CN114373253B - Bullet warehouse protection door management method capable of realizing remote authorization management - Google Patents

Bullet warehouse protection door management method capable of realizing remote authorization management Download PDF

Info

Publication number
CN114373253B
CN114373253B CN202111578230.2A CN202111578230A CN114373253B CN 114373253 B CN114373253 B CN 114373253B CN 202111578230 A CN202111578230 A CN 202111578230A CN 114373253 B CN114373253 B CN 114373253B
Authority
CN
China
Prior art keywords
user
door
authentication
protective door
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111578230.2A
Other languages
Chinese (zh)
Other versions
CN114373253A (en
Inventor
李红斌
张庭勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Heliding Technology Co ltd
Original Assignee
Chengdu Heliding Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Heliding Technology Co ltd filed Critical Chengdu Heliding Technology Co ltd
Priority to CN202111578230.2A priority Critical patent/CN114373253B/en
Publication of CN114373253A publication Critical patent/CN114373253A/en
Application granted granted Critical
Publication of CN114373253B publication Critical patent/CN114373253B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications

Abstract

The invention discloses a bullet magazine protective door management method capable of being remotely authorized and managed, which relates to the technical field of army, police and ordnance storage devices of banking financial systems and is used for solving the technical problems that a user cannot timely carry out identity verification and take away guns in a bullet magazine on site; the door closing is that whether the door is closed in place or not is judged by a sensor of the protective door, the state is reported to a management background, meanwhile, the protective door gives a door closing prompt which comprises sound and images, the user is entitled by remote authorization, and the protective door is opened by further identifying the identity of the user.

Description

Bullet warehouse protection door management method capable of realizing remote authorization management
Technical Field
The invention relates to the technical field of army storage devices of army, public security and banking financial systems, in particular to the technical field of a bullet warehouse protection door management method capable of remotely authorizing management.
Background
The national regulations of the gun support use management of the full-time daemon escort personnel prescribe that the units for the law to equip the daemon gun with escort public service should set up a special gun safekeeping house (room) or use a special safe box to intensively and uniformly keep the equipped guns and ammunition. The gun magazine door is arranged in the gun magazine, seals and opens the gun ammunition magazine, is widely used in the gun ammunition magazine, has a good use effect, and gradually increases the use requirement of people on the gun magazine door along with the continuous development of society.
The gun and bullet warehouse management method comprises the steps that gun and bullet warehouse management is carried out on basic units such as police dispatch houses and patrol police teams according to requirements of gun (ammunition) warehouse risk classification and safety precaution requirements (GA 1016-2012) of the industry standard of the police department, two persons are required to arrive at the scene at the same time for opening the gun and bullet warehouse, and the gun (ammunition) warehouse can be opened and closed respectively and independently.
In actual operation, as the gun magazine manager of the basic unit manages the gun magazine, other works need to be processed, and how to ensure that the user arrives at the scene in time to take the gun is an actual situation existing in the actual work of the basic unit.
Disclosure of Invention
The invention aims at: in order to solve the problem that a user cannot timely verify identity and take away a gun in a gun magazine on site, the invention provides a gun magazine protective door management method capable of remotely authorizing management.
The invention adopts the following technical scheme for realizing the purposes:
a door opening step: 1) The first user and the second user click application identity verification on the protective door of the bullet library and initiate remote identity approval authentication application to the manager through the management background, the manager approves and determines whether the initiated remote identity approval authentication passes through the receiving of the client device, if the approval passes, the first user and the second user are granted with the authentication right through the function of the management background on the protective door of the bullet library, and the protective door can be opened through the authentication; if the approval is not passed, the first user and the second user cannot obtain the identity authentication right of the protective door of the bullet library, and cannot open the protective door;
2) The first user and the second user initiate and click identity verification on the protective door at the same time, and the identity verification of the two users is judged and matched through the management background;
3) After the management background judges and matches the identity verification of the first user and the second user, if the identity verification cannot be passed, the first user and the second user initiate the identity verification again; if the authentication can be passed, the authentication of the first user and the second user is successfully matched;
4) After the authentication of the first user and the second user is successfully matched by the management background, opening the protective door (2), if the authentication is unsuccessful, continuing to close the protective door, and finally ending the door opening application;
the door closing step is 5) the protective door is provided with a sensor, the sensor is electrically connected with the management background, and the management background judges whether the protective door is closed or not through the sensor;
6) After judging through the management background, if the protective door is not closed, a door closing notification is initiated to the first user or the second user, and after the door is closed successfully, the management background sends out a display or sound prompt signal, and the door is closed; and when the first user or the second user directly closes the door, the management background directly sends out a display or sound prompt signal and sends out a door closing notification to the client device of the management personnel.
The step 1) of opening the door can be replaced by an emergency or temporary use condition step, a temporary user inputs identity information to the management background through a protection door, the temporary user clicks the protection door of the bullet library to apply for identity verification and initiates a remote identity approval authentication application to the manager under the condition that the manager is not in a unit or is not in the field through the action of the management background, the manager receives the remote identity approval authentication initiated by the client device and approves and determines whether the remote identity approval authentication is passed or not, and if the approval is passed, the temporary user is granted with the click identity verification right of the temporary user on the protection door of the bullet library through the action of the management background; if the approval is not passed, the temporary user initiates a remote identity approval certification application to the manager.
Further, the manager may not have the first user, the second user, or the other user pre-arranged in the unit or in the off-site situation, the other manager may approve the remote identity approval authentication through the client device, and the pre-arranged first user, the second user, or the other user may perform the authentication matching with the emergency or temporary user in the unit or in the on-site situation and open the security door.
Further, the gun magazine needs to open the protective door to perform identity verification on two users through faces and then matching through sound or other biological characteristics, and all the biological characteristics meet matching requirements to pass the identity verification, so that the risk of password leakage is avoided through a biological recognition technology.
Further described, the face authentication: after the two users pass through the faces in sequence to carry out identity authentication, the management background compares the faces of the two users respectively, the faces of the two users accord with each other and have the right of opening the door, the next biological authentication link is entered, and if only one face of the user does not accord with the right, the user refuses to pass through the biological authentication link and prompts the biological authentication link through screen display and sound.
Further described, the voice authentication: after the two users pass through face verification and enter a voice verification link, after the identity verification is carried out through voice and fingerprints, the management background compares the voice and the fingerprints of the two users respectively, the voice of the two users accords with the right of opening the door, and the protection door is opened, so that the opening is refused as long as the voice and the fingerprint of one user do not accord with each other.
Further stated, the gun magazine is provided with an RFI D antenna, the condition of a gun entering and exiting the gun magazine is detected through the RFI D antenna, and the gun magazine can be connected with a management background in a butt joint mode, so that linkage detection of gun entering and exiting is realized.
Further, the protection door is provided with an electric control lock cylinder, the mechanical key does not open the electric control lock cylinder under the condition of electricity and network, the mechanical key opens the electric control lock cylinder after power failure and network disconnection, and the door opening and closing hand wheel can be opened after power failure and network disconnection, so that the electric control lock cylinder and the door opening and closing hand wheel are opened after power failure and network disconnection.
The beneficial effects of the invention are as follows:
1. according to the invention, the manager clicks the application authentication and initiates a remote identity approval authentication application to the manager under the condition that the manager is not in a unit or is not on site through the action of the management background, the manager approves and determines whether the initiated remote identity approval authentication passes through the receiving of the client device, then the manager grants the user the click authentication right on the protective door of the bullet library through the action of the management background, and the manager can remotely grant the authentication right of the user for opening the protective door;
2. after the user is remotely granted with the identity verification right of opening the protective door, the user initiates and clicks the identity verification on the protective door simultaneously with other users, and the management background judges and matches the identity verification of the two users;
3. the invention can be used in an emergency or temporarily, an emergency or temporarily user inputs the identity information into the management background through the protective door, the temporarily user initiates a remote identity approval authentication application to the manager under the condition that the manager is not in a unit or is not in the field through the action of the management background, the manager can remotely grant the identity authentication right of the emergency or temporarily user for opening the protective door, and the emergency or temporarily user initiates and clicks the identity authentication on the protective door simultaneously with other users after being remotely granted with the identity authentication right for opening the protective door, and the management background judges and matches the identity authentication of the two users;
4. the invention must match the identity information of two users, thus must pass another person's agreement to open in the situation that a person wants to open the guard gate, the match of the identity information of two users uses the biological recognition technology to distinguish the identity of the user through the face, voiceprint technology, the authentication that opens the door is through the face first, then the voice, these two biological characteristics are in conformity, calculate and pass the authentication, ensure whether the user can open the compliance personnel of bullet storehouse guard gate, pass the dual effects of the face authentication and then the voice authentication first, open the guard gate, and need to gather the biological characteristic information of two users and can open the guard gate after comparing and matching, avoid the risk of the password reveal through the biological recognition technology.
5. If the emergency situation or the temporary need exists for opening the door, a manager does not arrange a user or other users in advance under the conditions of a unit or a non-site, other managers approve remote identity approval authentication through a client device, the prearranged user or other users are matched with the emergency or temporary user in identity verification under the conditions of the unit or the site and open the protective door, other managers can also remotely grant the authentication right of opening the protective door for the user, the identity of the user is authenticated through the face and voiceprint technology of the two users, the protective door is opened, and the protective door can be opened after the biometric information of the two users is acquired and matched.
