CN115131900A - Door opening method and device by using door opening software - Google Patents

Door opening method and device by using door opening software Download PDF

Info

Publication number
CN115131900A
CN115131900A CN202210737372.7A CN202210737372A CN115131900A CN 115131900 A CN115131900 A CN 115131900A CN 202210737372 A CN202210737372 A CN 202210737372A CN 115131900 A CN115131900 A CN 115131900A
Authority
CN
China
Prior art keywords
door opening
software
access control
door
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210737372.7A
Other languages
Chinese (zh)
Inventor
刘交
郭慧杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202210737372.7A priority Critical patent/CN115131900A/en
Publication of CN115131900A publication Critical patent/CN115131900A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application discloses a door opening method and device using door opening software, which can be applied to the field of door opening or the financial field. The method comprises the following steps: acquiring a corresponding entrance guard identification from a target entrance guard through door opening software according to a near field communication mode; sending a door opening request to a door access background system, wherein the door opening request comprises a software identifier of door opening software and a door access identifier; when the access control background system determines that the door opening software belongs to a legal user according to the software identification and a prestored legal software identification, receiving a door opening response message sent by the access control background system, wherein the door opening response message comprises a door opening password; and sending a door opening password to the target door control through the door opening software according to the near field communication mode so that the target door control can unlock when the door opening password is consistent with a legal door opening password acquired from the door control background system. By the method, the safety of door opening is improved, and convenience of a door opening user is guaranteed.

Description

Door opening method and device by using door opening software
Technical Field
The application relates to the field of door opening, in particular to a door opening method and device by using door opening software.
Background
With the rapid development of science and technology, banks have deployed a large number of unmanned outlets, which can allow users of the banks to automatically handle various simple services such as deposit and withdrawal directly, thus reducing the labor cost of the banks and facilitating the users of the banks.
At present, anyone can directly enter the unmanned network of the bank without inputting any password, which obviously causes great potential safety hazard and is not beneficial to the safe and normal operation of the unmanned network of the bank.
Disclosure of Invention
The embodiment of the application provides a door opening method and device by using door opening software, which can improve the security of unmanned bank outlets.
In view of this, a first aspect of the embodiments of the present application provides a door opening method using door opening software, where the method includes:
acquiring a corresponding entrance guard identifier from a target entrance guard through door opening software according to a near field communication mode;
sending a door opening request to a door access background system, wherein the door opening request comprises a software identifier of the door opening software and the door access identifier;
when the access control background system determines that the door opening software belongs to a legal user according to the software identification and a prestored legal software identification, receiving a door opening response message sent by the access control background system, wherein the door opening response message comprises a door opening password;
and sending the door opening password to the target access control through door opening software according to a near field communication mode, so that the target access control can unlock when the door opening password is consistent with a legal door opening password acquired from the access control background system.
A second aspect of the embodiments of the present application provides a door opening method using door opening software, where the method includes:
the method comprises the steps that an access control background system receives a door opening request sent by door opening software, wherein the door opening request comprises a software identifier of the door opening software and an access control identifier, and the access control identifier is acquired from a target access control through the door opening software according to a near field communication mode;
and if the access control background system determines that the door opening software belongs to a legal user according to the software identification and a prestored legal software identification, sending a door opening response message to the door opening software, wherein the door opening response message comprises a door opening password, so that the target access control is unlocked by the door opening software through the door opening password according to a near field communication mode.
A third aspect of the present embodiment provides a door opening device using door opening software, where the device includes an obtaining unit, a first sending unit, a receiving unit, and a second sending unit;
the acquisition unit is used for acquiring a corresponding access control identifier from a target access control through door opening software according to a near field communication mode;
the first sending unit is used for sending a door opening request to a door access background system, wherein the door opening request comprises a software identifier of the door opening software and the door access identifier;
the receiving unit is used for receiving a door opening response message sent by the access control background system when the access control background system determines that the door opening software belongs to a legal user according to the software identification and a prestored legal software identification, wherein the door opening response message comprises a door opening password;
and the second sending unit is used for sending the door opening password to the target access control through door opening software according to a near field communication mode, so that the target access control can unlock when the door opening password is consistent with a legal door opening password acquired from the access control background system.
A fourth aspect of the embodiments of the present application provides a door opening device using door opening software, where the device includes a receiving unit and a transmitting unit;
the receiving unit is used for receiving a door opening request sent by door opening software by the door access background system, wherein the door opening request comprises a software identifier of the door opening software and an access control identifier, and the access control identifier is acquired from a target access control through the door opening software according to a near field communication mode;
the sending unit is used for determining that the door opening software belongs to a legal user if the door access background system determines that the door opening software belongs to the legal user according to the software identification and a prestored legal software identification, and sending a door opening response message to the door opening software, wherein the door opening response message comprises a door opening password, so that the door opening software enables the target door access to unlock according to a near field communication mode through the door opening password.
A fifth aspect of embodiments of the present application provides an electronic device, including:
a memory for storing executable instructions;
and the processor is used for realizing the door opening method by using the door opening software provided by the embodiment of the application when the executable instructions stored in the memory are executed.
A sixth aspect of the present embodiment provides a computer-readable medium, which stores executable instructions and is configured to, when executed by a processor, implement the door opening method using door opening software provided in the present embodiment.
The embodiment of the application discloses a door opening method and a device by using door opening software, wherein the method comprises the following steps: firstly, acquiring a corresponding entrance guard identifier from a target entrance guard through door opening software according to a near field communication mode; then, sending a door opening request to a door access background system, wherein the door opening request comprises a software identifier of door opening software and an access control identifier; then, when the access control background system determines that the door opening software belongs to a legal user according to the software identification and a prestored legal software identification, the access control background system performs identity identification on the door opening user, and receives a door opening response message sent by the access control background system, wherein the door opening response message comprises a door opening password; and finally, sending the door opening password to the target access control through the door opening software according to the near field communication mode, and enabling a door opening user not to manually input the door opening password, so that the target access control can unlock the door when the door opening password is consistent with a legal door opening password acquired from the access control background system. The access control background system only sends the door opening password to the door opening software belonging to the legal user through the door opening software, so that the illegal user is prevented from randomly entering the target access control. In addition, the door opening software acquires the door control identification and sends the door opening password to the target door control in a near field communication mode, so that a door opening user does not need to manually input the password, and the convenience of the door opening user is guaranteed. In a word, the embodiment of the application ensures the convenience of the door opening user on the basis of improving the door opening safety through the door opening software.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a door opening method using door opening software according to an embodiment of the present application;
fig. 2 is another flowchart of a door opening method using door opening software according to an embodiment of the present application;
fig. 3 is an application scenario diagram of a door opening method using door opening software according to an embodiment of the present application;
fig. 4 is a specific flowchart of a door opening method using door opening software according to an embodiment of the present application;
fig. 5 is a binding flowchart of a door opening method using door opening software according to an embodiment of the present application;
fig. 6 is an updated flowchart of a door opening method using door opening software according to an embodiment of the present application;
fig. 7 is a schematic view of a door opener using door opening software according to another embodiment of the present application;
fig. 8 is another schematic diagram of a door opener using door opening software according to another embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims of the present application and in the drawings described above, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Moreover, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
With the rapid development of science and technology, a large number of unmanned outlets have been deployed in banks at present, however, anyone can directly enter the unmanned outlet of the bank without inputting any password at present, which obviously causes great potential safety hazard and is not favorable for the safe and normal operation of the unmanned outlet of the bank.
In view of this, the embodiment of the present application provides a door opening method using door opening software, and the method ensures the convenience of a door opening user through the door opening software on the basis of improving the door opening safety.
Specifically, an embodiment of the present application provides a method and an apparatus for opening a door by using door opening software, where the method includes: firstly, acquiring a corresponding entrance guard identifier from a target entrance guard through door opening software according to a near field communication mode; then, sending a door opening request to a door access background system, wherein the door opening request comprises a software identifier of door opening software and an access control identifier; then, when the access control background system determines that the door opening software belongs to a legal user according to the software identification and a prestored legal software identification, the access control background system performs identity identification on the door opening user, and receives a door opening response message sent by the access control background system, wherein the door opening response message comprises a door opening password; and finally, the door opening password is sent to the target door control through the door opening software according to the near field communication mode, and the door opening password is not required to be manually input by a door opening user, so that the target door control can unlock when the door opening password is consistent with the legal door opening password acquired from the door control background system. The access control background system only sends the door opening password to the door opening software belonging to the legal user through the door opening software, so that the illegal user is prevented from randomly entering the target access control. In addition, the door opening software acquires the door control identification and sends the door opening password to the target door control in a near field communication mode, so that a door opening user does not need to manually input the password, and the convenience of the door opening user is guaranteed. In a word, the embodiment of the application ensures the convenience of the door opening user on the basis of improving the door opening safety through the door opening software.
A door opening method using door opening software provided in the present application is described below by a method embodiment, as shown in fig. 1, fig. 1 is a flowchart of the door opening method using door opening software provided in the embodiment of the present application, and is applied to a terminal corresponding to the door opening software, and the door opening method using door opening software provided in the embodiment of the present application includes the following steps:
s101, obtaining a corresponding entrance guard identification from a target entrance guard through door opening software according to a near field communication mode.
Specifically, when a terminal where the door opening software is located is close to a target door control, a door control identifier of the target door control can be obtained according to a near field communication mode, wherein the door control identifier of the target door control can be static and unique, can also be dynamically changed, and is not limited herein.
Optionally, an access control identifier acquisition request may be sent to the target access control according to the near field communication manner; and acquiring the entrance guard identification from the target entrance guard through a near field communication mode.
Particularly, when a terminal where the door opening software is located is close to a target entrance guard, an entrance guard identification acquisition request can be sent to the target entrance guard according to a near field communication mode, and after the target entrance guard receives the entrance guard identification acquisition request, the corresponding entrance guard identification can be returned to the door opening software according to a near field communication technology. Because the required time of the near field communication technology is short, the access control identification of the target access control can be obtained in a short time, and the time for opening the door by a door opening user by using door opening software is reduced.
S102, sending a door opening request to a door access background system, wherein the door opening request comprises a software identifier of door opening software and an access control identifier.
S103, when the door opening software is determined to belong to a legal user by the door access background system according to the software identification and the prestored legal software identification, receiving a door opening response message sent by the door access background system, wherein the door opening response message comprises a door opening password.
Specifically, after the door opening software acquires the door access identifier corresponding to the target door access, a door opening request can be sent to a door access background system, wherein the door opening request comprises the software identifier of the door opening software. The access control background system can judge whether the software identification is legal software identification according to the software identification and the prestored legal software identification, so as to judge whether the legal software corresponding to the software identification belongs to a legal user. And when the access control background system determines that the door opening software belongs to a legal user, receiving a door opening response message sent by the access control background system, wherein the door opening response message comprises a door opening password.
It should be noted that if the access control background system determines that the door opening software is not affiliated to the legal user according to the software identifier and the legal software identifier, the access control background system may send a door opening failure message to the door opening software, and in addition, in view of safety, the access control background system may also send an early warning message to a target access control corresponding to the access control identifier, so as to warn that there may be a person who has to crack a password violently or open the door violently, etc.
And S104, sending a door opening password to the target door control through the door opening software according to the near field communication mode, so that the target door control can unlock when the door opening password is consistent with a legal door opening password acquired from the door control background system.
Specifically, after receiving the door opening response message, the door opening software can send a door opening password to the target door control according to the near field communication mode, so that the target door control can judge whether the door opening password is consistent with a legal door opening password acquired from a background system of the door control, and the target door control releases locking when the door opening password is consistent with the legal door opening password, and then the door is opened successfully. The target entrance guard needs to determine that the door opening password is consistent with the legal door opening password acquired from the entrance guard background and then unlocks, so that illegal users can be effectively prevented from opening doors and entering and exiting at will, and the safety is improved. In addition, the password is sent in a near field communication mode instead of being manually input by a user, so that the problem that the user is troublesome due to the fact that the password needs to be manually input can be solved, and convenience of opening the door by using door opening software is guaranteed for the user.
It should be noted that the door-opening password obtained by the target access control from the access control background system may be a constant password or a variable password. If the legal door opening password of the target door control is not changed, the door opening password obtained by the door opening software after successful verification is the only one, and at the moment, the door opening software can directly open the door in a near field communication mode without displaying the password content; if the legal door opening password is changed, the door opening password obtained by the door opening software after the verification is successful is also the corresponding changed door opening password, and the door opening software can open the door successfully according to the near field communication mode without limitation.
Next, a description is given of a door opening method using door opening software provided in the present application, as shown in fig. 2, fig. 2 is another flowchart of the door opening method using door opening software provided in the present application, and the method is applied to a background system of an access control system, and the door opening method using door opening software provided in the present application includes the following steps:
s201, receiving a door opening request sent by door opening software, wherein the door opening request comprises a software identifier of the door opening software and an entrance guard identifier, and the entrance guard identifier is acquired from a target entrance guard through the door opening software according to a near field communication mode.
S202, if the access control background system determines that the door opening software belongs to a legal user according to the software identification and the prestored legal software identification, sending a door opening response message to the door opening software, wherein the door opening response message comprises a door opening password, so that the door opening software enables the target access control to unlock according to the near field communication mode through the door opening password.
Specifically, the access control background system can judge whether the door opening software corresponding to the software identifier belongs to a legal user according to the software identifier and a prestored legal identifier, and can send a door opening response message to the door opening software after determining that the door opening software belongs to the legal user.
Optionally, when the door opening software acquires the user name and the password of the user for the first time, the door access background system receives a binding request sent by the door opening software, where the binding request includes the first software identifier and the user name and the password of the user.
And if the access control background system determines that the user is a legal user according to the user name and the password of the user, storing the first software identifier as a legal software identifier.
Specifically, the legal user may be a user who has already handled the service in the bank, and since the user stores the corresponding user information when going to the bank to handle the service, the access control background system may directly use the user information stored in the bank. When the door opening software acquires the user name and the password of the user for the first time, the door access background system receives a binding request sent by the door opening software, the binding request comprises the user name and the password of the user and a software identifier corresponding to the door opening software, the user name and the password of the user can be the user name and the password of the user when the user transacts business in a bank before, the door access background system can be used for inquiring corresponding user information, whether the user is a legal user is further judged, and if the user is determined to be the legal user, the first software identifier can be stored as the legal software identifier. The user information stored in the bank is used, the user name and the password of the user can be used for effectively judging whether the user corresponding to the user name is a legal user or not, and the first software identification is stored as a legal software identification when the user is the legal user.
Optionally, if the door opening software is reinstalled, when the reinstalled door opening software first obtains the user name and the password of the user, the door access background system receives a second binding request sent by the door opening software, where the second binding request includes a second software identifier and the user name and the password of the user, and the second software identifier is different from the first software identifier.
And if the access control background system determines that the user is a legal user according to the user name and the password of the user, the first software identification is modified into the second software identification.
Specifically, when the user uses the door opening software, the user is easily subjected to software upgrading and the like, and the software needs to be reinstalled, and the software identifier of the door opening software and the user information can be bound again due to safety considerations. Specifically, when the reloaded door opening software acquires the user name and the password of the user for the first time, the door access background system receives a second binding request sent by the door opening software, wherein the second binding request comprises a second software identifier and the password of the user name, and the second software identifier different from the first software identifier is set, so that the subsequent door access background system can modify the first software identifier into the second software identifier after determining that the user is a legal user according to the user name and the password of the user, and further update the legal software identifier in time. When the user needs to reinstall the software, the original software identification is changed into the reinstalled software identification which is used as the legal software identification for storage, so that the safety of opening the door after the user reinstalls the software is guaranteed.
Optionally, the door opening request further includes a terminal identifier.
If the access control background system determines that the door opening software belongs to a legal user according to the software identification and the prestored legal software identification, sending a door opening response message to the door opening software, wherein the method comprises the following steps: and if the access control background system determines that the door opening software belongs to a legal user according to the software identifier, a prestored legal software identifier, the terminal identifier and a prestored legal terminal identifier, sending a door opening response message to the door opening software, wherein the door opening response message comprises a door opening password.
Specifically, the door opening request may further include a terminal identifier, where the terminal identifier may be a unique Security Identifier (SID) of a mobile phone, and when the door opening software is judged to belong to a legal user, the access control background system may use the terminal identifier as a judgment basis in addition to the software identifier of the door opening software. When an illegal user obtains the software identifier of the door opening software of a legal user by simulating the door opening software of the legal user, the access control background system can still judge that the illegal user is not the legal user and further does not unlock the lock because the illegal user does not have the terminal identifier of the legal user. In a word, the terminal identification is added in the basis of judging the legal user, so that the condition that the illegal user releases the locking by simulating the door opening software of the legal user can be effectively prevented, and the door opening safety of the user is improved.
An application scenario of the door opening method using the door opening software provided in the embodiment of the present application needs to relate to a terminal where the door opening software is located, a door access background system, a target door access, and a bank user information database, refer to fig. 3, where fig. 3 is an application scenario diagram of the door opening method using the door opening software provided in the embodiment of the present application. Fig. 3 includes a door opening Application (APP) 301, a near field communication access control (NFC access control) 302, an access control background system 303, and a database 304. The APP that opens the door can acquire corresponding entrance guard's sign from NFC entrance guard through the near field communication mode, send the request of opening the door to entrance guard's background system, the request of opening the door is including the software sign of APP that opens the door, entrance guard's background system can judge whether software sign belongs to legal user according to the database, also can be according to the user information storage legal software sign of database self storage, can also return the response message that opens the door to the APP that opens the door, the response message that opens the door includes the password that opens the door, so that the APP that opens the door will open the door the password and send NFC entrance guard's locking according to the near field communication mode and relieve the lock.
Next, a specific flow of a door opening method using door opening software provided in an embodiment of the present application is described in detail with reference to fig. 4, where fig. 4 is a specific flow chart of the door opening method using door opening software provided in the embodiment of the present application.
Particularly, after a terminal where door opening software is located is close to an NFC access control, an access control identification acquisition request is sent according to a near field communication mode, and after the corresponding NFC access control receives the access control identification acquisition request, the access control identification is returned. The door opening software sends a door opening request, the door opening request comprises a software identifier, a terminal identifier and an access control identifier of the door opening software, the access control background system receives the door opening request and judges whether the software identifier and the terminal identifier are correct or not, namely whether the software identifier belongs to a legal software identifier and whether the terminal identifier belongs to a legal terminal identifier or not, if the software identifier and the terminal identifier both belong to a legal user, the access control background system returns a door opening response message comprising a door opening password to the door opening software and sends a legal door opening password to the NFC access control corresponding to the access control identifier. The NFC entrance guard receives the door opening password and then initiates door opening, the door opening password is sent to the NFC entrance guard in a near field communication mode, the NFC entrance guard judges whether the door opening password is consistent with the legal door opening password, and if the door opening password is consistent with the legal door opening password, the NFC entrance guard can open the door.
In the following, a binding flow of a door opening method using door opening software provided in the present application is described, referring to fig. 5, and fig. 5 is a binding flow chart of a door opening method using door opening software provided in an embodiment of the present application.
Specifically, when the user logs in the door opening software for the first time, the user name and the password of the user can be input, and when the door opening software obtains the user name and the password of the user, the software identifier and the terminal identifier of the door opening software can be automatically obtained, and the binding request is sent. Because the database of the bank stores the user information of transacted business, after receiving the binding request, the access control background system can query the database according to the user name, compare whether the corresponding password is correct, and bind the software identifier, the terminal identifier and the user information if the password is correct, namely, finish the storage of the software identifier as a legal software identifier and the storage of the terminal identifier as a legal terminal identifier.
In the following, a related description is given to an update flow of a door opening method using door opening software provided in the present application, referring to fig. 6, and fig. 6 is an update flow chart of a door opening method using door opening software provided in an embodiment of the present application.
Specifically, when the user needs to reinstall the door opening software under various conditions, the user still needs to input the user name and the password of the user, and when the reinstalled door opening software obtains the user name and the password of the user, the software identifier and the terminal identifier of the reinstalled door opening software can be automatically obtained, and the update request is sent. After receiving the update request, the access control background system can query the database according to the user name, compare whether the corresponding password is correct, and if the password is judged to be correct, bind the software identifier and the terminal identifier after being reassembled with the user information, namely, finish updating the software identifier after being reassembled as a legal software identifier.
It should be noted that, when a user needs to replace the terminal where the door opening software is located due to a situation such as replacement of a mobile phone, the door opening software may update both the reinstalled door opening software identifier and the updated terminal identifier, which is not described herein again.
The embodiment of the application discloses a door opening method by using door opening software, which comprises the following steps: firstly, acquiring a corresponding entrance guard identifier from a target entrance guard through door opening software according to a near field communication mode; then, sending a door opening request to a door access background system, wherein the door opening request comprises a software identifier of door opening software and an access control identifier; then, when the access control background system determines that the door opening software belongs to a legal user according to the software identification and a prestored legal software identification, the access control background system performs identity identification on the door opening user, and receives a door opening response message sent by the access control background system, wherein the door opening response message comprises a door opening password; and finally, the door opening password is sent to the target door control through the door opening software according to the near field communication mode, and the door opening password is not required to be manually input by a door opening user, so that the target door control can unlock when the door opening password is consistent with the legal door opening password acquired from the door control background system. The access control background system only sends the door opening password to the door opening software belonging to the legal user through the door opening software, so that the illegal user is prevented from randomly entering the target access control. In addition, the door opening software acquires the door control identification and sends the door opening password to the target door control in a near field communication mode, so that a door opening user does not need to manually input the password, and the convenience of the door opening user is guaranteed. In a word, the embodiment of the application ensures the convenience of the door opening user on the basis of improving the door opening safety through the door opening software.
Another embodiment of the present application provides a door opener using door opening software, as shown in fig. 7, fig. 7 is a schematic diagram of a door opener using door opening software according to another embodiment of the present application, where the door opener includes an obtaining unit 701, a first sending unit 702, a receiving unit 703 and a second sending unit 704;
and the acquisition unit is used for acquiring the corresponding entrance guard identification from the target entrance guard through the door opening software according to the near field communication mode.
And the first sending unit is used for sending a door opening request to the access control background system, wherein the door opening request comprises a software identifier of door opening software and an access control identifier.
And the receiving unit is used for receiving a door opening response message sent by the access control background system when the access control background system determines that the door opening software belongs to a legal user according to the software identifier and a prestored legal software identifier, wherein the door opening response message comprises a door opening password.
And the second sending unit is used for sending the door opening password to the target access control through the door opening software according to the near field communication mode so that the target access control can unlock the lock when the door opening password is consistent with the legal door opening password acquired from the access control background system.
Optionally, in the door opening device using door opening software provided in another embodiment of the present application, the obtaining unit is configured to send an access control identifier obtaining request to a target access control according to a near field communication manner; and acquiring the entrance guard identification from the target entrance guard through a near field communication mode.
Fig. 8 is another schematic view of a door opening device using door opening software according to another embodiment of the present invention, where the door opening device includes a receiving unit 801 and a transmitting unit 802.
And the receiving unit is used for receiving a door opening request sent by the door opening software by the door access background system, wherein the door opening request comprises a software identifier of the door opening software and an access control identifier, and the access control identifier is acquired from a target access control through the door opening software according to a near field communication mode.
And the sending unit is used for sending a door opening response message to the door opening software if the door opening software is determined to belong to a legal user by the access control background system according to the software identifier and a prestored legal software identifier, wherein the door opening response message comprises a door opening password, so that the door opening software enables the target access control to unlock through the door opening password in a near field communication mode.
Optionally, in the door opening device using the door opening software provided in another embodiment of the present application, the door opening device further includes a storage unit, configured to receive, by the door opening software, a binding request sent by the door opening software when the door opening software first obtains a user name and a password of a user, where the binding request includes a first software identifier and the user name and the password of the user; and if the access control background system determines that the user is a legal user according to the user name and the password of the user, storing the first software identifier as a legal software identifier.
Optionally, in the door opening device using the door opening software provided in another embodiment of the present application, the storage unit is further configured to receive, if the door opening software is reinstalled, a second binding request sent by the door opening software when the reinstalled door opening software first obtains a user name and a password of the user, where the second binding request includes a second software identifier and the user name and the password of the user, and the second software identifier is different from the first software identifier; and if the access control background system determines that the user is a legal user according to the user name and the password of the user, the first software identification is modified into the second software identification.
Optionally, in the door opening device using the door opening software, the sending unit is configured to, when the door opening request further includes the terminal identifier, determine that the door opening software belongs to a valid user if the access control background system determines that the door opening software belongs to the valid user according to the software identifier, the prestored valid software identifier, the terminal identifier, and the prestored valid terminal identifier, and send a door opening response message to the door opening software, where the door opening response message includes a door opening password.
It should be noted that, for the specific working processes of each module provided in the foregoing embodiments of the present application, reference may be made to corresponding implementation manners in the foregoing method embodiments, and details are not described herein again.
It should be noted that the door opening method and apparatus using the door opening software provided in the embodiments of the present application are used in the door opening field, the artificial intelligence field, the block chain field, the distributed field, the cloud computing field, the big data field, the mobile internet field, the network security field, the chip field, the virtual reality field, the augmented reality field, the holographic technology field, the quantum computing field, the quantum communication field, the quantum measurement field, the digital twin field, or the financial field. The above description is only an example, and does not limit the application field of the door opening method and apparatus using the door opening software provided in the embodiment of the present application.
Another embodiment of the present application provides an electronic device, including:
a memory for storing executable instructions;
the processor is configured to implement the above-mentioned door opening method using the door opening software according to the embodiment of the present application when executing the executable instructions stored in the memory.
Another embodiment of the present application provides a computer-readable storage medium, which stores executable instructions for implementing the door opening method using door opening software according to the embodiment of the present application when executed by a processor.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A door opening method using door opening software, the method comprising:
acquiring a corresponding entrance guard identification from a target entrance guard through door opening software according to a near field communication mode;
sending a door opening request to a door access background system, wherein the door opening request comprises a software identifier of the door opening software and the door access identifier;
when the access control background system determines that the door opening software belongs to a legal user according to the software identification and a prestored legal software identification, receiving a door opening response message sent by the access control background system, wherein the door opening response message comprises a door opening password;
and sending the door opening password to the target access control through door opening software according to a near field communication mode, so that the target access control can unlock when the door opening password is consistent with a legal door opening password acquired from the access control background system.
2. The method of claim 1, wherein the obtaining of the corresponding access control identifier from the target access control through the door opening software according to the near field communication manner comprises:
sending an access control identification acquisition request to the target access control according to the near field communication mode;
and acquiring the entrance guard identification from the target entrance guard in a near field communication mode.
3. A door opening method using door opening software, the method comprising:
the method comprises the steps that an access control background system receives an access control request sent by access control software, wherein the access control request comprises a software identifier of the access control software and an access control identifier, and the access control identifier is obtained from a target access control through the access control software according to a near-field communication mode;
and if the access control background system determines that the door opening software belongs to a legal user according to the software identification and a prestored legal software identification, sending a door opening response message to the door opening software, wherein the door opening response message comprises a door opening password, so that the door opening software enables the target access control to unlock according to a near field communication mode through the door opening password.
4. The method of claim 3, further comprising:
when the door opening software acquires the user name and the password of the user for the first time, the door access background system receives a binding request sent by the door opening software, wherein the binding request comprises a first software identifier and the user name and the password of the user;
and if the access control background system determines that the user is a legal user according to the user name and the password of the user, storing the first software identification as a legal software identification.
5. The method of claim 4, wherein if the door opening software is reinstalled, the method further comprises:
when the reinstalled door opening software acquires the user name and the password of the user for the first time, the door access background system receives a second binding request sent by the door opening software, wherein the second binding request comprises a second software identifier and the user name and the password of the user, and the second software identifier is different from the first software identifier;
and if the access control background system determines that the user is a legal user according to the user name and the password of the user, the first software identification is modified into the second software identification.
6. The method of claim 3, wherein the door open request further comprises a terminal identification;
if the access control background system determines that the door opening software belongs to a legal user according to the software identification and a prestored legal software identification, sending a door opening response message to the door opening software, wherein the door opening response message comprises:
and if the access control background system determines that the door opening software belongs to a legal user according to the software identification, a prestored legal software identification, the terminal identification and a prestored legal terminal identification, and sends a door opening response message to the door opening software, wherein the door opening response message comprises a door opening password.
7. A door opening device using door opening software is characterized by comprising an acquisition unit, a first sending unit, a receiving unit and a second sending unit;
the acquisition unit is used for acquiring a corresponding access control identifier from a target access control through door opening software according to a near field communication mode;
the first sending unit is used for sending a door opening request to a door access background system, wherein the door opening request comprises a software identifier of the door opening software and the door access identifier;
the receiving unit is used for receiving a door opening response message sent by the access control background system when the access control background system determines that the door opening software belongs to a legal user according to the software identification and a prestored legal software identification, wherein the door opening response message comprises a door opening password;
and the second sending unit is used for sending the door opening password to the target access control through door opening software according to a near field communication mode, so that the target access control can unlock when the door opening password is consistent with a legal door opening password acquired from the access control background system.
8. A door opening device using door opening software is characterized in that the device comprises a receiving unit and a transmitting unit;
the receiving unit is used for receiving a door opening request sent by door opening software by the door access background system, wherein the door opening request comprises a software identifier of the door opening software and an access control identifier, and the access control identifier is acquired from a target access control through the door opening software according to a near field communication mode;
the sending unit is used for determining that the door opening software belongs to a legal user if the door access background system determines that the door opening software belongs to the legal user according to the software identification and a prestored legal software identification, and sending a door opening response message to the door opening software, wherein the door opening response message comprises a door opening password, so that the door opening software enables the target door access to unlock according to a near field communication mode through the door opening password.
9. An electronic device, comprising:
a memory for storing executable instructions;
a processor for implementing the door opening method using the door opening software of any one of claims 1 to 6 when executing the executable instructions stored in the memory.
10. A computer-readable storage medium storing executable instructions for implementing the door opening method using the door opening software according to any one of claims 1 to 6 when executed by a processor.
CN202210737372.7A 2022-06-27 2022-06-27 Door opening method and device by using door opening software Pending CN115131900A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210737372.7A CN115131900A (en) 2022-06-27 2022-06-27 Door opening method and device by using door opening software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210737372.7A CN115131900A (en) 2022-06-27 2022-06-27 Door opening method and device by using door opening software

Publications (1)

Publication Number Publication Date
CN115131900A true CN115131900A (en) 2022-09-30

Family

ID=83379457

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210737372.7A Pending CN115131900A (en) 2022-06-27 2022-06-27 Door opening method and device by using door opening software

Country Status (1)

Country Link
CN (1) CN115131900A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105279832A (en) * 2015-12-01 2016-01-27 北京卡多宝信息技术有限公司 Intelligent door lock system and control method thereof
CN106600776A (en) * 2016-12-08 2017-04-26 宇龙计算机通信科技(深圳)有限公司 Method and system of access control
CN106850503A (en) * 2015-12-04 2017-06-13 阿里巴巴集团控股有限公司 One kind is exempted to log in identity identifying method and device
WO2017128922A1 (en) * 2016-01-29 2017-08-03 北京三快在线科技有限公司 Network-based control method, apparatus, server and pms for use of door lock
CN107564158A (en) * 2017-09-07 2018-01-09 深圳乐易住智能科技股份有限公司 One kind is without key intelligent door lock control system and method
CN108305359A (en) * 2018-01-09 2018-07-20 国网山东省电力公司滨州供电公司 A kind of electric power warehouse electronic access control system and method
CN109243012A (en) * 2018-07-24 2019-01-18 上海帝图信息科技有限公司 Access control system
CN109583181A (en) * 2018-11-29 2019-04-05 新华三技术有限公司 A kind of authentication method, device and machine readable storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105279832A (en) * 2015-12-01 2016-01-27 北京卡多宝信息技术有限公司 Intelligent door lock system and control method thereof
CN106850503A (en) * 2015-12-04 2017-06-13 阿里巴巴集团控股有限公司 One kind is exempted to log in identity identifying method and device
WO2017128922A1 (en) * 2016-01-29 2017-08-03 北京三快在线科技有限公司 Network-based control method, apparatus, server and pms for use of door lock
CN106600776A (en) * 2016-12-08 2017-04-26 宇龙计算机通信科技(深圳)有限公司 Method and system of access control
CN107564158A (en) * 2017-09-07 2018-01-09 深圳乐易住智能科技股份有限公司 One kind is without key intelligent door lock control system and method
CN108305359A (en) * 2018-01-09 2018-07-20 国网山东省电力公司滨州供电公司 A kind of electric power warehouse electronic access control system and method
CN109243012A (en) * 2018-07-24 2019-01-18 上海帝图信息科技有限公司 Access control system
CN109583181A (en) * 2018-11-29 2019-04-05 新华三技术有限公司 A kind of authentication method, device and machine readable storage medium

Similar Documents

Publication Publication Date Title
US9009476B2 (en) Multi-application smart card, and system and method for multi-application management of smart card
CN109711133A (en) Authentication method, device and the server of identity information
CN108805573A (en) A kind of Information Authentication method, server and storage medium
CN109784031B (en) Account identity verification processing method and device
KR20070036125A (en) Network security and fraud detection system and method
KR20180113229A (en) Loan service providing method using black chain and system performing the same
WO2008095011A2 (en) Methods and systems for authentication of a user
CN106600083B (en) Management method and equipment for driver order taking
CN109067881B (en) Remote authorization method, device, equipment and storage medium thereof
US8675828B2 (en) Authentication of a user to a telephonic communication device
CN107113613A (en) Server, mobile terminal, real-name network authentication system and method
CN109831463A (en) Intelligent terminal security protection system for operating system login authentication
CN106549957A (en) A kind of legal authentication method of terminal applies and system
CN105635113A (en) SDK-based remote service processing method and system
CN110969727A (en) Method for controlling intelligent door lock, mobile terminal and computer readable storage medium
CN108920919A (en) Control method, the device and system of interactive intelligence equipment
CN109496443A (en) Mobile authentication method and system for it
CN115761939A (en) Withdrawal box lock and unlock control method, withdrawal box, system and device
CN110598469A (en) Information processing method and device and computer storage medium
CN112073967B (en) Method and device for downloading identity certificate of mobile phone shield equipment and electronic equipment
CN115131900A (en) Door opening method and device by using door opening software
CN109389720B (en) Intelligent door lock permission processing method and device
CN101854628A (en) Password verification system and password verification method
KR102071984B1 (en) Method and device for providing authentication service using mobile terminal
CN115776548A (en) Double recording system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination