charging energy and needs to authenticate the acquired information to be authenticated, the electric energy is provided through a power supply module in the access control equipment.
It should be noted that the access control device further includes: and the power supply module is connected with the processing module and used for providing electric energy when the processing module fails to acquire electric energy based on the wireless charging energy and needs to authenticate the acquired information to be authenticated.
In some embodiments, the method further comprises:
and displaying prompt information of successful unlocking or failed unlocking through a display module in the access control equipment.
It should be noted that the access control device further includes: and the display module is used for displaying prompt information of unlocking success or unlocking failure.
In some embodiments, the information to be authenticated comprises at least one of:
fingerprint information;
face information;
keying password information;
and sending the identification information of the unlocking device of the wireless charging energy.
Here, the fingerprint information specifically refers to fingerprint information of an unlocking person, and can be acquired by a fingerprint acquirer. The face information specifically refers to face information of an unlocking person and can be acquired through a face acquisition device. The key password information refers to secret information in a character string form, and can be determined by detecting input on a collector. Generally, the key password information includes at least one of numbers, letters, or symbols.
The unlocking device is used for opening the access control device; such as a smart phone or smart card. The smart phone or the smart card has unique identification information for representing the identity of the smart phone or the smart card, such as a card number of the smart card, a serial number of the smart phone, and the like.
In the embodiment of the disclosure, the authentication information is authenticated, and the unlocking is performed after the authentication is successful, so that the unlocking safety can be ensured.
In order to achieve that the access control device can be safely opened without electric quantity, an embodiment of the present disclosure further provides an unlocking method applied to a mobile terminal, where fig. 7 is a flowchart illustrating a second unlocking method according to an exemplary embodiment, and as shown in fig. 7, the method includes:
step 701, determining an unlocking mode used for unlocking the access control equipment;
step 702, receiving input information to be authenticated when the access control equipment is unlocked in the first mode;
and 703, loading the information to be authenticated onto a radio wave for providing wireless charging energy for the access control equipment, and sending the information to be authenticated.
Here, the mobile terminal may be an unlocking device that unlocks an access control device.
In an embodiment of the present disclosure, the unlocking mode for unlocking the door control device includes: a first mode and a second mode. The first mode is an intelligent unlocking mode, namely the mobile terminal sends the information to be authenticated while sending wireless charging energy for charging the access control equipment. That is, the wireless charging energy carries information to be authenticated. The second mode is specifically a common unlocking mode, namely the entrance guard equipment comprises an input module, and the information to be authenticated is acquired by detecting input information on the input module. In other words, the second mode is unlocking performed by an unlocking person inputting on an input module of the access control device before the access control device.
Before formal unlocking, an unlocking mode used for unlocking the access control equipment can be determined, if the access control equipment is unlocked by using the first mode, information to be authenticated input by a user on a mobile terminal is received, and the information to be authenticated is loaded to a radio wave for providing wireless charging energy for the access control equipment and is sent.
As an example, in a specific implementation, an application program for controlling unlocking may be installed on the mobile terminal, and the application program may include an option of the first mode, that is, when it is detected that the first mode is selected, the mobile terminal sends a radio wave for modulating or loading information to be authenticated to the access control device, so that the access control device may obtain wireless charging energy based on the radio wave. Therefore, the smart phone can be considered to have the reverse wireless charging function and the intelligent unlocking function at the same time.
Thus, even if there is no electricity in the access control apparatus when the access control apparatus is to be opened, the electric power can be supplied to the access control apparatus by transmitting the radio wave. And the mode of carrying the information to be authenticated through radio waves provides the information for safety authentication while providing electric energy, thereby improving the user experience.
The information to be authenticated sent by the mobile terminal may be fingerprint information, face information, key password information, or identification information of an unlocking device sending the radio wave, and the like. The unlocking device may acquire the information to be authenticated, encode the information to be authenticated to obtain encoded information (e.g., consisting of 0 and/or 1), process the encoded information by an encryption algorithm to obtain a character string consisting of short random letters and/or numbers, and send the character string to the access control device. Here, the information to be authenticated is encrypted, so that the information to be authenticated is not easily intercepted or tampered by others, and the unlocking security is further improved.
In some embodiments, the method further comprises:
and when the access control device is unlocked in the second mode, sending radio waves for providing wireless charging energy to the access control device.
As described above, the second mode is specifically a normal unlocking mode, and unlocking is achieved by inputting on the input module of the access control device. Then, the mobile terminal is only used to provide wireless charging energy, i.e. the radio wave does not carry or modulate the information to be authenticated.
In some embodiments, the method further comprises:
and receiving prompt information which is returned by the access control equipment and used for representing whether unlocking is successful.
After the access control device finishes authentication of the authentication information every time, prompt information is output for success and failure of the authentication, and the prompt information is sent to the mobile terminal. The prompt message of successful unlocking may be: unlocking is successful or authentication is successful; the prompt message of the unlocking failure may be: failure to unlock or authentication.
So, through at the in-process of authentication at every turn, all carry out the mode that shows to the result of authentication, can be so that the user can see the result of authentication directly perceivedly through the demonstration of mobile terminal's display screen, and the user of being convenient for knows the result very first time, improves user experience.
In some embodiments, the method further comprises:
and after the prompt information representing unlocking failure of the door control equipment for preset times is received, switching an unlocking mode for unlocking the door control equipment from a first mode to a second mode.
The preset number of times may be set as required, for example, 3 times, that is, if all 3 authentications fail, the first mode is prohibited from being used for unlocking within a period of time, and at this time, only the second mode may be used for unlocking.
Therefore, when the authentication fails in the authentication for the preset times, the mode of unlocking is switched from the first mode to the second mode, so that unlocking can be performed through the second mode when the unlocking of the first mode fails, the difficulty that the user cannot unlock due to the fact that the access control equipment cannot be opened when the unlocking of the first mode fails is reduced, and the user experience is further improved.
Fig. 8 is a block diagram illustrating an unlocking device 1800, according to an exemplary embodiment. For example, the apparatus 1800 may be a mobile phone, computer, digital broadcast terminal, messaging device, game console, tablet device, medical device, fitness device, personal digital assistant, and so forth.
Referring to fig. 8, apparatus 1800 may include one or more of the following components: a processing component 1802, a memory 1804, a power component 1806, a multimedia component 1808, an audio component 1810, an input/output (I/O) interface 1812, a sensor component 1814, and a communications component 1816.
The processing component 1802 generally controls the overall operation of the device 1800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 1802 may include one or more processors 1820 to execute instructions to perform all or part of the steps of the methods described above. Further, the processing component 1802 may also include one or more modules that facilitate interaction between the processing component 1802 and other components. For example, the processing component 1802 can include a multimedia module to facilitate interaction between the multimedia component 1808 and the processing component 1802.
The memory 1804 is configured to store various types of data to support operation at the apparatus 1800. Examples of such data include instructions for any application or method operating on the device 1800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 1804 may be implemented by any type or combination of volatile or non-volatile storage devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power components 1806 provide power to various components of device 1800. The power components 1806 may include: a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the apparatus 1800.
The multimedia component 1808 includes a screen that provides an output interface between the device 1800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 1808 includes a front facing camera and/or a rear facing camera. The front-facing camera and/or the rear-facing camera may receive external multimedia data when the device 1800 is in an operating mode, such as a shooting mode or a video mode. Each front camera and/or rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
Audio component 1810 is configured to output and/or input audio signals. For example, the audio component 1810 includes a Microphone (MIC) configured to receive external audio signals when the apparatus 1800 is in operating modes, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 1804 or transmitted via the communication component 1816. In some embodiments, audio component 1810 also includes a speaker for outputting audio signals.
I/O interface 1812 provides an interface between processing component 1802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor component 1814 includes one or more sensors for providing various aspects of state assessment for the apparatus 1800. For example, the sensor assembly 1814 can detect an open/closed state of the device 1800, the relative positioning of components such as a display and keypad of the device 1800, the sensor assembly 1814 can also detect a change in position of the device 1800 or a component of the device 1800, the presence or absence of user contact with the device 1800, orientation or acceleration/deceleration of the device 1800, and a change in temperature of the device 1800. The sensor assembly 1814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 1814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 1814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 1816 is configured to facilitate communications between the apparatus 1800 and other devices in a wired or wireless manner. The device 1800 may access a wireless network based on a communication standard, such as WiFi, 2G, or 3G, or a combination thereof. In an exemplary embodiment, the communication component 1816 receives a broadcast signal or broadcast associated information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 1816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, or other technologies.
In an exemplary embodiment, the apparatus 1800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer readable storage medium is also provided, such as the memory 1804 including instructions that are executable by the processor 1820 of the apparatus 1800 to perform the above-described method. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer readable storage medium, wherein instructions when executed by a processor enable the above-described unlocking method to be performed.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This disclosure is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (12)

1. An access control device, comprising:
the wireless electric energy receiving module is used for receiving wireless charging energy;
the processing module is connected with the wireless power receiving module and used for acquiring information to be authenticated after the wireless charging energy is acquired, authenticating the information to be authenticated and generating a first control signal after the authentication is successful;
and the unlocking module is connected with the processing module and used for unlocking based on the first control signal.
2. The door access device of claim 1, wherein the unlock mode of the door access device comprises: a first mode;
the processing module is configured to extract the information to be authenticated from the wireless charging energy in the first mode.
3. The door access device of claim 2, wherein the unlock mode of the door access device further comprises: a second mode;
entrance guard's equipment still includes:
and the input module is connected with the processing module and used for receiving the information to be authenticated and sending the information to be authenticated to the processing module in the second mode.
4. The door access device of claim 3,
the processing module is further configured to determine that the information to be authenticated is not extracted from the wireless charging energy in the first mode, or switch the unlocking mode of the access control device from the first mode to the second mode when the information to be authenticated extracted from the wireless charging energy fails to be authenticated in authentication for a preset number of times.
5. The door access device according to claim 1, wherein the processing module is further configured to generate a second control signal when the authentication fails;
entrance guard's equipment still includes:
and the locking module is connected with the processing module and used for locking based on the second control signal.
6. The access control device of claim 1, wherein the information to be authenticated comprises at least one of:
fingerprint information;
face information;
keying password information;
and sending the identification information of the unlocking device of the wireless charging energy.
7. An unlocking method is applied to a mobile terminal, and comprises the following steps:
determining an unlocking mode used for unlocking the access control equipment;
receiving input information to be authenticated when the access control equipment is unlocked in a first mode;
and loading the information to be authenticated to a radio wave for providing wireless charging energy for the access control equipment and sending the information.
8. The unlocking method according to claim 7, further comprising:
and when the access control device is unlocked in the second mode, sending radio waves for providing wireless charging energy to the access control device.
9. The unlocking method according to claim 8, further comprising:
and receiving prompt information which is returned by the access control equipment and used for representing whether unlocking is successful.
10. The unlocking method according to claim 9, further comprising:
and after the prompt information representing unlocking failure of the door control equipment for preset times is received, switching an unlocking mode for unlocking the door control equipment from a first mode to a second mode.
11. An unlocking device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to: the method of any one of claims 7 to 10 when executed by executable instructions stored in the memory.
12. A non-transitory computer readable storage medium having instructions therein which, when executed by a processor of an unlocking device, enable the unlocking device to perform the method of any of claims 7 to 10.
CN202010084743.7A 2020-02-10 2020-02-10 Access control equipment, unlocking method and device and storage medium Pending CN113256858A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010084743.7A CN113256858A (en) 2020-02-10 2020-02-10 Access control equipment, unlocking method and device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010084743.7A CN113256858A (en) 2020-02-10 2020-02-10 Access control equipment, unlocking method and device and storage medium

Publications (1)

Publication Number Publication Date
CN113256858A true CN113256858A (en) 2021-08-13

Family

ID=77219351

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010084743.7A Pending CN113256858A (en) 2020-02-10 2020-02-10 Access control equipment, unlocking method and device and storage medium

Country Status (1)

Country Link
CN (1) CN113256858A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2782375A1 (en) * 2013-03-20 2014-09-24 Eff'Innov Technologies Smart Power Supply Device and Corresponding Method for Using a Power Supply Device
CN104079027A (en) * 2014-06-04 2014-10-01 科世达(上海)管理有限公司 Key charging method and system, vehicle-mounted control system and keyless starting device
CN204103574U (en) * 2014-11-12 2015-01-14 西南大学 A kind of electronic lock full-automatic wireless charging device
CN106652132A (en) * 2016-12-06 2017-05-10 上海斐讯数据通信技术有限公司 Door lock device based on Wifi charging
CN107067512A (en) * 2017-04-07 2017-08-18 昆山吉纳尔运动器材有限公司 A kind of shared bicycle smart lock wireless charging system and its control method
CN109308751A (en) * 2017-07-27 2019-02-05 德金属工业股份有限公司 To the method for electronic lock wireless charging and unlock
CN208569729U (en) * 2018-07-26 2019-03-01 厦门渐朗电子科技有限公司 A kind of gateway type intelligent fingerprint lock

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2782375A1 (en) * 2013-03-20 2014-09-24 Eff'Innov Technologies Smart Power Supply Device and Corresponding Method for Using a Power Supply Device
CN104079027A (en) * 2014-06-04 2014-10-01 科世达(上海)管理有限公司 Key charging method and system, vehicle-mounted control system and keyless starting device
CN204103574U (en) * 2014-11-12 2015-01-14 西南大学 A kind of electronic lock full-automatic wireless charging device
CN106652132A (en) * 2016-12-06 2017-05-10 上海斐讯数据通信技术有限公司 Door lock device based on Wifi charging
CN107067512A (en) * 2017-04-07 2017-08-18 昆山吉纳尔运动器材有限公司 A kind of shared bicycle smart lock wireless charging system and its control method
CN109308751A (en) * 2017-07-27 2019-02-05 德金属工业股份有限公司 To the method for electronic lock wireless charging and unlock
CN208569729U (en) * 2018-07-26 2019-03-01 厦门渐朗电子科技有限公司 A kind of gateway type intelligent fingerprint lock

Similar Documents

Publication Publication Date Title
EP3657370B1 (en) Methods and devices for authenticating smart card
CN103838992B (en) A kind of fingerprint identification method and terminal
KR101242122B1 (en) Method for remotely controlling doorlock apparatus using smart phone and the doorlock appratus
US20150379255A1 (en) Systems and methods for granting access to a computing device using a wearable device
CN109816832B (en) Unlocking method and device
CN104537291A (en) Screen interface unlocking method and screen interface unlocking device
CN103634477A (en) Method and system for preventing thievery of mobile phone with fingerprint device
CN104376248A (en) Method and device for carrying out user authentication on password input interface
CN105096419B (en) Unlocking method and device, door lock and intelligent wearable equipment
KR20120090148A (en) Method and system for controlling a car using smart phone
CN102629955A (en) Face recognition mobile telephone and implementation method thereof
WO2013123453A1 (en) Data storage devices, systems, and methods
CN106126986B (en) Unlocking processing method and device for locked data partition
JP2009031877A (en) Contactless ic card, portable terminal equipment, start control method, and start control program
CN102542647A (en) Method and system for opening safe or entrance guard device by utilizing mobile terminal
US20150016698A1 (en) Electronic device providing biometric authentication based upon multiple biometric template types and related methods
CN108696361A (en) Configuration method, generation method and the device of smart card
CN103995572A (en) Computer unlocking method and computer with unlocking module
WO2018006318A1 (en) Method and system for using intelligent entrance guard on basis of mobile terminal
CN108650219B (en) User identity identification method, related device, equipment and system
CN106535190A (en) Network connection method and apparatus
WO2019218328A1 (en) Smart door lock wireless communication method, smart door lock, gateway, and communication device
CN106797386B (en) Security verification method and device, terminal equipment and server
CN113256858A (en) Access control equipment, unlocking method and device and storage medium
CN110867002A (en) Door opening mode setting method, intelligent lock and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination