CN114553474A - Access control permission control method and device based on Internet of things - Google Patents

Access control permission control method and device based on Internet of things Download PDF

Info

Publication number
CN114553474A
CN114553474A CN202210014996.6A CN202210014996A CN114553474A CN 114553474 A CN114553474 A CN 114553474A CN 202210014996 A CN202210014996 A CN 202210014996A CN 114553474 A CN114553474 A CN 114553474A
Authority
CN
China
Prior art keywords
access control
data
equipment
target
internet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210014996.6A
Other languages
Chinese (zh)
Other versions
CN114553474B (en
Inventor
黄兵
唐重阳
张泰�
李澄澄
程鹏飞
曾锡池
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Digital Power Grid Research Institute of China Southern Power Grid Co Ltd
Original Assignee
Shenzhen Digital Power Grid Research Institute of China Southern Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Digital Power Grid Research Institute of China Southern Power Grid Co Ltd filed Critical Shenzhen Digital Power Grid Research Institute of China Southern Power Grid Co Ltd
Priority to CN202210014996.6A priority Critical patent/CN114553474B/en
Publication of CN114553474A publication Critical patent/CN114553474A/en
Application granted granted Critical
Publication of CN114553474B publication Critical patent/CN114553474B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Power Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses an access control permission control method and device based on the Internet of things, wherein the method comprises the following steps: when a passing request aiming at access control equipment accessed to an Internet of things platform is detected, acquiring identification information corresponding to a target object corresponding to the passing request, wherein the target object comprises a person or a vehicle triggering the passing request; determining the authority attribute of the target object according to the identification information; controlling the access control equipment to execute matched operation according to the authority attribute; and storing the equipment data corresponding to the access control equipment into a storage space corresponding to the access control equipment on the platform of the Internet of things, wherein the equipment data at least comprises the passing data of the target object about the passing request. Therefore, the invention not only can carry out real-time management and control when people and vehicles pass in and out of the access passage, but also can meet the monitoring and backtracking requirements of the passing conditions of the people and the vehicles by storing the equipment data of the access control equipment, is beneficial to improving the safety of the access control system and reducing the safety management and control cost of the access control system.

Description

Access control permission control method and device based on Internet of things
Technical Field
The invention relates to the technical field of Internet of things, in particular to an access control permission control method and device based on the Internet of things.
Background
In actual life, access control systems are widely applied to access passages of various places, such as communities and industrial parks, due to the fact that effective safety control can be performed on the access passages. However, practice finds that the current access control system can only generally control the passage of people and vehicles when the people and the vehicles pass in and out of the access passage, and cannot backtrack the passing conditions of the people and the vehicles, so that the security of the access control system is low and the cost of security control is high. Therefore, how to provide a new access control method to improve the security of the access control system and reduce the security control cost of the access control system is very important.
Disclosure of Invention
The technical problem to be solved by the invention is to provide an access control permission control method and device based on the Internet of things, which can be beneficial to improving the safety of an access control system and reducing the safety control cost of the access control system.
In order to solve the technical problem, the invention discloses an access control method based on the internet of things in a first aspect, and the method comprises the following steps:
when a passing request aiming at access control equipment accessed to an Internet of things platform is detected, acquiring identification information corresponding to a target object corresponding to the passing request, wherein the target object comprises a person or a vehicle triggering the passing request;
determining the authority attribute of the target object according to the identification information;
controlling the access control equipment to execute matched operation according to the authority attribute;
and storing the equipment data corresponding to the access control equipment to the storage space corresponding to the Internet of things platform, wherein the equipment data at least comprises the passing data of the target object about the passing request.
As an optional implementation manner, in the first aspect of the present invention, the determining, according to the identification information, the authority attribute of the target object includes:
determining target identity information corresponding to the identification information based on an identity database of the Internet of things platform, and determining identity information of all authorized objects corresponding to the access control equipment based on an access control authority database of the Internet of things platform;
judging whether the target identity information is matched with the identity information of one of the authorized objects;
when the judgment result is yes, determining the authority attribute of the target object as an authorized attribute;
when the judgment result is negative, determining that the authority attribute of the target object is an unauthorized attribute;
when the identification information includes at least two pieces of sub-identification information, the determining, based on the identity database of the internet of things, target identity information corresponding to the identification information includes:
determining identity information corresponding to each piece of sub-identification information based on an identity database of the Internet of things platform;
judging whether the identity information corresponding to each sub-identification information is the same identity information;
when the judgment result is yes, determining the identity information corresponding to any sub-identification information as the target identity information corresponding to the identification information;
when the judgment result is negative, determining the identity information corresponding to the body identification information in all the sub-identification information as the target identity information corresponding to the identification information, wherein the body identification information comprises the sub-identification information determined based on the body characteristics of the target object;
and controlling the access control equipment to execute matched operations according to the authority attribute, wherein the operations comprise:
when the authority attribute is an authorized attribute, controlling the access control equipment to release the target object;
and when the authority attribute is an unauthorized attribute, controlling the access control equipment to output a no-pass authority prompt to the target object.
As an optional implementation manner, in the first aspect of the present invention, after determining the authority attribute of the target object according to the identification information, the method further includes:
when the permission attribute is the unauthorized attribute, detecting whether an access control authorization request aiming at the access control equipment triggered by the target object is received;
when the detection result is yes, judging whether the target object meets the authorization condition of the access control equipment or not according to the target identity information;
when the target object meets the authorization condition, granting the target object a target authority for the access control equipment;
wherein, before the granting of the target object with the right to the access control device, the method further comprises:
judging whether the authority level corresponding to the target object is greater than or equal to a preset level or not according to the target identity information;
when the permission level is greater than or equal to the preset level, determining that the target permission comprises a first permission and a second permission, wherein the first permission comprises a passing permission of the access control equipment, and the second permission comprises a permission for adding an authorized object and/or deleting an authorized object to the access control equipment;
and when the permission level is smaller than the preset level, determining that the target permission comprises a first permission.
As an optional implementation manner, in the first aspect of the present invention, before the granting the right of the target object to the access control device, the method further includes:
judging whether associated access control equipment of the access control equipment exists in all unauthorized access control equipment corresponding to the target object or not according to a control area corresponding to the access control equipment, wherein the control area corresponding to the associated access control equipment comprises a control area corresponding to the access control equipment;
when the judgment result is yes, the granting of the target permission of the target object for the access control device includes:
and granting the target object with target permission for the access control equipment and the associated access control equipment.
As an optional implementation manner, in the first aspect of the present invention, the device data has a corresponding data topic;
before the storing the device data corresponding to the access control device into the storage space corresponding to the internet of things platform by the access control device, the method further includes:
uploading device data corresponding to the access control device to a data middleware of the Internet of things platform;
judging whether a data theme corresponding to the equipment data is matched with a target data theme in the data middleware, wherein the target data theme comprises any data theme subscribed by an engine corresponding to the Internet of things platform in the data middleware, and the engine corresponds to at least one analysis mode;
when the judgment result is yes, determining a target analysis mode corresponding to the access control equipment in all the analysis modes according to the data theme corresponding to the equipment data;
screening equipment data correspondingly matched with the target analysis mode from the equipment data based on the engine;
embedding the screening equipment data into a data model corresponding to the target analysis mode to obtain target equipment data based on a target storage format;
and, will the equipment data storage that entrance guard's equipment corresponds extremely entrance guard's equipment is in the storage space that thing networking platform corresponds includes:
and storing the target equipment data to a storage space corresponding to the Internet of things platform of the entrance guard equipment.
As an optional implementation manner, in the first aspect of the present invention, before the uploading the device data corresponding to the access control device to the data middleware of the internet of things platform, the method further includes:
judging whether a data theme corresponding to the equipment data of the access control equipment is matched with any data theme in the data middleware of the Internet of things platform;
when the judgment result is negative, creating a data theme corresponding to the equipment data in the data middleware;
adding the data theme corresponding to the equipment data to a subscribed theme queue of an engine of the Internet of things platform in the data middleware, and triggering and executing the operation of uploading the equipment data corresponding to the access control equipment to the data middleware of the Internet of things platform;
and when the data theme corresponding to the device data is not matched with all the data themes in the data middleware, determining a target analysis mode corresponding to the access control device in all the analysis modes according to the data theme corresponding to the device data, wherein the target analysis mode comprises:
determining equipment corresponding to each analysis mode corresponding to the engine;
judging whether the same type of equipment corresponding to the access control equipment exists in all the equipment corresponding to the analysis mode;
and when the judgment result is yes, determining the analysis mode corresponding to the equipment of the same type as the target analysis mode of the access control equipment.
As an alternative implementation, in the first aspect of the present invention, the method further includes:
analyzing all historical traffic data of the access control equipment in the storage space to obtain traffic flow corresponding to each time interval of the access control equipment in a preset period, wherein the preset period comprises any one of a natural year, a natural month, a natural week and a natural day;
judging whether the traffic flow corresponding to the access control equipment in each time interval is smaller than a preset flow or not according to the traffic flow corresponding to the access control equipment in each time interval, and determining the time interval as a target time interval when the judgment result is yes;
when the current time is within any one target time interval, detecting whether an access reservation request corresponding to the access control equipment within the target time interval is received in advance;
when the detection result is negative, controlling the access control equipment to enter a dormant state;
and when the detection result is yes, determining an access time interval corresponding to the access reservation request according to the access reservation request, and controlling the access control equipment to enter a dormant state in a dormant time interval, wherein the dormant time interval comprises time intervals except the access time interval in a target time interval in which the current time is positioned.
The invention discloses a second aspect of an access control device based on the Internet of things, which comprises:
the system comprises an acquisition module, a processing module and a display module, wherein the acquisition module is used for acquiring identification information corresponding to a target object corresponding to a traffic request when the traffic request aiming at access control equipment accessed to an Internet of things platform is detected, and the target object comprises a person or a vehicle triggering the traffic request;
the determining module is used for determining the authority attribute of the target object according to the identification information;
the control module is used for controlling the access control equipment to execute matched operation according to the authority attribute;
and the storage module is used for storing equipment data corresponding to the access control equipment to a storage space corresponding to the Internet of things platform, wherein the equipment data at least comprises the passing data of the target object about the passing request.
As an optional implementation manner, in the second aspect of the present invention, a specific manner of determining, by the determining module, the authority attribute of the target object according to the identification information includes:
determining target identity information corresponding to the identification information based on an identity database of the Internet of things platform, and determining identity information of all authorized objects corresponding to the access control equipment based on an access control authority database of the Internet of things platform;
judging whether the target identity information is matched with the identity information of one of the authorized objects;
when the judgment result is yes, determining the authority attribute of the target object as an authorized attribute;
when the judgment result is negative, determining the authority attribute of the target object as an unauthorized attribute;
the identification information comprises at least one piece of sub-identification information, and the specific mode of the determining module for determining the target identity information corresponding to the identification information based on the identity database of the internet of things comprises the following steps:
when the identification information comprises at least two pieces of sub-identification information, determining the identity information corresponding to each piece of sub-identification information based on an identity database of the Internet of things platform;
judging whether the identity information corresponding to each sub-identification information is the same identity information;
when the judgment result is yes, determining the identity information corresponding to any sub-identification information as the target identity information corresponding to the identification information;
when the judgment result is negative, determining the identity information corresponding to the body identification information in all the sub-identification information as the target identity information corresponding to the identification information, wherein the body identification information comprises the sub-identification information determined based on the body characteristics of the target object;
and the control module controls the specific mode of the access control equipment to execute the matched operation according to the authority attribute, and the specific mode comprises the following steps:
when the authority attribute is an authorized attribute, controlling the access control equipment to release the target object;
and when the authority attribute is an unauthorized attribute, controlling the access control equipment to output a no-pass authority prompt to the target object.
As an alternative embodiment, in the second aspect of the present invention, the apparatus further comprises:
the first detection module is used for detecting whether an access authorization request which is triggered by the target object and aims at the access control equipment is received or not when the authority attribute is the unauthorized attribute after the determining module determines the authority attribute of the target object according to the identification information;
the first judgment module is used for judging whether the target object meets the authorization condition of the access control equipment or not according to the target identity information when the first detection module detects that the access control authorization request is received;
the authorization module is used for granting the target object a target permission for the access control device when the first judgment module judges that the target object meets the authorization condition;
the first judging module is further configured to, before the authorization module grants a target permission of the target object for the access control device, judge whether a permission level corresponding to the target object is greater than or equal to a preset level according to the target identity information;
the determining module is further configured to determine that the target permission includes a first permission and a second permission when the first determining module determines that the permission level is greater than or equal to the preset level, and determine that the target permission includes the first permission when the first determining module determines that the permission level is less than the preset level; the first permission comprises the passing permission of the access control equipment, and the second permission comprises the permission of adding an authorized object and/or deleting the authorized object for the access control equipment.
As an optional implementation manner, in the second aspect of the present invention, the first determining module is further configured to determine, before the authorization module grants the target object with the right to the access control device, whether a related access control device of the access control device exists in all unauthorized access control devices corresponding to the target object according to a control area corresponding to the access control device, where the control area corresponding to the related access control device includes a control area corresponding to the access control device;
and the specific mode that the authorization module grants the target object with the permission of the access control device comprises the following steps:
and when the first judging module judges that the associated access control equipment exists in all the unauthorized access control equipment, the target object is granted the target permission of the access control equipment and the associated access control equipment.
As an alternative embodiment, in the second aspect of the present invention, the apparatus further comprises:
the data transmission module is used for uploading the equipment data corresponding to the access control equipment to the data middleware of the Internet of things platform before the storage module stores the equipment data corresponding to the access control equipment to the storage space corresponding to the Internet of things platform;
a second determining module, configured to determine whether a data topic corresponding to the device data matches a target data topic in the data middleware, where the target data topic includes any data topic subscribed by an engine corresponding to the internet of things platform in the data middleware, and the engine corresponds to at least one analysis manner;
the determining module is further configured to determine, according to the data theme corresponding to the device data, a target analysis mode corresponding to the access control device among all the analysis modes when the second determining module determines that the data theme corresponding to the device data matches the target data theme;
the screening module is used for screening equipment data which are correspondingly matched with the target analysis mode from the equipment data based on the engine;
the embedding module is used for embedding the screening equipment data into the data model corresponding to the target analysis mode to obtain target equipment data based on a target storage format;
and the storage module stores the equipment data that the entrance guard equipment corresponds extremely the entrance guard equipment is in the concrete mode of the storage space that the thing networking platform corresponds includes:
and storing the target equipment data to a storage space corresponding to the Internet of things platform of the access control equipment.
As an optional implementation manner, in the second aspect of the present invention, the second determining module is further configured to determine whether a data theme corresponding to the device data of the access control device matches any data theme in the data middleware of the platform of the internet of things before the data transmission module uploads the device data corresponding to the access control device to the data middleware of the platform of the internet of things;
the device further comprises:
the creating module is configured to create a data theme corresponding to the device data in the data middleware when the second determining module determines that the data theme corresponding to the device data does not match all data themes in the data middleware;
the adding module is used for adding the data theme corresponding to the equipment data to a subscribed theme queue in the data middleware of an engine of the Internet of things platform and triggering the data transmission module to execute the operation of uploading the equipment data corresponding to the access control equipment to the data middleware of the Internet of things platform;
and the specific mode of determining the target analysis mode corresponding to the access control equipment in all the analysis modes by the determining module according to the data theme corresponding to the equipment data comprises the following steps:
when the second judging module judges that the data theme corresponding to the equipment data is not matched with all the data themes in the data middleware, determining equipment corresponding to each analysis mode corresponding to the engine;
judging whether the same type of equipment corresponding to the access control equipment exists in all the equipment corresponding to the analysis mode;
and when the judgment result is yes, determining the analysis mode corresponding to the equipment of the same type as the target analysis mode of the access control equipment.
As an alternative embodiment, in the second aspect of the present invention, the apparatus further comprises:
the analysis module is used for analyzing all historical traffic data of the access control equipment in the storage space to obtain traffic flow corresponding to each time interval of the access control equipment in a preset period, wherein the preset period comprises any one of a natural year, a natural month, a natural week and a natural day;
the second judging module is further configured to judge, for the traffic flow corresponding to each time interval of the access control device, whether the traffic flow corresponding to the time interval of the access control device is smaller than a preset flow, and when a judgment result is yes, determine the time interval as a target time interval;
the second detection module is used for detecting whether an access reservation request corresponding to the access control equipment in any target time interval is received in advance when the current time is positioned in the target time interval;
the control module is further configured to control the access control device to enter a dormant state when the second detection module detects that the access reservation request is not received in advance;
the determining module is further configured to determine, when the second detecting module detects that the access reservation request is received in advance, an access time interval corresponding to the access reservation request according to the access reservation request;
the control module is further used for controlling the access control equipment to enter a dormant state in a dormant time interval, wherein the dormant time interval comprises a time interval, except the access time interval, in a target time interval in which the current time is positioned.
The third aspect of the invention discloses another access control device based on the internet of things, which comprises:
a memory storing executable program code;
a processor coupled with the memory;
the processor calls the executable program code stored in the memory to execute the access control method based on the internet of things disclosed by the first aspect of the invention.
The invention discloses a computer storage medium, wherein a computer instruction is stored in the computer storage medium, and when the computer instruction is called, the computer instruction is used for executing the access control method based on the internet of things disclosed by the first aspect of the invention.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
in the embodiment of the invention, when a pass request aiming at access control equipment accessed to an Internet of things platform is detected, identification information corresponding to a target object corresponding to the pass request is collected, wherein the target object comprises a person or a vehicle triggering the pass request; determining the authority attribute of the target object according to the identification information; controlling the access control equipment to execute matched operation according to the authority attribute; and storing the equipment data corresponding to the access control equipment into a storage space corresponding to the access control equipment on the platform of the Internet of things, wherein the equipment data at least comprises the passing data of the target object about the passing request. Therefore, the invention not only can carry out real-time management and control when people and vehicles pass in and out of the access passage, but also can meet the monitoring and backtracking requirements of the passing conditions of the people and the vehicles by storing the equipment data of the access control equipment, so that the responsibility main body can be confirmed by checking the equipment data when the abnormal state occurs in the control area corresponding to the access control equipment, the safety of the access control system is favorably improved, and the safety management and control cost of the access control system is reduced.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flow chart of an access control method based on the internet of things according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of another access control method based on the internet of things according to the embodiment of the invention;
fig. 3 is a schematic structural diagram of an access permission control device based on the internet of things according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of another access control device based on the internet of things according to the embodiment of the invention;
fig. 5 is a schematic structural diagram of another access control device based on the internet of things according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," and the like in the description and claims of the present invention and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, apparatus, article, or article that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or article.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The invention discloses an access control permission control method and device based on the Internet of things, which can not only perform real-time control when people and vehicles enter and exit an entrance passage, but also meet the monitoring and backtracking requirements on the passing conditions of the people and the vehicles by storing equipment data of access control equipment, so that the responsibility main body can be confirmed by checking the equipment data when an abnormal state occurs in a control area corresponding to the access control equipment, the safety of an access control system is favorably improved, and the safety control cost of the access control system is reduced. The following are detailed below.
Example one
Referring to fig. 1, fig. 1 is a schematic flow chart of an access permission control method based on the internet of things according to an embodiment of the present invention. The access control method based on the internet of things described in fig. 1 may be applied to any scene where the passage of people and vehicles needs to be controlled, such as the entrance and exit of a place such as a community, a school, an office building, and the entrance and exit of a parking lot in the place, and may also be applied to a switch device that controls the usage right, such as a switch device of an intelligent drawer, and the embodiment of the present invention is not limited. As shown in fig. 1, the access control method based on the internet of things may include the following operations:
101. when a passing request aiming at access control equipment accessed to an Internet of things platform is detected, identification information corresponding to a target object corresponding to the passing request is collected, and the target object comprises a person or a vehicle triggering the passing request.
In the embodiment of the invention, the pass request can be actively triggered by a target object, when the target object is a person, the target object triggers the pass request by inputting a fingerprint into an entrance guard device, swiping an entrance guard card or an IC card and clicking a relevant button, and can also trigger the pass request on an Internet of things platform through an intelligent terminal, when the target object is a vehicle, besides the triggering method, the relevant person of the target object, such as a driver, can also trigger the pass request on the Internet of things platform through the intelligent device on the vehicle, and in addition, the pass request can also be remotely triggered on the physical network platform by the relevant person of the target object; the access request may also be automatically triggered by the target object, specifically, when the detection device corresponding to the access control device detects that the target object enters the detection range of the detection device, the detection device may include an identification device, such as a camera or an infrared detector, which is not limited in the embodiments of the present invention.
In this embodiment of the present invention, when the target object is a person, the identification information of the target object may include one or more of face information, fingerprint information, information of an access control card or an IC card, height information, and the like of the target object, and when the target object is a vehicle, the identification information of the target object may include one or more of a vehicle identifier corresponding to the vehicle, such as a license plate number, an ETC identifier, and face information, fingerprint information, information of an access control card or an IC card of a person related to the vehicle, and the embodiment of the present invention is not limited.
102. And determining the authority attribute of the target object according to the identification information.
As an optional implementation manner, determining the authority attribute of the target object according to the identification information may include:
determining target identity information corresponding to the identification information based on an identity database of the Internet of things platform, and determining identity information of all authorized objects corresponding to the access control equipment based on an access control authority database of the Internet of things platform;
judging whether the target identity information is matched with the identity information of one authorized object;
when the judgment result is yes, determining the authority attribute of the target object as an authorized attribute;
and when the judgment result is negative, determining the authority attribute of the target object as an unauthorized attribute.
In this optional implementation manner, optionally, the target identity information includes one or more of a person number, a person name, person identification card information, person occupation information, and the like of the target object, and the embodiment of the present invention is not limited.
Therefore, the optional implementation mode can determine the authority attribute of the target object by combining the collected identification information with the database of the Internet of things platform, so that the intelligence, the accuracy and the reliability of determining the authority attribute are improved, and the safety of the access control system is improved.
In this optional implementation manner, optionally, the identification information includes at least one piece of sub-identification information, and when the identification information includes at least two pieces of sub-identification information, determining target identity information corresponding to the identification information based on an identity database of the internet of things may include:
determining identity information corresponding to each piece of sub-identification information based on an identity database of the Internet of things platform;
judging whether the identity information corresponding to each piece of sub-identification information is the same identity information;
when the judgment result is yes, determining the identity information corresponding to any sub-identification information as the target identity information corresponding to the identification information;
and when the judgment result is negative, determining the identity information corresponding to the body identification information in all the sub-identification information as the target identity information corresponding to the identification information, wherein the body identification information comprises the sub-identification information determined based on the body characteristics of the target object.
Therefore, by implementing the optional implementation mode, the identity information of the target object can be determined based on the body characteristics when the plurality of pieces of sub-identification information of the same target object are not matched, the accuracy and the reliability of determining the identity information of the target object are improved, the occurrence of the situation that the target object uses other person identity information to pass through the access control equipment is reduced, and the safety and the reliability of the access control system are improved.
103. And controlling the access control equipment to execute matched operation according to the authority attribute.
As an optional implementation manner, according to the authority attribute, controlling the access control device to execute a matched operation may include:
when the authority attribute is the authorized attribute, controlling the access control equipment to release the target object;
and when the authority attribute is an unauthorized attribute, controlling the access control equipment to output a no-pass authority prompt to the target object.
Therefore, the implementation of the optional implementation mode can improve the accuracy and the reliability of controlling the entrance guard equipment to execute the matched operation.
104. And storing the equipment data corresponding to the access control equipment into a storage space corresponding to the access control equipment on the platform of the Internet of things, wherein the equipment data at least comprises the passing data of the target object about the passing request.
In the embodiment of the present invention, the traffic data of the target object about the traffic request may include one or more of identification information, target identity information corresponding to the identification information, an authority attribute, a traffic request triggering manner, a traffic request triggering time, a body parameter corresponding to the target identity, an equipment identifier of the access control equipment, and the like, where the traffic request triggering manner may include one or more of a card swiping triggering manner, a fingerprint triggering manner, a face triggering manner, and the like. Optionally, the device data corresponding to the access control device may further include one or more of a device state of the access control device, an authorization record of the access control device, and the like, where the device state of the access control device may include one of an online state, an offline state, an abnormal state, and the like, the authorization record of the access control device may include one or more of identity information of an authorization object, identification information of the authorization object, an authorization time range of the authorization object, an authorization subject, and the like of the authorization record, and the authorization subject may include one of the access control device, an authorization control system corresponding to the access control device, an authorization controller corresponding to the access control device, and the like.
Therefore, the embodiment of the invention can not only carry out real-time management and control when people and vehicles pass in and out of the access passage, but also meet the monitoring and backtracking requirements on the passing conditions of the people and the vehicles by storing the equipment data of the access control equipment, so that the responsibility main body can be confirmed by checking the equipment data when the abnormal state occurs in the control area corresponding to the access control equipment, the safety of the access control system can be further improved, and the safety management and control cost of the access control system can be reduced.
In an alternative embodiment, the device data has a corresponding data topic;
before storing the device data corresponding to the access control device into the storage space corresponding to the access control device in the internet of things platform, the method may further include:
uploading device data corresponding to the access control device to a data middleware of the Internet of things platform;
judging whether a data theme corresponding to the equipment data is matched with a target data theme in the data middleware or not, wherein the target data theme comprises any data theme subscribed by an engine corresponding to the Internet of things platform in the data middleware, and the engine corresponds to at least one analysis mode;
when the judgment result is yes, determining a target analysis mode corresponding to the access control equipment in all analysis modes according to the data theme corresponding to the equipment data;
screening equipment data which are correspondingly matched with the target analysis mode from the equipment data based on the engine;
embedding the screening equipment data into a data model corresponding to a target analysis mode to obtain target equipment data based on a target storage format;
and, the device data storage that corresponds entrance guard's equipment to entrance guard's equipment at the memory space that thing networking platform corresponds can include:
and storing the target equipment data into a storage space corresponding to the access control equipment on the Internet of things platform.
Therefore, the optional embodiment can store the data into the storage space after the data are accurately screened and subjected to format conversion, so that the accuracy and the reliability of data storage are improved, and the relevant personnel of the platform of the Internet of things can conveniently output the accurate equipment data when needing to check the equipment data.
In this optional embodiment, as an optional implementation manner, before uploading device data corresponding to the access control device to the data middleware of the internet of things platform, the method may further include:
judging whether a data theme corresponding to the equipment data of the access control equipment is matched with any data theme in the data middleware of the Internet of things platform;
if not, creating a data theme corresponding to the preparation data in the data middleware;
and adding the data theme corresponding to the equipment data to a subscribed theme queue in the data middleware of an engine of the Internet of things platform, and triggering and executing the operation of uploading the equipment data corresponding to the access control equipment to the data middleware of the Internet of things platform.
Therefore, the optional implementation mode can automatically add the data theme to the equipment data of the access control equipment in the data middleware, and the situation that the data cannot be screened or stored due to the fact that the data theme matched with the equipment data of the access control equipment does not exist is reduced.
In this optional implementation manner, optionally, when the data theme corresponding to the device data does not match all the data themes in the data middleware, determining, according to the data theme corresponding to the device data, a target analysis manner corresponding to the access control device in all the analysis manners may include:
determining equipment corresponding to each analysis mode corresponding to the engine;
judging whether the same type of equipment corresponding to the access control equipment exists in the equipment corresponding to all the analysis modes;
and when the judgment result is yes, determining the analysis mode corresponding to the equipment of the same type as the target analysis mode of the access control equipment.
Therefore, the optional implementation mode can also be used as an analysis mode of the access control equipment by referring to other analysis modes of the same type of equipment, so that the time cost and the operation cost consumed by creating a new analysis mode are reduced, and the efficiency of determining the analysis mode corresponding to the access control equipment is improved.
In another optional embodiment, the method may further comprise:
analyzing all historical traffic data of the access control equipment in a storage space to obtain traffic flow corresponding to each time interval of the access control equipment in a preset period, wherein the preset period comprises any one of a natural year, a natural month, a natural week and a natural day;
judging whether the traffic flow corresponding to the access control device in each time interval is smaller than a preset flow or not according to the traffic flow corresponding to the access control device in each time interval, and determining the time interval as a target time interval when the judgment result is yes;
when the current time is within any target time interval, detecting whether an access reservation request corresponding to the access control equipment within the target time interval is received in advance;
when the detection result is negative, controlling the access control equipment to enter a dormant state;
and when the detection result is yes, determining an access time interval corresponding to the access reservation request according to the access reservation request, and controlling the access control equipment to enter a dormant state in the dormant time interval, wherein the dormant time interval comprises time intervals except the access time interval in a target time interval in which the current time is positioned.
Therefore, by implementing the optional embodiment, the working state of the access control equipment can be regulated according to the historical passing data of the access control equipment, and the energy consumption of the access control equipment in a time interval with fewer visitors is saved.
In yet another optional embodiment, the method may further comprise:
determining all data types corresponding to the access control equipment and an acquisition trigger mechanism of each data type, wherein the acquisition trigger mechanism of each data type comprises a time trigger mechanism and/or an event trigger mechanism;
when the acquisition trigger mechanism of the target data type corresponding to the access control equipment comprises a time trigger mechanism, judging whether the acquisition interval duration corresponding to the access control equipment is greater than a preset duration; when the judgment result is yes, acquiring target equipment data corresponding to the target data type based on the access control equipment, and triggering and executing the operation of storing the equipment data corresponding to the access control equipment into a storage space corresponding to the access control equipment on the Internet of things platform; the acquisition interval duration is the interval duration between the acquisition time of the equipment data corresponding to the last acquired target data type and the current time, and the equipment data corresponding to the access control equipment comprises target equipment data;
when the acquisition trigger mechanism of the target data type corresponding to the access control equipment comprises an event trigger mechanism, detecting whether a trigger event aiming at the target equipment data corresponding to the target data type occurs currently or not based on the access control equipment; when the detection result is yes, acquiring target equipment data corresponding to the type of the target data based on the access control equipment, and triggering and executing the operation of storing the equipment data corresponding to the access control equipment into a storage space corresponding to the access control equipment on the Internet of things platform; the equipment data corresponding to the access control equipment comprise target equipment data.
Therefore, the optional embodiment can select the matched acquisition triggering mechanism according to different data types, so that the matching degree of the acquired equipment data and the actual requirement is improved, and the diversity and flexibility of data acquisition and data storage are improved.
Example two
Referring to fig. 2, fig. 2 is a schematic flow chart of another access control method based on the internet of things according to the embodiment of the present invention. The access control method based on the internet of things described in fig. 2 may be applied to any scene where the passage of people and vehicles needs to be controlled, such as the entrance and exit of a place such as a community, a school, an office building, and the like, and the entrance and exit of a parking lot in the place, and may also be applied to a switch device that controls the use permission, such as a switch device of an intelligent drawer, and the like, and the embodiment of the present invention is not limited. As shown in fig. 2, the access control method based on the internet of things may include the following operations:
201. when a passing request aiming at access control equipment accessed to an Internet of things platform is detected, identification information corresponding to a target object corresponding to the passing request is collected, and the target object comprises a person or a vehicle triggering the passing request.
202. And determining the authority attribute of the target object according to the identification information.
203. And controlling the access control equipment to execute matched operation according to the authority attribute.
204. And storing the equipment data corresponding to the access control equipment into a storage space corresponding to the access control equipment on the platform of the Internet of things, wherein the equipment data at least comprises the passing data of the target object about the passing request.
205. And when the authority attribute is an unauthorized attribute, detecting whether an access control authorization request aiming at the access control equipment triggered by the target object is received.
In the embodiment of the present invention, the target object may trigger the access authorization request through the access control device, or may trigger the access authorization request through an intelligent device such as an intelligent terminal, and optionally, the target object may trigger the access authorization request through the access control device in a key interaction manner, or may trigger the access authorization request through a voice interaction manner, which is not limited in the embodiment of the present invention.
206. And when the detection result in the step 205 is yes, judging whether the target object meets the authorization condition of the access control device according to the target identity information.
207. And if the judgment result in the step 206 is yes, granting the target object the target authority aiming at the access control equipment.
In the embodiment of the present invention, for other descriptions of steps 201-204, please refer to the detailed description of step 101-104 in the first embodiment, which is not repeated herein.
It should be noted that, in other embodiments, when the authority attribute is an unauthorized attribute, step 206 may be triggered directly without performing step 205.
Therefore, the embodiment of the invention can not only perform real-time management and control when people and vehicles pass in and out of the access passage, but also meet the monitoring and backtracking requirements on the passing conditions of the people and the vehicles by storing the equipment data of the access control equipment, so that the responsibility main body can be confirmed by checking the equipment data when the abnormal state occurs in the control area corresponding to the access control equipment, the safety of the access control system is further improved, the safety management and control cost of the access control system is reduced, in addition, the access control authority of the people or the vehicles about the access control equipment can be granted in time according to the collected identification information, and the convenience and the intelligence of granting the access control authority are improved.
In an optional embodiment, before granting the target object the right to the access control device, the method may further include:
judging whether the authority level corresponding to the target object is greater than or equal to a preset level or not according to the target identity information;
when the authority level is greater than or equal to the preset level, determining that the target authority comprises a first authority and a second authority, wherein the first authority comprises the passing authority of the access control equipment, and the second authority comprises the authority for adding an authorized object and/or deleting the authorized object for the access control equipment;
and when the permission level is less than the preset level, determining that the target permission comprises a first permission.
Therefore, the optional embodiment can grant different types of permissions to the target object according to actual requirements, improve the diversity and flexibility of granting the access permissions, and also improve the matching degree of the granted permission types and the identity information of the target object, so that the accuracy and reliability of granting the access permissions are improved.
In another optional embodiment, before granting the target object the right to the access control device, the method may further include:
judging whether associated access control equipment of the access control equipment exists in all unauthorized access control equipment corresponding to the target object according to a control area corresponding to the access control equipment, wherein the control area corresponding to the associated access control equipment comprises a control area corresponding to the access control equipment;
when the determination result is yes, granting the target object a target right for the access control device may include:
and granting the target object with target permission for the access control equipment and the associated access control equipment.
Therefore, the optional embodiment can grant the access control permission of the access control device and the access control device associated with the access control device for the target object, and the grant efficiency of the access control permission is improved.
EXAMPLE III
Referring to fig. 3, fig. 3 is a schematic structural diagram of an access control device based on the internet of things according to an embodiment of the present invention. The access control device based on the internet of things described in fig. 3 may be applied to any scene where the passage of people and vehicles needs to be controlled, such as the entrance and exit of a place such as a community, a school, an office building, and the entrance and exit of a parking lot in the place, and may also be applied to a switch device that controls the usage right, such as a switch device of an intelligent drawer, and the embodiment of the present invention is not limited. As shown in fig. 3, the access control device based on the internet of things may include:
the acquisition module 301 is configured to acquire identification information corresponding to a target object corresponding to a passage request when the passage request for the access control device accessing the internet of things platform is detected, where the target object includes a person or a vehicle triggering the passage request;
a determining module 302, configured to determine, according to the identification information, an authority attribute of the target object;
the control module 303 is configured to control the access control device to execute a matching operation according to the permission attribute;
the storage module 304 is configured to store device data corresponding to the access control device in a storage space corresponding to the access control device on the internet of things platform, where the device data at least includes passage data of the target object about the passage request.
It can be seen that, the implementation of the device described in fig. 3 not only can perform real-time management and control when people and vehicles pass in and out of the access passage, but also can satisfy the monitoring and backtracking requirements for the passing conditions of the people and the vehicles by storing the device data of the access control device, so that the responsibility main body can be confirmed by checking the device data when the abnormal state occurs in the control area corresponding to the access control device, the security of the access control system can be further improved, and the safety management and control cost of the access control system can be reduced.
In an alternative embodiment, as shown in fig. 3, the specific manner of determining, by the determining module 302, the authority attribute of the target object according to the identification information may include:
determining target identity information corresponding to the identification information based on an identity database of the Internet of things platform, and determining identity information of all authorized objects corresponding to the access control equipment based on an access control authority database of the Internet of things platform;
judging whether the target identity information is matched with the identity information of one authorized object;
when the judgment result is yes, determining the authority attribute of the target object as an authorized attribute;
when the judgment result is negative, determining the authority attribute of the target object as an unauthorized attribute;
the identification information includes at least one piece of sub-identification information, and the specific manner of determining the target identity information corresponding to the identification information by the determining module 302 based on the identity database of the internet of things may include:
when the identification information comprises at least two pieces of sub-identification information, determining the identity information corresponding to each piece of sub-identification information based on an identity database of the Internet of things platform;
judging whether the identity information corresponding to each piece of sub-identification information is the same identity information;
when the judgment result is yes, determining the identity information corresponding to any sub-identification information as the target identity information corresponding to the identification information;
when the judgment result is negative, determining the identity information corresponding to the body identification information in all the sub-identification information as target identity information corresponding to the identification information, wherein the body identification information comprises the sub-identification information determined based on the body characteristics of the target object;
and, the specific way that the control module 303 controls the access control device to execute the matched operation according to the permission attribute may include:
when the authority attribute is the authorized attribute, controlling the access control equipment to release the target object;
and when the authority attribute is an unauthorized attribute, controlling the access control equipment to output a no-pass authority prompt to the target object.
It can be seen that the device described in fig. 3 can also determine the authority attribute of the target object by combining the collected identification information with the database of the internet-of-things platform, so that the intelligence, accuracy and reliability of determining the authority attribute are improved, and the identity information of the target object can be determined based on the body characteristics when a plurality of pieces of sub-identification information of the same target object are not matched, so that the accuracy and reliability of determining the identity information of the target object are improved, the occurrence of the situation that the target object uses other person identity information to pass through the access control equipment is reduced, and the security and reliability of the access control system are improved.
In another alternative embodiment, as shown in fig. 4, the apparatus may further include:
a first detection module 305, configured to detect whether an access authorization request for the access control device triggered by the target object is received when the authority attribute is an unauthorized attribute after the determining module 302 determines the authority attribute of the target object according to the identification information;
a first determining module 306, configured to determine whether the target object meets an authorization condition of the access control device according to the target identity information when the first detecting module 305 detects that the access control authorization request is received;
the authorization module 307 is configured to grant a target right of the target object for the access control device when the first determining module 306 determines that the target object meets the authorization condition;
the first judging module 306 is further configured to, before the authorization module 307 grants the target permission of the target object for the access control device, judge whether the permission level corresponding to the target object is greater than or equal to a preset level according to the target identity information;
the determining module 302 is further configured to determine that the target permission includes a first permission and a second permission when the first determining module 306 determines that the permission level is greater than or equal to the preset level, and determine that the target permission includes the first permission when the first determining module 306 determines that the permission level is less than the preset level; the first permission comprises the passing permission of the access control device, and the second permission comprises the permission of adding an authorized object and/or deleting the authorized object for the access control device.
Therefore, the device described by implementing the figure 4 can grant different types of permissions to the target object according to actual requirements, improve the diversity and flexibility of granting the access permission, and also can improve the matching degree of the granted permission type and the identity information of the target object, thereby improving the accuracy and reliability of granting the access permission.
In yet another optional embodiment, as shown in fig. 4, the first determining module 306 is further configured to determine, before the authorization module 307 grants the target object with the right to the access control device, whether an associated access control device of the access control device exists in all unauthorized access control devices corresponding to the target object according to a control area corresponding to the access control device, where the control area corresponding to the associated access control device includes a control area corresponding to the access control device;
and, the specific manner of granting the target object with the right to the access control device by the authorization module 307 may include:
when the first judgment module 306 judges that the associated access control devices exist in all the unauthorized access control devices, the target object is granted the target permission of the access control device and the associated access control devices.
Therefore, the device described in the embodiment of fig. 4 can also grant the access control permission of the access control device and the associated access control device for the target object, and the efficiency of granting the access control permission is improved.
In yet another alternative embodiment, as shown in fig. 4, the apparatus may further include:
the data transmission module 308 is configured to upload device data corresponding to the access control device to a data middleware of the internet of things platform before the storage module 304 stores the device data corresponding to the access control device in a storage space corresponding to the internet of things platform of the access control device;
the second judging module 309 is configured to judge whether a data topic corresponding to the device data is matched with a target data topic in the data middleware, where the target data topic includes any data topic subscribed by an engine corresponding to the internet of things platform in the data middleware, and the engine corresponds to at least one analysis mode;
the determining module 302 is further configured to determine, according to the data topic corresponding to the device data, a target analysis mode corresponding to the access control device in all analysis modes when the second determining module 309 determines that the data topic corresponding to the device data matches the target data topic;
a screening module 310, configured to screen, based on the engine, screened device data that is correspondingly matched with the target analysis method from the device data;
the embedding module 311 is configured to embed the screening device data into a data model corresponding to a target analysis manner, so as to obtain target device data based on a target storage format;
and, the specific way that the storage module 304 stores the device data corresponding to the access control device to the storage space corresponding to the access control device on the internet of things platform may include:
and storing the target equipment data into a storage space corresponding to the access control equipment on the Internet of things platform.
Therefore, the device described in fig. 4 can also store the data into the storage space after the data is subjected to accurate screening and format conversion, so that the accuracy and reliability of data storage are improved, and the relevant personnel of the platform of the internet of things can output accurate equipment data when needing to check the equipment data.
In yet another alternative embodiment, as shown in fig. 4, the second determining module is further configured to determine whether a data theme corresponding to the device data of the access control device matches any data theme in the data middleware of the internet of things platform before the data transmission module uploads the device data corresponding to the access control device to the data middleware of the internet of things platform;
the apparatus may further include:
a creating module 312, configured to create a data topic corresponding to the device data in the data middleware when the second determining module 309 determines that the data topic corresponding to the device data does not match all data topics in the data middleware;
the adding module 313 is configured to add a data theme corresponding to the device data to a subscribed theme queue in a data middleware of an engine of the internet of things platform, and trigger the operation of the data transmission module 308 for uploading the device data corresponding to the access control device to the data middleware of the internet of things platform;
and, the specific manner of determining, by the determining module 302, the target analysis manner corresponding to the access control device in all the analysis manners according to the data topic corresponding to the device data may include:
when the second judging module 309 judges that the data topic corresponding to the device data does not match all the data topics in the data middleware, determining a device corresponding to each analysis mode corresponding to the engine;
judging whether the devices corresponding to all the analysis modes have the same type of devices corresponding to the access control devices;
and when the judgment result is yes, determining the analysis mode corresponding to the equipment of the same type as the target analysis mode of the access control equipment.
It can be seen that, by implementing the apparatus described in fig. 4, a data theme can be automatically added to the device data of the access control device in the data middleware, thereby reducing the occurrence of the situation that data cannot be filtered or stored due to the absence of the data theme matched with the device data of the access control device, and further, by using an analysis mode that refers to other devices of the same type as an analysis mode of the access control device, reducing the time cost and the operation cost consumed by creating a new analysis mode, and improving the efficiency of determining the analysis mode corresponding to the access control device.
In yet another alternative embodiment, as shown in fig. 4, the apparatus may further include:
the analysis module 314 is configured to analyze all historical traffic data of the access control device in the storage space to obtain a traffic flow corresponding to each time interval of the access control device in a preset period, where the preset period includes any one of a natural year, a natural month, a natural week, and a natural day;
the second determining module 309 is further configured to determine, for the traffic flow corresponding to each time interval of the access control device, whether the traffic flow corresponding to the time interval of the access control device is smaller than a preset flow, and when a determination result is yes, determine the time interval as a target time interval;
the second detecting module 315 is configured to detect whether an access reservation request corresponding to the access control device in any target time interval is received in advance when the current time is within the target time interval;
the control module 303 is further configured to control the access control device to enter a dormant state when the second detection module 315 detects that the access reservation request is not received in advance;
the determining module 302 is further configured to determine, when the second detecting module 315 detects that the access reservation request is received in advance, an access time interval corresponding to the access reservation request according to the access reservation request;
the control module 303 is further configured to control the access control device to enter a sleep state within a sleep time interval, where the sleep time interval includes a time interval within a target time interval in which the current time is located, except for the access time interval.
Therefore, the device described in fig. 4 can regulate and control the working state of the access control device according to the historical traffic data of the access control device, and energy consumption of the access control device in a time interval with few visitors is saved.
Example four
Referring to fig. 5, fig. 5 is a schematic structural diagram of another access control device based on the internet of things according to an embodiment of the present invention. As shown in fig. 5, this entrance guard's authority control device based on thing networking can include:
a memory 401 storing executable program code;
a processor 402 coupled with the memory 401;
the processor 402 calls the executable program code stored in the memory 401 to execute the steps in the access control method based on the internet of things described in the first embodiment or the second embodiment of the present invention.
EXAMPLE five
The embodiment of the invention discloses a computer storage medium, wherein a computer instruction is stored in the computer storage medium, and when the computer instruction is called, the computer instruction is used for executing steps in the access control method based on the Internet of things described in the first embodiment or the second embodiment of the invention.
Example six
An embodiment of the present invention discloses a computer program product, which includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause a computer to execute the steps in the method for controlling access authorization based on internet of things described in the first embodiment or the second embodiment.
The above-described embodiments of the apparatus are merely illustrative, and the modules described as separate components may or may not be physically separate, and the components shown as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above detailed description of the embodiments, those skilled in the art will clearly understand that the embodiments may be implemented by software plus a necessary general hardware platform, and may also be implemented by hardware. Based on such understanding, the above technical solutions may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, where the storage medium includes a Read-Only Memory (ROM), a Random Access Memory (RAM), a Programmable Read-Only Memory (PROM), an Erasable Programmable Read-Only Memory (EPROM), a One-time Programmable Read-Only Memory (OTPROM), an Electrically Erasable Programmable Read-Only Memory (EEPROM), a Compact Disc-Read-Only Memory (CD-ROM), or other disk memories, CD-ROMs, or other magnetic disks, A tape memory, or any other medium readable by a computer that can be used to carry or store data.
Finally, it should be noted that: the access control method and device based on the internet of things disclosed in the embodiment of the invention are only preferred embodiments of the invention, and are only used for illustrating the technical scheme of the invention, but not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those skilled in the art; the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. An access control method based on the Internet of things is characterized by comprising the following steps:
when a passing request aiming at access control equipment accessed to an Internet of things platform is detected, acquiring identification information corresponding to a target object corresponding to the passing request, wherein the target object comprises a person or a vehicle triggering the passing request;
determining the authority attribute of the target object according to the identification information;
controlling the access control equipment to execute matched operation according to the authority attribute;
and storing the equipment data corresponding to the access control equipment to the storage space corresponding to the Internet of things platform, wherein the equipment data at least comprises the passing data of the target object about the passing request.
2. The internet of things-based access control method according to claim 1, wherein the determining the authority attribute of the target object according to the identification information comprises:
determining target identity information corresponding to the identification information based on an identity database of the Internet of things platform, and determining identity information of all authorized objects corresponding to the access control equipment based on an access control authority database of the Internet of things platform;
judging whether the target identity information is matched with the identity information of one of the authorized objects;
when the judgment result is yes, determining the authority attribute of the target object as an authorized attribute;
when the judgment result is negative, determining that the authority attribute of the target object is an unauthorized attribute;
when the identification information includes at least two pieces of sub-identification information, the determining, based on the identity database of the internet of things, target identity information corresponding to the identification information includes:
determining identity information corresponding to each piece of sub-identification information based on an identity database of the Internet of things platform;
judging whether the identity information corresponding to each sub-identification information is the same identity information;
when the judgment result is yes, determining the identity information corresponding to any sub-identification information as the target identity information corresponding to the identification information;
when the judgment result is negative, determining the identity information corresponding to the body identification information in all the sub-identification information as the target identity information corresponding to the identification information, wherein the body identification information comprises the sub-identification information determined based on the body characteristics of the target object;
and controlling the access control equipment to execute matched operations according to the authority attribute, wherein the operations comprise:
when the authority attribute is an authorized attribute, controlling the access control equipment to release the target object;
and when the authority attribute is an unauthorized attribute, controlling the access control equipment to output a no-pass authority prompt to the target object.
3. The internet of things-based access control method according to claim 2, wherein after determining the authority attribute of the target object according to the identification information, the method further comprises:
when the permission attribute is the unauthorized attribute, detecting whether an access control authorization request aiming at the access control equipment triggered by the target object is received;
when the detection result is yes, judging whether the target object meets the authorization condition of the access control equipment or not according to the target identity information;
when the target object meets the authorization condition, granting the target object a target authority for the access control equipment;
wherein, before the granting of the target object with the right to the access control device, the method further comprises:
judging whether the authority level corresponding to the target object is greater than or equal to a preset level or not according to the target identity information;
when the permission level is greater than or equal to the preset level, determining that the target permission comprises a first permission and a second permission, wherein the first permission comprises a passing permission of the access control equipment, and the second permission comprises a permission for adding an authorized object and/or deleting an authorized object to the access control equipment;
and when the permission level is smaller than the preset level, determining that the target permission comprises a first permission.
4. The Internet of things-based access control method according to claim 3, wherein before the granting of the target object with the right to the access control device, the method further comprises:
judging whether associated access control equipment of the access control equipment exists in all unauthorized access control equipment corresponding to the target object or not according to a control area corresponding to the access control equipment, wherein the control area corresponding to the associated access control equipment comprises a control area corresponding to the access control equipment;
when the judgment result is yes, the granting of the target permission of the target object for the access control device includes:
and granting the target object with target permission for the access control equipment and the associated access control equipment.
5. The Internet of things-based access control method according to any one of claims 1-4, wherein the device data has a corresponding data theme;
before the storing the device data corresponding to the access control device into the storage space corresponding to the internet of things platform by the access control device, the method further includes:
uploading device data corresponding to the access control device to a data middleware of the Internet of things platform;
judging whether a data theme corresponding to the equipment data is matched with a target data theme in the data middleware, wherein the target data theme comprises any data theme subscribed by an engine corresponding to the Internet of things platform in the data middleware, and the engine corresponds to at least one analysis mode;
when the judgment result is yes, determining a target analysis mode corresponding to the access control equipment in all the analysis modes according to the data theme corresponding to the equipment data;
screening the screening equipment data correspondingly matched with the target analysis mode from the equipment data based on the engine;
embedding the screening equipment data into a data model corresponding to the target analysis mode to obtain target equipment data based on a target storage format;
and, will the equipment data storage that entrance guard's equipment corresponds extremely entrance guard's equipment is in the storage space that the thing networking platform corresponds includes:
and storing the target equipment data to a storage space corresponding to the Internet of things platform of the access control equipment.
6. The Internet of things-based access control method according to claim 5, wherein before the device data corresponding to the access control device is uploaded to the data middleware of the Internet of things platform, the method further comprises:
judging whether a data theme corresponding to the equipment data of the access control equipment is matched with any data theme in the data middleware of the Internet of things platform;
when the judgment result is negative, creating a data theme corresponding to the equipment data in the data middleware;
adding the data theme corresponding to the equipment data to a subscribed theme queue of an engine of the Internet of things platform in the data middleware, and triggering and executing the operation of uploading the equipment data corresponding to the access control equipment to the data middleware of the Internet of things platform;
and when the data theme corresponding to the device data is not matched with all the data themes in the data middleware, determining a target analysis mode corresponding to the access control device in all the analysis modes according to the data theme corresponding to the device data, wherein the target analysis mode comprises:
determining equipment corresponding to each analysis mode corresponding to the engine;
judging whether the same type of equipment corresponding to the access control equipment exists in all the equipment corresponding to the analysis mode;
and when the judgment result is yes, determining the analysis mode corresponding to the equipment of the same type as the target analysis mode of the access control equipment.
7. The Internet of things-based access control method according to claim 5, further comprising:
analyzing all historical traffic data of the access control equipment in the storage space to obtain traffic flow corresponding to each time interval of the access control equipment in a preset period, wherein the preset period comprises any one of a natural year, a natural month, a natural week and a natural day;
judging whether the traffic flow corresponding to the access control equipment in each time interval is smaller than a preset flow or not according to the traffic flow corresponding to the access control equipment in each time interval, and determining the time interval as a target time interval when the judgment result is yes;
when the current time is within any one target time interval, detecting whether an access reservation request corresponding to the access control equipment within the target time interval is received in advance;
when the detection result is negative, controlling the access control equipment to enter a dormant state;
and when the detection result is yes, determining an access time interval corresponding to the access reservation request according to the access reservation request, and controlling the access control equipment to enter a dormant state in the dormant time interval, wherein the dormant time interval comprises a time interval except the access time interval in a target time interval in which the current moment is positioned.
8. The utility model provides an entrance guard's access control device based on thing networking which characterized in that, the device includes:
the system comprises an acquisition module, a processing module and a display module, wherein the acquisition module is used for acquiring identification information corresponding to a target object corresponding to a traffic request when the traffic request aiming at access control equipment accessed to an Internet of things platform is detected, and the target object comprises a person or a vehicle triggering the traffic request;
the determining module is used for determining the authority attribute of the target object according to the identification information;
the control module is used for controlling the access control equipment to execute matched operation according to the authority attribute;
and the storage module is used for storing equipment data corresponding to the access control equipment to a storage space corresponding to the Internet of things platform, wherein the equipment data at least comprises the passing data of the target object about the passing request.
9. The utility model provides an entrance guard's access control device based on thing networking which characterized in that, the device includes:
a memory storing executable program code;
a processor coupled with the memory;
the processor calls the executable program codes stored in the memory to execute the access permission control method based on the Internet of things according to any one of claims 1-7.
10. A computer storage medium, wherein the computer storage medium stores computer instructions, which when invoked, are configured to perform the method for controlling access rights based on the internet of things according to any one of claims 1 to 7.
CN202210014996.6A 2022-01-07 2022-01-07 Access control permission control method and device based on Internet of things Active CN114553474B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210014996.6A CN114553474B (en) 2022-01-07 2022-01-07 Access control permission control method and device based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210014996.6A CN114553474B (en) 2022-01-07 2022-01-07 Access control permission control method and device based on Internet of things

Publications (2)

Publication Number Publication Date
CN114553474A true CN114553474A (en) 2022-05-27
CN114553474B CN114553474B (en) 2023-11-03

Family

ID=81670450

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210014996.6A Active CN114553474B (en) 2022-01-07 2022-01-07 Access control permission control method and device based on Internet of things

Country Status (1)

Country Link
CN (1) CN114553474B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115550430A (en) * 2022-09-19 2022-12-30 中国联合网络通信集团有限公司 Method, platform, system and storage medium for monitoring access control abnormity

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102243773A (en) * 2010-05-11 2011-11-16 丁峰 Entrance control system supported by multiple identities recognition
CN108305360A (en) * 2018-01-16 2018-07-20 厦门中控智慧信息技术有限公司 Access control method and relevant apparatus
CN110473328A (en) * 2019-09-09 2019-11-19 腾讯科技(深圳)有限公司 Community's access control management method and device, storage medium, electronic equipment
CN110782575A (en) * 2019-09-24 2020-02-11 深圳市智微智能科技开发有限公司 Storehouse management method and related product
WO2020135079A1 (en) * 2018-12-26 2020-07-02 巽腾(广东)科技有限公司 Method and device for opening electronic gate, and server
CN111681346A (en) * 2020-05-29 2020-09-18 软通动力信息技术有限公司 Prevention and control passing processing method, device, equipment and medium
CN113611032A (en) * 2021-05-24 2021-11-05 沈阳格林豪森物业管理有限公司 Access control management method and system based on face recognition
CN113781695A (en) * 2021-08-27 2021-12-10 创视未来科技(深圳)有限公司 Access control management method, system, device and computer readable storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102243773A (en) * 2010-05-11 2011-11-16 丁峰 Entrance control system supported by multiple identities recognition
CN108305360A (en) * 2018-01-16 2018-07-20 厦门中控智慧信息技术有限公司 Access control method and relevant apparatus
WO2020135079A1 (en) * 2018-12-26 2020-07-02 巽腾(广东)科技有限公司 Method and device for opening electronic gate, and server
CN110473328A (en) * 2019-09-09 2019-11-19 腾讯科技(深圳)有限公司 Community's access control management method and device, storage medium, electronic equipment
CN110782575A (en) * 2019-09-24 2020-02-11 深圳市智微智能科技开发有限公司 Storehouse management method and related product
CN111681346A (en) * 2020-05-29 2020-09-18 软通动力信息技术有限公司 Prevention and control passing processing method, device, equipment and medium
CN113611032A (en) * 2021-05-24 2021-11-05 沈阳格林豪森物业管理有限公司 Access control management method and system based on face recognition
CN113781695A (en) * 2021-08-27 2021-12-10 创视未来科技(深圳)有限公司 Access control management method, system, device and computer readable storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115550430A (en) * 2022-09-19 2022-12-30 中国联合网络通信集团有限公司 Method, platform, system and storage medium for monitoring access control abnormity
CN115550430B (en) * 2022-09-19 2024-04-09 中国联合网络通信集团有限公司 Monitoring method, platform, system and storage medium for door access abnormality

Also Published As

Publication number Publication date
CN114553474B (en) 2023-11-03

Similar Documents

Publication Publication Date Title
US10389729B2 (en) Access control using portable electronic devices
CN108009728B (en) Regional security management method and system in park
WO2015099607A1 (en) An integrated access control and identity management system
EP2779133A2 (en) System and method of anomaly detection
CN109712291B (en) Opening method and device of electronic gate and server
CN113611032A (en) Access control management method and system based on face recognition
CN110768942B (en) Identity authentication system
CN113160472A (en) Intelligent management method, device, system, equipment and medium for community access control
CN112233305A (en) Building intelligent management system
CN114553474B (en) Access control permission control method and device based on Internet of things
CN114202839A (en) Gate passage control method, device, equipment and storage medium
CN112381435A (en) Gridding directional pushing management method for dynamic risk in hydropower station operation process
CN110914875B (en) Location-based behavior monitoring
CN110060126A (en) A kind of device and method based on 5G two dimensional code smart lock management floating population
CN113838228A (en) Command issuing method and device applied to access control management system and storage medium
US20200050757A1 (en) Action monitoring apparatus, system, and method
KR100918272B1 (en) A security control system and method thereof using the identification of a specific person
CN116503984A (en) Unattended personnel monitoring system of transformer substation
CN112233306A (en) Access control response processing method, access control terminal and control platform
CN112669501A (en) Access control method, device and computer readable storage medium
DE102015202485A1 (en) Telecommunication method for authenticating a user
CN115273276B (en) Method and device for authenticating a user
CN212933600U (en) Access control management equipment with data tampering and uploading prevention functions
CN214623767U (en) Coal mine entry personnel detection authentication channel device
CN116844270A (en) Access control system, access control method, access control device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 518000, 3rd Floor, Building 40, Baotian Industrial Zone, Chentian Community, Xixiang Street, Bao'an District, Shenzhen City, Guangdong Province

Applicant after: China Southern Power Grid Digital Platform Technology (Guangdong) Co.,Ltd.

Address before: 518053 501, 502, 601 and 602, building D, wisdom Plaza, Qiaoxiang Road, Gaofa community, Shahe street, Nanshan District, Shenzhen, Guangdong

Applicant before: China Southern Power Grid Shenzhen Digital Power Grid Research Institute Co.,Ltd.

GR01 Patent grant
GR01 Patent grant