6. The sensor is arranged on the protective door, and the management background is used for judging whether the protective door is closed or not and sending a door closing prompt.
7. The RFID antenna has the function of infrared detection, can detect the condition of the gun entering and exiting the gun magazine through the transmission signal, and can be in butt joint with a management background to realize linkage detection of the gun entering and exiting the magazine.
8. According to the invention, after power failure and network disconnection, a manager and maintainer can open the electric control lock cylinder through the mechanical key so as to open the protective door, and under the condition of power failure and network, the mechanical key cannot be used and open the electric control lock cylinder, and the door opening and closing hand wheel can be opened by using the same principle after power failure and network disconnection, so that the electric control lock cylinder and the door opening and closing hand wheel are opened after power failure and network disconnection.
Drawings
FIG. 1 is a schematic diagram of a system architecture connection of the present invention;
FIG. 2 is a schematic diagram of a door opening process according to the present invention;
FIG. 3 is a schematic diagram of a door closing process according to the present invention;
FIG. 4 is a schematic illustration of an emergency or temporary door opening process of the present invention;
FIG. 5 is a schematic view of the forward direction structure of the guard gate of the present invention;
fig. 6 is a schematic view of a part of the structure of the protective door of the present invention.
Reference numerals: 1-gun magazine, 2-guard gate, 3-automatically controlled lock core, 4-RFID antenna, 5-pay off box, 6-power connector lug, 7-signal line, 8-management backstage, 9-router, 10-client device, 11-switch door hand wheel, 12-display screen, 13-door hinge, 14-loudspeaker, 15-function button, 16-fingerprint button, 17-alcohol detector, 18-voice microphone, 19-camera lens, 20-pilot lamp.
Detailed Description
The following examples are set forth to provide a better understanding of the present invention to those skilled in the art.
Example 1
As shown in fig. 1, this embodiment provides a bullet storehouse guard gate management system that can remote authorization management, including bullet storehouse 1 and guard gate 2, automatically controlled lock core 3 is installed to guard gate 2, automatically controlled lock core 3 and management backstage 8 electric connection, RFID antenna 4 is installed to the upper end of bullet storehouse 1 and unwrapping wire case 5 and power connector lug 6 are installed to its side, power connector lug 6 is connected the power and supplies power to all devices on the guard gate 2, RFID antenna 4 and management backstage 8, unwrapping wire case 5 can place unnecessary electric wire, mainly used prevents that the length of circuit from being insufficient from being wired to the system's circuit, bullet storehouse 1 passes through signal line 7 electric connection management backstage 8, customer end device 10 and router 9 signal connection, management backstage 8 and router 9 electric connection.
Example 2
As shown in fig. 5-6, the bullet storehouse 1 is hinged with the protective door 2 through a door hinge 13, the protective door 2 is provided with a door opening and closing hand wheel 11, the door opening and closing hand wheel 11 is electrically connected with the management background 8, the protective door 2 is provided with an integrated electric appliance, the integrated electric appliance is electrically connected with the management background 8, the integrated electric appliance is provided with a display screen 12, a human face is displayed or the opening state of the protective door 2 is displayed, the left side of the display screen 12 is provided with a loudspeaker 14, the lower side of the display screen 12 is provided with a function button 15 and a fingerprint button 16, the right side of the display screen 12 is provided with the function button 15, the fingerprint button 16, an alcohol detector 17, a voice microphone 18, a lens 19 and an indicator lamp 20 sequentially from top to bottom, the alcohol detector 17 collects whether a user drinks or not, the consciousness state of the worker is judged according to the alcohol concentration, the management background 8 does not open the protective door 2 if the alcohol concentration of the worker is too high, and the indicator lamp 20 mainly sounds and blinks whether the protective door 2 is opened or closed.
Example 3
As shown in fig. 2 to 4, the present embodiment provides a bullet magazine protection door management method capable of remote authorization management, which includes the following steps:
a door opening step: 1) The first user and the second user click application identity verification on the protective door 2 of the bullet library 1 and initiate remote identity approval authentication application to the manager through the management background 8, the manager approves and determines whether the initiated remote identity approval authentication passes through the receiving of the client device 10, if the approval passes, the first user and the second user are granted with the identity verification right on the protective door 2 of the bullet library 1 through the action of the management background 8, and the protective door 2 can be opened through the identity verification; if the approval is not passed, the first user and the second user cannot obtain the authentication right of the protection door 2 of the bullet magazine 1, and cannot open the protection door 2;
2) The first user and the second user initiate identity verification on the protective door 2 at the same time, and identity information of the two users is judged and matched through the management background 8;
3) After the management background 8 judges and matches the identity verification of the first user and the second user, if the identity verification cannot be passed, the first user and the second user initiate the identity verification again; if the authentication can be passed, the authentication of the first user and the second user is successfully matched;
4) After the authentication of the first user and the second user is successfully matched, the management background 8 opens the protection door 2, if the authentication is unsuccessful, the protection door 2 is continuously closed, and finally the door opening application is finished;
the door closing step is 5) the protective door 2 is provided with a sensor, the sensor is electrically connected with the management background 8, and the management background 8 judges whether the protective door 2 is closed or not through the sensor;
6) After judging by the management background 8, if the protection door 2 is not closed, a door closing notification is initiated to the first user or the second user, and after the door is closed successfully, the management background 8 sends out an image or sound prompt signal, and the door closing is finished; when the first user or the second user directly closes the door, the management background 8 directly sends out a display or sound prompt signal, and sends out a door closing notification to the client device 10 of the management personnel.
Further, the step 1) of opening the door may be replaced by an emergency or temporary use step, the temporary user inputs the identity information to the management background 8 in advance (through the fingerprint button 16, the voice microphone 18 and the lens 19) through the integrated electrical appliance on the protection door 2, the temporary user clicks the protection door 2 of the bullet magazine 1 to apply for identity verification and initiates a remote identity approval authentication application to the manager under the condition that the manager is not in a unit or is not in the field through the action of the management background 8, the manager receives the remote identity approval authentication initiated by the client device 10 and approves and determines whether the remote identity approval passes or not, and if the approval passes, the temporary user is granted the click identity authentication right of the bullet magazine 1 on the protection door 2 through the action of the management background 8; if the approval is not passed, the temporary user initiates a remote identity approval certification application to the manager.
Further, the manager may not have the first user, the second user, or other user pre-arranged in the unit or in the field, and the other manager may approve the remote authentication by the other manager through the client device 10, and the first user, the second user, or other user pre-arranged may perform authentication matching with the emergency or temporary user in the unit or in the field, and open the security door 2.
Further, the bullet magazine 1 needs to collect two faces of the user through the lens 19, collect the voice of the user or other biological characteristics through the voice microphone 18 to match the faces of the user, and all the biological characteristics meet the matching requirement to pass the authentication, so that the risk of password leakage is avoided through the biological recognition technology.
Further described, the face authentication: after the two users pass through the faces in sequence to carry out identity authentication, the management background 8 compares the faces of the two users respectively, the faces of the two users accord with each other and have the right of opening the door, the next biological authentication link is entered, and if one face of the user does not accord with the right, the user refuses to pass through the biological authentication link and prompts the biological authentication link through screen display and sound.
Further described, the voice authentication: after the two users all pass through the lens 19 and acquire faces and enter the voice microphone 18 to acquire voice verification links, after the voice and fingerprint buttons 16 are used for carrying out identity verification on fingerprints, the management background 8 respectively compares the voice and the fingerprints of the two users, the voice of the two users accords with the right of opening the door, the protective door 2 is opened, and the opening is refused as long as the voice and the fingerprint of one user do not accord with each other.
Further, the gun magazine is provided with the RFI D antenna 4, and the condition of a gun entering and exiting the gun magazine 1 is checked through the RFI D antenna 4, and the gun magazine can be connected with the management background 8 connected with the gun magazine 1 for butt joint, so that linkage check of gun entering and exiting is realized.
Further, the protection door 2 is provided with an electric control lock cylinder 3, the electric control lock cylinder 3 is not opened by a mechanical key under the condition of electricity and network, and the electric control lock cylinder 3 is opened by the mechanical key after power failure and network disconnection.
Further, the user clicks the function button 15 on the protective door 2 of the bullet magazine 1 to activate the integrated electrical apparatus, so that the lens 19 collects the face, the voice microphone 18 collects the sound of the user, and the fingerprint button 16 and the alcohol detector 17 are turned on.
Example 4
For further explanation of the above embodiment 1, the electric control lock core 3 installed on the protective door 2 is in line or signal communication with the management background 8, the RFI D antenna 4 is installed at the upper end of the gun magazine 1, the RFI D antenna 4 is in signal communication with the management background 8, the face brushing device 5 and the radio 6 at the side end of the gun magazine 1 are all in signal communication with the management background 8, the lens 19 and the voice microphone 18 are used for collecting the face and the voice, the gun magazine 1 is in telecommunication connection with the management background 8 through the signal line 7 to transmit control signals, the client device 10 is in signal connection with the management background 8 through the router 9 and is equivalent to external network or local area network connection, the management background 8 mainly plays a role in management and control, and the sensor line or signal installed inside the protective door 2 is connected with the management background 8 to detect whether the protective door 2 is closed.
Example 5
The invention uses biological recognition technology, namely, the identity of a user is identified by a face and voiceprint technology, the identification of opening the door is carried out by the face firstly, then the voice, the two biological characteristics are in accordance, and only if the identification is carried out, whether the user can open the bullet warehouse protective door is ensured, the protective door is opened by the double effects of the face identification and the voice identification firstly, and the protective door can be opened after the biological characteristic information of the two users is acquired and compared and matched.
The door is temporarily opened or an emergency exists, the manager is not in the unit, other managers in the unit or related people arranged in advance can examine and approve the door in a remote empowerment mode (remote operation of the client device 10), the door is compared after the examination and approval is passed, the identity of the user is identified through the face and voiceprint technologies of the two users, the protection door is opened, and the protection door is opened after the biological characteristic information of the two users is acquired and matched in a comparison mode.
And the sensor for installing the protective door judges whether the protective door is closed or not through the management background and sends out a door closing prompt.
The RFID antenna has the function of infrared detection, can check the condition of the gun entering and exiting the gun magazine through a transmission signal, and can be in butt joint with a management background to realize linkage check of the gun entering and exiting the magazine.
In an operating environment, power failure and network disconnection occur: after power failure and network disconnection, a manager and maintainers can open the electric control lock cylinder through a mechanical key to open the protective door, and under the condition of power failure and network disconnection at ordinary times, the mechanical key cannot be used and cannot open the electric control lock cylinder, because the management background operation program is controlled, the electric control lock cylinder is not controlled by the management background after power failure, and the door opening and closing hand wheel can be opened after power failure and network disconnection by using the same principle, so that the electric control lock cylinder and the door opening and closing hand wheel are opened after power failure and network disconnection.
In addition to the manager being equipped with the client device, other manager is also equipped with the client device and downloads the app program so that other manager can remotely operate to grant the user remote authority when not in the field, and open the guard gate through the biometric identification of two users in the field.
Example 6
Management background: the management background is a management control background for managing the protective door, can store the user information of the protective door, record the information of opening and closing the door, record approval information, all relevant operations such as entering, exiting, approval and the like form electronic records and accounts, are convenient to count and check, trace afterwards, can be used for recording identity information by temporary users, and can be used for deleting the temporary user identity information in the management background.
RFID: the radio frequency identification is an abbreviation of radio frequency identification (RadioFrequencyIdentification, RFID), i.e. identification by radio waves. In RFID systems, identification information is stored in electronic data carriers, which are called electronic tags. Basic data stored in the tag is read by an RFID reader-writer, the reader-writer can read out stored information, and data is written into the tag, and data interaction is performed in a wireless communication mode in the writing and reading processes.
The personal information obtains personal related information of the police and the manager, including name, ID card number, mobile phone number, sex and role (manager), which are recorded from the management background.
Face registration: the face information of the user is input through a lens arranged on the protective door.
Voiceprint registration: voice information of a user is recorded through a voice microphone installed on the protective door.
The management background can re-record or delete the face and voiceprint information and other information.
The above description is only a preferred embodiment of the present invention, and the patent protection scope of the present invention is defined by the claims, and all equivalent changes made in the content of the present invention are included in the protection scope of the present invention.

Claims (8)

1. The bullet warehouse protection door management method capable of being remotely authorized and managed is characterized by comprising the following steps of:
a door opening step: 1) The first user and the second user click application identity verification on the protective door (2) of the bullet library (1) and initiate remote identity approval authentication application to the manager through the management background (8), the manager approves and determines whether the initiated remote identity approval authentication passes through the receiving of the client device (10), if the approval passes, the first user and the second user are granted with the identity verification right on the protective door (2) of the bullet library (1) through the action of the management background (8), and the protective door (2) can be opened through the identity verification; if the approval is not passed, the first user and the second user cannot obtain the identity authentication right of the protective door (2) of the bullet library (1) and cannot open the protective door (2);
2) The first user and the second user initiate identity verification on the protective door (2) at the same time, and identity information of the two users is judged and matched through the management background (8);
3) After the management background (8) judges and matches the identity verification of the first user and the second user, if the identity verification cannot be passed, the first user and the second user initiate the identity verification again; if the authentication can be passed, the authentication of the first user and the second user is successfully matched;
4) After the authentication of the first user and the second user is successfully matched by the management background (8), the protection door (2) is opened, if the authentication is unsuccessful, the protection door (2) is continuously closed, and finally the door opening application is finished;
the door closing step is that 5) the protective door (2) is provided with a sensor, the sensor is electrically connected with the management background (8), and the management background (8) judges whether the protective door (2) is closed or not through the sensor;
6) After judging through the management background (8), if the protection door (2) is not closed, a door closing notification is initiated to the first user or the second user, and after the door is closed successfully, the management background (8) sends out an image or sound prompt signal, and the door closing is finished; the first user or the second user directly closes the door, the management background (8) directly sends out display or sound prompt signals, and a door closing notification is sent to a client device (10) of the management personnel.
2. A bullet magazine protective door management method capable of being remotely authorized and managed according to claim 1, characterized in that the door opening step 1) can be replaced by an emergency or temporary use condition step, a temporary user inputs identity information into the management background (8) in advance through the protective door (2), the temporary user clicks the protective door (2) of the bullet magazine (1) to apply for identity verification and initiates a remote identity approval authentication application to the manager under the condition that the manager is not in a unit or is not on site through the action of the management background (8), the manager receives through the client device (10) and approves and determines whether the initiated remote identity approval authentication is passed, and if the approval is passed, the temporary user is granted the click identity verification right of the user on the protective door (2) of the bullet magazine (1) through the action of the management background (8); if the approval is not passed, the temporary user initiates a remote identity approval certification application to the manager.
3. A bullet magazine security gate management method as claimed in claim 2, wherein said manager has no pre-arranged first, second or other users in the event of a unit or off-site, said remote identity approval authentication is approved by the manager via the client device (10), and the pre-arranged first, second or other users are matched with the emergency or temporary user in the event of a unit or on-site and the security gate is opened.
4. A method for remotely authorizing and managing a bullet magazine protective door according to any one of claims 1-3, wherein the bullet magazine (1) is required to open the protective door (2) to verify identity by matching two users through faces and then through sound or other biological features, and all biological features meet the matching requirement to pass the identity verification.
5. The method for remotely authorizing and managing a bullet library security gate according to claim 4, wherein said face authentication: after the two users pass through the faces in sequence to carry out identity authentication, the management background (8) compares the faces of the two users respectively, the faces of the two users accord with each other and have the right of opening the door, the next biological authentication link is entered, and if one face of the user does not accord with each other, the user refuses to pass through the biological authentication link and prompts the biological authentication link through screen display and sound.
6. The method for remotely authorized managed bullet library security gate management of claim 5 wherein said voice authentication: after the two users pass through face verification and enter a voice verification link, after the identity verification is carried out through voice and fingerprints, the management background (8) compares the voice and the fingerprints of the two users respectively, the voice of the two users accords with the right of opening the door, the protective door (2) is opened, and the opening is refused as long as the voice and the fingerprint of one user do not accord with each other.
7. The bullet magazine protective door management method capable of being remotely authorized and managed according to claim 1 is characterized in that an RFID antenna (4) is arranged on the bullet magazine, the condition of a gun entering and exiting the bullet magazine (1) is checked through the RFID antenna (4), and the bullet magazine protective door management method can be in butt joint with a management background (8) connected with the bullet magazine (1) to realize linkage check of the entrance and the exit of the gun.
8. The bullet warehouse protection door management method capable of being remotely authorized and managed according to claim 1, wherein the protection door (2) is provided with an electric control lock cylinder (3), a mechanical key does not open the electric control lock cylinder (3) under the condition of electricity and network, the mechanical key opens the electric control lock cylinder (3) after power failure and network disconnection, and a door opening hand wheel (11) can be opened by using the same principle, namely after power failure and network disconnection, so that the electric control lock cylinder (3) and the door opening hand wheel (11) are opened after power failure and network disconnection.
CN202111578230.2A 2021-12-22 2021-12-22 Bullet warehouse protection door management method capable of realizing remote authorization management Active CN114373253B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111578230.2A CN114373253B (en) 2021-12-22 2021-12-22 Bullet warehouse protection door management method capable of realizing remote authorization management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111578230.2A CN114373253B (en) 2021-12-22 2021-12-22 Bullet warehouse protection door management method capable of realizing remote authorization management

Publications (2)

Publication Number Publication Date
CN114373253A CN114373253A (en) 2022-04-19
CN114373253B true CN114373253B (en) 2024-01-09

Family

ID=81139797

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111578230.2A Active CN114373253B (en) 2021-12-22 2021-12-22 Bullet warehouse protection door management method capable of realizing remote authorization management

Country Status (1)

Country Link
CN (1) CN114373253B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114937325A (en) * 2022-05-09 2022-08-23 安徽领云物联科技有限公司 Method for opening door by multiple combined identity verification of team personnel
CN114999127A (en) * 2022-06-14 2022-09-02 四川省永生爆破工程有限公司 Intelligent voice control system for personnel entering and exiting dangerous chemical storehouse

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20170047433A (en) * 2015-10-22 2017-05-08 주식회사 카티스 Firearms Management Method and System
CN109658560A (en) * 2018-11-28 2019-04-19 任明和 Realize the authorization method of the long-range acoustic control dynamic code of smart lock
CN110533814A (en) * 2019-09-02 2019-12-03 广西锐武信息技术有限公司 A kind of gun receive monitoring system and monitoring method
CN113367504A (en) * 2021-07-26 2021-09-10 广东华南智控科技有限公司 Method for verifying opening of bullet cabinet and bullet cabinet
CN113506394A (en) * 2021-06-28 2021-10-15 上海欣能信息科技发展有限公司 Remote permission system and remote permission method based on transformer substation operation management and control

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7890180B2 (en) * 2004-08-09 2011-02-15 Cardiac Pacemakers, Inc. Secure remote access for an implantable medical device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20170047433A (en) * 2015-10-22 2017-05-08 주식회사 카티스 Firearms Management Method and System
CN109658560A (en) * 2018-11-28 2019-04-19 任明和 Realize the authorization method of the long-range acoustic control dynamic code of smart lock
CN110533814A (en) * 2019-09-02 2019-12-03 广西锐武信息技术有限公司 A kind of gun receive monitoring system and monitoring method
CN113506394A (en) * 2021-06-28 2021-10-15 上海欣能信息科技发展有限公司 Remote permission system and remote permission method based on transformer substation operation management and control
CN113367504A (en) * 2021-07-26 2021-09-10 广东华南智控科技有限公司 Method for verifying opening of bullet cabinet and bullet cabinet

Also Published As

Publication number Publication date
CN114373253A (en) 2022-04-19

Similar Documents

Publication Publication Date Title
CN109064601B (en) Intelligent gate sentry robot implementation method
CN109272613B (en) Sensor and video linked Internet of things safety electronic access control system
CN114373253B (en) Bullet warehouse protection door management method capable of realizing remote authorization management
KR101439348B1 (en) Attendance management system using face recognitionaccess control unit
US7907753B2 (en) Access control system with symbol recognition
US7110580B2 (en) Distributed biometric access control method and apparatus
US6853739B2 (en) Identity verification system
CN105701885A (en) Face identification access control system and implementation method thereof
CN106097519B (en) A kind of control device of electronic lock, electronic lock, control method and its application
CN108877021B (en) Access control management method for unmanned venue
CN110164012A (en) A kind of community's access control system and working method thereof
CN109215206A (en) A kind of cell recognition of face Property Management System and its method
CN107038509A (en) Self-service registration-management system
CN113724428A (en) Gate system for identity recognition and health detection of community owners and management method
CN201927095U (en) Entrance guard system based on palm vein authentication
CN111179487A (en) Intelligent door lock and intelligent door lock system
WO2021233004A1 (en) Safe cabinet device, unlocking method, and unlocking system
CN209912036U (en) Face identification security entrance guard all-in-one
CN210573993U (en) Intelligent door lock and intelligent door lock system
CN210627312U (en) Video access control system
CN114941477A (en) Handover cabinet, intelligent handover management system and method
CN113298993A (en) Personnel access management method and system based on face recognition
KR101226645B1 (en) Method for Managing Digital Locking Apparatus By Using Bionic Information, System And Managing Apparatus
KR20210128193A (en) Access control system capable of face recognition
CN113012361A (en) Intelligent cabinet, system and method for storing digital certificate

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant