CN113313864B - Access control method, device, wireless earphone, access control equipment and storage medium - Google Patents

Access control method, device, wireless earphone, access control equipment and storage medium Download PDF

Info

Publication number
CN113313864B
CN113313864B CN202110580643.8A CN202110580643A CN113313864B CN 113313864 B CN113313864 B CN 113313864B CN 202110580643 A CN202110580643 A CN 202110580643A CN 113313864 B CN113313864 B CN 113313864B
Authority
CN
China
Prior art keywords
access control
verification information
terminal
verification
entrance guard
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110580643.8A
Other languages
Chinese (zh)
Other versions
CN113313864A (en
Inventor
朱燕霙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN202110580643.8A priority Critical patent/CN113313864B/en
Publication of CN113313864A publication Critical patent/CN113313864A/en
Application granted granted Critical
Publication of CN113313864B publication Critical patent/CN113313864B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/23Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04RLOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
    • H04R1/00Details of transducers, loudspeakers or microphones
    • H04R1/10Earpieces; Attachments therefor ; Earphones; Monophonic headphones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04RLOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
    • H04R1/00Details of transducers, loudspeakers or microphones
    • H04R1/10Earpieces; Attachments therefor ; Earphones; Monophonic headphones
    • H04R1/1025Accumulators or arrangements for charging
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Selective Calling Equipment (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the application provides an access control method, an access control device, a wireless earphone, access control equipment and a storage medium, and relates to the technical field of Internet of things. The method is applied to a wireless earphone, and comprises the following steps: responding to the door control opening operation, acquiring door control verification information, wherein the door control verification information is used for opening verification of door control equipment; the access control equipment is used for switching from the closed state to the open state when the access control verification information passes the open verification. According to the technical scheme, after the wireless earphone receives and confirms the entrance guard opening operation, the wireless earphone broadcasts the acquired entrance guard verification information through the wireless communication assembly, and entrance guard equipment is convenient to receive the entrance guard verification information through the wireless communication assembly. Further, the entrance guard equipment performs opening verification on the received entrance guard verification information, so that after the entrance guard verification information passes the opening verification, the entrance guard equipment is switched from a closed state to an open state.

Description

Access control method, device, wireless earphone, access control equipment and storage medium
Technical Field
The embodiment of the application relates to the technical field of the Internet of things, in particular to an access control method, an access control device, a wireless earphone, access control equipment and a storage medium.
Background
The entrance guard equipment is equipment for controlling the entrance passage and is developed from door locks.
In the related art, a user can control access control equipment through an operation terminal. Specifically, the terminal is provided with an application program for managing the access control system, and after logging in the application program, the application program is operated to control the access control equipment to switch between opening and closing.
Disclosure of Invention
The embodiment of the application provides an access control method, an access control device, a wireless earphone, access control equipment and a storage medium. The technical scheme comprises the following steps:
in one aspect, an embodiment of the present application provides an access control method, which is applied to a wireless earphone, and the method includes:
responding to an entrance guard opening operation, and acquiring entrance guard verification information, wherein the entrance guard verification information is used for opening verification of entrance guard equipment;
the access control verification information is broadcast through the wireless communication assembly, and the access control equipment is used for switching from a closed state to an open state when the access control verification information passes the open verification.
On the other hand, the embodiment of the application provides an access control method, which is applied to access control equipment and comprises the following steps:
receiving access control verification information broadcast by a wireless earphone through a wireless communication assembly, wherein the access control verification information is acquired and broadcast when the wireless earphone receives an access control opening operation;
opening and verifying the access control verification information;
and responding to the entrance guard verification information to pass the opening verification, and switching from the closed state to the open state.
On the other hand, the embodiment of the application provides an entrance guard control device, is applied to wireless earphone, the device includes:
the information acquisition module is used for responding to the door control opening operation and acquiring door control verification information, wherein the door control verification information is used for opening verification of door control equipment;
and the information broadcasting module is used for broadcasting the access control verification information through the wireless communication assembly, and the access control equipment is used for switching from a closed state to an open state when the access control verification information passes the open verification.
On the other hand, the embodiment of the application provides an entrance guard control device, is applied to access control equipment, the device includes:
the information receiving module is used for receiving access control verification information broadcast by the wireless earphone through the wireless communication assembly, and the access control verification information is acquired and broadcast when the wireless earphone receives an access control opening operation;
The information verification module is used for carrying out opening verification on the access control verification information;
and the control module is used for responding to the access control verification information to pass the opening verification and switching from the closed state to the open state.
In another aspect, embodiments of the present application provide a wireless headset including a processor and a memory, the memory storing a computer program loaded by the processor and executing the access control method as described in the above aspect.
In another aspect, an embodiment of the present application provides an access control device, where the access control device includes a processor and a memory, where the memory stores a computer program, and the computer program is loaded by the processor and executes the access control method according to the above aspect.
In another aspect, embodiments of the present application provide a computer readable storage medium having a computer program stored therein, the computer program being loaded and executed by a processor to implement the access control method described in the above aspect.
In another aspect, embodiments of the present application provide a computer program product, the computer program product, or computer program comprising computer instructions stored in a computer-readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions so that the computer device performs the access control method described in the above aspect.
The beneficial effects that technical scheme that this application embodiment provided include at least:
after the wireless earphone receives and confirms the entrance guard opening operation, the wireless earphone broadcasts the acquired entrance guard verification information through the wireless communication assembly, so that the entrance guard equipment can conveniently receive the entrance guard verification information through the wireless communication assembly. Further, the entrance guard equipment performs opening verification on the received entrance guard verification information, so that after the entrance guard verification information passes the opening verification, the entrance guard equipment is switched from a closed state to an open state. Compared with the mode of controlling the access control equipment by using the terminal in the related art, the access control equipment is opened by operating the wireless earphone, so that the operation steps of opening the access control equipment are simplified, and the efficiency of opening the access control equipment can be improved.
Drawings
FIG. 1 is a schematic illustration of an implementation environment provided by one embodiment of the present application;
FIG. 2 is a schematic illustration of an implementation environment provided by another embodiment of the present application;
fig. 3 is a schematic structural diagram of a wireless earphone according to an embodiment of the present application;
FIG. 4 is a flow chart of a door access control method provided by one embodiment of the present application;
FIG. 5 is a flow chart of a door access control method provided by one embodiment of the present application;
Fig. 6 is a flowchart of an access control method according to another embodiment of the present application;
FIG. 7 is a schematic diagram of an interface for the first terminal to set the door access verification information;
fig. 8 is a flowchart of an access control method according to another embodiment of the present application;
fig. 9 is a schematic diagram of detecting a headphone case uncapping operation;
fig. 10 is an interface schematic diagram of a first terminal provided with a headphone case uncapping operation;
FIG. 11 is a flow chart of an access control method provided in another embodiment of the present application;
fig. 12 is a flowchart of an access control method according to another embodiment of the present application;
fig. 13 is a flowchart of an access control method according to another embodiment of the present application;
FIG. 14 is a flow chart of a wireless headset setting an entrance guard opening operation and broadcasting entrance guard verification information;
fig. 15 is a flowchart of a wireless headset setting a door opening operation and broadcasting door access verification information;
FIG. 16 is a flow chart of an access device scanning and identifying broadcast access verification information;
fig. 17 is a flowchart of an access control method according to another embodiment of the present application;
fig. 18 is a block diagram of an access control device according to an embodiment of the present application;
fig. 19 is a block diagram of an access control device according to another embodiment of the present application;
Fig. 20 is a block diagram of a wireless headset according to an embodiment of the present application;
fig. 21 is a block diagram of an access control device according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
FIG. 1 is a schematic diagram of an implementation environment provided by one embodiment of the present application. The implementation environment comprises an access control device 11 and a wireless headset 12.
The entrance guard device 11 is a system for controlling the entrance and exit passage, and is developed from a door lock. The access control device 11 has a communication function by which broadcast messages are scanned and a processing function by which authentication of identity information is performed.
The wireless earphone 12 is a wireless device for establishing a data communication connection with a terminal and playing audio, and optionally, the wireless earphone 12 may also open the access control device 11 by broadcasting access control verification information. Optionally, after receiving the access control opening operation triggered by the user, the wireless earphone 12 broadcasts corresponding access control verification information outwards, and the access control device 11 switches to the open state after the access control verification information is legal.
Optionally, referring to fig. 3, the wireless headset 12 includes a wireless communication component, a sensor component, an identity information storage component, and an action processing component. The sensor component is used for receiving related data generated when a user operates the wireless earphone 12, such as data generated by clicking or double clicking the wireless earphone 12, and the identity information storage component is used for storing access control verification information, wherein the access control verification information comprises terminal identification information, access control keys of access control equipment, user account information for logging in a specified application program, wireless earphone identification information and the like. The action processing component is configured to perform analysis processing on data generated by the user operating the wireless headset 12, such as performing action processing on data of a single click operation or a double click operation, and determine whether the action corresponds to an access control opening operation. The wireless communication component is used for broadcasting the access control verification information outwards.
Optionally, the implementation environment further includes a terminal 13, and a designated application program is installed in the terminal 13, where the designated application program is used for managing intelligent devices such as an access control system. Alternatively, the terminal 13 triggers an access opening operation of opening the access control device by designating an application setting, such as clicking a control key of the wireless headset 12, double clicking a control key of the wireless headset 12, or long pressing a control key of the wireless headset 12, or the like.
Optionally, referring to fig. 2, the implementation environment further includes a wireless headset charging box 14, the wireless headset charging box 14 being configured to house the wireless headset 12 and to charge the wireless headset 12. The user can also set the door opening operation of the wireless headset charging case 14 to the door opening operation by designating an application program. When the wireless earphone 12 detects that the wireless earphone charging box 14 is switched from the closed state to the open state, the access control verification information is broadcasted outwards through the wireless earphone 12, and the access control device 11 is switched to the open state after the access control verification information is legal.
Fig. 4 is a flowchart of an access control method according to an embodiment of the present application. The method is applied to a wireless earphone, and comprises the following steps:
step 401, in response to an entrance guard opening operation, entrance guard verification information is obtained, wherein the entrance guard verification information is used for opening verification of entrance guard equipment.
When the wireless earphone receives and confirms the entrance guard opening operation, entrance guard verification information required by the entrance guard opening operation is obtained, the entrance guard verification information is used for entrance guard equipment to carry out opening verification, when the entrance guard equipment verifies that the entrance guard information meets entrance guard opening conditions, the entrance guard is switched from the closed state to the open state, and the entrance guard verification information can be an entrance guard key of the entrance guard equipment, a terminal identifier of a wireless earphone binding terminal and the like.
In one possible implementation, the wireless headset receives an access opening operation corresponding to the wireless headset, the access opening operation being set by default by the wireless headset or by user-defined settings. The process of setting the designated entrance guard opening operation will be explained in the following embodiments. Alternatively, the entrance guard opening operation may be one of a single click operation, a double click operation, and a long press operation.
In another possible implementation manner, the wireless earphone is accommodated in the wireless earphone charging box, and the wireless earphone charging box is in a closed state, and if the wireless earphone charging box is detected to be switched from the closed state to the open state, it is determined that an entrance guard opening operation is received. Through the mode, the opening of the charging box can be controlled by opening the charging box, and the operation is more convenient.
Optionally, in this implementation, before receiving the entrance guard opening instruction, if the wireless headset is received in the wireless headset charging box after the preset time period is detected, a subsequent step is performed. The preset time period is set according to actual requirements, and is exemplified by 5 seconds. If the wireless charging box is switched to the open state, the user may take out the wireless earphone, so as to detect whether the wireless earphone is taken out, and further judge the purpose of opening the wireless earphone charging box. By the mode, the situation that the access control equipment is opened under the condition that a user expects to take out the wireless earphone can be avoided, and false triggering is reduced.
Optionally, after the wireless earphone acquires the door opening operation, acquiring a distance between the wireless earphone and the door opening device, and executing a subsequent step of acquiring door opening verification information based on the door opening operation under the condition that the distance is smaller than a preset threshold. The preset threshold is set according to actual requirements. Through the mode, the user controls the access control equipment through the wireless earphone under the condition that the access control equipment is close to the user, and safety is improved.
Step 402, broadcasting access verification information through the wireless communication component, wherein the access device is used for switching from a closed state to an open state when the access verification information passes the open verification.
The wireless earphone is internally provided with a wireless communication component for broadcasting the access control verification information, the wireless communication component can be a Bluetooth component or an Ultra Wide Band (UWB) component, and the access control equipment and the wireless earphone are provided with the same wireless communication component for receiving the access control verification information broadcasted by the wireless earphone.
The entrance guard verification information is used for verifying whether the entrance guard equipment is allowed to be switched from the closed state to the open state. The access verification information may be an access key of the access device. Optionally, the access authentication information may further include terminal identification information, identification information of the wireless headset, user account information for logging into the specified application program, and so on.
In one possible implementation, the wireless headset stores access authentication information in advance, and reads information to be authenticated from the local after receiving an access opening operation. In another possible implementation manner, the wireless earphone may further determine that the access control verification information is acquired from the terminal after the access control opening operation.
Optionally, after the wireless earphone acquires the access control verification information, encryption processing is performed on the information to be verified. Optionally, after the wireless earphone acquires the access control verification information, desensitizing the information to be verified. The desensitization processing refers to deformation processing of sensitive data. Methods employed for the desensitization treatment include, but are not limited to: substitution, randomization, offset and rounding, masking, and the like, to which embodiments of the present application are not limited.
After the access control verification information is encrypted and desensitized by the wireless earphone, the access control verification information is broadcast outwards through the wireless communication assembly, and the access control equipment is used for verifying the access control verification information after the access control verification information is scanned, and is switched to an open state after the access control equipment passes the verification.
To sum up, the technical scheme that this application embodiment provided, after wireless earphone received and confirmed the entrance guard and opens the operation, obtain corresponding entrance guard and verify the information to broadcast this entrance guard through wireless communication subassembly and verify the information, be used for entrance guard's equipment to open after receiving entrance guard and verify the information and verify, the entrance guard's equipment of being convenient for opens the entrance guard after confirming through opening the verification.
After the access control equipment receives the access control verification information broadcast by the wireless earphone, the access control verification information is decoded and desensitized to obtain a corresponding access control key and a terminal identifier, so that the access control key and the terminal identifier are verified, and whether to open the access control is determined.
Fig. 5 is a flowchart of an access control method according to an embodiment of the present application. The method is applied to the access control equipment and comprises the following steps.
Step 501, receiving access control verification information broadcast by a wireless earphone through a wireless communication component, and acquiring and broadcasting the access control verification information when the wireless earphone receives an access control opening operation.
The access control equipment comprises a wireless communication component, the wireless communication component is used for receiving access control verification information broadcast by the wireless earphone, and the access control verification information comprises an access control key and a terminal identifier which are stored by the wireless earphone.
In one possible implementation, the access control device is always in an operating state, that is, the wireless communication component scans broadcast signals in real time, but the access control device triggers corresponding functions only when a user approaches, and if the access control device is always in the operating state, power consumption is increased.
In order to reduce the power consumption of the access control device, in one possible implementation manner, the access control device may be provided with an infrared sensor or an ultrasonic sensor, when a user enters into the detection range of the infrared sensor or the ultrasonic sensor, the access control device is awakened from a dormant state and scans broadcast signals through a wireless communication assembly, when the infrared sensor or the ultrasonic sensor does not detect an object within a preset time, the access control device automatically enters into the dormant state, so that the power consumption of the access control device is reduced, and the situation that when more broadcast signals exist around, the broadcast signals are frequently received, and the power consumption is increased can be avoided.
Step 502, performing open verification on access verification information.
After the access control equipment scans the access control verification information broadcast by the wireless earphone through the wireless communication assembly, the access control equipment further performs opening verification on the access control information.
Because the access control verification information broadcast by the wireless earphone is a data packet after encryption and desensitization processing from the safety aspect, the access control equipment needs to perform decoding and desensitization operation after receiving the access control verification information, and the decoding and desensitization protocol of the access control equipment is required to be consistent with the protocol used by the wireless earphone, otherwise, the access control verification information cannot be verified.
After the decoding and desensitization of the access verification information are finished, the access verification information can be verified, the verification content comprises an access key of the access device, or the access key and the terminal identification are verified, when the access device is opened and verified, the access device can acquire the access verification information from a local storage or a cloud server, and the verification process is to match the access verification information received by the access device and broadcasted by the wireless earphone with the actual access verification information stored by the access device.
Step 503, switching from the closed state to the open state in response to the entrance guard verification information passing the open verification.
When the access control verification information broadcast by the access control equipment to the wireless earphone is consistent with the actual access control verification information stored by the access control equipment, the access control equipment is determined to pass the opening verification, and then the access control equipment is switched from the closing state to the opening state.
To sum up, after receiving the entrance guard opening operation on the wireless earphone, the wireless earphone sends the entrance guard verification information to the entrance guard device for verification, and when the entrance guard device verifies the broadcasted entrance guard verification information, the entrance guard device is switched from the closed state to the open state. Compared with the prior art, the access control device is controlled through the appointed application program, the operation is more convenient, and the efficiency of opening the access control device can be improved.
It should be noted that, the entrance guard opening operation executed by the wireless earphone needs to be set in advance by the terminal device, so before the wireless earphone receives the entrance guard opening operation, the wireless earphone receives the target action sent by the terminal and used for triggering the entrance guard opening operation, and the target action is the operation of opening the entrance guard device set by the terminal which is connected with the wireless earphone in a pairing way. The target action may be, for example, a click operation, a double click operation, a long press operation, etc. on the wireless earphone, and may be, for example, an operation by opening the wireless earphone box.
Fig. 6 is a flowchart of an access control method according to an embodiment of the present application. The method is applied to the wireless earphone and comprises the following steps.
In step 601, in the use state, motion recognition is performed based on sensor data acquired by the sensor.
The wireless earphone is internally provided with various sensors, such as a pressure sensor, an acceleration sensor and the like, corresponding sensor data are acquired by the wireless earphone through the built-in sensors, and the sensor data are data generated when a user performs related operation actions on the wireless earphone. For example, the pressure sensor is used for collecting data of pressing operation of a user on the wireless earphone, and the acceleration sensor is used for collecting data of double-click or multiple continuous clicking actions of the user on the keys. Optionally, the wireless earphone may further include a touch sensor, for detecting a touch operation of the user on the touch area.
The wireless earphone receives corresponding sensor data in real time through the built-in sensor and analyzes the data, and specific operation actions of a user corresponding to the sensor data on the wireless earphone are identified.
In response to identifying the target action, determining that the door access opening operation is received, the target action including at least one of a tap action, a press action, and a touch action 602.
When the wireless earphone identifies a corresponding target action according to the sensor data and the target action corresponds to a target action of opening the access control equipment set by the wireless earphone, the access control opening operation is determined to be received, and the target action can be set by a user or a default set action of a system, such as at least one of a knocking action, a pressing action and a touch action of the wireless earphone.
In one possible implementation manner, in order to avoid that the target action corresponding to the access opening operation collides with the common key of the wireless earphone, the target action of the wireless earphone can be set by a specified application program, for example, a double-click operation or three continuous click operations of the wireless earphone are set as the access opening operation, so that the wireless earphone can determine the access opening operation, and not switch songs.
Step 603, obtaining a locally stored access control key and a first terminal identifier, wherein the first terminal identifier is a terminal identifier of a first terminal used when the wireless earphone sets an access control opening function.
After the wireless earphone determines that the access control opening operation is received, an access control key for opening the access control equipment and a first terminal identifier are also required to be obtained from the local storage, and the access control key is a password corresponding to the access control equipment. But in order to improve entrance guard's security under the general condition, when opening entrance guard's equipment, can verify access control key and first terminal identification simultaneously, avoid appearing the security problem under the condition that access control key revealed. The first terminal identifier is a terminal identifier of the first terminal used when the wireless earphone sets the entrance guard opening function, and the terminal identifier can be a media access control bit (Media Access Control, MAC) address of the first terminal, or a universal unique identification code (Universally Unique Identifier, UUID) of the first terminal, or a bluetooth address of the first terminal.
It should be noted that, the wireless earphone establishes a data communication connection with the first terminal before determining the target action, and receives, through the data communication connection, the access control key, the first terminal identifier and the access control opening mode sent by the first terminal, where the access control opening mode includes target information corresponding to the target action.
As shown in fig. 7, after the first terminal 71 establishes a data communication connection with the wireless headset 72, the access control system application program is logged in, and corresponding parameter information is set in the corresponding access control setting interface. The target information of opening the door may be a single click operation, a double click operation, a long press operation, or the like to the wireless headset 72. Such as the user setting the target information 710 corresponding to the target action as "double-click wireless headset". And inputs key information of the corresponding access device through the access key input block 711.
After the user selects the target action and inputs the corresponding access key, the first terminal 71 sends the set parameter information including the access key, the first terminal identifier, the access opening mode information, and the like through the data communication connection established with the wireless headset 72.
In one possible implementation manner, the first terminal establishes a data communication connection with the wireless earphone through bluetooth, and the first terminal can send corresponding parameter information to the wireless earphone through an SPP (Serial Port Profile, SPP) private protocol, so as to ensure the security of data transmission.
Step 604, determining the access control key and the first terminal identifier as access control verification information, wherein the access control device is used for performing key verification according to the access control key and performing terminal verification according to the first terminal identifier.
And after the wireless earphone acquires the access control key and the first terminal identifier from the local storage, determining the corresponding access control key and the first terminal identifier as access control verification information for opening the access control equipment. The access control equipment is used for carrying out key verification on the access control key and carrying out terminal verification according to the first terminal identifier. The access control equipment can be a user home door lock, and when the access control equipment determines that the access control key is correct and the first terminal identification indicates the first terminal corresponding to the user, the access control equipment is started.
Step 605, broadcasting a data packet through the wireless communication component, wherein the data packet contains an earphone identifier of the wireless earphone and access control verification information, the access control verification information is encrypted, and the access control equipment is used for identifying the data packet broadcast by the wireless earphone based on the earphone identifier and decrypting the access control verification information in the data packet.
After the wireless earphone confirms the access control verification information, the access control information needs to be broadcasted to the access control equipment through the wireless communication assembly. Because the wireless earphone adopts the broadcasting mode, when the receiving equipment and the wireless earphone adopt the same transmission protocol, access control verification information can be received, and in order to improve the broadcasting safety, encryption and desensitization processing are further required to be carried out on the access control verification information before the access control verification information is broadcasted, and the data packet is broadcasted through the wireless communication assembly.
When the wireless earphone and the corresponding access control equipment adopt the same encryption protocol and the same desensitization protocol, the data packet cannot be decrypted when the equipment receiving the broadcast data packet and the wireless earphone adopt different encryption protocols or desensitization protocols, so that the safety of data transmission is further improved.
In one possible implementation manner, the wireless communication component for broadcasting the data packet may be a bluetooth component, and when the user needs to open the access control, the wireless earphone performs clicking or double clicking operations and the like on the wireless earphone, and the wireless earphone broadcasts the data packet into the bluetooth coverage area through the bluetooth component, so that the access control device can timely scan the broadcasted data packet. The following description will be made with respect to broadcasting data packets through the bluetooth module and UWB module, respectively.
1. The access verification information is broadcast through the Bluetooth module, so that the access verification information is received by the access device through the Bluetooth module, and the distance between the access verification information and the wireless earphone is determined.
When the wireless earphone broadcasts access verification information through the Bluetooth module, the Bluetooth module broadcasts the encrypted and desensitized broadcast data packet to the periphery according to the signal emission intensity, and when the access control equipment is in the broadcast coverage range and scans a broadcast signal, the corresponding data packet is obtained and decrypted.
2. The access verification information is broadcast through the UWB component, so that the access verification information is received by the access device through the UWB component, and the distance and the spatial position relation between the access verification information and the wireless earphone are determined.
In one possible application scenario, when a user mistakenly triggers the wireless headset at home, the access control device will also be opened when the wireless headset is closer to the access control device due to the omni-directional broadcast adopted by the bluetooth module. In order to enable the access control equipment to accurately identify the specific position of the wireless earphone, the safety is improved, the receiving direction of the UWB component in the access control equipment can be changed, and optionally, the receiving direction of the built-in UWB component of the access control equipment is set to be consistent with the opening direction of the access control equipment. Thereby avoiding the false opening of access control equipment and improving the safety of opening the access control.
In summary, the wireless earphone identifies the actions of the user through the sensor data collected by the sensor, so that when the target actions are identified, the access control opening operation is determined to be received, then the access control key and the first terminal identifier of the access control opening device are obtained from the local storage, and then the corresponding access control key and the first terminal identifier are determined to be access control verification information, and broadcast is performed through the wireless communication assembly.
In addition, through carrying out encryption and desensitization processing with entrance guard verification information, ensure the security at the radio communication subassembly at the broadcast data package, when radio earphone broadcast data package, broadcast through bluetooth subassembly or UWB subassembly, the entrance guard's equipment of being convenient for confirms radio earphone's distance information or space position information to open the entrance guard according to distance information or space position information, improve the security of opening the entrance guard.
In a possible implementation manner, when the user does not wear the wireless earphone, that is, the wireless earphone is in the box-in state, in order to conveniently open the access control device, the opening can take the action of opening the wireless earphone box as the access control opening operation, that is, the function of opening the cover and unlocking is realized.
Fig. 8 is a flowchart of an access control method according to an embodiment of the present application. The method is applied to the wireless earphone and comprises the following steps.
Step 801, in the case in state, in response to identifying that the earphone box is switched from the cover closing state to the cover opening state, it is determined that an entrance guard opening operation is received.
When the user needs to open the access control device and does not wear the wireless earphone, the user can open the cover of the earphone box, the wireless earphone is positioned in the earphone box, and when the wireless earphone is connected with the wireless earphone and recognizes that the earphone box is switched from the cover closing state to the cover opening state, the access control opening operation is determined to be received.
Schematically, as shown in fig. 9, a micro switch 903 is disposed at the bottom of the wireless earphone 901, when the wireless earphone 901 is put into the earphone box 902, the micro switch 903 is tapped, the micro switch 903 is turned on, a trigger signal 904 is generated, and the earphone box 902 receives the trigger signal, that is, it is determined that the wireless earphone 901 is in the in-box state. When the user performs the uncapping operation, the wireless earphone 901 moves upwards, the micro switch 903 is in an off state, at this time, the trigger signal 904 is interrupted, the earphone box 902 sends an operation signal of the uncapping operation to the wireless earphone 901 through the serial port, and after the wireless earphone 901 receives the trigger signal, it is determined that the access control opening operation is received.
Step 802, obtaining a locally stored access control key and a first terminal identifier, wherein the first terminal identifier is a terminal identifier of a first terminal used when the wireless earphone sets an access control opening function.
And after the wireless earphone determines the door access opening operation, acquiring a locally stored door access key and a first terminal identifier. The access control key, the access control opening mode and the first terminal identification stored by the wireless earphone are obtained through data communication connection established with the first terminal.
Schematically, as shown in fig. 10, after the first terminal 101 establishes a data communication connection with the wireless earphone 102, the access control system application program is logged in, and corresponding parameter information is set in the corresponding access control setting interface. If the user sets the door access opening mode information 1010 to "open the wireless headset charging box". And inputs key information of the corresponding access control device through the access control key input box 1020.
After the user selects the target action and inputs the corresponding access key, the first terminal 101 sends the set parameter information including the access key, the first terminal identifier, the access opening mode information, and the like through the data communication connection established with the wireless earphone 102.
Step 803, determining the access control key and the first terminal identifier as access control verification information, wherein the access control device is used for performing key verification according to the access control key and performing terminal verification according to the first terminal identifier.
The implementation of this step may refer to step 604, and this embodiment is not described herein.
Step 804, broadcasting a data packet through the wireless communication component, wherein the data packet contains an earphone identifier of the wireless earphone and access control verification information, the access control verification information is encrypted, and the access control equipment is used for identifying the data packet broadcast by the wireless earphone based on the earphone identifier and decrypting the access control verification information in the data packet.
The implementation of this step may refer to step 605, and this embodiment is not described herein.
In this embodiment of the application, when wireless earphone is in into the box state, through the operation of uncapping to earphone box execution, trigger earphone box and send the operating signal of uncapping to wireless earphone, be convenient for wireless earphone confirm receive the access control open operation, and then trigger wireless earphone broadcast entrance guard verification information, realize uncapping unblock function. Compared with the related art, the access control device is controlled through the appointed application program, so that the operation is more convenient, and the efficiency of opening the access control device can be improved.
In another possible implementation manner, when the wireless earphone of the user is lost or the wireless earphone is transferred to other people for use, in order to avoid that the other people opens the access control device by performing touch operation or cover opening operation on the wireless earphone, before the wireless earphone broadcasts the access control verification information, a second terminal identifier of a second terminal connected with the wireless earphone is acquired, the second terminal identifier is sent to the access control device, and the access control device is matched with the first terminal identifier stored in the local storage or the cloud server through the received second terminal identifier to determine the true identity of the user.
Fig. 11 is a flowchart of an access control method according to an embodiment of the present application. The method is applied to the wireless earphone and comprises the following steps.
Step 1101, in the use state, performing action recognition based on the sensor data acquired by the sensor.
The implementation of this step may refer to step 601, and this embodiment is not described herein.
In step 1102, in response to identifying the target action, it is determined that the door access opening operation is received, the target action including at least one of a tap action, a press action, and a touch action.
The implementation of this step may refer to step 602, and this embodiment is not described herein.
Step 1103, obtaining a locally stored access key.
In order to avoid the safety problem caused by the loss of the wireless earphone, when a user logs in an access control system application program to set an access control key and an access control opening mode, a first terminal identifier of a first terminal used by the user is bound with the access control key, for example, the MAC address of the first terminal is bound with the access control key, and the access control key is stored in a cloud server, so that access control equipment can verify the key conveniently.
When the wireless earphone determines that the access control opening operation is identified, an access control key is acquired from the local storage, and the access control key is sent to the wireless earphone and stored when the user establishes wireless data communication connection.
Step 1104, obtaining a second terminal identifier of the second terminal currently connected.
In order to avoid that the wireless earphone directly sends the access control key to the access control equipment to open the access control after determining the access control opening operation, the wireless earphone performs data interaction with the second terminal establishing data communication connection again before sending the access control key, and a second terminal identifier of the current second terminal is obtained, wherein the second terminal identifier can be an MAC address or a Bluetooth address of the second terminal. When the second terminal is not the first terminal used by the user, the wireless headset is indicated to be used by the user.
And step 1105, determining the access control key and the second terminal identifier as access control verification information, wherein the access control equipment is used for carrying out key verification according to the access control key and carrying out terminal verification according to the second terminal identifier.
And after the wireless earphone acquires the second terminal identifier of the current second terminal, determining the second terminal identifier and the access control key as access control verification information, and acquiring the access control key and the terminal identifier through local storage or access to a cloud server after the second terminal identifier is conveniently transmitted to the access control equipment.
Step 1106, broadcasting a data packet through the wireless communication component, wherein the data packet contains an earphone identifier of the wireless earphone and access control verification information, the access control verification information is encrypted, and the access control equipment is used for identifying the data packet broadcast by the wireless earphone based on the earphone identifier and decrypting the access control verification information in the data packet.
After the access authentication information is encrypted and desensitized by the wireless earphone, the data packet is broadcasted through the wireless communication component, and the embodiment of this step may refer to step 605, which is not described herein.
It should be noted that, after the access control equipment obtains the access control verification information, the access control equipment also obtains the access control verification information actually stored in the access control system by accessing the cloud server. Because the cloud server stores the first terminal identification corresponding to the first terminal by the user and the bound access control key, when the second terminal identification received by the access control equipment through broadcasting is not matched with the first terminal identification, the switch state of the access control equipment is not switched.
In this embodiment of the application, in order to avoid non-user oneself to open entrance guard's equipment through wireless earphone, confirm to open entrance guard's equipment operation at wireless earphone back, through obtaining the second terminal identification of the second terminal of connecting wireless earphone once more, and regard second terminal identification and the entrance guard's secret key of local storage as entrance guard's verification information, the entrance guard's equipment of being convenient for is based on the entrance guard's verification information that obtains and the entrance guard's verification information that local storage or high in the clouds server kept and match, avoid non-user oneself to open entrance guard's equipment, the security of opening entrance guard's equipment has been improved.
After the access control equipment receives the access control verification information broadcast by the wireless earphone, the access control verification information is decoded and desensitized to obtain a corresponding access control key and a terminal identifier, so that the access control key and the terminal identifier are verified, and whether to open the access control is determined.
Fig. 12 is a flowchart of an access control method according to an embodiment of the present application. The method is applied to the access control equipment and comprises the following steps.
Step 1201, receiving, by the wireless communication component, the access control verification information broadcasted by the wireless headset, where the access control verification information is obtained and broadcasted when the wireless headset receives the access control opening operation.
In one possible implementation manner, the access control device may include a plurality of wireless communication components, such as a bluetooth module and a UWB module, where when the bluetooth module is built in the access control device and the bluetooth module receives a broadcast signal of the wireless earphone, the corresponding access control device receives the broadcast access control verification information through the bluetooth module. When the UWB component is arranged in the access control equipment and the wireless earphone broadcasting signal is received through the UWB component, the corresponding access control equipment receives the broadcasting access control verification information through the UWB component.
Step 1202, acquiring an access control key and a terminal identifier contained in the access control verification information, wherein the terminal identifier is a first terminal identifier or a second terminal identifier, the first terminal identifier is a terminal identifier of a first terminal used when an access control opening function is set for the wireless earphone, and the second terminal identifier is a terminal identifier of a second terminal currently connected with the wireless earphone.
After the access control equipment receives the access control verification information broadcast by the wireless earphone through the wireless communication component, the distance relation or the spatial position relation between the access control equipment and the wireless earphone is further determined. After the distance relation or the spatial position relation is met, further decrypting and verifying the data packet broadcast by the wireless earphone.
When entrance guard equipment receives the entrance guard verification information that wireless earphone broadcast through bluetooth module, because bluetooth module's effective broadcasting range is wider, can reach 5 meters or more scope, the user can be in the remote circumstances of entrance guard equipment and the mistake triggers wireless earphone and open the entrance guard, consequently in order to avoid the user not to arrive entrance guard equipment and just open the entrance guard, still need set for the effective distance that entrance guard equipment was opened, if set for wireless earphone trigger corresponding operation in 3 meters and open the entrance guard.
In order to determine the distance between the wireless headset and the access device, in one possible implementation, the distance may be determined based on the strength with which the access device receives the broadcast signal, where the strength with which the access device receives the broadcast signal is inversely proportional to the distance, i.e. the further the wireless headset is from the access device, the weaker the received broadcast signal, and vice versa. Therefore, the distance to the wireless earphone can be calculated by a signal strength and distance conversion formula. When the access control equipment detects that the distance between the access control equipment and the wireless earphone is smaller than the distance threshold, the access control information is started and verified, if the threshold is set to be 3 meters, and the access control equipment detects that the distance between the access control equipment and the wireless earphone is 2 meters, namely the distance is smaller than the distance threshold, and at the moment, the access control information can be started and verified.
Under a possible application scenario, because bluetooth module broadcasts access control verification information through the mode of omnidirectional broadcast, when the user has opened the access control and gets into in the room, if the wireless earphone is triggered by mistake this moment, and the distance is less than bluetooth module's distance threshold value, access control equipment at this moment also can open the access control again based on access control verification information. In order to reduce the false triggering probability of the access control, the spatial position of the wireless earphone can be determined through the UWB component, and the access control verification information is received based on the specific spatial position relation of the wireless earphone.
When the access control equipment receives access control verification information broadcast by the wireless earphone through the UWB component, a plurality of receiving modules of the UWB component can be arranged in the access control equipment, the distance and the angle between the receiving modules are adjusted, when the space position of the wireless earphone needs to be confirmed, the positioning function is started, and the relative position of the wireless earphone is calculated according to the time difference of the receiving signals received by the receiving modules and the receiving angles of the receiving modules. And indicating that the wireless earphone is positioned in the target azimuth of the access control equipment by setting a distance threshold and a spatial position relation, and opening and verifying the access control verification information when the received broadcast meets the spatial position relation.
In one possible implementation, the target azimuth of the wireless earphone may be set to be in the outdoor 3-meter range, that is, the access control device may perform opening verification on the access verification information only when the wireless earphone is triggered by the user from the outside of the door and the distance from the access control device is less than 3 meters.
It should be noted that, the wireless earphone carries out the data package that broadcasts through wireless communication subassembly, and the data package is the data of encryption and desensitization, if other terminal equipment is continuous broadcasting data in entrance guard's peripheral, in order to avoid entrance guard's equipment to frequently decrypt this invalid broadcasting data, can add the earphone sign in the data package, this earphone sign can be wireless earphone's UUID, this earphone sign is the identification information that does not pass through, can directly read according to the data package and obtain for entrance guard's equipment quick identification broadcast data package's specific equipment. When the access control device determines that the data packet is broadcast by the earphone, namely, the broadcast data is decrypted, and when the identification information cannot be obtained from the data packet or is broadcast by the mobile phone device or other non-earphone devices, the broadcasted data packet is not decrypted, so that the power consumption of the access control device is further reduced.
After the access control device determines that the wireless earphone meets the distance relation or the spatial position relation, decrypting the received data packet, and obtaining an access control key and a terminal identifier contained in the access control verification information after the decryption is completed, wherein the terminal identifier can be a first terminal identifier or a second terminal identifier, the first terminal identifier is a terminal identifier of a first terminal used when an access control opening function is set for the wireless earphone, and the second terminal identifier is a terminal identifier of a second terminal currently connected with the wireless earphone.
Step 1203, performing key verification based on the access key, and performing terminal verification based on the terminal identifier.
After the access control equipment acquires the access control key and the terminal identifier contained in the access control verification information, acquiring actual access control verification information capable of opening the access control equipment from local storage or from a cloud server, wherein the actual access control verification information comprises a first terminal identifier and an access control key which are set by a user, and the verification process of the access control verification information comprises key verification of the access control key and terminal verification of the terminal identifier.
Optionally, the actual access control verification information stored by the cloud server is verification information set by the user through logging in an access control system application program, and when the user updates the first terminal identifier and the access control key, the server automatically issues the updated first terminal identifier and the updated access control key to a local storage of the access control equipment for storage.
Optionally, in order to ensure the security of the access control device, the access control device can be further set to acquire from the cloud server when key verification is executed each time, and the actual access control verification information is deleted after the verification is finished, so that information leakage is avoided.
In step 1204, in response to the access key passing the key verification, and the terminal identification passing the terminal verification, switching from the closed state to the open state.
When the access control key acquired by the access control equipment is matched with the access control key acquired from the cloud server, the terminal identifier is also indicated as the first terminal identifier, the access control verification information is determined to meet the access control opening condition, and the access control equipment is switched from the closed state to the open state.
In the embodiment of the application, when the broadcasting signal scanned by the access control equipment through the wireless communication assembly indicates that the distance condition is met or the space position condition is met, the received access control information is determined to be opened and verified, decryption processing is further carried out on the access control verification information, and the corresponding terminal identification and access control key are obtained. The access control device is convenient to verify the terminal identification and the access control key, and the access control device is started when the access control key passes the key verification and the terminal identification passes the terminal verification.
In the above embodiment, the binding mode between the access control key and the first terminal identifier is only applicable to a wireless earphone of one user, and when the access control device is a home door lock and the corresponding home contains a plurality of home members, a white list needs to be set at this time, and other home members are added into the white list.
Fig. 13 is a flowchart of an access control method according to an embodiment of the present application. The method is applied to the access control equipment and comprises the following steps.
Step 1301, receiving, by the wireless communication component, the access control verification information broadcasted by the wireless headset, where the access control verification information is obtained and broadcasted when the wireless headset receives an access control opening operation.
The implementation of this step may refer to step 1201, and this embodiment is not described herein.
Step 1302, obtaining an access key and a terminal identifier contained in the access verification information, where the terminal identifier is a first terminal identifier or a second terminal identifier, the first terminal identifier is a terminal identifier of a first terminal used when an access opening function is set for the wireless headset, and the second terminal identifier is a terminal identifier of a second terminal currently connected to the wireless headset.
Reference may be made to step 1202 for implementation of this step, and this embodiment is not described here in detail.
Step 1303, a terminal white list is obtained, and a terminal included in the terminal white list has an opening authority of the access control device.
When the access control equipment corresponds to a family and comprises a plurality of family members, an access control system application program can be logged in, a plurality of terminal whitelists are set, and the terminal whitelists comprise opening authorities of the terminal based on opening the access control equipment.
Illustratively, the terminal whitelist is shown in table 1.
TABLE 1
Terminal MAC address Entrance guard key
Terminal 1 00-16-EA-AE-3C-40 74021259
Terminal 2 44-45-53-54-00-00 74021259
Terminal 3 04-17-CB-AL-00-YC 74021259
Terminal 4 19-17-44-3C-94-61 74021259
In step 1304, in response to the terminal identification belonging to the terminal whitelist, it is determined that the terminal identification passes the terminal verification.
As can be seen from table 1, the terminal whitelist includes 4 terminals, and different terminals all correspond to the same access control key, when each member of different families needs to open access control equipment through respective wireless headphones, the access control equipment will match with the cloud server or the local storage for the stored terminal whitelist based on the acquired access control verification information, and when the corresponding terminal is matched, it is determined that the terminal identifier passes the terminal verification.
It should be noted that, when the user needs to improve the security of the access control device, the identification information of the wireless earphone, such as the bluetooth address of the wireless earphone, may be bound in the white list of the terminal.
In step 1305, in response to the terminal identification not belonging to the terminal whitelist, it is determined that the terminal identification fails the terminal verification.
When the access control verification information acquired by the access control equipment is not matched with the terminal white list, the wireless earphone broadcasting the access control verification information does not have the opening authority of the access control equipment, if the acquired terminal identifier is 11-11-42-3F-94-66, the wireless earphone is determined to not have the opening authority of the access control through traversing the terminal white list and not matched with the corresponding terminal identifier.
Step 1306, switching from the closed state to the open state in response to the entrance guard key passing the key verification and the terminal identification passing the terminal verification.
When the access control key passes the key verification and the terminal identification passes the terminal verification, the access control verification information is indicated to be broadcasted by family members through the wireless earphone, and the access control equipment is switched from the closed state to the open state.
In this embodiment of the application, through the mode that sets up the terminal white list, when entrance guard's equipment scans entrance guard's verification information, through carry out terminal verification and entrance guard's key verification with the terminal white list, judge that wireless earphone possesses the entrance guard and open the authority, can ensure to realize the control to entrance guard's equipment under a plurality of family members's the condition through the mode that sets up the terminal white list, when guaranteeing the security promptly, have the opening efficiency that can improve entrance guard's equipment.
Fig. 14 is a flowchart of setting an entrance guard opening operation by a wireless headset through a terminal and broadcasting entrance guard verification information according to a user operation, and the method includes the following steps.
Step 1401, establishing a data communication connection with a terminal.
Step 1402, set up the entrance guard and open the operation.
The user sets an access control opening operation, such as at least one of a single click operation, a double click operation and a long press operation, of the wireless earphone through the terminal. In addition, the terminal can also send the set access control verification information to the wireless earphone through the established data communication connection.
Step 1403, the user operates the wireless headset.
When the user needs to open the access control device, related operations such as a single click operation, a double click operation, a long press operation and the like are performed on the wireless earphone.
Step 1404, identify whether the user operation is an access control opening operation.
The wireless headset recognizes a user operation through sensor data collected by the sensor device, performs step 1405 when recognizing that the user operation is an entrance guard opening operation set through the terminal, and performs step 1403 when recognizing that the user operation is not an entrance guard opening operation set through the terminal.
In step 1405, access verification information is read.
And when the access control operation is determined, access control verification information is acquired from the local storage, wherein the access control verification information comprises a first terminal identifier and an access control key.
In step 1406, a cryptographic desensitization process is performed.
After the wireless earphone determines the access control verification information, encryption and desensitization processing are carried out on the access control verification information, so that the safety of data transmission is improved.
And 1407, broadcasting the encrypted and desensitized access control verification information.
Fig. 15 is a flowchart of setting an access control opening box operation by a wireless earphone through a terminal, and broadcasting access control verification information according to user operation, and the method comprises the following steps.
Step 1501, a data communication connection is established with a terminal.
In step 1502, an uncapping operation is set.
And under the condition that the wireless earphone is put into a box state, the operation of opening the charging bin of the wireless earphone is an entrance guard opening operation.
In step 1503, the wireless headset is docked.
At step 1504, the user opens the earphone box.
Step 1505, it is determined whether or not it is an uncovering operation.
Step 1506 is executed when the wireless headset determines that the user operation is a headset lid opening operation, and step 1504 is executed when the wireless headset determines that the user operation is not a headset lid opening operation.
Step 1506, access authentication information is read.
In step 1507, the encryption desensitization process.
Step 1508, broadcasting the encrypted desensitized access authentication information.
Fig. 16 is a flowchart of the access control device scanning a broadcast signal and performing authority verification on the acquired access control verification information, and the method includes the following steps.
Step 1601, a broadcast signal is scanned.
In step 1602, a determination is made as to whether the distance/spatial location is within a target range.
After the access control device scans the broadcast signal through the wireless communication component, when the wireless communication component is a Bluetooth component, judging the distance of the wireless earphone according to the signal intensity of the broadcast signal received by the wireless Bluetooth component, when the distance of the wireless earphone is smaller than a distance threshold value, determining that the wireless earphone is in a target range, executing step 1603, otherwise executing step 1604;
when the wireless communication component is a UWB component, it is determined whether the spatial location information of the wireless headset is in the target azimuth and within the preset distance range, and when it is determined that the wireless headset is in the target range and within the distance range, step 1603 is performed, otherwise step 1604 is performed.
Step 1603, no data packet is received.
When the wireless earphone is determined not to be in the target range, the corresponding broadcast data packet is not received.
Step 1604, decrypting the access verification information.
And when the wireless earphone is determined to be in the target range, receiving the corresponding broadcast data packet, and decrypting the encrypted access control verification information.
Step 1605, opening verification to the access verification information.
Step 1606, determine if access rights are owned.
The access control equipment performs authority verification on the acquired access control verification information, wherein the authority verification comprises terminal verification on a terminal identifier and key verification on an access control key.
When it is determined that the entrance guard verification information does not have the entrance guard opening right, step 1607 is executed, and when it is determined that the entrance guard verification information has the entrance guard opening right, step 1608 is executed.
Step 1607, display no rights.
And when the access control verification information is judged to not have the access control opening right, displaying no right or carrying out voice prompt.
Step 1608, opening the access control device.
And when the access control verification information is judged to have the access control opening right, opening the access control equipment.
Fig. 17 is a flowchart of an access control method according to an embodiment of the present application. The method is applied to the embodiment of fig. 1, and comprises the following steps:
step 1701, performing action recognition based on sensor data acquired by the sensor.
In step 1702, a target action is identified, and it is determined that an access opening operation is received.
Step 1703, obtaining a locally stored access control key and a first terminal identifier.
And step 1704, determining the access control key and the first terminal identifier as access control verification information.
Step 1705, the data packet is broadcast by the wireless communication component.
Step 1706, receiving, by the wireless communication component, the access control verification information broadcast by the wireless headset.
Step 1707, obtain the entrance guard key and terminal identification contained in the entrance guard verification information.
Step 1708, performing key verification based on the access key, and performing terminal verification based on the terminal identifier.
Step 1709, in response to the access key passing the key verification and the terminal identification passing the terminal verification, switching from the closed state to the open state.
To sum up, after the wireless earphone receives and confirms the entrance guard opening operation, the wireless earphone broadcasts the acquired entrance guard verification information through the wireless communication assembly, so that the entrance guard equipment can receive the entrance guard verification information through the wireless communication assembly. Further, the entrance guard equipment performs opening verification on the received entrance guard verification information, so that after the entrance guard verification information passes the opening verification, the entrance guard equipment is switched from a closed state to an open state. Compared with the mode of controlling the access control equipment by using the terminal in the related art, the access control equipment is opened by operating the wireless earphone, so that the operation steps are simplified, and the efficiency of opening the access control equipment can be improved.
Referring to fig. 18, there is shown an access control device provided in an embodiment of the present application, applied to a wireless earphone, the device includes:
the information acquisition module 1801 is configured to respond to an access control opening operation, and acquire access control verification information, where the access control verification information is used for an access control device to perform opening verification;
the information broadcasting module 1802 is configured to broadcast the access control verification information through the wireless communication component, where the access control device is configured to switch from a closed state to an open state when the access control verification information passes the open verification.
Optionally, the apparatus further includes:
the data acquisition module is used for performing action recognition based on the sensor data acquired by the sensor in the use state;
and the target action determining module is used for determining that the access control opening operation is received in response to the identification of the target action, wherein the target action comprises at least one of a knocking action, a pressing action and a touch action.
Optionally, the information obtaining module 1801 further includes:
the first acquisition unit is used for acquiring a locally stored access control key and a first terminal identifier, wherein the first terminal identifier is a terminal identifier of a first terminal used when the wireless earphone is provided with an access control opening function;
The first determining unit is used for determining the access control key and the first terminal identifier as the access control verification information, and the access control equipment is used for carrying out key verification according to the access control key and carrying out terminal verification according to the first terminal identifier;
optionally, the apparatus further includes:
the first receiving module is used for receiving the access control key, the first terminal identifier and the access control opening mode information sent by the first terminal through data communication connection with the first terminal, and the access control opening mode information comprises the action information of the target action.
Optionally, the information obtaining module 1801 further includes:
the second acquisition unit is used for acquiring the locally stored access control key;
a third obtaining unit, configured to obtain a second terminal identifier currently connected to the second terminal;
the second determining unit is used for determining the access control key and the second terminal identifier as the access control verification information, and the access control equipment is used for carrying out key verification according to the access control key and carrying out terminal verification according to the second terminal identifier;
optionally, the apparatus further includes:
the second receiving module is used for receiving the access control key and the access control opening mode information sent by the first terminal through data communication connection with the first terminal, the first terminal is used for setting an access control opening function by the wireless earphone, and the access control opening mode information comprises action information of the target action.
Optionally, the apparatus further includes:
and the first determining module is used for determining that the access control opening operation is received in response to the fact that the earphone box is identified to be switched from the cover closing state to the cover opening state under the box entering state.
Optionally, the information obtaining module 1801 further includes:
a fourth obtaining unit, configured to obtain a locally stored access control key and a first terminal identifier, where the first terminal identifier is a terminal identifier of a first terminal used when the wireless headset sets an access control opening function;
the third determining unit is used for determining the access control key and the first terminal identifier as the access control verification information, and the access control equipment is used for performing key verification according to the access control key and terminal verification according to the first terminal identifier;
optionally, the apparatus further includes:
the third receiving module is used for receiving the access control key, the first terminal identifier and the access control opening mode information sent by the first terminal through data communication connection with the first terminal, and the access control opening mode information indicates that the access control opening mode information is switched from a cover closing state to a cover opening state.
Optionally, the information broadcasting module 1802 is configured to broadcast a data packet through the wireless communication module, where the data packet includes an earphone identifier of the wireless earphone and the access control verification information, and the access control verification information is encrypted, and the access control device is configured to identify the data packet broadcast by the wireless earphone based on the earphone identifier, and decrypt the access control verification information in the data packet.
Optionally, the information broadcasting module 1802 includes:
the first broadcasting unit is used for broadcasting the access control verification information through the Bluetooth assembly, so that the access control equipment receives the access control verification information through the Bluetooth assembly and determines the distance between the access control equipment and the wireless earphone;
or alternatively, the first and second heat exchangers may be,
and the second broadcasting unit is used for broadcasting the access control verification information through the UWB component, so that the access control equipment receives the access control verification information through the UWB component and determines the distance and the spatial position relation between the access control equipment and the wireless earphone.
Referring to fig. 19, there is shown an access control device provided in an embodiment of the present application, applied to an access control apparatus, the device includes:
the information receiving module 1901 is used for receiving access control verification information broadcast by the wireless earphone through the wireless communication component, wherein the access control verification information is acquired and broadcast when the wireless earphone receives an access control opening operation;
the information verification module 1902 is configured to perform open verification on the access control verification information;
and a control module 1903, configured to switch from the closed state to the open state in response to the entrance guard verification information passing the open verification.
Optionally, the information verification module 1902 includes:
A fifth obtaining unit, configured to obtain an access key and a terminal identifier included in the access verification information, where the terminal identifier is a first terminal identifier or a second terminal identifier, the first terminal identifier is a terminal identifier of a first terminal used when an access opening function is set for the wireless headset, and the second terminal identifier is a terminal identifier of a second terminal currently connected to the wireless headset;
the first verification unit is used for carrying out key verification based on the access control key and carrying out terminal verification based on the terminal identifier;
optionally, the control module 1903 includes:
and the control unit is used for responding to the access control key to pass the key verification, and the terminal identification passes the terminal verification and is switched from the closed state to the open state.
Optionally, the first verification unit is further configured to:
acquiring a terminal white list, wherein a terminal contained in the terminal white list has the opening authority of the access control equipment;
responding to the terminal identifier belonging to the terminal white list, and determining that the terminal identifier passes terminal verification;
and determining that the terminal identification does not pass the terminal verification according to the fact that the terminal identification does not belong to the terminal white list.
Optionally, the information receiving module 1901 includes:
the first receiving unit is used for receiving the access control verification information broadcast by the wireless earphone through the Bluetooth module;
optionally, the first verification unit is further configured to:
determining a distance from the wireless headset based on the signal reception intensity of the Bluetooth module;
and responding to the distance being smaller than a distance threshold value, and carrying out opening verification on the access verification information.
Optionally, the information receiving module 1901 further includes:
the second receiving unit is used for receiving the access control verification information broadcasted by the wireless earphone through the UWB component;
optionally, the first verification unit is further configured to:
determining a distance and spatial position relationship between the wireless earphone and the wireless receiver based on the receiving condition of the UWB component;
and responding to the fact that the distance is smaller than a distance threshold value, and the spatial position relation indicates that the wireless earphone is located in a target azimuth of the access control equipment, and opening verification is conducted on the access control verification information.
Optionally, the information receiving module 1901 further includes:
a third receiving unit for receiving the broadcasted data packet through the wireless communication component;
And the decryption unit is used for responding to the data packet containing the earphone identifier and performing decryption processing on the access control verification information in the data packet.
Fig. 20 is a block diagram illustrating a wireless headset according to an exemplary embodiment of the present application. A wireless headset in the present application may include one or more of the following components: a processor 2010 and a memory 2020.
Processor 2010 may include one or more processing cores such as a 4-core processor, an 8-core processor, or the like. Processor 2010 may be implemented in at least one of DSP (Digital Signal Processing ), FPGA (Field-Programmable Gate Array, field programmable gate array), PLA (Programmable Logic Array ). Processor 2010 may also include a main processor, which is a processor for processing data in an awake state, also called a CPU (Central Processing Unit ), and a coprocessor; a coprocessor is a low-power processor for processing data in a standby state. In some embodiments, the processor 2010 may be integrated with a GPU (Graphics Processing Unit, image processor) for responsible for rendering and rendering of content that the display screen is required to display. In some embodiments, the processor 2010 may also include an AI (Artificial Intelligence ) processor for processing computing operations related to machine learning.
Memory 2020 may include one or more computer-readable storage media, which may be non-transitory. Memory 2020 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in memory 2020 is used to store at least one instruction for execution by processor 2010 to implement the access control method provided by the method embodiments herein.
In the embodiment of the present application, the wireless headset 2000 may further include an audio circuit 2030 for playing music, and the audio circuit 2030 may include a microphone and a speaker. The microphone is used for collecting sound waves of users and the environment, and converting the sound waves into electric signals to be input to the processor 2010 for processing. The speaker is then used to convert the electrical signal from processor 2010 into sound waves. The speaker may be a conventional thin film speaker or a piezoelectric ceramic speaker.
In this embodiment of the present application, the wireless headset 2000 may further include a wireless communication component 2040, such as a bluetooth component or a UWB component, where the bluetooth component is configured to establish a data communication connection with a terminal to transmit audio data, and when the access control needs to be opened, the bluetooth component is further configured to broadcast encrypted access control verification information, and when the wireless communication component 2040 is a UWB component, not only the encrypted access control verification information may be broadcast, but also a target positioning function, such as positioning spatial location information of an access control device that receives a broadcast signal, may be implemented.
In addition, the wireless headset 2000 also includes various sensors 2050 for collecting various sensor data generated when the wireless headset 2000 is operated. For example, an acceleration sensor may be used to detect a double click or single click continuous click operation of the wireless headset 2000 by the user. The gyro sensor may detect the body direction and the rotation angle of the wireless headset 2000. The pressure sensor may be used to detect a pressing operation of a key by a user.
The above-described structure of the wireless earphone is merely illustrative, and the wireless earphone may include more or less components in actual implementation, which is not limited in this embodiment.
Those skilled in the art will appreciate that the structure shown in fig. 20 is not limiting and may include more or fewer components than shown, or may combine certain components, or may employ a different arrangement of components.
Fig. 21 is a block diagram illustrating a structure of an access control device according to an exemplary embodiment of the present application. The access control device in the present application may include one or more of the following components: a processor 2110 and a memory 2120.
The processor 2110 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and the like. The processor 2110 may be implemented in at least one hardware form of DSP (Digital Signal Processing ), FPGA (Field-Programmable Gate Array, field programmable gate array), PLA (Programmable Logic Array ). The processor 2110 may also include a main processor, which is a processor for processing data in an awake state, also referred to as a CPU (Central Processing Unit ), and a coprocessor; a coprocessor is a low-power processor for processing data in a standby state. In some embodiments, the processor 2110 may be integrated with a GPU (Graphics Processing Unit, image processor) for taking care of rendering and rendering of the content that the display screen is required to display. In some embodiments, the processor 2110 may also include an AI (Artificial Intelligence ) processor for processing computing operations related to machine learning.
Memory 2120 may include one or more computer-readable storage media, which may be non-transitory. Memory 2120 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in memory 2120 is used to store at least one instruction for execution by processor 2110 to implement the access control method provided by the method embodiments herein.
In this embodiment, the access control device 2100 further includes a wireless communication component 2130, such as a bluetooth component or a UWB component, where the bluetooth component is configured to scan and receive a broadcast signal, such as access control verification information broadcasted by a wireless headset, and in addition, the bluetooth component may determine a distance between the bluetooth component and the wireless headset according to a signal strength of the received broadcast signal, and the UWB component may not only receive the access control verification information broadcasted by the wireless headset, but also may implement a target positioning function, such as positioning spatial location information of the wireless headset of the broadcast signal.
In this embodiment, the access control device 2100 further includes a door lock driving assembly 2140, where the door lock driving assembly 2140 is configured to switch the access control device from a closed state to an open state when the access control verification information passes through verification, and the interior of the door lock driving assembly is capable of including a driving device and a transmission device, when the processor 2110 determines that the access control device passes through verification, a driving signal is sent to the door lock driving assembly 2140, and after the door lock driving assembly 2140 receives the driving signal, the driving device acts, so as to drive the transmission device to move to change the on-off state of the access control device.
Optionally, the access device 2100 may also include audio circuitry for playing music, which may include a microphone and a speaker. The microphone is used for collecting sound waves of a user and the environment, converting the sound waves into electric signals and inputting the electric signals to the processor for processing, such as voice control unlocking, for collecting the sound of the user. The speaker is used to convert the electrical signals from the processor into sound waves. The speaker can be traditional film speaker, also can be piezoceramics speaker, and the speaker can carry out voice broadcast when opening the entrance guard.
Optionally, the access device 2100 may further include a camera assembly, which may be any of a depth camera, a wide angle camera, and a tele camera, where the camera assembly is configured to obtain a face image, perform face recognition, and open the access device, and in some embodiments, the camera assembly may further include a flash. The flash lamp can be a single-color temperature flash lamp or a double-color temperature flash lamp. The dual-color temperature flash lamp refers to a combination of a warm light flash lamp and a cold light flash lamp, and can be used for light compensation under different color temperatures.
Optionally, the access device 2100 may further include various sensors, such as a fingerprint sensor, for capturing fingerprint information of a user for fingerprint unlocking, and when the identity of the user is identified as a trusted identity, the processor 2110 authorizes the user to perform related sensitive operations, such as switching the access device 2100 from a closed state to an open state, or changing an access key, etc. If the user enters the detection range of the infrared sensor, the access control device 2100 is switched from the sleep state to the wake state, and the pressure sensor can detect the pressure applied to the access control device 2100, for example, if the pressure exceeds a threshold value to alarm due to malicious damage to the access control device 2100.
Optionally, the access device 2100 further includes a matrix touch screen, where the matrix touch screen may be classified into a resistive touch screen, a capacitive touch screen, a surface acoustic wave touch screen, an infrared touch screen, and the like, and the matrix touch screen is used to display an operation interface of the access device 2100, so that a user can manually input an access key or display operation information.
The structure of the above-mentioned access control device is merely illustrative, and in actual implementation, the access control device may include more or fewer components, which is not limited in this embodiment.
It will be appreciated by those skilled in the art that the structure shown in fig. 21 is not limiting of the access device and may include more or fewer components than shown, or may combine certain components, or may employ a different arrangement of components.
In an exemplary embodiment, there is also provided a computer-readable storage medium having stored therein a computer program that is loaded and executed by a processor to implement the entrance guard control method in the above-described method embodiment.
Alternatively, the above-described computer-readable storage medium may be a ROM, a RAM, a magnetic tape, a floppy disk, an optical data storage device, or the like.
In an exemplary embodiment, there is also provided a computer program product including computer instructions stored in a computer-readable storage medium, the computer instructions being read from the computer-readable storage medium by a processor of a computer device, the computer instructions being executed by the processor, causing the computer device to perform the access control method in the above-described method embodiment.
It should be understood that references herein to "a plurality" are to two or more. "and/or", describes an association relationship of an association object, and indicates that there may be three relationships, for example, a and/or B, and may indicate: a exists alone, A and B exist together, and B exists alone. The character "/" generally indicates that the context-dependent object is an "or" relationship. The terms "first," "second," and the like, as used herein, do not denote any order, quantity, or importance, but rather are used to distinguish one element from another.
The foregoing embodiment numbers of the present application are merely for describing, and do not represent advantages or disadvantages of the embodiments.
The foregoing description of the exemplary embodiments of the present application is not intended to limit the invention to the particular embodiments disclosed, but on the contrary, the intention is to cover all modifications, equivalents, alternatives, and alternatives falling within the spirit and scope of the invention.

Claims (18)

1. An access control method, characterized in that it is applied to a wireless earphone, said method comprising:
responding to an entrance guard opening operation, acquiring entrance guard verification information, wherein the entrance guard verification information is used for opening verification when entrance guard equipment scans the entrance guard verification information, the entrance guard verification information comprises an entrance guard key of the entrance guard equipment and a first terminal identifier, and the first terminal identifier is a terminal identifier of a first terminal used when the wireless earphone sets an entrance guard opening function;
The access control verification information is broadcast through the wireless communication assembly, and the access control equipment is used for switching from a closed state to an open state when the access control verification information passes the open verification.
2. The method of claim 1, wherein prior to obtaining access verification information in response to an access opening operation, the method comprises:
in a use state, performing action recognition based on sensor data acquired by a sensor; in response to identifying a target action, determining that the access opening operation is received, the target action including at least one of a tap action, a press action, and a touch action.
3. The method of claim 2, wherein the obtaining access verification information comprises:
acquiring the access control key and the first terminal identifier which are stored locally;
determining the access control key and the first terminal identifier as the access control verification information, wherein the access control equipment is used for performing key verification according to the access control key and performing terminal verification according to the first terminal identifier;
the method further comprises the steps of:
and receiving the access control key, the first terminal identifier and the access control opening mode information sent by the first terminal through data communication connection with the first terminal, wherein the access control opening mode information comprises the action information of the target action.
4. The method of claim 1, wherein prior to obtaining access verification information in response to an access opening operation, the method comprises:
and in the box-in state, determining that the entrance guard opening operation is received in response to the fact that the earphone box is identified to be switched from the cover closing state to the cover opening state.
5. The method of claim 4, wherein the obtaining access verification information comprises:
acquiring the access control key and the first terminal identifier which are stored locally;
determining the access control key and the first terminal identifier as the access control verification information, wherein the access control equipment is used for performing key verification according to the access control key and performing terminal verification according to the first terminal identifier;
the method further comprises the steps of:
and receiving the access control key, the first terminal identifier and the access control opening mode information sent by the first terminal through data communication connection with the first terminal, wherein the access control opening mode information indicates that the access control opening mode information is switched from a cover closing state to a cover opening state.
6. The method of any one of claims 1 to 5, wherein broadcasting the access verification information via a wireless communication component comprises:
The wireless communication module is used for broadcasting a data packet, the data packet comprises an earphone identifier of the wireless earphone and the access control verification information, the access control verification information is encrypted, and the access control equipment is used for identifying the data packet broadcast by the wireless earphone based on the earphone identifier and decrypting the access control verification information in the data packet.
7. The method of any one of claims 1 to 5, wherein broadcasting the access verification information via a wireless communication component comprises:
broadcasting the access control verification information through a Bluetooth assembly, so that the access control equipment receives the access control verification information through the Bluetooth assembly and determines the distance between the access control equipment and the wireless earphone;
or alternatively, the first and second heat exchangers may be,
and broadcasting the access control verification information through an ultra-wideband UWB component, so that the access control equipment receives the access control verification information through the UWB component and determines the distance and the spatial position relation between the access control equipment and the wireless earphone.
8. An access control method, which is characterized by being applied to access control equipment, comprising:
the method comprises the steps that access control verification information broadcasted by a wireless earphone is scanned through a wireless communication assembly, the access control verification information is obtained and broadcasted when the wireless earphone receives an access control opening operation, the access control verification information comprises an access control key of access control equipment and a first terminal identifier, and the first terminal identifier is a terminal identifier of a first terminal used when the wireless earphone sets an access control opening function;
Opening and verifying the access control verification information;
and responding to the entrance guard verification information to pass the opening verification, and switching from the closed state to the open state.
9. The method of claim 8, wherein the performing open verification of the access verification information comprises:
acquiring an access control key and a terminal identifier contained in the access control verification information, wherein the terminal identifier is the first terminal identifier;
performing key verification based on the access control key, and performing terminal verification based on the terminal identifier;
the response to the entrance guard verification information passing the opening verification, switching from the closed state to the open state, including:
and responding to the access control key passing key verification, and the terminal identification passing terminal verification, switching from a closed state to an open state.
10. The method of claim 9, wherein the performing terminal authentication based on the terminal identification comprises:
acquiring a terminal white list, wherein a terminal contained in the terminal white list has the opening authority of the access control equipment;
responding to the terminal identifier belonging to the terminal white list, and determining that the terminal identifier passes terminal verification;
And determining that the terminal identification does not pass the terminal verification according to the fact that the terminal identification does not belong to the terminal white list.
11. The method of any one of claims 8 to 10, wherein scanning access authentication information broadcast by a wireless headset via a wireless communication component comprises:
scanning the access control verification information broadcasted by the wireless earphone through a Bluetooth module;
the step of opening and verifying the access control verification information comprises the following steps:
determining a distance from the wireless headset based on the signal reception intensity of the Bluetooth module;
and responding to the distance being smaller than a distance threshold value, and carrying out opening verification on the access verification information.
12. The method of any one of claims 8 to 10, wherein scanning access authentication information broadcast by a wireless headset via a wireless communication component comprises:
scanning the access control verification information broadcast by the wireless earphone through a UWB component;
the step of opening and verifying the access control verification information comprises the following steps:
determining a distance and spatial position relationship between the wireless earphone and the wireless receiver based on the receiving condition of the UWB component;
and responding to the fact that the distance is smaller than a distance threshold value, and the spatial position relation indicates that the wireless earphone is located in a target azimuth of the access control equipment, and opening verification is conducted on the access control verification information.
13. The method of any one of claims 8 to 10, wherein scanning access authentication information broadcast by a wireless headset via a wireless communication component comprises:
scanning, by the wireless communication component, the broadcasted data packets;
and responding to the data packet containing the earphone identifier, and decrypting the access control verification information in the data packet.
14. An access control device for a wireless headset, the device comprising:
the information acquisition module is used for responding to the entrance guard opening operation and acquiring entrance guard verification information, wherein the entrance guard verification information is used for opening verification when an entrance guard device scans the entrance guard verification information, the entrance guard verification information comprises an entrance guard key of the entrance guard device and a first terminal identifier, and the first terminal identifier is a terminal identifier of a first terminal used when the wireless earphone sets an entrance guard opening function;
and the information broadcasting module is used for broadcasting the access control verification information through the wireless communication assembly, and the access control equipment is used for switching from a closed state to an open state when the access control verification information passes the open verification.
15. An access control device, characterized in that is applied to access control equipment, the device includes:
The information receiving module is used for scanning access control verification information broadcasted by the wireless earphone through the wireless communication assembly, the access control verification information is obtained and broadcasted when the wireless earphone receives an access control opening operation, the access control verification information comprises an access control key of the access control equipment and a first terminal identifier, and the first terminal identifier is a terminal identifier of a first terminal used when the wireless earphone sets an access control opening function;
the information verification module is used for carrying out opening verification on the access control verification information;
and the control module is used for responding to the access control verification information to pass the opening verification and switching from the closed state to the open state.
16. A wireless headset comprising a processor and a memory, wherein the memory stores at least one instruction, at least one program, a set of codes, or a set of instructions, the at least one instruction, the at least one program, the set of codes, or the set of instructions being loaded and executed by the processor to implement the access control method of any one of claims 1 to 7.
17. An access control device comprising a processor and a memory, wherein the memory stores at least one instruction, at least one program, a set of codes, or a set of instructions, the at least one instruction, the at least one program, the set of codes, or the set of instructions being loaded and executed by the processor to implement the access control method of any one of claims 8 to 13.
18. A computer readable storage medium having stored therein at least one instruction, at least one program, code set, or instruction set loaded and executed by a processor to implement the access control method of any one of claims 1 to 7, or to implement the access control method of any one of claims 8 to 13.
CN202110580643.8A 2021-05-26 2021-05-26 Access control method, device, wireless earphone, access control equipment and storage medium Active CN113313864B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110580643.8A CN113313864B (en) 2021-05-26 2021-05-26 Access control method, device, wireless earphone, access control equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110580643.8A CN113313864B (en) 2021-05-26 2021-05-26 Access control method, device, wireless earphone, access control equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113313864A CN113313864A (en) 2021-08-27
CN113313864B true CN113313864B (en) 2023-05-09

Family

ID=77375348

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110580643.8A Active CN113313864B (en) 2021-05-26 2021-05-26 Access control method, device, wireless earphone, access control equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113313864B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113689687A (en) * 2021-08-30 2021-11-23 三星电子(中国)研发中心 Ultra-wideband-based equipment control method and device
CN114049704B (en) * 2021-11-03 2023-01-13 珠海格力电器股份有限公司 Door lock control method and device, electronic equipment and storage medium
GB2616446A (en) * 2022-03-09 2023-09-13 Continental Automotive Tech Gmbh Apparatus capable of being used as a primary device and an auxiliary device, and a system in association thereto
CN114639193A (en) * 2022-03-14 2022-06-17 Oppo广东移动通信有限公司 Control method, control device, electronic equipment and computer storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488887A (en) * 2015-12-28 2016-04-13 慧锐通智能科技股份有限公司 Entrance guard access control method
CN105488875A (en) * 2015-11-25 2016-04-13 浙江宇视科技有限公司 Access control verification method and device
CN105551118A (en) * 2015-10-31 2016-05-04 东莞酷派软件技术有限公司 Electronic key opening access control method, and apparatus and system thereof
CN105976466A (en) * 2016-05-03 2016-09-28 科世达(上海)管理有限公司 Car access control opening method
CN107021066A (en) * 2017-02-27 2017-08-08 上海蔚来汽车有限公司 Identification system and method based on Intelligent key
CN108604396A (en) * 2016-02-03 2018-09-28 欧陆汽车有限责任公司 It is related to the method and apparatus of motor vehicle entrance and/or activation system
CN109936833A (en) * 2017-12-15 2019-06-25 蔚来汽车有限公司 Vehicle virtual key generates application method and its system and user terminal
CN212229716U (en) * 2020-06-03 2020-12-25 南通宇为信息科技有限公司 OA office entrance guard device

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103164728A (en) * 2013-03-08 2013-06-19 李钰 IC (Integrated Circuit) card of loading fingerprint authentication function
EP3073283B1 (en) * 2015-03-23 2019-04-24 Assa Abloy AB Method and device for considering whether a portable key device is located inside or outside a barrier
JP6380262B2 (en) * 2015-06-29 2018-08-29 京セラドキュメントソリューションズ株式会社 Authentication device
CN105611441B (en) * 2015-10-30 2019-01-15 东莞酷派软件技术有限公司 Headset control method, earphone control device and earphone
CN105678880A (en) * 2016-02-06 2016-06-15 哼哈洛克(北京)科技股份有限公司 Key position judgment system of electronic lock and electronic lock
CN105788047B (en) * 2016-03-30 2018-12-14 北京千丁互联科技有限公司 A kind of control of bluetooth access equipment, control of bluetooth access management system and method
CN207148947U (en) * 2017-09-08 2018-03-27 深圳传音通讯有限公司 A kind of gate control system
CN108091009A (en) * 2017-12-08 2018-05-29 深圳达实信息技术有限公司 A kind of control of bluetooth access system and its application method based on narrowband Internet of Things
CN109636992A (en) * 2019-01-31 2019-04-16 深圳市多度科技有限公司 Pass through the method, system and electronic equipment of wearable device access control machine
CN111415442A (en) * 2020-03-16 2020-07-14 恒玄科技(上海)股份有限公司 Access control method, electronic device and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105551118A (en) * 2015-10-31 2016-05-04 东莞酷派软件技术有限公司 Electronic key opening access control method, and apparatus and system thereof
CN105488875A (en) * 2015-11-25 2016-04-13 浙江宇视科技有限公司 Access control verification method and device
CN105488887A (en) * 2015-12-28 2016-04-13 慧锐通智能科技股份有限公司 Entrance guard access control method
CN108604396A (en) * 2016-02-03 2018-09-28 欧陆汽车有限责任公司 It is related to the method and apparatus of motor vehicle entrance and/or activation system
CN105976466A (en) * 2016-05-03 2016-09-28 科世达(上海)管理有限公司 Car access control opening method
CN107021066A (en) * 2017-02-27 2017-08-08 上海蔚来汽车有限公司 Identification system and method based on Intelligent key
CN109936833A (en) * 2017-12-15 2019-06-25 蔚来汽车有限公司 Vehicle virtual key generates application method and its system and user terminal
CN212229716U (en) * 2020-06-03 2020-12-25 南通宇为信息科技有限公司 OA office entrance guard device

Also Published As

Publication number Publication date
CN113313864A (en) 2021-08-27

Similar Documents

Publication Publication Date Title
CN113313864B (en) Access control method, device, wireless earphone, access control equipment and storage medium
US10708410B2 (en) Systems and methods for controlling a locking mechanism using a portable electronic device
RU2626659C1 (en) Method and equipment for device control
US11900935B2 (en) System and method for securing electronic devices
CN104503688A (en) Intelligent hardware device control achieving method and device
CN109154642A (en) For establishing the system and method positioned in real time
KR101876183B1 (en) Security-enhanced residential gateway device based on internet of things
KR102250421B1 (en) Method for home networking using AI voice recognition speakers and network devices installed in the household, device and system using the same
KR20050033636A (en) Security system for apparatus in a wireless network
CN104780045B (en) The management method and device of smart machine
US10306129B1 (en) Local and remote video-camera control
KR20140109683A (en) Smart digital door lock system with a black-box functionality
CN114830197B (en) Electronic device for controlling access by utilizing wireless communication and method thereof
CN106060098B (en) Processing method, processing unit and the processing system of identifying code
KR102545375B1 (en) Electronic device for performing authorization using accessory and method for the same
CN113766482B (en) Method for searching Bluetooth device, electronic device and storage medium
CN108012270B (en) Information processing method, equipment and computer readable storage medium
KR20180062692A (en) Method, user terminal, door lock device and entry security system for controlling of opening and closing door
Pasanen et al. New efficient rf fingerprint-based security solution for bluetooth secure simple pairing
Ye et al. Easy peasy: A new handy method for pairing multiple cots IoT devices
CN115879140A (en) Equipment control method, center equipment and device
CN113301539B (en) Data transmission method, electronic device and computer storage medium
US20240267252A1 (en) Method and apparatus for authorizing changes to a local network control device
US20240291676A1 (en) Electronic device for providing internet of things service and method for operation thereof
CN114399854A (en) Unlocking method of intelligent door lock, mobile device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant