CN113808315A - Access control management method, device and computer readable storage medium - Google Patents
Access control management method, device and computer readable storage medium Download PDFInfo
- Publication number
- CN113808315A CN113808315A CN202111125875.0A CN202111125875A CN113808315A CN 113808315 A CN113808315 A CN 113808315A CN 202111125875 A CN202111125875 A CN 202111125875A CN 113808315 A CN113808315 A CN 113808315A
- Authority
- CN
- China
- Prior art keywords
- access control
- equipment
- response information
- account
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title claims abstract description 53
- 238000003860 storage Methods 0.000 title claims abstract description 13
- 230000004044 response Effects 0.000 claims abstract description 128
- 238000012790 confirmation Methods 0.000 claims abstract description 16
- 230000006870 function Effects 0.000 claims description 26
- 238000000034 method Methods 0.000 claims description 21
- 230000000007 visual effect Effects 0.000 abstract description 13
- 238000010586 diagram Methods 0.000 description 20
- 238000004891 communication Methods 0.000 description 7
- 238000004590 computer program Methods 0.000 description 7
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 230000005236 sound signal Effects 0.000 description 4
- 238000004458 analytical method Methods 0.000 description 3
- 230000001960 triggered effect Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000008447 perception Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/14—Systems for two-way working
- H04N7/141—Systems for two-way working between two video terminals, e.g. videophone
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/183—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
- H04N7/186—Video door telephones
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Telephonic Communication Services (AREA)
Abstract
The application discloses an access control management method, an access control management device and a computer readable storage medium, wherein the access control management method comprises the following steps: when receiving an incoming call request sent by an access control capability platform, outputting prompt information; and when receiving the confirmation operation relative to the prompt message, sending response information corresponding to the incoming call request to the access control capability platform, wherein the response information comprises multimedia data and/or control information acquired by the input device, and the access control capability platform sends the received response information to the access control equipment so that the access control equipment operates according to the received response information. This application passes through user equipment and receives the incoming call request, so, need not additionally to install visual entrance guard's equipment at indoor to reduce entrance guard's administrative cost.
Description
Technical Field
The present application relates to the field of access control technologies, and in particular, to an access control method, an access control device, and a computer-readable storage medium.
Background
At present, an access control system is that an intelligent access control device with a camera and a digital key is installed under a residential quarter, and then a visual intelligent access control device with a liquid crystal display is installed in each owner home. The visitor calls the visitor information to the owner through the intelligent entrance guard equipment below the building, and the owner confirms the identity of the visitor through the visual intelligent entrance guard equipment installed in the house and decides whether to open the door or not. Based on the scheme, a visual access control device must be installed in an owner house, and the visual access control device must be matched with an access control device below a unit floor to be used. Therefore, there is a problem in that the access control cost is high.
Disclosure of Invention
The embodiment of the application aims to solve the problem of high cost of the existing access control management by providing an access control management method, an access control management device and a computer-readable storage medium.
In order to achieve the above object, an aspect of the present application provides an access control method, which is applied to a user equipment, and the method includes:
when receiving an incoming call request sent by an access control capability platform, outputting prompt information;
when receiving the confirmation operation relative to the prompt message, sending response information corresponding to the incoming call request to the access control capability platform, wherein the response information comprises multimedia data and/or control information collected by input equipment, and the access control capability platform sends the received response information to the access control equipment so that the access control equipment operates according to the received response information.
Optionally, the operation of confirming the prompt message includes at least one of:
starting an intercom function of the user equipment and the access control equipment;
canceling the entrance guard of the entrance guard equipment;
and hanging up the incoming call request.
In addition, in order to achieve the above object, another aspect of the present application further provides an access control method applied to an access control device, where the method includes:
sending an incoming call request to an access control capability platform;
receiving response information corresponding to the incoming call request sent by the access control capability platform;
and operating according to the response information, wherein the response information comprises the multimedia data and/or the control information collected by the input equipment.
Optionally, the step of operating according to the response information includes:
starting the talkback function of the user equipment and the access control equipment according to the response information;
or, the entrance guard of the entrance guard equipment is cancelled according to the response information;
or hanging up the incoming call request according to the response information.
In addition, in order to achieve the above object, another aspect of the present application further provides an access control management method, which is applied to an access control capability platform, and the method includes:
receiving an incoming call request sent by an access control device, and sending the incoming call request to user equipment;
receiving response information corresponding to the incoming call request sent by the user equipment, wherein the response information comprises multimedia data and/or control information collected by input equipment;
and sending the response information to the access control equipment so that the access control equipment operates according to the response information.
Optionally, the method further comprises:
receiving a registration request of the user equipment or the access control equipment, wherein the registration request comprises account information bound to the user equipment or the access control equipment, and the account information is stored in an access control service platform;
and acquiring a first account bound to the user equipment or the access control equipment according to the registration request, and performing network registration according to the first account.
In addition, in order to achieve the above object, another aspect of the present application further provides an access control management method, which is applied to an access control service platform, and the method includes:
acquiring address information of a user, a first account of the user, and user equipment and access control equipment corresponding to the user;
respectively configuring accounts of the user equipment and the access control equipment to obtain a second account corresponding to the user equipment and a third account corresponding to the access control equipment;
binding the address information, the first account, the second account and the third account;
and when an account information acquisition request sent by the user equipment or the access control equipment is received, sending the bound account information to the user equipment or the access control equipment.
In addition, in order to achieve the above object, another aspect of the present application further provides an access control device, which includes an output module and a first sending module, wherein:
the output module is used for outputting prompt information when receiving an incoming call request sent by the access control capability platform;
the first sending module is used for sending response information corresponding to the incoming call request to the access control capability platform when receiving confirmation operation relative to the prompt information, wherein the response information comprises multimedia data and/or control information acquired by input equipment, and the access control capability platform sends the received response information to the access control equipment so that the access control equipment operates according to the received response information;
or, entrance guard's management device includes second sending module, first receiving module and operation module, wherein:
the second sending module is used for sending an incoming call request to the access control capability platform;
the first receiving module is used for receiving response information corresponding to the incoming call request sent by the access control capability platform;
the operation module is used for operating according to the response information, and the response information comprises multimedia data and/or control information acquired by the input equipment;
or, entrance guard's management device includes second receiving module, third receiving module and third sending module, wherein:
the second receiving module is used for receiving an incoming call request sent by the access control equipment and sending the incoming call request to the user equipment;
the third receiving module is configured to receive response information corresponding to the incoming call request sent by the user equipment, where the response information includes multimedia data and/or control information acquired by an input device;
the third sending module is configured to send the response information to the access control device, so that the access control device operates according to the response information;
or, entrance guard's management device is including obtaining module, configuration module, binding module and fourth sending module, wherein:
the acquisition module is used for acquiring the address information of a user, a first account of the user, and user equipment and access control equipment corresponding to the user;
the configuration module is used for respectively configuring the account numbers of the user equipment and the access control equipment to obtain a second account number corresponding to the user equipment and a third account number corresponding to the access control equipment;
the binding module is used for binding the address information, the first account, the second account and the third account;
and the fourth sending module is used for sending the bound account information to the user equipment or the access control equipment when receiving the account information obtaining request sent by the user equipment or the access control equipment.
In addition, in order to achieve the above object, another aspect of the present application further provides an access control management device, where the device includes a memory, a processor, and an access control management program stored in the memory and running on the processor, and the processor implements the steps of the access control management method when executing the access control management program.
In addition, to achieve the above object, another aspect of the present application provides a computer-readable storage medium, where an access control management program is stored, and when the access control management program is executed by a processor, the access control management program implements the steps of the access control management method as described above.
The application provides an access control management method, which comprises the steps of outputting prompt information when receiving an incoming call request sent by an access control capability platform; and when receiving the confirmation operation relative to the prompt message, sending response information corresponding to the incoming call request to the access control capability platform, wherein the response information comprises multimedia data and/or control information acquired by the input device, and the access control capability platform sends the received response information to the access control equipment so that the access control equipment operates according to the received response information. This application passes through user equipment and receives the incoming call request, so, need not additionally to install visual entrance guard's equipment at indoor to reduce entrance guard's administrative cost.
Drawings
Fig. 1 is a schematic terminal structure diagram of a hardware operating environment according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a first embodiment of the access control management method of the present application;
fig. 3 is a schematic flow chart of a second embodiment of the access control method of the present application;
fig. 4 is a schematic flow chart of a third embodiment of the access control method of the present application;
fig. 5 is a schematic flow chart of a fourth embodiment of the access control management method of the present application;
fig. 6 is a schematic block diagram of the access control device of the present application;
fig. 7 is a schematic block diagram of another access control device according to the present application;
fig. 8 is a schematic block diagram of a door access control device according to the present application;
fig. 9 is a schematic block diagram of a door access control device according to the present application;
fig. 10 is a system framework diagram of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The main solution of the embodiment of the application is as follows: when receiving an incoming call request sent by an access control capability platform, outputting prompt information; when receiving the confirmation operation relative to the prompt message, sending response information corresponding to the incoming call request to the access control capability platform, wherein the response information comprises multimedia data and/or control information collected by input equipment, and the access control capability platform sends the received response information to the access control equipment so that the access control equipment operates according to the received response information.
Because in current entrance guard management scheme, a visual entrance guard equipment must be installed at the owner's house to this visual entrance guard equipment must be supporting with the entrance guard equipment of unit downstairs just can use. Therefore, there is a problem in that the access control cost is high.
When an incoming call request sent by the access control capability platform is received, prompt information is output; and when receiving the confirmation operation relative to the prompt message, sending response information corresponding to the incoming call request to the access control capability platform, wherein the response information comprises multimedia data and/or control information acquired by the input device, and the access control capability platform sends the received response information to the access control equipment so that the access control equipment operates according to the received response information. This application passes through user equipment and receives the incoming call request, so, need not additionally to install visual entrance guard's equipment at indoor to reduce entrance guard's administrative cost.
