CN113643468A - Access control system control method and computer readable storage medium - Google Patents
Access control system control method and computer readable storage medium Download PDFInfo
- Publication number
- CN113643468A CN113643468A CN202110757306.1A CN202110757306A CN113643468A CN 113643468 A CN113643468 A CN 113643468A CN 202110757306 A CN202110757306 A CN 202110757306A CN 113643468 A CN113643468 A CN 113643468A
- Authority
- CN
- China
- Prior art keywords
- visitor
- terminal
- owner
- identity
- access control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000007726 management method Methods 0.000 claims 2
- 238000012550 audit Methods 0.000 claims 1
- 230000000007 visual effect Effects 0.000 description 4
- 238000012544 monitoring process Methods 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 1
- 239000000470 constituent Substances 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Lock And Its Accessories (AREA)
Abstract
The embodiment of the invention discloses a control method of an access control system and a computer readable storage medium, which are applied to the access control system. The identity of the visitor is determined by matching the face feature information of the visitor captured by the biological feature recognition equipment with the identity information prestored in the server. The visitor is pushed to the owner terminal based on a request visiting instruction sent by the visitor terminal and identity information corresponding to the visitor in the server, the identity of the visitor is confirmed by the owner terminal based on the owner terminal, and after an unlocking instruction is sent based on the owner terminal, the door lock control equipment executes unlocking operation. According to the method, before the owner opens the access control, the identity of the visitor outside the access control can be effectively screened and confirmed at the terminal, and when the system judges that the visitor is a blacklist person, early warning can be timely carried out, so that the personal safety and the property safety of the owner are ensured.
Description
Technical Field
The invention relates to the field of access control, in particular to a control method of an access control system and a computer readable storage medium.
Background
As door locks are updated and iterated, the operation of unlocking by users has been developed from the original unlocking by using keys to help users unlock by control software.
For the existing entrance guard system adopting a visual screen terminal or unlocking by a remote key, if people outside the entrance guard are visitors well known by an owner, the owner can directly carry out unlocking operation. However, if a strange visitor is outside the door and the owner is informed that the identity of the owner is a worker such as a distributor, a hydropower overhaul worker and the like, the owner can not confirm the identity authenticity of the strange visitor outside the door only according to image information displayed on the visual screen terminal or an audio conversation of remote unlocking, and a great safety risk exists. Therefore, it is necessary to provide a method for helping the owner to effectively identify and confirm the authenticity of the identity of the stranger outside the entrance before opening the entrance.
Disclosure of Invention
In view of the defects of the prior art and the access control method, an embodiment of the present application aims to provide an access control system control method and a computer-readable storage medium, so as to solve the drawback that an owner cannot effectively identify and confirm the authenticity of the identity of an unfamiliar visitor outside an access control before opening the access control.
The application provides a control method of an access control system, which is applied to the access control system, wherein the access control system comprises a biological characteristic recognition device, a door lock control device, a server, a visitor terminal, an owner terminal and a property terminal, the biological characteristic recognition device is used for capturing face characteristic information, and the method comprises the following steps:
matching the face feature information of the visitor captured by the biological feature recognition equipment with identity information prestored in a server to determine the identity of the visitor, wherein the identity of the visitor comprises a registered visitor, a non-registered visitor and blacklist personnel, the registered visitor is a visitor who has uploaded the identity information to the server, and the non-registered visitor is a visitor who does not upload the identity information to the server;
and the visitor sends a visit request instruction based on the visitor terminal, the identity information of the visitor in the server is pushed to the owner terminal, the owner terminal confirms the identity of the visitor based on the visit request instruction, and after the owner terminal sends an unlocking instruction, the door lock control equipment executes unlocking operation.
Preferably, the access control system comprises a physical access control keyboard;
based on a request visit instruction sent by a visitor terminal, the visitor and the server correspond to identity information of the visitor and push the identity information to an owner terminal, the owner terminal confirms the identity of the visitor and sends an unlocking instruction, and the door lock control equipment executes unlocking operation and comprises:
after the visitor sends out the request instruction of visiting based on entity entrance guard's keyboard, will request instruction of visiting and visitor identity information propelling movement to owner's terminal together, the owner be based on owner's terminal confirms the visitor's identity, and based on after owner's terminal sends the instruction of unblanking, lock controlgear carries out the operation of unblanking.
Preferably, the access control management system comprises a virtual access control keyboard, and after the visitor scans the two-dimensional code based on the visitor terminal, the interface of the visitor terminal generates the virtual access control keyboard for inputting a visit request instruction;
based on a request visit instruction sent by a visitor terminal, the visitor and the server correspond to identity information of the visitor and push the identity information to an owner terminal, the owner terminal confirms the identity of the visitor and sends an unlocking instruction, and the door lock control equipment executes unlocking operation and comprises:
the visitor is based on after virtual entrance guard's keyboard sends the request instruction of visiting, will request instruction of visiting and visitor identity information propelling movement to owner's terminal together, the owner of business is based on owner's terminal confirms the identity of visitor, and based on after owner's terminal sends the instruction of unblanking, lock controlgear carries out the operation of unblanking.
Preferably, the method further comprises:
after the visitor sends out a reservation visit request based on the visitor terminal, the reservation visit request and visitor identity information are pushed to an owner terminal together, and after the owner terminal confirms the reservation visit request and generates reservation passing information, the reservation passing information is sent to the visitor terminal;
after the visitor terminal receives the reservation passing information, if in the reservation visiting time period, the biological characteristic identification equipment grabs the human face characteristic information of the visitor, or the visitor inputs a visiting request based on the virtual access control keyboard, the door lock control equipment executes unlocking operation, and the owner terminal generates prompt information for prompting the visitor to visit.
Preferably, the identity information prestored in the server comprises visitor identity information and blacklist identity information;
the server is used for storing visitor identity information uploaded according to the APP registration information, visitor identity information guided by a third-party platform data interface and visitor identity information provided by a service provider.
Preferably, the visitor sends a visit request instruction based on the visitor terminal, and the server sends identity information corresponding to the visitor to the owner terminal, and after the owner terminal confirms the identity of the visitor and sends an unlocking instruction, the door lock control device executes an unlocking operation including:
if the identity of the visitor is a registered visitor, pushing a visit request instruction sent by the visitor based on the visitor terminal and visitor identity information prestored in a server to an owner terminal, and after the owner terminal confirms the identity of the visitor and sends an unlocking instruction, executing unlocking operation by the door lock control equipment;
if the identity of visitor is the non-registration visitor, with visitor's face characteristic information that biological characteristic identification equipment snatched, perhaps the self-timer image of visitor sends the owner terminal, if the owner is based on the owner terminal is confirmed the visitor is acquainted identity to after sending the instruction of unblanking, lock controlgear carries out the operation of unblanking, if the owner is based on the owner terminal is confirmed the visitor is strange identity, the owner continues to confirm based on video information, the audio information that the owner terminal received the identity of visitor to after judging entrance guard and opening the risk, confirm whether to send the instruction of unblanking.
And if the identity of the visitor is blacklist personnel, sending blacklist visitor warning information to an owner terminal, and synchronously sending the owner warning information to a property terminal.
Preferably, the owner terminal comprises a fixed terminal and a mobile terminal, the fixed terminal and the mobile terminal are compatible or independent to operate, and the owner terminal and the mobile terminals operate synchronously.
Preferably, the access control system is further configured to transmit audio information, video information and text short messages.
Preferentially, in order to facilitate management, the system is provided with a property terminal, the property terminal is used for auditing personal information and face characteristic information uploaded by an owner and sending the data to an equipment database, and the property terminal is also used for a property manager to call, increase, decrease and manage access control data of access control users.
The present application also relates to a computer-readable storage medium having stored thereon a program or instructions which, when executed by a processor, implement the access control system of any of the above.
The embodiment of the invention discloses a control method of an access control system, which is applied to the access control system, wherein the access control system comprises a biological characteristic recognition device, a door lock control device, a server, a visitor terminal, an owner terminal and a property terminal. Matching the face feature information of the visitor captured by the biological feature recognition equipment with identity information prestored in a server to determine the identity of the visitor. And the visitor sends a visit request instruction based on the visitor terminal, the identity information of the visitor in the server is pushed to the owner terminal, the owner terminal confirms the identity of the visitor based on the visit request instruction, and after the owner terminal sends an unlocking instruction, the door lock control equipment executes unlocking operation. According to the method, before the owner opens the access control, the identity of the visitor outside the access control can be effectively screened and confirmed at the terminal, and when the system judges that the visitor is a blacklist person, early warning can be timely carried out, so that the personal safety and the property safety of the owner are ensured.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings required to be used in the embodiments will be briefly described below, and it should be understood that the following drawings only illustrate some embodiments of the present invention, and therefore should not be considered as limiting the scope of the present invention. In the drawings, like constituent elements are similarly numbered.
Fig. 1 shows a flowchart of a method for controlling an access control system according to embodiment 1 of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
Hereinafter, the terms "including", "having", and their equivalents, which may be used in various embodiments of the present invention, are intended to indicate only specific features, numbers, steps, operations, or combinations of the foregoing, and should not be construed as first excluding the presence of or adding to one or more other features, numbers, steps, operations, or combinations of the foregoing.
Furthermore, the terms "first," "second," "third," and the like are used solely to distinguish one from another and are not to be construed as indicating or implying relative importance.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which various embodiments of the present invention belong. The terms (such as those defined in commonly used dictionaries) should be interpreted as having a meaning that is consistent with their contextual meaning in the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein in various embodiments of the present invention.
Referring to fig. 1, fig. 1 shows a flowchart of a method for controlling an access control system according to embodiment 1 of the present invention, which is applied to an access control system, where the access control system includes a biometric device, a door lock control device, a server, a visitor terminal, an owner terminal, and a property terminal, and the biometric device is used to capture face feature information.
The access control system control method in fig. 1 includes the following steps:
The identity of the visitor comprises a registered visitor, a non-registered visitor and blacklist personnel, the registered visitor is a visitor who uploads identity information to the server, and the non-registered visitor is a visitor who does not upload the identity information to the server.
Specifically, the personal information uploaded by the visitor is stored in the server as pre-stored identity information, wherein the personal information uploaded by the visitor includes, but is not limited to, a name, an identity card number, a mobile phone number, and the like, and the personal information to be uploaded and registered is set according to actual needs, which is not limited herein.
Specifically, the biometric information includes: and (4) face feature information. Matching the captured face feature information with the face feature information of the registered visitor prestored in the server to obtain prestored identity information of the corresponding registered visitor.
102, pushing the visitor to an owner terminal based on a visit request instruction sent by the visitor terminal and identity information corresponding to the visitor in the server, confirming the identity of the visitor by the owner terminal, and executing unlocking operation by the door lock control equipment based on the unlocking instruction sent by the owner terminal.
Specifically, the access control management system comprises an entity access control keyboard; based on a request visit instruction sent by a visitor terminal, the visitor corresponds to the identity information of the visitor in the server and is pushed to an owner terminal, the owner terminal confirms the identity of the visitor and sends an unlocking instruction, and then the door lock control equipment executes unlocking operation, and the door lock control equipment comprises: after the visitor sends out the request instruction of visiting based on entity entrance guard's keyboard, will request instruction of visiting and visitor identity information propelling movement to owner's terminal together, the owner be based on owner's terminal confirms the visitor's identity, and based on after owner's terminal sends the instruction of unblanking, lock controlgear carries out the operation of unblanking.
Specifically, the access control management system comprises a virtual access control keyboard, and after the visitor scans the two-dimensional code based on the visitor terminal, the interface of the visitor terminal generates the virtual access control keyboard for inputting a visit request instruction; based on a request visit instruction sent by a visitor terminal, the visitor corresponds to the identity information of the visitor in the server and is pushed to an owner terminal, the owner terminal confirms the identity of the visitor and sends an unlocking instruction, and then the door lock control equipment executes unlocking operation, and the door lock control equipment comprises: the visitor is based on after virtual entrance guard's keyboard sends the request instruction of visiting, will request instruction of visiting and visitor identity information propelling movement to owner's terminal together, the owner of business is based on owner's terminal confirms the identity of visitor, and based on after owner's terminal sends the instruction of unblanking, lock controlgear carries out the operation of unblanking.
It can be understood that:
when a visitor visits an owner, the visitor can scan the two-dimensional code arranged on the access control system through the mobile terminal, and after the two-dimensional code is scanned through the mobile terminal, the operation interface of the mobile terminal of the visitor can generate a virtual keyboard. After the visitor inputs a request visit instruction through the virtual keyboard, the request visit instruction and the identity information of the visitor are pushed to the owner terminal together, so that the owner can judge whether to send an unlocking instruction or not according to the information received by the owner terminal.
In addition, the owner access control system can perform unlocking operation through various modes such as magnetic card verification, key password verification and the like, and is not limited herein.
In addition to the above steps, the summary of the invention is further described below:
specifically, for preventing a visitor from harassing an owner, if the same times of characters in the call request instruction are greater than the threshold value of the number of the same characters, the output of the characters input by the visitor is stopped within a preset time period, wherein the call request instruction is the house number of the owner.
Specifically, after the visitor sends out a reservation visit request based on the visitor terminal, the reservation visit request and visitor identity information are pushed to an owner terminal together, the owner terminal confirms the reservation visit request and generates reservation passing information, and then the reservation passing information is sent to the visitor terminal;
after the visitor terminal receives the reservation passing information, if in the reservation visiting time period, the biological characteristic identification equipment grabs the human face characteristic information of the visitor, or the visitor inputs a visiting request based on the virtual access control keyboard, the door lock control equipment executes unlocking operation, and the owner terminal generates prompt information for prompting the visitor to visit.
In order to prevent the visitor from waiting for opening the door before the entrance guard and causing time waste, the visitor can send out a reservation and visit request at the visitor terminal in advance, the system pushes the identity information of the visitor and the reservation and visit request to the owner terminal, the owner operates and agrees to the visit reservation of the visitor after the owner terminal confirms, and the reservation is transmitted back to the visitor terminal through the information.
After confirming that the visitor terminal receives the reservation passing information of the owner, the visitor directly scans the face in front of the entrance guard biological characteristic recognition equipment in the reserved time period to pass through, or requests to unlock on the virtual entrance guard keyboard, the entrance guard lock is automatically opened to allow the visitor to pass through, and when the door lock is opened, the owner terminal synchronously prompts the visitor to visit for the owner.
Specifically, the identity information prestored in the server comprises visitor identity information and blacklist identity information; the server is used for storing visitor identity information obtained according to the APP registration information, visitor identity information guided by a third-party platform data interface and visitor identity information provided by a service provider.
The visitor may pre-register visitor identity information in a number of different ways and be stored by the server, not limited herein.
Preferably, the visitor sends a visit request instruction based on the visitor terminal, and the server sends identity information corresponding to the visitor to the owner terminal, and after the owner terminal confirms the identity of the visitor and sends an unlocking instruction, the door lock control device executes an unlocking operation including: if the identity of the visitor is a registered visitor, pushing a visit request command sent by the visitor based on the visitor terminal and visitor identity information commands prestored in a server to an owner terminal, and after the owner terminal confirms the identity of the visitor and sends an unlocking command, executing unlocking operation by the door lock control equipment; if the identity of visitor is the non-registration visitor, with visitor's face characteristic information that biological characteristic identification equipment snatched, perhaps the self-timer image of visitor sends the owner terminal, if the owner is based on the owner terminal is confirmed the visitor is acquainted identity to after sending the instruction of unblanking, lock controlgear carries out the operation of unblanking, if the owner is based on the owner terminal is confirmed the visitor is strange identity, the owner continues to confirm based on video information, the audio information that the owner terminal received the identity of visitor to after judging entrance guard and opening the risk, confirm whether to send the instruction of unblanking. And if the identity of the visitor is blacklist personnel, sending blacklist visitor warning information to an owner terminal, and synchronously sending the owner warning information to a property terminal.
Specifically, when the visitor is a person familiar with the owner, the biometric feature recognition system takes a snapshot of the head portrait of the visitor or a self-portrait of the visitor is sent to the owner terminal. The owner confirms that the visitor outside the entrance guard is a familiar person and directly sends an unlocking instruction to the door lock control equipment.
When the visitor outside the entrance guard is a stranger, the owner continues to discriminate and confirm the identity of the visitor through video information, audio information and text short messages, judges whether a risk exists or not and determines whether an unlocking instruction is sent to the door lock control equipment or not.
In addition, when the visitor is judged to be a blacklist person, warning information of the blacklist visitor can be sent to the owner terminal in time, when the owner terminal displays an early warning signal, the owner can selectively give an alarm or take precautionary measures in advance, and then an unlocking instruction is sent to the door lock control equipment based on the owner terminal, so that personal and property safety of the owner is guaranteed.
Specifically, the owner terminal comprises a fixed terminal and a mobile terminal, the fixed terminal and the mobile terminal are compatible or independent to operate, and the owner terminal and the mobile terminals operate synchronously.
In particular, the fixed terminal may be a visual screen terminal. After the visitor sends a request visit instruction, the owner can select to execute the unlocking operation through the mobile terminal or select to execute the unlocking operation through the visual screen terminal according to actual requirements, and the method is not limited herein. When the owner controls the entrance guard through the mobile terminal, the owner does not need to move to the position near the video screen terminal to execute unlocking operation.
Meanwhile, generally, owners of one room are not limited to one, and therefore, an owner terminal and a plurality of mobile terminals operate synchronously, that is, after a visitor sends a visit request instruction, the visit request instruction can be sent to the mobile terminals of all the owners in the same room.
Specifically, the access control system is further used for transmitting audio information, video information and text short messages.
When the owner judges whether to execute the unlocking operation, the more specific identity confirmation is carried out on the visitor outside the entrance guard through the audio information, the video information and the text short message transmitted by the entrance guard system.
Specifically, the property terminal is used for auditing personal information and face feature information uploaded by a property owner and sending the data to the equipment database, and the property terminal is also used for a property manager to take, increase, decrease and manage access control data of access control users.
The property management personnel can realize the monitoring and management of the external personnel in the property management district by calling, increasing, decreasing and managing the access control data of the access control user. Meanwhile, the property end can be networked with a security system, so that the monitoring and management of floating population can be better realized.
An embodiment of the present application further provides a computer-readable storage medium, where a program or an instruction is stored on the computer-readable storage medium, and when the program or the instruction is executed by a processor, the access control system control method is implemented.
In the embodiments provided in the present application, it should be understood that the disclosed method can be implemented in other ways. The implementation steps described above are merely illustrative.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention is essentially embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a smart phone, a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: Read-Only Memory (ROM), Random Access Memory (RAM), and the like, which can store program codes.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention.
Claims (10)
1. The access control system control method is characterized by being applied to an access control system, wherein the access control system comprises a biological characteristic recognition device, a door lock control device, a server, a visitor terminal, an owner terminal and a property terminal, the biological characteristic recognition device is used for capturing face characteristic information, and the method comprises the following steps:
matching the face feature information of the visitor captured by the biological feature recognition equipment with identity information prestored in a server to determine the identity of the visitor, wherein the identity of the visitor comprises a registered visitor, a non-registered visitor and blacklist personnel, the registered visitor is a visitor who has uploaded the identity information to the server, and the non-registered visitor is a visitor who does not upload the identity information to the server;
and the visitor sends a visit request instruction based on the visitor terminal, the identity information of the visitor in the server is pushed to the owner terminal, the owner terminal confirms the identity of the visitor based on the visit request instruction, and after the owner terminal sends an unlocking instruction, the door lock control equipment executes unlocking operation.
2. The access control system control method of claim 1, wherein the access control system comprises a physical access control keyboard;
based on a request visit instruction sent by a visitor terminal, the visitor corresponds to the identity information of the visitor in the server and is pushed to an owner terminal, the owner terminal confirms the identity of the visitor and sends an unlocking instruction, and then the door lock control equipment executes unlocking operation, and the door lock control equipment comprises:
after the visitor sends out the request instruction of visiting based on entity entrance guard's keyboard, will request instruction of visiting and visitor identity information propelling movement to owner's terminal together, the owner be based on owner's terminal confirms the visitor's identity, and based on after owner's terminal sends the instruction of unblanking, lock controlgear carries out the operation of unblanking.
3. The access control system control method according to claim 1 or 2, wherein the access control management system comprises a virtual access control keyboard, and after the visitor scans the two-dimensional code based on the visitor terminal, an interface of the visitor terminal generates the virtual access control keyboard for inputting a request visit instruction;
based on a request visit instruction sent by a visitor terminal, the visitor corresponds to the identity information of the visitor in the server and is pushed to an owner terminal, the owner terminal confirms the identity of the visitor and sends an unlocking instruction, and then the door lock control equipment executes unlocking operation, and the door lock control equipment comprises:
after the visitor sends out the request instruction of visiting based on virtual entrance guard's keyboard, will request instruction of visiting and visitor identity information propelling movement to owner's terminal together, the owner be based on owner's terminal confirms the visitor's identity, and based on after owner's terminal sends the instruction of unblanking, lock controlgear carries out the operation of unblanking.
4. The access control system control method of claim 3, further comprising:
after the visitor sends out a reservation visit request based on the visitor terminal, the reservation visit request and visitor identity information are pushed to an owner terminal together, and after the owner terminal confirms the reservation visit request and generates reservation passing information, the reservation passing information is sent to the visitor terminal;
after the visitor terminal receives the reservation passing information, if in the reservation visiting time period, the biological characteristic identification equipment grabs the human face characteristic information of the visitor, or the visitor inputs a visiting request based on the virtual access control keyboard, the door lock control equipment executes unlocking operation, and the owner terminal generates prompt information for prompting the visitor to visit.
5. The access control system control method according to claim 1, wherein the identity information pre-stored in the server comprises visitor identity information and blacklist identity information;
the server is used for storing visitor identity information uploaded according to the APP registration information, visitor identity information guided by a third-party platform data interface and visitor identity information provided by a service provider.
6. The access control system control method of claim 1 or 5, wherein the step of pushing the visitor to a host terminal based on a visit request command sent by the visitor terminal and identity information corresponding to the visitor in the server, wherein after the host confirms the identity of the visitor based on the host terminal and sends an unlocking command, the door lock control device performs an unlocking operation, comprises:
if the identity of the visitor is a registered visitor, pushing a visit request instruction sent by the visitor based on the visitor terminal and visitor identity information prestored in a server to an owner terminal, and after the owner terminal confirms the identity of the visitor and sends an unlocking instruction, executing unlocking operation by the door lock control equipment;
if the identity of the visitor is a non-registered visitor, sending face feature information of the visitor captured by a biological feature recognition device or a self-photographing image of the visitor to the owner terminal, if the owner confirms that the visitor is a familiar identity based on the owner terminal and sends an unlocking instruction, the door lock control device executes unlocking operation, if the owner confirms that the visitor is a strange identity based on the owner terminal, the owner continuously confirms the identity of the visitor based on video information and audio information received by the owner terminal and confirms whether the unlocking instruction is sent or not after judging the risk of opening the door access;
and if the identity of the visitor is blacklist personnel, the system sends blacklist visitor warning information to the owner terminal and synchronously sends the owner warning information to the property terminal.
7. The access control system control method according to claim 1, wherein the owner terminal comprises a fixed terminal and a mobile terminal, the fixed terminal and the mobile terminal are compatible or independent to operate, and the owner terminal and the mobile terminals operate synchronously.
8. The door access control system control method according to claim 1, wherein the door access control system is further configured to transmit audio information, video information and text messages.
9. The access control system control method of claim 1, wherein the property terminal is configured to audit personal information and face feature information uploaded by a property owner and send data to the device database, and the property terminal is further configured to allow property management personnel to call, increase, decrease, and manage access control data of access control users.
10. A computer-readable storage medium, on which a program or instructions are stored, which, when executed by a processor, implement the steps of the access control system control method according to any one of claims 1 to 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110757306.1A CN113643468A (en) | 2021-07-05 | 2021-07-05 | Access control system control method and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110757306.1A CN113643468A (en) | 2021-07-05 | 2021-07-05 | Access control system control method and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113643468A true CN113643468A (en) | 2021-11-12 |
Family
ID=78416715
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110757306.1A Pending CN113643468A (en) | 2021-07-05 | 2021-07-05 | Access control system control method and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113643468A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI835386B (en) * | 2022-11-02 | 2024-03-11 | 吾微而智股份有限公司 | Access management system |
CN117994887A (en) * | 2024-03-29 | 2024-05-07 | 一智科技(成都)有限公司 | Gate system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109243026A (en) * | 2018-09-03 | 2019-01-18 | 日立楼宇技术(广州)有限公司 | A kind of caller management method and system |
CN109712287A (en) * | 2018-12-26 | 2019-05-03 | 浙江添锦建筑装饰工程有限公司 | A kind of intelligent district access control system |
CN111915789A (en) * | 2020-08-05 | 2020-11-10 | 中国建设银行股份有限公司 | Visitor reservation management method, device, equipment and storage medium |
CN112837460A (en) * | 2020-07-08 | 2021-05-25 | 别红成 | Unattended intelligent access control system and personnel access management method |
CN112927408A (en) * | 2021-01-22 | 2021-06-08 | 中国工商银行股份有限公司 | Visitor visiting processing method and device |
-
2021
- 2021-07-05 CN CN202110757306.1A patent/CN113643468A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109243026A (en) * | 2018-09-03 | 2019-01-18 | 日立楼宇技术(广州)有限公司 | A kind of caller management method and system |
CN109712287A (en) * | 2018-12-26 | 2019-05-03 | 浙江添锦建筑装饰工程有限公司 | A kind of intelligent district access control system |
CN112837460A (en) * | 2020-07-08 | 2021-05-25 | 别红成 | Unattended intelligent access control system and personnel access management method |
CN111915789A (en) * | 2020-08-05 | 2020-11-10 | 中国建设银行股份有限公司 | Visitor reservation management method, device, equipment and storage medium |
CN112927408A (en) * | 2021-01-22 | 2021-06-08 | 中国工商银行股份有限公司 | Visitor visiting processing method and device |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI835386B (en) * | 2022-11-02 | 2024-03-11 | 吾微而智股份有限公司 | Access management system |
CN117994887A (en) * | 2024-03-29 | 2024-05-07 | 一智科技(成都)有限公司 | Gate system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10657782B2 (en) | Networked premises security | |
US20100182123A1 (en) | System for monitoring users' time and attendance and controlling users' access | |
CN104809773A (en) | Entrance guard control method, entrance guard control apparatus, and entrance guard system | |
CN113643468A (en) | Access control system control method and computer readable storage medium | |
CN107945315A (en) | Entrance guard controlling method and system | |
CN106897959A (en) | A kind of intelligent Community safety-protection system based on Internet of Things | |
KR102107203B1 (en) | Parking breaker open/close system using portable phone of resident to automatically enter vehicle by parking breaker using KIOSK terminal or tablet PC | |
CN108174142A (en) | A kind of long-range control locking method locked based on intelligent doorbell and intelligent cloud, system | |
CN101511085A (en) | Method and apparatus for limiting usage of mobile terminal function by using personal identification | |
EP2592830A1 (en) | Video door entry system | |
WO2001016909A1 (en) | Method for controlling fingerprint identification door lock system | |
CN109859350B (en) | Remote authorized fingerprint self-service entry method and hotel self-service check-in method | |
CN111445611A (en) | Face recognition access control system | |
CN112950828A (en) | Community pedestrian system and community pedestrian method | |
CN112927408A (en) | Visitor visiting processing method and device | |
CN111402459A (en) | Intelligent access control system with community comprehensive management function and method thereof | |
JP2009108575A (en) | Room entrance/exit control system | |
JP4344303B2 (en) | Entrance / exit management system | |
KR101165400B1 (en) | apparatus and method for management input/output of sers in digital door lock system | |
JP2006039728A (en) | Authentication system and method | |
CN111862428B (en) | Access control method and device | |
JP4705346B2 (en) | Resident management system, occupant management server, and occupant management program | |
JP4563055B2 (en) | Entrance / exit control device for controlling mobile terminal with camera function | |
CN111377312A (en) | Face identification ladder control system | |
CN113202353A (en) | Control method and control device for intelligent door lock and intelligent door lock |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20211112 |