CN113643468A - Access control system control method and computer readable storage medium - Google Patents

Access control system control method and computer readable storage medium Download PDF

Info

Publication number
CN113643468A
CN113643468A CN202110757306.1A CN202110757306A CN113643468A CN 113643468 A CN113643468 A CN 113643468A CN 202110757306 A CN202110757306 A CN 202110757306A CN 113643468 A CN113643468 A CN 113643468A
Authority
CN
China
Prior art keywords
visitor
terminal
owner
identity
access control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110757306.1A
Other languages
Chinese (zh)
Inventor
别红成
刘云云
李利文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Hongli Technology Co ltd
Original Assignee
Shenzhen Hongli Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Hongli Technology Co ltd filed Critical Shenzhen Hongli Technology Co ltd
Priority to CN202110757306.1A priority Critical patent/CN113643468A/en
Publication of CN113643468A publication Critical patent/CN113643468A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the invention discloses a control method of an access control system and a computer readable storage medium, which are applied to the access control system. The identity of the visitor is determined by matching the face feature information of the visitor captured by the biological feature recognition equipment with the identity information prestored in the server. The visitor is pushed to the owner terminal based on a request visiting instruction sent by the visitor terminal and identity information corresponding to the visitor in the server, the identity of the visitor is confirmed by the owner terminal based on the owner terminal, and after an unlocking instruction is sent based on the owner terminal, the door lock control equipment executes unlocking operation. According to the method, before the owner opens the access control, the identity of the visitor outside the access control can be effectively screened and confirmed at the terminal, and when the system judges that the visitor is a blacklist person, early warning can be timely carried out, so that the personal safety and the property safety of the owner are ensured.

Description

Access control system control method and computer readable storage medium
Technical Field
The invention relates to the field of access control, in particular to a control method of an access control system and a computer readable storage medium.
Background
As door locks are updated and iterated, the operation of unlocking by users has been developed from the original unlocking by using keys to help users unlock by control software.
For the existing entrance guard system adopting a visual screen terminal or unlocking by a remote key, if people outside the entrance guard are visitors well known by an owner, the owner can directly carry out unlocking operation. However, if a strange visitor is outside the door and the owner is informed that the identity of the owner is a worker such as a distributor, a hydropower overhaul worker and the like, the owner can not confirm the identity authenticity of the strange visitor outside the door only according to image information displayed on the visual screen terminal or an audio conversation of remote unlocking, and a great safety risk exists. Therefore, it is necessary to provide a method for helping the owner to effectively identify and confirm the authenticity of the identity of the stranger outside the entrance before opening the entrance.
Disclosure of Invention
In view of the defects of the prior art and the access control method, an embodiment of the present application aims to provide an access control system control method and a computer-readable storage medium, so as to solve the drawback that an owner cannot effectively identify and confirm the authenticity of the identity of an unfamiliar visitor outside an access control before opening the access control.
The application provides a control method of an access control system, which is applied to the access control system, wherein the access control system comprises a biological characteristic recognition device, a door lock control device, a server, a visitor terminal, an owner terminal and a property terminal, the biological characteristic recognition device is used for capturing face characteristic information, and the method comprises the following steps:
matching the face feature information of the visitor captured by the biological feature recognition equipment with identity information prestored in a server to determine the identity of the visitor, wherein the identity of the visitor comprises a registered visitor, a non-registered visitor and blacklist personnel, the registered visitor is a visitor who has uploaded the identity information to the server, and the non-registered visitor is a visitor who does not upload the identity information to the server;
and the visitor sends a visit request instruction based on the visitor terminal, the identity information of the visitor in the server is pushed to the owner terminal, the owner terminal confirms the identity of the visitor based on the visit request instruction, and after the owner terminal sends an unlocking instruction, the door lock control equipment executes unlocking operation.
Preferably, the access control system comprises a physical access control keyboard;
based on a request visit instruction sent by a visitor terminal, the visitor and the server correspond to identity information of the visitor and push the identity information to an owner terminal, the owner terminal confirms the identity of the visitor and sends an unlocking instruction, and the door lock control equipment executes unlocking operation and comprises:
after the visitor sends out the request instruction of visiting based on entity entrance guard's keyboard, will request instruction of visiting and visitor identity information propelling movement to owner's terminal together, the owner be based on owner's terminal confirms the visitor's identity, and based on after owner's terminal sends the instruction of unblanking, lock controlgear carries out the operation of unblanking.
Preferably, the access control management system comprises a virtual access control keyboard, and after the visitor scans the two-dimensional code based on the visitor terminal, the interface of the visitor terminal generates the virtual access control keyboard for inputting a visit request instruction;
based on a request visit instruction sent by a visitor terminal, the visitor and the server correspond to identity information of the visitor and push the identity information to an owner terminal, the owner terminal confirms the identity of the visitor and sends an unlocking instruction, and the door lock control equipment executes unlocking operation and comprises:
the visitor is based on after virtual entrance guard's keyboard sends the request instruction of visiting, will request instruction of visiting and visitor identity information propelling movement to owner's terminal together, the owner of business is based on owner's terminal confirms the identity of visitor, and based on after owner's terminal sends the instruction of unblanking, lock controlgear carries out the operation of unblanking.
Preferably, the method further comprises:
after the visitor sends out a reservation visit request based on the visitor terminal, the reservation visit request and visitor identity information are pushed to an owner terminal together, and after the owner terminal confirms the reservation visit request and generates reservation passing information, the reservation passing information is sent to the visitor terminal;
after the visitor terminal receives the reservation passing information, if in the reservation visiting time period, the biological characteristic identification equipment grabs the human face characteristic information of the visitor, or the visitor inputs a visiting request based on the virtual access control keyboard, the door lock control equipment executes unlocking operation, and the owner terminal generates prompt information for prompting the visitor to visit.
Preferably, the identity information prestored in the server comprises visitor identity information and blacklist identity information;
the server is used for storing visitor identity information uploaded according to the APP registration information, visitor identity information guided by a third-party platform data interface and visitor identity information provided by a service provider.
Preferably, the visitor sends a visit request instruction based on the visitor terminal, and the server sends identity information corresponding to the visitor to the owner terminal, and after the owner terminal confirms the identity of the visitor and sends an unlocking instruction, the door lock control device executes an unlocking operation including:
if the identity of the visitor is a registered visitor, pushing a visit request instruction sent by the visitor based on the visitor terminal and visitor identity information prestored in a server to an owner terminal, and after the owner terminal confirms the identity of the visitor and sends an unlocking instruction, executing unlocking operation by the door lock control equipment;
if the identity of visitor is the non-registration visitor, with visitor's face characteristic information that biological characteristic identification equipment snatched, perhaps the self-timer image of visitor sends the owner terminal, if the owner is based on the owner terminal is confirmed the visitor is acquainted identity to after sending the instruction of unblanking, lock controlgear carries out the operation of unblanking, if the owner is based on the owner terminal is confirmed the visitor is strange identity, the owner continues to confirm based on video information, the audio information that the owner terminal received the identity of visitor to after judging entrance guard and opening the risk, confirm whether to send the instruction of unblanking.
And if the identity of the visitor is blacklist personnel, sending blacklist visitor warning information to an owner terminal, and synchronously sending the owner warning information to a property terminal.
Preferably, the owner terminal comprises a fixed terminal and a mobile terminal, the fixed terminal and the mobile terminal are compatible or independent to operate, and the owner terminal and the mobile terminals operate synchronously.
Preferably, the access control system is further configured to transmit audio information, video information and text short messages.
Preferentially, in order to facilitate management, the system is provided with a property terminal, the property terminal is used for auditing personal information and face characteristic information uploaded by an owner and sending the data to an equipment database, and the property terminal is also used for a property manager to call, increase, decrease and manage access control data of access control users.
The present application also relates to a computer-readable storage medium having stored thereon a program or instructions which, when executed by a processor, implement the access control system of any of the above.
The embodiment of the invention discloses a control method of an access control system, which is applied to the access control system, wherein the access control system comprises a biological characteristic recognition device, a door lock control device, a server, a visitor terminal, an owner terminal and a property terminal. Matching the face feature information of the visitor captured by the biological feature recognition equipment with identity information prestored in a server to determine the identity of the visitor. And the visitor sends a visit request instruction based on the visitor terminal, the identity information of the visitor in the server is pushed to the owner terminal, the owner terminal confirms the identity of the visitor based on the visit request instruction, and after the owner terminal sends an unlocking instruction, the door lock control equipment executes unlocking operation. According to the method, before the owner opens the access control, the identity of the visitor outside the access control can be effectively screened and confirmed at the terminal, and when the system judges that the visitor is a blacklist person, early warning can be timely carried out, so that the personal safety and the property safety of the owner are ensured.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings required to be used in the embodiments will be briefly described below, and it should be understood that the following drawings only illustrate some embodiments of the present invention, and therefore should not be considered as limiting the scope of the present invention. In the drawings, like constituent elements are similarly numbered.
Fig. 1 shows a flowchart of a method for controlling an access control system according to embodiment 1 of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
Hereinafter, the terms "including", "having", and their equivalents, which may be used in various embodiments of the present invention, are intended to indicate only specific features, numbers, steps, operations, or combinations of the foregoing, and should not be construed as first excluding the presence of or adding to one or more other features, numbers, steps, operations, or combinations of the foregoing.
Furthermore, the terms "first," "second," "third," and the like are used solely to distinguish one from another and are not to be construed as indicating or implying relative importance.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which various embodiments of the present invention belong. The terms (such as those defined in commonly used dictionaries) should be interpreted as having a meaning that is consistent with their contextual meaning in the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein in various embodiments of the present invention.
Referring to fig. 1, fig. 1 shows a flowchart of a method for controlling an access control system according to embodiment 1 of the present invention, which is applied to an access control system, where the access control system includes a biometric device, a door lock control device, a server, a visitor terminal, an owner terminal, and a property terminal, and the biometric device is used to capture face feature information.
The access control system control method in fig. 1 includes the following steps:
step 101, matching the face feature information of the visitor captured by the biological feature recognition device with identity information prestored in a server to determine the identity of the visitor.
The identity of the visitor comprises a registered visitor, a non-registered visitor and blacklist personnel, the registered visitor is a visitor who uploads identity information to the server, and the non-registered visitor is a visitor who does not upload the identity information to the server.
Specifically, the personal information uploaded by the visitor is stored in the server as pre-stored identity information, wherein the personal information uploaded by the visitor includes, but is not limited to, a name, an identity card number, a mobile phone number, and the like, and the personal information to be uploaded and registered is set according to actual needs, which is not limited herein.
Specifically, the biometric information includes: and (4) face feature information. Matching the captured face feature information with the face feature information of the registered visitor prestored in the server to obtain prestored identity information of the corresponding registered visitor.
102, pushing the visitor to an owner terminal based on a visit request instruction sent by the visitor terminal and identity information corresponding to the visitor in the server, confirming the identity of the visitor by the owner terminal, and executing unlocking operation by the door lock control equipment based on the unlocking instruction sent by the owner terminal.
Specifically, the access control management system comprises an entity access control keyboard; based on a request visit instruction sent by a visitor terminal, the visitor corresponds to the identity information of the visitor in the server and is pushed to an owner terminal, the owner terminal confirms the identity of the visitor and sends an unlocking instruction, and then the door lock control equipment executes unlocking operation, and the door lock control equipment comprises: after the visitor sends out the request instruction of visiting based on entity entrance guard's keyboard, will request instruction of visiting and visitor identity information propelling movement to owner's terminal together, the owner be based on owner's terminal confirms the visitor's identity, and based on after owner's terminal sends the instruction of unblanking, lock controlgear carries out the operation of unblanking.
Specifically, the access control management system comprises a virtual access control keyboard, and after the visitor scans the two-dimensional code based on the visitor terminal, the interface of the visitor terminal generates the virtual access control keyboard for inputting a visit request instruction; based on a request visit instruction sent by a visitor terminal, the visitor corresponds to the identity information of the visitor in the server and is pushed to an owner terminal, the owner terminal confirms the identity of the visitor and sends an unlocking instruction, and then the door lock control equipment executes unlocking operation, and the door lock control equipment comprises: the visitor is based on after virtual entrance guard's keyboard sends the request instruction of visiting, will request instruction of visiting and visitor identity information propelling movement to owner's terminal together, the owner of business is based on owner's terminal confirms the identity of visitor, and based on after owner's terminal sends the instruction of unblanking, lock controlgear carries out the operation of unblanking.
It can be understood that:
when a visitor visits an owner, the visitor can scan the two-dimensional code arranged on the access control system through the mobile terminal, and after the two-dimensional code is scanned through the mobile terminal, the operation interface of the mobile terminal of the visitor can generate a virtual keyboard. After the visitor inputs a request visit instruction through the virtual keyboard, the request visit instruction and the identity information of the visitor are pushed to the owner terminal together, so that the owner can judge whether to send an unlocking instruction or not according to the information received by the owner terminal.
In addition, the owner access control system can perform unlocking operation through various modes such as magnetic card verification, key password verification and the like, and is not limited herein.
In addition to the above steps, the summary of the invention is further described below:
specifically, for preventing a visitor from harassing an owner, if the same times of characters in the call request instruction are greater than the threshold value of the number of the same characters, the output of the characters input by the visitor is stopped within a preset time period, wherein the call request instruction is the house number of the owner.
Specifically, after the visitor sends out a reservation visit request based on the visitor terminal, the reservation visit request and visitor identity information are pushed to an owner terminal together, the owner terminal confirms the reservation visit request and generates reservation passing information, and then the reservation passing information is sent to the visitor terminal;
after the visitor terminal receives the reservation passing information, if in the reservation visiting time period, the biological characteristic identification equipment grabs the human face characteristic information of the visitor, or the visitor inputs a visiting request based on the virtual access control keyboard, the door lock control equipment executes unlocking operation, and the owner terminal generates prompt information for prompting the visitor to visit.
In order to prevent the visitor from waiting for opening the door before the entrance guard and causing time waste, the visitor can send out a reservation and visit request at the visitor terminal in advance, the system pushes the identity information of the visitor and the reservation and visit request to the owner terminal, the owner operates and agrees to the visit reservation of the visitor after the owner terminal confirms, and the reservation is transmitted back to the visitor terminal through the information.
After confirming that the visitor terminal receives the reservation passing information of the owner, the visitor directly scans the face in front of the entrance guard biological characteristic recognition equipment in the reserved time period to pass through, or requests to unlock on the virtual entrance guard keyboard, the entrance guard lock is automatically opened to allow the visitor to pass through, and when the door lock is opened, the owner terminal synchronously prompts the visitor to visit for the owner.
Specifically, the identity information prestored in the server comprises visitor identity information and blacklist identity information; the server is used for storing visitor identity information obtained according to the APP registration information, visitor identity information guided by a third-party platform data interface and visitor identity information provided by a service provider.
The visitor may pre-register visitor identity information in a number of different ways and be stored by the server, not limited herein.
Preferably, the visitor sends a visit request instruction based on the visitor terminal, and the server sends identity information corresponding to the visitor to the owner terminal, and after the owner terminal confirms the identity of the visitor and sends an unlocking instruction, the door lock control device executes an unlocking operation including: if the identity of the visitor is a registered visitor, pushing a visit request command sent by the visitor based on the visitor terminal and visitor identity information commands prestored in a server to an owner terminal, and after the owner terminal confirms the identity of the visitor and sends an unlocking command, executing unlocking operation by the door lock control equipment; if the identity of visitor is the non-registration visitor, with visitor's face characteristic information that biological characteristic identification equipment snatched, perhaps the self-timer image of visitor sends the owner terminal, if the owner is based on the owner terminal is confirmed the visitor is acquainted identity to after sending the instruction of unblanking, lock controlgear carries out the operation of unblanking, if the owner is based on the owner terminal is confirmed the visitor is strange identity, the owner continues to confirm based on video information, the audio information that the owner terminal received the identity of visitor to after judging entrance guard and opening the risk, confirm whether to send the instruction of unblanking. And if the identity of the visitor is blacklist personnel, sending blacklist visitor warning information to an owner terminal, and synchronously sending the owner warning information to a property terminal.
Specifically, when the visitor is a person familiar with the owner, the biometric feature recognition system takes a snapshot of the head portrait of the visitor or a self-portrait of the visitor is sent to the owner terminal. The owner confirms that the visitor outside the entrance guard is a familiar person and directly sends an unlocking instruction to the door lock control equipment.
When the visitor outside the entrance guard is a stranger, the owner continues to discriminate and confirm the identity of the visitor through video information, audio information and text short messages, judges whether a risk exists or not and determines whether an unlocking instruction is sent to the door lock control equipment or not.
In addition, when the visitor is judged to be a blacklist person, warning information of the blacklist visitor can be sent to the owner terminal in time, when the owner terminal displays an early warning signal, the owner can selectively give an alarm or take precautionary measures in advance, and then an unlocking instruction is sent to the door lock control equipment based on the owner terminal, so that personal and property safety of the owner is guaranteed.
Specifically, the owner terminal comprises a fixed terminal and a mobile terminal, the fixed terminal and the mobile terminal are compatible or independent to operate, and the owner terminal and the mobile terminals operate synchronously.
In particular, the fixed terminal may be a visual screen terminal. After the visitor sends a request visit instruction, the owner can select to execute the unlocking operation through the mobile terminal or select to execute the unlocking operation through the visual screen terminal according to actual requirements, and the method is not limited herein. When the owner controls the entrance guard through the mobile terminal, the owner does not need to move to the position near the video screen terminal to execute unlocking operation.
Meanwhile, generally, owners of one room are not limited to one, and therefore, an owner terminal and a plurality of mobile terminals operate synchronously, that is, after a visitor sends a visit request instruction, the visit request instruction can be sent to the mobile terminals of all the owners in the same room.
Specifically, the access control system is further used for transmitting audio information, video information and text short messages.
When the owner judges whether to execute the unlocking operation, the more specific identity confirmation is carried out on the visitor outside the entrance guard through the audio information, the video information and the text short message transmitted by the entrance guard system.
Specifically, the property terminal is used for auditing personal information and face feature information uploaded by a property owner and sending the data to the equipment database, and the property terminal is also used for a property manager to take, increase, decrease and manage access control data of access control users.
The property management personnel can realize the monitoring and management of the external personnel in the property management district by calling, increasing, decreasing and managing the access control data of the access control user. Meanwhile, the property end can be networked with a security system, so that the monitoring and management of floating population can be better realized.
An embodiment of the present application further provides a computer-readable storage medium, where a program or an instruction is stored on the computer-readable storage medium, and when the program or the instruction is executed by a processor, the access control system control method is implemented.
In the embodiments provided in the present application, it should be understood that the disclosed method can be implemented in other ways. The implementation steps described above are merely illustrative.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention is essentially embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a smart phone, a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: Read-Only Memory (ROM), Random Access Memory (RAM), and the like, which can store program codes.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention.

Claims (10)

1. The access control system control method is characterized by being applied to an access control system, wherein the access control system comprises a biological characteristic recognition device, a door lock control device, a server, a visitor terminal, an owner terminal and a property terminal, the biological characteristic recognition device is used for capturing face characteristic information, and the method comprises the following steps:
matching the face feature information of the visitor captured by the biological feature recognition equipment with identity information prestored in a server to determine the identity of the visitor, wherein the identity of the visitor comprises a registered visitor, a non-registered visitor and blacklist personnel, the registered visitor is a visitor who has uploaded the identity information to the server, and the non-registered visitor is a visitor who does not upload the identity information to the server;
and the visitor sends a visit request instruction based on the visitor terminal, the identity information of the visitor in the server is pushed to the owner terminal, the owner terminal confirms the identity of the visitor based on the visit request instruction, and after the owner terminal sends an unlocking instruction, the door lock control equipment executes unlocking operation.
2. The access control system control method of claim 1, wherein the access control system comprises a physical access control keyboard;
based on a request visit instruction sent by a visitor terminal, the visitor corresponds to the identity information of the visitor in the server and is pushed to an owner terminal, the owner terminal confirms the identity of the visitor and sends an unlocking instruction, and then the door lock control equipment executes unlocking operation, and the door lock control equipment comprises:
after the visitor sends out the request instruction of visiting based on entity entrance guard's keyboard, will request instruction of visiting and visitor identity information propelling movement to owner's terminal together, the owner be based on owner's terminal confirms the visitor's identity, and based on after owner's terminal sends the instruction of unblanking, lock controlgear carries out the operation of unblanking.
3. The access control system control method according to claim 1 or 2, wherein the access control management system comprises a virtual access control keyboard, and after the visitor scans the two-dimensional code based on the visitor terminal, an interface of the visitor terminal generates the virtual access control keyboard for inputting a request visit instruction;
based on a request visit instruction sent by a visitor terminal, the visitor corresponds to the identity information of the visitor in the server and is pushed to an owner terminal, the owner terminal confirms the identity of the visitor and sends an unlocking instruction, and then the door lock control equipment executes unlocking operation, and the door lock control equipment comprises:
after the visitor sends out the request instruction of visiting based on virtual entrance guard's keyboard, will request instruction of visiting and visitor identity information propelling movement to owner's terminal together, the owner be based on owner's terminal confirms the visitor's identity, and based on after owner's terminal sends the instruction of unblanking, lock controlgear carries out the operation of unblanking.
4. The access control system control method of claim 3, further comprising:
after the visitor sends out a reservation visit request based on the visitor terminal, the reservation visit request and visitor identity information are pushed to an owner terminal together, and after the owner terminal confirms the reservation visit request and generates reservation passing information, the reservation passing information is sent to the visitor terminal;
after the visitor terminal receives the reservation passing information, if in the reservation visiting time period, the biological characteristic identification equipment grabs the human face characteristic information of the visitor, or the visitor inputs a visiting request based on the virtual access control keyboard, the door lock control equipment executes unlocking operation, and the owner terminal generates prompt information for prompting the visitor to visit.
5. The access control system control method according to claim 1, wherein the identity information pre-stored in the server comprises visitor identity information and blacklist identity information;
the server is used for storing visitor identity information uploaded according to the APP registration information, visitor identity information guided by a third-party platform data interface and visitor identity information provided by a service provider.
6. The access control system control method of claim 1 or 5, wherein the step of pushing the visitor to a host terminal based on a visit request command sent by the visitor terminal and identity information corresponding to the visitor in the server, wherein after the host confirms the identity of the visitor based on the host terminal and sends an unlocking command, the door lock control device performs an unlocking operation, comprises:
if the identity of the visitor is a registered visitor, pushing a visit request instruction sent by the visitor based on the visitor terminal and visitor identity information prestored in a server to an owner terminal, and after the owner terminal confirms the identity of the visitor and sends an unlocking instruction, executing unlocking operation by the door lock control equipment;
if the identity of the visitor is a non-registered visitor, sending face feature information of the visitor captured by a biological feature recognition device or a self-photographing image of the visitor to the owner terminal, if the owner confirms that the visitor is a familiar identity based on the owner terminal and sends an unlocking instruction, the door lock control device executes unlocking operation, if the owner confirms that the visitor is a strange identity based on the owner terminal, the owner continuously confirms the identity of the visitor based on video information and audio information received by the owner terminal and confirms whether the unlocking instruction is sent or not after judging the risk of opening the door access;
and if the identity of the visitor is blacklist personnel, the system sends blacklist visitor warning information to the owner terminal and synchronously sends the owner warning information to the property terminal.
7. The access control system control method according to claim 1, wherein the owner terminal comprises a fixed terminal and a mobile terminal, the fixed terminal and the mobile terminal are compatible or independent to operate, and the owner terminal and the mobile terminals operate synchronously.
8. The door access control system control method according to claim 1, wherein the door access control system is further configured to transmit audio information, video information and text messages.
9. The access control system control method of claim 1, wherein the property terminal is configured to audit personal information and face feature information uploaded by a property owner and send data to the device database, and the property terminal is further configured to allow property management personnel to call, increase, decrease, and manage access control data of access control users.
10. A computer-readable storage medium, on which a program or instructions are stored, which, when executed by a processor, implement the steps of the access control system control method according to any one of claims 1 to 9.
CN202110757306.1A 2021-07-05 2021-07-05 Access control system control method and computer readable storage medium Pending CN113643468A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110757306.1A CN113643468A (en) 2021-07-05 2021-07-05 Access control system control method and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110757306.1A CN113643468A (en) 2021-07-05 2021-07-05 Access control system control method and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN113643468A true CN113643468A (en) 2021-11-12

Family

ID=78416715

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110757306.1A Pending CN113643468A (en) 2021-07-05 2021-07-05 Access control system control method and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN113643468A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI835386B (en) * 2022-11-02 2024-03-11 吾微而智股份有限公司 Access management system
CN117994887A (en) * 2024-03-29 2024-05-07 一智科技(成都)有限公司 Gate system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109243026A (en) * 2018-09-03 2019-01-18 日立楼宇技术(广州)有限公司 A kind of caller management method and system
CN109712287A (en) * 2018-12-26 2019-05-03 浙江添锦建筑装饰工程有限公司 A kind of intelligent district access control system
CN111915789A (en) * 2020-08-05 2020-11-10 中国建设银行股份有限公司 Visitor reservation management method, device, equipment and storage medium
CN112837460A (en) * 2020-07-08 2021-05-25 别红成 Unattended intelligent access control system and personnel access management method
CN112927408A (en) * 2021-01-22 2021-06-08 中国工商银行股份有限公司 Visitor visiting processing method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109243026A (en) * 2018-09-03 2019-01-18 日立楼宇技术(广州)有限公司 A kind of caller management method and system
CN109712287A (en) * 2018-12-26 2019-05-03 浙江添锦建筑装饰工程有限公司 A kind of intelligent district access control system
CN112837460A (en) * 2020-07-08 2021-05-25 别红成 Unattended intelligent access control system and personnel access management method
CN111915789A (en) * 2020-08-05 2020-11-10 中国建设银行股份有限公司 Visitor reservation management method, device, equipment and storage medium
CN112927408A (en) * 2021-01-22 2021-06-08 中国工商银行股份有限公司 Visitor visiting processing method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI835386B (en) * 2022-11-02 2024-03-11 吾微而智股份有限公司 Access management system
CN117994887A (en) * 2024-03-29 2024-05-07 一智科技(成都)有限公司 Gate system

Similar Documents

Publication Publication Date Title
US10657782B2 (en) Networked premises security
US20100182123A1 (en) System for monitoring users' time and attendance and controlling users' access
CN104809773A (en) Entrance guard control method, entrance guard control apparatus, and entrance guard system
CN113643468A (en) Access control system control method and computer readable storage medium
CN107945315A (en) Entrance guard controlling method and system
CN106897959A (en) A kind of intelligent Community safety-protection system based on Internet of Things
KR102107203B1 (en) Parking breaker open/close system using portable phone of resident to automatically enter vehicle by parking breaker using KIOSK terminal or tablet PC
CN108174142A (en) A kind of long-range control locking method locked based on intelligent doorbell and intelligent cloud, system
CN101511085A (en) Method and apparatus for limiting usage of mobile terminal function by using personal identification
EP2592830A1 (en) Video door entry system
WO2001016909A1 (en) Method for controlling fingerprint identification door lock system
CN109859350B (en) Remote authorized fingerprint self-service entry method and hotel self-service check-in method
CN111445611A (en) Face recognition access control system
CN112950828A (en) Community pedestrian system and community pedestrian method
CN112927408A (en) Visitor visiting processing method and device
CN111402459A (en) Intelligent access control system with community comprehensive management function and method thereof
JP2009108575A (en) Room entrance/exit control system
JP4344303B2 (en) Entrance / exit management system
KR101165400B1 (en) apparatus and method for management input/output of sers in digital door lock system
JP2006039728A (en) Authentication system and method
CN111862428B (en) Access control method and device
JP4705346B2 (en) Resident management system, occupant management server, and occupant management program
JP4563055B2 (en) Entrance / exit control device for controlling mobile terminal with camera function
CN111377312A (en) Face identification ladder control system
CN113202353A (en) Control method and control device for intelligent door lock and intelligent door lock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20211112