As shown in fig. 1, fig. 1 is a schematic structural diagram of a terminal device in a hardware operating environment according to an embodiment of the present application.
As shown in fig. 1, the terminal device may include: a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, a communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the terminal device configuration shown in fig. 1 does not constitute a limitation of the terminal device and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a computer-readable storage medium, may include an access control program therein.
In the terminal device shown in fig. 1, the network interface 1004 is mainly used for data communication with the background server; the user interface 1003 is mainly used for data communication with a client (user side); when the terminal is a user device, the processor 1001 may be configured to call the access control management program in the memory 1005, and perform the following operations:
when receiving an incoming call request sent by an access control capability platform, outputting prompt information;
when receiving the confirmation operation relative to the prompt message, sending response information corresponding to the incoming call request to the access control capability platform, wherein the response information comprises multimedia data and/or control information collected by input equipment, and the access control capability platform sends the received response information to the access control equipment so that the access control equipment operates according to the received response information.
When the terminal is an access control device, the processor 1001 may be configured to call an access control management program in the memory 1005, and perform the following operations:
sending an incoming call request to an access control capability platform;
receiving response information corresponding to the incoming call request sent by the access control capability platform;
and operating according to the response information, wherein the response information comprises the multimedia data and/or the control information collected by the input equipment.
When the terminal is a platform for access control capability, the processor 1001 may be configured to call an access control management program in the memory 1005, and perform the following operations:
receiving an incoming call request sent by an access control device, and sending the incoming call request to user equipment;
receiving response information corresponding to the incoming call request sent by the user equipment, wherein the response information comprises multimedia data and/or control information collected by input equipment;
and sending the response information to the access control equipment so that the access control equipment operates according to the response information.
When the terminal is an access service platform, the processor 1001 may be configured to call an access management program in the memory 1005, and perform the following operations:
acquiring address information of a user, a first account of the user, and user equipment and access control equipment corresponding to the user;
respectively configuring accounts of the user equipment and the access control equipment to obtain a second account corresponding to the user equipment and a third account corresponding to the access control equipment;
binding the address information, the first account, the second account and the third account;
and when an account information acquisition request sent by the user equipment or the access control equipment is received, sending the bound account information to the user equipment or the access control equipment.
Referring to fig. 2, fig. 2 is a schematic flow chart of a first embodiment of the access control management method according to the present application.
It should be noted that, although a logical order is shown in the flowcharts, in some cases, the steps shown or described may be performed in an order different from that shown or described.
The access control management method of the embodiment is applied to user equipment and comprises the following steps:
step S10, when receiving an incoming call request sent by the access control capability platform, outputting prompt information;
it should be noted that, referring to fig. 10, fig. 10 is a schematic diagram of a system framework of the present application, where the system includes a user device (including a mobile phone, a sound box with a screen, a sound box without a screen, etc.), an access control device (including a camera, a display screen, etc.), and an access control platform (including an access control capability platform and an access control service platform). The entrance guard equipment is communicated with the user equipment through the entrance guard platform, and meanwhile, the entrance guard platform can be connected with the entrance guard equipment and the user equipment in the community.
In this embodiment, when a visitor sends an incoming call request to an owner through an access control device, the incoming call request firstly passes through an access control capability platform, and then is forwarded to a user device through the access control capability platform, and when the user device successfully receives the incoming call request, prompt information is output. For example, when the mobile phone and the sound box receive an incoming call request, the mobile phone and the sound box with the screen ring at the same time, wherein the mobile phone and the sound box with the screen receive a VoLTE video incoming call request, the sound box without the screen receives a VoLTE audio incoming call request, and VoLTE (Voice over Long-Term Evolution Voice bearer) is a high-speed wireless communication standard facing the mobile phone and the data terminal. Secondly, the sound box with the screen is generally placed in a living room, and the sound box without the screen is generally placed in a bedroom (room), or the user can determine the positions of the sound box with the screen and the sound box without the screen according to the requirement of the user.
And step S20, when receiving the confirmation operation relative to the prompt information, sending response information corresponding to the incoming call request to the access control capability platform, wherein the response information comprises multimedia data and/or control information collected by input equipment, and the access control capability platform sends the received response information to the access control equipment so that the access control equipment operates according to the received response information.
When the mobile phone or the sound box rings, the access control equipment can output a ring back tone to wait for the owner to answer and open the door. At this time, the owner may perform corresponding confirmation operation based on the ringing information, for example, the owner may open the intercom function of the mobile phone (or the sound box) and the access control device, or cancel the access control of the access control device, or hang up the incoming call request of the access control device. When the mobile phone or the sound box receives the confirmation operation triggered by the ringing information of the user, response information corresponding to the incoming call request is sent to the entrance guard capability platform, and at the moment, the entrance guard capability platform sends the received response information to the entrance guard equipment, so that the entrance guard equipment operates according to the received response information. The response information includes multimedia data and/or control information, such as key information, voice information, etc., collected by an input device (including a mobile phone, a sound box, etc.).
In an embodiment, when the host finds that there is an incoming call of a visitor, any ringing device can be selected to answer the incoming call and perform operations such as talkback, door opening refusal and the like. For example, the owner selects a mobile phone to answer a VoLTE video call, at this time, the access control capability platform hangs up calls from other speakers, the visitor does not sense the answering operation of the owner, the visitor still hears the ring back tone, and the owner can hear the voice of the visitor and see the video of the visitor. Then, the owner can select to press the number key 0 on the dial plate of the mobile phone to start the talkback function, or select the key # to realize the door opening operation, and if the owner does not want to open the door, the current conversation can be directly hung up. When the owner selects the key 0 or # on the mobile phone dial plate, the DTMF audio signal corresponding to the key is packaged into the audio stream of the current call and sent to the access control capability platform, then the access control capability platform sends the audio stream to the corresponding access control equipment, the DTMF key signal is analyzed by the access control equipment, the talkback function is opened if the DTMF audio signal is found to be 0, and the access control is opened and the current call is hung up if the DTMF audio signal is found to be #.
The owner selects the sound box with the screen to answer the VoLTE video call, at the moment, the entrance guard ability platform can hang up the incoming calls of the mobile phone and other sound boxes without the screen, the visitor has no perception on the answering operation of the owner, the sound of the visitor is still heard as the ring back tone, and the owner can hear the sound of the visitor and see the video of the visitor. Then, the owner can select a key to realize the corresponding function in the display screen of the sound box with the screen, for example, select the number key 0 to start the intercom function, or select the key # to realize the door opening operation, if the owner does not want to open the door, the owner can directly hang up the current conversation. When the owner selects the key 0 or the # key, the DTMF audio signal corresponding to the key can be packaged into the audio stream of the current call, the audio stream is sent to the access control capability platform, then the access control capability platform sends the audio stream to the corresponding access control equipment, the DTMF key signal is analyzed by the access control equipment, the talkback function is opened if the audio stream is found to be 0, and the access control is opened and the current call is hung up if the audio stream is found to be the # key.
The owner selects a non-screen sound box to answer the VoLTE audio call, at the moment, the access control capability platform can hang up the mobile phone and other incoming calls with the screen sound box, the visitor has no perception on the answering operation of the owner, the ring back tone is still heard, and the owner can hear the sound of the visitor. Then, the owner can implement the corresponding operation by sending voice, for example, the voice information sent by the owner is "open the intercom function between the speaker and the access control device", at this time, the speaker without the screen performs recognition processing on the received voice information to obtain keywords in the voice information, such as "open" and "intercom function", after recognizing the keywords, a corresponding audio stream is generated based on the keywords, and the audio stream is sent to the access control capability platform, and then the access control capability platform sends the audio stream to the corresponding access control device, and after the access control device parses the corresponding keywords, the corresponding function is run according to the keywords. Optionally, the screenless sound box may further perform operations such as talkback, door opening refusal, and the like by pressing a key, for example, directly perform corresponding confirmation operations through a key arranged on the screenless sound box.
The embodiment provides an access control management method based on VoLTE audio and video conversation, which adopts a mobile phone and/or a sound box to replace a visual access control device in a user home and an access control device downstairs to communicate, realizes operations such as speaking and opening a door, and thus, the user home does not need to additionally install a visual access control device, thereby reducing the cost of access control management. Secondly, when the visitor calls the user through the access control equipment, the loudspeaker box and the mobile phone in the user's home ring at the same time, so that the user can receive the incoming call information of the visitor in time, and the probability of missing the incoming call of the visitor is reduced. Finally, the access control equipment and the mobile phone terminal (or the sound box) communicate by using audio and video conversation based on VoLTE, so that the transmission delay of audio and video streams is small, the video picture is smooth, and the user experience is improved.
Further, referring to fig. 3, a second embodiment of the access control method of the present application is provided.
The access control management method is applied to access control equipment and comprises the following steps:
step S30, sending an incoming call request to the access control capability platform;
when a visitor needs to access the owner, the incoming call request can be triggered through the access control equipment, and then the incoming call request is sent to the access control capability platform through the access control equipment, so that the access control capability platform sends the incoming call request to the user equipment. In one embodiment, a visitor inputs an owner house number (661) into an entrance guard device corresponding to a unit downstairs in an owner home (e.g., located in 1 building and 2 unit 661 rooms in a cell), and clicks a call button on the entrance guard device, at this time, a call request is triggered, and the call request is sent to a user device via an entrance guard capability platform, then, a sound box with a screen and a mobile phone in the owner home can receive a voice over long term evolution (VoLTE) video call (a sound box without a screen receives a VoLTE audio call), and meanwhile, the visitor can listen to a ring back tone at the entrance guard device side, and waits for the owner to answer and open a door.
Step S40, receiving response information corresponding to the incoming call request sent by the access control capability platform;
after the incoming call request is sent to the user equipment by the access control capability platform, response information corresponding to the incoming call request sent by the user equipment can be received, and at the moment, the access control capability platform can send the received response information to the access control equipment.
And step S50, operating according to the response information, wherein the response information comprises the multimedia data and/or the control information collected by the input equipment.
After receiving response information corresponding to the incoming call request, the access control equipment acquires multimedia data and/or control information in the response information, and then operates based on the multimedia data and/or the control information. For example, when the response information is a DTMF key signal, if the response information is analyzed to obtain a key 0, the intercom function of the user equipment and the access control equipment is started; and if the key # is obtained through analysis, opening the entrance guard and hanging up the current call. If the signal is a hang-up signal, the current incoming call request is directly hung up. Or when the response information is voice information, if the voice keyword obtained by analysis is 'open talkback function', opening the talkback function between the user equipment and the entrance guard equipment; and if the voice keyword obtained by analysis is 'cancel entrance guard', canceling the entrance guard of the entrance guard equipment.
In this embodiment, a VoLTE audio/video call request is sent to a user equipment through a door access device, so that an owner can communicate with the door access device based on the user equipment, thereby reducing the cost of door access management.
Further, referring to fig. 4, a third embodiment of the access control management method of the present application is provided.
The access control management method is applied to an access control capability platform and comprises the following steps:
step S60, receiving an incoming call request sent by the access control equipment, and sending the incoming call request to user equipment;
when a visitor triggers an incoming call request at the side of the access control equipment, the access control equipment sends the incoming call request to the access control capability platform, and then the access control capability platform sends the incoming call request to the user equipment.
Step S70, receiving response information corresponding to the incoming call request sent by the user equipment, where the response information includes multimedia data and/or control information collected by an input device;
after receiving the incoming call request sent by the access control capability platform, the user equipment sends response information corresponding to the incoming call request to the access control capability platform, and at the moment, the access control capability platform receives the response information sent by the user equipment, wherein the response information comprises multimedia data and/or control information, such as key information, voice information and the like, collected by the input equipment.
And step S80, sending the response information to the access control equipment so that the access control equipment operates according to the response information.
The access control capability platform sends the received response information to the access control equipment so that the access control equipment operates based on the response information, for example, when the response information is a DTMF key signal, if the access control equipment analyzes to obtain a key 0, the talkback function of the user equipment and the access control equipment is started; and if the entrance guard equipment analyzes to obtain the key #, opening the entrance guard and hanging up the current call. When the response information is voice information, if the voice keyword obtained by analyzing the access control equipment is 'open talkback function', opening the talkback function between the user equipment and the access control equipment; and if the voice keyword obtained by analyzing the access control equipment is 'cancel access control', canceling the access control of the access control equipment.
The network registration is needed to realize the communication between the access control equipment and the user equipment. In an embodiment, after the door control device or the user equipment is started and successfully connected to the network, the https protocol is firstly used to obtain the virtual account information bound with the door control service platform, and then the PbSIP proprietary protocol based on the TCP is used to register the virtual account information on the door control capability platform. After receiving a registration request sent by access control equipment or user equipment, the access control capability platform queries a database, acquires IMS account information of corresponding equipment, and then registers the IMS account to a core network by adopting a standard SIP protocol.
In this embodiment, through entrance guard's ability platform retransmission incoming call request and response message to realize communicating between user equipment and the entrance guard equipment, so, need not to install visual entrance guard in the owner and also can realize entrance guard's management, thereby reduced entrance guard administrative cost.
Further, referring to fig. 5, a fourth embodiment of the access control management method of the present application is provided.
The access control management method of the embodiment is applied to an access control service platform and comprises the following steps:
step S90, acquiring address information of a user, a first account of the user, and user equipment and access control equipment corresponding to the user;
the access control service platform is mainly responsible for managing access control equipment, user equipment and user information of each cell unit, so that the access control service platform can acquire address information of users in a cell, a first account number of the users, equipment bound by the users and the access control equipment, wherein the address information of the users comprises the cell, the floor, the room number and the like of the users, such as a cell 661 located in cell 1 and cell 2. The first account of the user is an IMS account, wherein the user can obtain a designated IMS account (i.e., the first account) after opening the access control service in the business hall, and then the user can bind devices such as a sound box and a mobile phone in a home through the access control APP. Meanwhile, the property manager also needs to open an access control service in a business hall to obtain a specified IMS account, and then binds access control equipment of each unit of the community through an access control APP.
Step S100, respectively configuring accounts of the user equipment and the access control equipment to obtain a second account corresponding to the user equipment and a third account corresponding to the access control equipment;
after the user equipment and the access control equipment are successfully bound through the access control APP, the access control service platform allocates a virtual account for each user equipment and each access control equipment, namely each user equipment corresponds to a second account, and each access control equipment corresponds to a third account.
Step S110, binding the address information, the first account, the second account and the third account;
the access control service platform binds the address information of the user, a first account (IMS account), a second account and a third account. For example, after the entrance guard service platform completes the virtual account number allocation, the user equipment corresponding to each user and the virtual account number information of the entrance guard equipment are bound with the corresponding IMS account number, and meanwhile, the entrance guard service platform can also bind the entrance guard equipment of different units and the house numbers of the users, so that entrance guards below different units can correctly call a sound box and a mobile phone in an owner's house by inputting the house numbers.
And step S120, when an account information acquisition request sent by the user equipment or the access control equipment is received, sending the bound account information to the user equipment or the access control equipment.
And when receiving an account information acquisition request sent by the user equipment or the access control equipment, the access control service platform sends the bound account information to the user equipment or the access control equipment. For example, before network registration, the user equipment or the access control device needs to send a request for acquiring virtual account information to the access control service platform, and after receiving the request, the access control service platform sends the bound account information to the user equipment or the access control device.
According to the embodiment, the address information of the user, the account information of the user and the account information of the equipment are subjected to associated management, so that the target object can be quickly determined when the service capability platform forwards the incoming call request or the response information, and the access control management efficiency is improved.
In addition, the application also provides an access control management device, the device comprises a memory, a processor and an access control management program which is stored on the memory and runs on the processor, and when receiving an incoming call request sent by the access control capability platform, the device outputs prompt information; and when receiving the confirmation operation relative to the prompt message, sending response information corresponding to the incoming call request to the access control capability platform, wherein the response information comprises multimedia data and/or control information acquired by the input device, and the access control capability platform sends the received response information to the access control equipment so that the access control equipment operates according to the received response information. This application passes through user equipment and receives the incoming call request, so, need not additionally to install visual entrance guard's equipment at indoor to reduce entrance guard's administrative cost.
Further, referring to fig. 6, fig. 6 is a schematic block diagram of the access control management device of the present application.
The access control device 100 includes an output module 10 and a first transmission module 20, wherein:
the output module 10 is configured to output a prompt message when receiving an incoming call request sent by the access control capability platform;
the first sending module 20 is configured to send response information corresponding to the incoming call request to the access control capability platform when receiving a confirmation operation corresponding to the prompt message, where the response information includes multimedia data and/or control information acquired by an input device, and the access control capability platform sends the received response information to the access control device, so that the access control device operates according to the received response information.
Further, the access control device 100 further includes an opening module, a canceling module and a hang-up module;
the opening module is used for opening the talkback function of the user equipment and the access control equipment;
the cancelling module is used for cancelling the access control of the access control equipment;
and the hanging module is used for hanging up the incoming call request.
Further, referring to fig. 7, fig. 7 is a schematic diagram of another module of the access control device of the present application.
The access control device 100 includes a second sending module 30, a first receiving module 40, and an operating module 50, wherein:
the second sending module 30 is configured to send an incoming call request to the access control capability platform;
the first receiving module 40 is configured to receive response information corresponding to the incoming call request sent by the access control capability platform;
the operation module 50 is configured to operate according to the response information, where the response information includes multimedia data and/or control information acquired by the input device.
Further, the operation module 50 includes an opening unit, a canceling unit and a hang-up unit;
the opening unit is used for opening the talkback function of the user equipment and the access control equipment according to the response information;
the cancelling unit is used for cancelling the access control of the access control equipment according to the response information;
and the hanging unit is used for hanging up the incoming call request according to the response information.
Further, referring to fig. 8, fig. 8 is a schematic block diagram of the access control device of the present application.
The access control device 100 includes a second receiving module 60, a third receiving module 70 and a third sending module 80, wherein:
the second receiving module 60 is configured to receive an incoming call request sent by the access control device, and send the incoming call request to the user equipment;
the third receiving module 70 is configured to receive response information corresponding to the incoming call request sent by the user equipment, where the response information includes multimedia data and/or control information acquired by an input device;
and the third sending module 80 is configured to send the response information to the access control device, so that the access control device operates according to the response information.
Further, the access control device 100 further includes a fourth receiving module and a registration module;
the fourth receiving module is configured to receive a registration request of the user equipment or the access control equipment, where the registration request includes account information bound to the user equipment or the access control equipment, and the account information is stored in an access control service platform;
and the registration module is used for acquiring a first account bound by the user equipment or the access control equipment according to the registration request and performing network registration according to the first account.
Further, referring to fig. 9, fig. 9 is a schematic block diagram of the access control device according to the present application.
The access control management device 100 includes an obtaining module 90, a configuration module 100, a binding module 110, and a fourth sending module 120, wherein:
the obtaining module 90 is configured to obtain address information of a user, a first account of the user, and user equipment and access control equipment corresponding to the user;
the configuration module 100 is configured to configure the account numbers of the user equipment and the access control equipment respectively to obtain a second account number corresponding to the user equipment and a third account number corresponding to the access control equipment;
the binding module 110 is configured to bind the address information, the first account, the second account, and the third account;
the fourth sending module 120 is configured to send the bound account information to the user equipment or the access control device when receiving an account information obtaining request sent by the user equipment or the access control device.
The implementation of the functions of each module of the access control management device is similar to the process in the embodiment of the method, and is not repeated here.
In addition, the present application also provides a computer-readable storage medium, in which a program of the access control management method is stored, and when the program of the access control management method is executed by a processor, the steps of the access control management method are implemented.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should be noted that in the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The application can be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
While alternative embodiments of the present application have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following appended claims be interpreted as including alternative embodiments and all such alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.
Claims (10)
1. An access control management method, applied to a user equipment, the method comprising:
when receiving an incoming call request sent by an access control capability platform, outputting prompt information;
when receiving the confirmation operation relative to the prompt message, sending response information corresponding to the incoming call request to the access control capability platform, wherein the response information comprises multimedia data and/or control information collected by input equipment, and the access control capability platform sends the received response information to the access control equipment so that the access control equipment operates according to the received response information.
2. The access control management method according to claim 1, wherein the confirmation operation of the prompt message includes at least one of:
starting an intercom function of the user equipment and the access control equipment;
canceling the entrance guard of the entrance guard equipment;
and hanging up the incoming call request.
3. An access control management method is applied to access control equipment, and the method comprises the following steps:
sending an incoming call request to an access control capability platform;
receiving response information corresponding to the incoming call request sent by the access control capability platform;
and operating according to the response information, wherein the response information comprises the multimedia data and/or the control information collected by the input equipment.
4. The access control management method of claim 3, wherein the step of operating according to the response message comprises:
starting the talkback function of the user equipment and the access control equipment according to the response information;
or, the entrance guard of the entrance guard equipment is cancelled according to the response information;
or hanging up the incoming call request according to the response information.
5. The access control management method is applied to an access control capability platform, and comprises the following steps:
receiving an incoming call request sent by an access control device, and sending the incoming call request to user equipment;
receiving response information corresponding to the incoming call request sent by the user equipment, wherein the response information comprises multimedia data and/or control information collected by input equipment;
and sending the response information to the access control equipment so that the access control equipment operates according to the response information.
6. The access control management method of claim 5, wherein the method further comprises:
receiving a registration request of the user equipment or the access control equipment, wherein the registration request comprises account information bound to the user equipment or the access control equipment, and the account information is stored in an access control service platform;
and acquiring a first account bound to the user equipment or the access control equipment according to the registration request, and performing network registration according to the first account.
7. The access control management method is applied to an access control service platform, and comprises the following steps:
acquiring address information of a user, a first account of the user, and user equipment and access control equipment corresponding to the user;
respectively configuring accounts of the user equipment and the access control equipment to obtain a second account corresponding to the user equipment and a third account corresponding to the access control equipment;
binding the address information, the first account, the second account and the third account;
and when an account information acquisition request sent by the user equipment or the access control equipment is received, sending the bound account information to the user equipment or the access control equipment.
8. The utility model provides an entrance guard management device which characterized in that, entrance guard management device includes output module and first sending module, wherein:
the output module is used for outputting prompt information when receiving an incoming call request sent by the access control capability platform;
the first sending module is used for sending response information corresponding to the incoming call request to the access control capability platform when receiving confirmation operation relative to the prompt information, wherein the response information comprises multimedia data and/or control information acquired by input equipment, and the access control capability platform sends the received response information to the access control equipment so that the access control equipment operates according to the received response information;
or, entrance guard's management device includes second sending module, first receiving module and operation module, wherein:
the second sending module is used for sending an incoming call request to the access control capability platform;
the first receiving module is used for receiving response information corresponding to the incoming call request sent by the access control capability platform;
the operation module is used for operating according to the response information, and the response information comprises multimedia data and/or control information acquired by the input equipment;
or, entrance guard's management device includes second receiving module, third receiving module and third sending module, wherein:
the second receiving module is used for receiving an incoming call request sent by the access control equipment and sending the incoming call request to the user equipment;
the third receiving module is configured to receive response information corresponding to the incoming call request sent by the user equipment, where the response information includes multimedia data and/or control information acquired by an input device;
the third sending module is configured to send the response information to the access control device, so that the access control device operates according to the response information;
or, entrance guard's management device is including obtaining module, configuration module, binding module and fourth sending module, wherein:
the acquisition module is used for acquiring the address information of a user, a first account of the user, and user equipment and access control equipment corresponding to the user;
the configuration module is used for respectively configuring the account numbers of the user equipment and the access control equipment to obtain a second account number corresponding to the user equipment and a third account number corresponding to the access control equipment;
the binding module is used for binding the address information, the first account, the second account and the third account;
and the fourth sending module is used for sending the bound account information to the user equipment or the access control equipment when receiving the account information obtaining request sent by the user equipment or the access control equipment.
9. An access management device comprising a memory, a processor and an access management program stored on the memory and running on the processor, the processor implementing the steps of the method of any one of claims 1 to 7 when executing the access management program.
10. A computer-readable storage medium, having stored thereon a door access management program, which when executed by a processor, performs the steps of the method of any of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111125875.0A CN113808315A (en) | 2021-09-24 | 2021-09-24 | Access control management method, device and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111125875.0A CN113808315A (en) | 2021-09-24 | 2021-09-24 | Access control management method, device and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113808315A true CN113808315A (en) | 2021-12-17 |
Family
ID=78896608
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111125875.0A Pending CN113808315A (en) | 2021-09-24 | 2021-09-24 | Access control management method, device and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113808315A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999056429A1 (en) * | 1998-04-24 | 1999-11-04 | Identix Incorporated | Personal identification system and method |
CN102833136A (en) * | 2011-06-15 | 2012-12-19 | 中兴通讯股份有限公司 | Digital home control method and wireless terminal |
CN106910267A (en) * | 2017-01-05 | 2017-06-30 | 深圳市多度科技有限公司 | Intelligent access control system and application method thereof |
CN107103668A (en) * | 2017-04-19 | 2017-08-29 | 腾讯科技(深圳)有限公司 | A kind of gate control system information transferring method, device and server |
CN110290031A (en) * | 2019-06-12 | 2019-09-27 | 恒大智慧科技有限公司 | A kind of visitor's processing method, terminal and storage medium based on smart home |
CN110738778A (en) * | 2019-09-27 | 2020-01-31 | 北京小米移动软件有限公司 | control forbidding method, device, equipment and storage medium |
CN110910541A (en) * | 2019-12-02 | 2020-03-24 | 中移(杭州)信息技术有限公司 | Access control method, system, network device and computer readable storage medium |
-
2021
- 2021-09-24 CN CN202111125875.0A patent/CN113808315A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999056429A1 (en) * | 1998-04-24 | 1999-11-04 | Identix Incorporated | Personal identification system and method |
CN102833136A (en) * | 2011-06-15 | 2012-12-19 | 中兴通讯股份有限公司 | Digital home control method and wireless terminal |
CN106910267A (en) * | 2017-01-05 | 2017-06-30 | 深圳市多度科技有限公司 | Intelligent access control system and application method thereof |
CN107103668A (en) * | 2017-04-19 | 2017-08-29 | 腾讯科技(深圳)有限公司 | A kind of gate control system information transferring method, device and server |
CN110290031A (en) * | 2019-06-12 | 2019-09-27 | 恒大智慧科技有限公司 | A kind of visitor's processing method, terminal and storage medium based on smart home |
CN110738778A (en) * | 2019-09-27 | 2020-01-31 | 北京小米移动软件有限公司 | control forbidding method, device, equipment and storage medium |
CN110910541A (en) * | 2019-12-02 | 2020-03-24 | 中移(杭州)信息技术有限公司 | Access control method, system, network device and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105656915B (en) | Immediate communication methods, devices and systems | |
CN102083011B (en) | Intercommunication system and call processing method thereof for multiple calling terminals | |
CN100407819C (en) | Method for monitoring cluster service process and cluster communication system | |
CN102194269A (en) | Door control system based on communication network and working method thereof | |
JP2012517642A (en) | Multimedia communication in virtual environment | |
CN112887194B (en) | Interactive method, device, terminal and storage medium for realizing communication of hearing-impaired people | |
CN105141798A (en) | Unit building door management method and unit building door system | |
GB2560441B (en) | Automatically delaying playback of a voice message at a captioning device | |
CN105611217A (en) | Video doorbell and control system thereof | |
CN111769967A (en) | Intelligent configuration method and device for intercom equipment, server, terminal equipment and storage medium | |
CN106464759B (en) | Message method, LAN gateway and wearable device in a kind of local area network | |
CN109120804B (en) | Outbound system based on response information identification | |
CN106603994A (en) | Electronic doorbell interception and break-in management apparatus and method | |
US11837235B2 (en) | Communication transfer between devices | |
US8363574B2 (en) | Monitoring participants in a conference call | |
CN113808315A (en) | Access control management method, device and computer readable storage medium | |
CN105898083A (en) | Phone internet of things system and method | |
EP1519510B1 (en) | Multicast system and corresponding communication terminal | |
CN116962615A (en) | Communication method, device, terminal, intelligent desk lamp, server and storage medium | |
CN107277277B (en) | Call center interaction system and method | |
CN110557610A (en) | Calling system and method for door phone, door phone and storage medium | |
CN111770304A (en) | Method and device for establishing video communication | |
CN110493473A (en) | Method, equipment and the computer storage medium of caller identification | |
CN1878218A (en) | Method for changing mobile device ring mode by intercepting signal and its application device | |
CN103139407B (en) | Internet telephone system and device thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20211217 |
|
RJ01 | Rejection of invention patent application after publication |