CN115171259A - Access control method, device, system, controller and terminal equipment - Google Patents

Access control method, device, system, controller and terminal equipment Download PDF

Info

Publication number
CN115171259A
CN115171259A CN202210734446.1A CN202210734446A CN115171259A CN 115171259 A CN115171259 A CN 115171259A CN 202210734446 A CN202210734446 A CN 202210734446A CN 115171259 A CN115171259 A CN 115171259A
Authority
CN
China
Prior art keywords
information
controller
user access
collector
access information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210734446.1A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Xhorse Electronics Co Ltd
Original Assignee
Shenzhen Xhorse Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Xhorse Electronics Co Ltd filed Critical Shenzhen Xhorse Electronics Co Ltd
Priority to CN202210734446.1A priority Critical patent/CN115171259A/en
Publication of CN115171259A publication Critical patent/CN115171259A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/253Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition visually
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/23Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Abstract

The application relates to an access control method, device, system, controller and terminal equipment. The method comprises the following steps: receiving user access information acquired by at least one acquisition device through a wired interface; the collector is in wired connection with the controller; analyzing the collected user access information to obtain analyzed user access information; and comparing the analyzed user access information with authorized user access information in a local database, and opening the access control corresponding to the collector when the comparison is successful. By adopting the method, the information security can be improved.

Description

Access control method, device, system, controller and terminal equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method, an apparatus, a system, a controller, and a terminal device for controlling an access.
Background
The traditional entrance guard biometric algorithm is deployed in a server. After the equipment collects the image, the image is transmitted to a server for feature extraction and comparison, and finally entrance guard control is executed according to the result. However, in the conventional method, there is a problem that information security is low.
Disclosure of Invention
In view of the above, it is necessary to provide a method, an apparatus, a system, a controller and a terminal device for entrance guard control, which can improve information security.
An access control method is applied to a controller, and comprises the following steps:
receiving user access information acquired by at least one acquisition device through a wired interface; the collector is in wired connection with the controller;
analyzing the collected user access information to obtain analyzed user access information;
and comparing the analyzed user access information with authorized user access information in a local database, and opening the access control corresponding to the collector when the comparison is successful.
An access control method is applied to terminal equipment and comprises the following steps:
acquiring input updating information;
sending update information to the bound controller, wherein the update information comprises user access update information; the user access updating information is used for indicating the controller to update the local database of the controller according to the user access updating information, comparing the user access information acquired by receiving at least one collector through a wired interface with authorized user access information in the updated local database, and opening the access control corresponding to the collector when the comparison is successful.
An access control system, the system comprising a controller and a collector, the controller and the collector being in wired connection, wherein:
the collector is used for collecting user access information;
the controller is used for receiving the user access information through a wired interface;
the controller is used for analyzing the user access information collected by the collector and acquiring the analyzed user access information;
and the controller is used for comparing the analyzed user access information with authorized user access information in a local database, and opening the access control corresponding to the collector when the comparison is successful.
A controller is used for realizing the steps of each access control method.
A terminal device comprises a memory and a processor, wherein the memory stores a computer program, and the processor executes the computer program to realize the steps of each access control method.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the respective access control method.
According to the access control method, the access control device, the access control system, the controller and the terminal equipment, the collectors are in wired connection with the controller, the user access information collected by at least one collector is received through the wired interface, the collected user access information is analyzed, the analyzed user access information is obtained, the analyzed user access information is compared with authorized user access information in a local database, when the comparison is successful, an access control corresponding to the collector is started, compared with a traditional mode, a server does not need to be deployed, the controller is in wired connection with the collectors, information is transmitted in a local area network, external network connection is not needed, personal information safety is high, and implementation cost is low.
Drawings
Fig. 1 is an application environment diagram of an access control method in one embodiment;
FIG. 2 is a schematic flow chart illustrating a method for controlling access control according to an embodiment;
fig. 3 is a diagram of an application environment of the access control method in another embodiment;
FIG. 4 is a schematic diagram of internal interfaces of a switch in one embodiment;
FIG. 5 is a schematic diagram illustrating a connection flow between a controller and a collector according to an embodiment;
FIG. 6 is a schematic flow chart illustrating a method for controlling access control in another embodiment;
fig. 7 is a flowchart illustrating a method for controlling an access control system according to another embodiment;
fig. 8 is a block diagram showing the construction of an access control device according to an embodiment;
FIG. 9 is a diagram of an internal structure of a computer device in one embodiment.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The technical solutions in the embodiments of the present application will be described clearly and completely with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without inventive step, are within the scope of the present disclosure.
It should be noted that all directional indicators (such as up, down, left, right, front, back, 8230; \8230;) in the embodiments of the present application are only used to explain the relative positional relationship between the components, the movement, etc. in a specific posture (as shown in the attached drawings), and if the specific posture is changed, the directional indicators are changed accordingly, and the connection may be a direct connection or an indirect connection.
It is to be understood that "connection" in the following embodiments is to be understood as "electrical connection", "communication connection", and the like if the connected circuits, modules, units, and the like have electrical signals or information transfer therebetween.
In one embodiment, as shown in fig. 1, an application environment diagram of the access control method in one embodiment is shown. Fig. 1 includes a controller 110, a collector 120, and a gate guard 130. The controller is in wired connection with the collector, and the controller is in one-way communication with the collector, namely the collector sends user access information to the controller. The entrance guard is connected with the controller in a wired or wireless way, and the controller sends an opening instruction or a closing instruction to the entrance guard. The controller may specifically include an NPU (Neural-network Processing Unit) and a processor chip. The controller includes at least one wired port for wired connection with the harvester. The controller may further comprise at least one wired port for wired connection to a door.
In an embodiment, as shown in fig. 2, a schematic flow chart of an access control method in an embodiment includes:
step 202, receiving user access information acquired by at least one acquisition device through a wired interface; the collector is connected with the controller through wires.
The collected user access information includes, but is not limited to, collected biometric information, collected card information, and collected password information. The biometric information includes face information, fingerprint information, and the like. The collector is a device used for collecting user access information. The collector can be specifically arranged near the entrance guard.
Specifically, the controller comprises at least one wired interface used for being connected with the collector, and user access information collected by the at least one collector can be received through the wired interface. The collector is connected with the controller through wires.
And 204, analyzing the acquired user access information to obtain the analyzed user access information.
The analyzed user access information comprises an analyzed biological characteristic value, analyzed card information and analyzed password information.
Specifically, the controller analyzes the collected user access information through the processor to obtain the analyzed user access information.
And step 206, comparing the analyzed user access information with authorized user access information in a local database, and opening the access control corresponding to the collector when the comparison is successful.
Wherein the authorized user access information is stored in a local database of the controller. And binding the collector and the corresponding access control in the controller. For example, collector 1-1 corresponds to gate 1-1, and collector 1-2 corresponds to gate 1-2. The authorized user access information includes, but is not limited to, authorized biometric information, authorized card information, authorized password information. When the user access information is the biological characteristic information, the authorized user access information can be a biological characteristic value, and the controller stores the characteristic value without storing the whole image, so that the memory and storage occupation are reduced.
Specifically, the controller compares the analyzed user access information with the corresponding authorized user access information in the local database to obtain comparison similarity. And when the comparison similarity is greater than the similarity threshold value, namely the comparison is successful, opening the access control corresponding to the collector.
In the embodiment, the collector is in wired connection with the controller, the user access information collected by at least one collector is received through the wired interface, the collected user access information is analyzed, the analyzed user access information is obtained, the analyzed user access information is compared with authorized user access information in the local database, and when the comparison is successful, the entrance guard corresponding to the collector is opened; the collector is effectively isolated, and personal information leakage or attack caused by the fact that the collector is connected with a network is avoided; meanwhile, the scheme in the embodiment can realize the association of a plurality of collectors, form a system and realize the association of equipment information.
In one embodiment, as shown in fig. 3, an application environment diagram of the access control method in another embodiment is shown. The terminal device may be, but is not limited to, various personal computers, notebook computers, mobile phones, tablet computers, and portable wearable devices. In fig. 3, the switch and the controller 1, the controller 2 and the controller 3 are connected through a wireless network, and information is transmitted in two directions. The controller 1 belongs to 2 collectors which are respectively a collector 1-1 and a collector 1-2, and 2 gate inhibition devices which are respectively a gate inhibition 1-1 and a gate inhibition 1-2. And when the user access information acquired by the acquisition device 1-1 is successfully compared, opening the corresponding access control 1-1. The controller 2 is respectively connected with the collector 2-1 and the entrance guard 2-1 through wires. The controller 3 is respectively connected with the collector 3-1 and the entrance guard 3-1 through wires. And operating the account bound with the controller in the terminal equipment. The terminal device transmits the update information to the exchange and indicates the destination controllers such as controller 1 and controller 2 to which it is addressed, and the exchange transmits the update information to controller 1 and controller 2.
In one embodiment, as shown in fig. 4, a schematic diagram of an internal interface of a switch in one embodiment is shown. The block chip in the center of fig. 4 includes an NPU and an ARM (Advanced RISC Machines), and may further include a Switch (Switch chip). Reference numeral 1 is a wired interface for communication with a collector, which supports unidirectional communication. Reference numeral 2 is a wired interface for communication with the switch, which supports bidirectional communication. Reference numeral 3 is an interface for communicating with the door 130, which may be a wired interface or a wireless interface, and which communicates unidirectionally.
The access control method further comprises the following steps: receiving update information sent by a terminal device where a target account is located; the target account is an account bound with the controller; and updating the information according to the updating information.
The terminal equipment and the controller can be connected in a wired or wireless mode through the switch. If the account number bound between the terminal device and the controller logs in the terminal device, the controller can be managed based on an application program operated by the terminal device and used for communicating with the controller. The update information includes, but is not limited to, user access update information, system update information, algorithm update information. The user access update information includes, but is not limited to, biometric update information, profile update information. The basic data update information includes name, age, height, weight, and work unit. The system update information is used to update the system in the controller. The algorithm update information is used to update a decryption algorithm or a parsing algorithm of the controller, etc.
Specifically, the account bound to the controller logs in at the terminal device, and the terminal device sends update information to the controller. And the controller receives the update information sent by the account bound with the controller, and updates the information according to the update information.
In this embodiment, user access update information sent by the terminal device where the target account is located is received, and the local database is updated according to the user access update information.
In this embodiment, update information sent by the terminal device where the target account is located is received, and the local database is updated according to the update information, so that all controllers and collectors subordinate to the controllers can be managed in a unified manner through the terminal device, a traditional central server is not needed, external network connection is not needed, the information security is high, and the implementation cost is low.
In one embodiment, the collected user access information is encrypted; the collected user access information comprises collected biological characteristic information;
analyzing the collected user access information to obtain the analyzed user access information, comprising:
decrypting the acquired biological characteristic information to obtain decrypted biological characteristic information;
and extracting the features in the decrypted biological feature information through a neural network processor to obtain the analyzed biological feature information.
The collected user access information is encrypted and then sent to the controller. The encryption and decryption algorithm may be any algorithm, and is not limited herein. Biometric information includes, but is not limited to, face information, fingerprint information, and the like.
Specifically, the controller decrypts the acquired biometric information by using a decryption algorithm to obtain the decrypted biometric information. The controller extracts the features in the decrypted biological feature information through the neural network processor to obtain the analyzed biological feature information. The analyzed biometric information may specifically be some feature values or the like. Likewise, the authorized user may also have access to information in the form of some characteristic value.
In this embodiment, the acquired user access information is encrypted, the acquired biometric information is decrypted in the controller, the decrypted biometric information is obtained, the features in the decrypted biometric information are extracted, and the analyzed biometric information is obtained, so that the security of the information can be further improved on the basis of wired connection.
In one embodiment, the access control method further comprises: and returning a comparison result to the collector, wherein the comparison result is used for indicating the collector to display prompt information corresponding to the comparison result and play the prompt information corresponding to the comparison result.
Wherein, the comparison result is successful or failed. And prompting information corresponding to the comparison result is used for prompting whether the user is an authorized person. The prompt message may be visual message such as "authorized", "unauthorized" or voice message.
Specifically, the controller returns a result of successful comparison or failed comparison to the collector. When the comparison is successful, the collector can display the 'green light' and play the 'authorized'. When the comparison fails, the collector can display a red light and play unauthorized.
In this embodiment, return the comparison result to the collector, the comparison result is used for instructing the collector to show and broadcast prompt message, can embody the comparison result more directly perceivedly, improves entrance guard's convenience.
In one embodiment, the traditional offline face recognition access control has the disadvantages that multiple devices cannot be associated, information cannot be synchronized, and face entry operation is complex. The traditional central server is troublesome in installation and arrangement, high in cost, low in identification efficiency and low in information security. Therefore, the pseudo center service face recognition entrance guard control system which is convenient to install and arrange, low in cost, high in recognition efficiency, capable of synchronizing multi-device information and convenient for face input is designed, and the pseudo center service face recognition entrance guard control system is used for positioning small and medium-scale user groups. The application environment applied to fig. 3 and the terminal device are taken as an example for explanation.
The embodiment of the application adopts a local area network C-S model, consists of a plurality of controllers and a plurality of collectors, and is connected and powered through a wired network. One controller can be connected with N (N is more than or equal to 1) collectors at most through N interfaces. The controller integrates the functions of a Power Over Ethernet (POE) Power supply switch, an algorithm calculation function, an access control function and a remote interaction function. The mobile phone can be connected with the controller through a mobile phone application program, and information such as human faces, cards, passwords and the like of the checking personnel can be added, deleted and changed. The collector is convenient to connect, the connection can be automatically completed by accessing the controller through a network cable, and relevant information of the collector can be configured by using the mobile phone app. The collector is placed in door, floodgate machine department, and the wired net twine of controller and collector is connected. Because the controller is from taking N giga net gapes, the collector is designed for indoor (controller) + outdoor (collector) with being connected of controller, or the mode of (controller) + entrance guard outside (collector) in the entrance guard, can guarantee entrance guard's safety like this, giga network can effectively reduce the network delay and improve information processing efficiency simultaneously, the collector can effectively be kept apart to N mouth giga net card exchange function that the controller is from taking, avoid the collector to connect the network and cause information leakage or be attacked. The collector provides four verification modes of card verification, face verification, password verification and electronic doorbell, and the first three verification modes are processed by the controller and output results. The doorbell verification is that the controller receives a doorbell signal sent by the collector and pushes information corresponding to the doorbell signal to the terminal equipment which logs in the target account; and the receiving terminal equipment is verified by the user mobile phone app, and the controller executes the received terminal equipment. One mobile app can conveniently manage all controllers and indirectly manage the collectors under the controllers without a traditional central server.
The controller uses ARM + NPU (embedded neural network processor) + Switch (Switch chip) to realize 5 (RJ 45 kilomega network Interface) +2 (RGMII (Reduced Gigabit Media Independent Interface) kilomega network protocol port, ARM is connected with Switch circuit board inside). The collector adopts the hardware scheme of infrared camera, common RGB camera, 3.5-inch touch display screen, NFC card reader and POE power supply.
Fig. 5 is a schematic flow chart illustrating a connection between a controller and a collector according to an embodiment. The collector is connected with the controller through wires. The collector waits for broadcast data. The controller starts data broadcasting and sends broadcasting data. And the collector initiates connection when receiving the broadcast data, and the controller starts a connection service function, is connected with the collector and completes the connection.
Face registration: the mobile phone and the controller are connected with WIFI under the same router, one or more controller nodes to be authorized for the user are selected by using the app, and information such as personnel photos and filling names is uploaded. The controller receives the app data to extract the characteristic value of the face photo and stores the user information and the face characteristic value into a local database.
Fig. 6 is a schematic flow chart of a door access control method in another embodiment. The identification flow will be described with reference to fig. 6.
When the collector detects that the verification request is triggered, user access information (such as face information, card information, password information and the like) is obtained. The collector encrypts the user access information, transmits the user access information to the controller, and waits for the controller to return a comparison result. The following description will take the user access information as face information as an example. The collector infrared camera and the infrared light supplement lamp are in a normally open state. The collector uses a face detection algorithm, whether the collected image contains a face or not can be calculated in real time, whether the collected image is a living body or not can be detected, and if the face exists, the light supplement lamp and the RGB camera can be started to sample according to the current ambient light condition. And the image is processed, compressed and encrypted by a basic image algorithm and is sent to the controller through a network interface.
The controller waits for the user access information collected by the collector. The controller determines whether the information is valid. When the information is invalid, receiving and decrypting the image information in real time, extracting the features in the decrypted information, and obtaining the analyzed feature value; and comparing the analyzed characteristic value with an authorized characteristic value in a local database. And when the information comparison is passed, recording and returning a comparison result to the collector, and opening the access control corresponding to the collector. Taking face recognition as an example, the controller operates a face recognition image algorithm to extract a face characteristic value in an image, then the extracted image characteristic value is compared with a face characteristic value of an authorized person stored in a local database of the controller, if a similarity threshold value of the compared characteristic value reaches a set threshold value, the person is judged to be the authorized person, the controller opens a corresponding access control and returns a result to the collector, and the controller is used for displaying a verification result on a display screen of the collector and prompting the verification result by a loudspeaker. If the similarity does not reach the set threshold value after the characteristic values stored in the database of the comparison controller are compared, the person is judged to be an unauthorized person, the comparison result is returned to the collector, and prompt information is displayed and played by the loudspeaker.
In the embodiment, a decentralization scheme is adopted, the controller and the collector can normally operate, and meanwhile, centralization can be realized, and terminal equipment is used as a center to manage authorization and the like. The method has the advantages of convenient installation, high recognition efficiency, low cost, synchronous information crossing equipment, convenient operation, no networking of information and information safety.
The installation is convenient: the equipment only needs the wired network connection of the controller and the collector, and the controller and the collector are arranged in the door and outside the door, so that the construction difficulty is low. The controller can be connected with the central router through a wireless network or a wired network, and management of all installed controllers can be achieved only by connecting the mobile phone with the central router WIFI.
The recognition efficiency is high: the collector and the controller are connected by a gigabit network port, the distance is short, and the network delay is very low. The collector integrates a face detection function, only sends primary screening image information with faces to the controller, and can reduce resource expenditure of the controller.
The information is synchronized across equipment and is convenient to operate: the application program in the terminal equipment is used as a pseudo center, multiple equipment can be configured at one time, the equipment can also be synchronously appointed, and the application program can be operated only by a mobile phone, so that the application program is convenient to use. The account controls the verification login, and is safe and efficient.
Information security: the controller is not networked, the collector is physically isolated, the application program only performs user login verification and does not perform any user information networking, and the user information safety can be effectively protected.
The embodiment of the application has been used through experiments and simulation. The simulation installation, the use and the installation are convenient, and the wiring is convenient; the user information configuration and the information cross-equipment synchronization are convenient to use through an application program; the verified recognition efficiency is almost the same as that of the offline face recognition entrance guard, the time consumed by information transmission can be controlled within 50ms according to software statistical calculation, and the whole acquisition and recognition time can be controlled within 200 ms.
In one embodiment, an access control method includes:
the method comprises the steps that (a 1) updating information sent by terminal equipment where a target account is located is received; the target account is an account bound to the controller.
And (a 2) updating information according to the updating information.
Step (a 3), receiving user access information acquired by at least one acquisition device through a wired interface; the collector is connected with the controller through wires.
And (a 4) decrypting the acquired user access information to obtain the decrypted user access information.
And (a 5) when the acquired user access information comprises acquired biological characteristic information, extracting the characteristics in the decrypted biological characteristic information through a neural network processor to obtain the analyzed biological characteristic information.
And (a 6) when the collected user access information comprises at least one of collected card information and collected password information, analyzing the collected user access information through a processor to obtain the analyzed user access information.
And (a 7) comparing the analyzed user access information with the updated authorized user access information in the local database, and opening the access control corresponding to the collector when the comparison is successful.
And (a 8) returning a comparison result to the collector, wherein the comparison result is used for instructing the collector to display the prompt information corresponding to the comparison result and play the prompt information corresponding to the comparison result.
In the embodiment, the collector is in wired connection with the controller, the user access information collected by at least one collector is received through the wired interface, the collected user access information is analyzed, the analyzed user access information is obtained, the analyzed user access information is compared with authorized user access information in the local database, and when the comparison is successful, the entrance guard corresponding to the collector is opened; the collector is effectively isolated, and information leakage or attack caused by the fact that the collector is connected with a network is avoided; meanwhile, the scheme in the embodiment can realize the association of a plurality of collectors to form a system and realize the association of equipment information.
In an embodiment, as shown in fig. 7, a flowchart of an access control method in another embodiment is applied to a terminal device, and includes:
step 702, obtain the input update information.
Step 704, sending update information to the bound controller, wherein the update information includes user access update information; the user access updating information is used for indicating the controller to update the local database of the controller according to the user access updating information, comparing the user access information received by the wired interface and collected by the at least one collector with the authorized user access information in the updated local database, and opening the access control corresponding to the collector when the comparison is successful.
Specifically, the terminal device acquires update information input from an application program for communicating with the controller. The terminal equipment can be used for carrying out operations such as biological characteristic information input, card information input, password information input and the like. In the application for communicating with the controller, update information is transmitted to the bound controller in response to the transmission operation. Wherein the application is configured to not send information to the external network to ensure information security.
In the embodiment, the input update information is acquired, the update information is sent to the bound controller, the update information comprises user access update information, the user access update information is finally used for opening an access control corresponding to the collector, pseudo-centralization is achieved through terminal equipment, all controllers and collectors subordinate to indirect management controllers can be managed in a unified mode, a traditional central server is not needed, external network connection is not needed, information safety is high, and implementation cost is low.
In one embodiment, a target account logged in on a terminal device is bound with at least one controller; sending update information to the bound controllers, including: in response to a selection operation of at least one controller, update information is sent to the bound controller.
The target account number logged in on the terminal equipment is bound with at least one controller.
Specifically, a controller identifier corresponding to a bound controller is displayed in an application program; in response to a selection operation of at least one controller, update information is sent to the selected bound controller. The application is configured to not send information to the foreign network.
In this embodiment, the terminal device can select to which controller the update information is sent, so that the controller can manage the controllers in a unified manner, thereby improving the security of the information while realizing pseudo-centering.
It should be understood that, although the steps in the flowcharts of fig. 2, 3, 5, and 6 described above are sequentially shown as indicated by arrows and the steps (a 1) to (a 8) are sequentially shown as indicated by reference numerals, the steps are not necessarily sequentially performed in the order indicated by the arrows or numerals. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2, 3, 5, and 6 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least some of the other steps.
In one embodiment, an access control system includes a controller and a collector, the controller and the collector are connected by wire, wherein:
the collector is used for collecting user access information;
the controller is used for receiving user access information through the wired interface;
the controller is used for analyzing the collected user access information and obtaining the analyzed user access information;
the controller is used for comparing the analyzed user access information with authorized user access information in the local database, and when the comparison is successful, the access control corresponding to the collector is opened.
In the embodiment, through the cooperation of the collector and the controller, the pseudo-center service access control system which is convenient to install and arrange, low in cost, high in recognition efficiency and capable of synchronizing information of multiple devices can be used for positioning small and medium-scale user groups, and safety is improved.
In one embodiment, the access control system further comprises a terminal device, wherein:
logging in an account number of a bound controller in the terminal equipment;
the terminal equipment is used for acquiring input updating information;
the terminal equipment is used for sending update information to the bound controller, and the update information comprises user access update information;
the controller is used for updating the local database of the controller according to the user access updating information;
the controller is used for comparing the user access information acquired by receiving at least one acquisition device through the wired interface with the authorized user access information in the updated local database, and when the comparison is successful, the access control corresponding to the acquisition device is opened.
In the embodiment, all controllers and collectors under the indirect management controller can be managed in a unified mode through the terminal equipment, a traditional central server is not needed, external network connection is not needed, information safety is high, and implementation cost is low.
In one embodiment, as shown in fig. 8, a block diagram of an access control device in one embodiment is shown. Fig. 8 provides an access control apparatus, which may be a part of a computer device using a software module or a hardware module, or a combination of the two, and specifically includes an information interaction module, an algorithm calculation module, and an access control module, where:
the information interaction module is used for receiving the user access information acquired by the at least one acquisition device through a wired interface; the collector is in wired connection with the controller;
the algorithm calculation module is used for analyzing the acquired user access information and acquiring the analyzed user access information;
the algorithm calculation module is also used for comparing the analyzed user access information with authorized user access information in a local database;
and the access control module is used for opening the access control corresponding to the collector when the comparison is successful.
In the embodiment, the collector is in wired connection with the controller, the user access information collected by at least one collector is received through the wired interface, the collected user access information is analyzed, the analyzed user access information is obtained, the analyzed user access information is compared with authorized user access information in the local database, and when the comparison is successful, the access control corresponding to the collector is opened; the collector is effectively isolated, and personal information leakage or personal information attack caused by the fact that the collector is connected with a network is avoided; meanwhile, the scheme in the embodiment can realize the association of a plurality of collectors, form a system and realize the association of equipment information.
In one embodiment, the information exchange module is configured to receive update information sent by a terminal device where the target account is located; the target account is an account bound with the controller; and updating the information according to the updating information.
In this embodiment, the update information sent by the terminal device where the target account is located is received, and the local database is updated according to the update information, so that all controllers and collectors subordinate to the controllers can be managed in a unified manner through the terminal device, a traditional central server is not needed, an external network connection is not needed, the information security is high, and the implementation cost is low.
In one embodiment, the collected user access information is encrypted; the user access information comprises biometric information;
the algorithm calculation module is used for decrypting the acquired biological characteristic information to obtain decrypted biological characteristic information;
and extracting the features in the decrypted biological feature information to obtain the analyzed biological feature information.
In this embodiment, the acquired user access information is encrypted, the acquired biometric information is decrypted in the controller to obtain the decrypted biometric information, the features in the decrypted biometric information are extracted to obtain the analyzed biometric information, and the security of the information can be further improved on the basis of wired connection.
In an embodiment, the information exchange module is further configured to return the comparison result to the collector, where the comparison result is used to instruct the collector to display the prompt information corresponding to the comparison result and play the prompt information corresponding to the comparison result.
In this embodiment, a comparison result is returned to the collector, and the comparison result is used for instructing the collector to display and play prompt information, so that the comparison result can be embodied more visually, and the convenience of the access control is improved.
For the specific definition of the access control device, reference may be made to the above definition of the access control method, which is not described herein again. All modules in the access control device can be wholly or partially realized through software, hardware and a combination of the software and the hardware. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a terminal device is provided, an internal structure of which may be as shown in fig. 9. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operating system and the computer program to run on the non-volatile storage medium. The communication interface of the computer device is used for communicating with an external terminal in a wired or wireless manner, and the wireless manner can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement an access control method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on a shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 9 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, the controller is used for realizing the steps of the access control method.
In one embodiment, a terminal device is provided, which includes a memory and a processor, wherein the memory stores a computer program, and the processor implements the steps of the above method embodiments when executing the computer program.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the above-mentioned method embodiments.
In one embodiment, a computer program product or computer program is provided that includes computer instructions stored in a computer readable storage medium. The computer instructions are read by a processor of the computer device from the computer-readable storage medium, and the computer instructions are executed by the processor to cause the computer device to perform the steps in the above-described method embodiments.
It will be understood by those skilled in the art that all or part of the processes of the methods of the above embodiments may be implemented by hardware related to instructions of a computer program, which may be stored in a non-volatile computer readable storage medium, and when executed, may include the processes of the above embodiments of the methods. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

Claims (10)

1. An access control method applied to a controller, the method comprising:
receiving user access information acquired by at least one acquisition device through a wired interface; the collector is in wired connection with the controller;
analyzing the collected user access information to obtain analyzed user access information;
and comparing the analyzed user access information with authorized user access information in a local database, and opening the access control corresponding to the collector when the comparison is successful.
2. The method of claim 1, further comprising:
receiving update information sent by a terminal device where a target account is located; the target account is an account bound with the controller;
and updating information according to the updating information.
3. The method of claim 1, wherein the collected user access information is encrypted; the collected user access information comprises collected biological characteristic information;
the analyzing the collected user access information to obtain the analyzed user access information comprises the following steps:
decrypting the acquired biological characteristic information to obtain decrypted biological characteristic information;
and extracting the features in the decrypted biological feature information through a neural network processor to obtain the analyzed biological feature information.
4. The method of any of claims 1 to 3, further comprising:
and returning a comparison result to the collector, wherein the comparison result is used for indicating the collector to display prompt information corresponding to the comparison result and play the prompt information corresponding to the comparison result.
5. An access control method is applied to a terminal device, and comprises the following steps:
acquiring input updating information;
sending the update information to the bound controller, wherein the update information comprises user access update information; the user access updating information is used for indicating the controller to update the local database of the controller according to the user access updating information, comparing the user access information acquired by receiving at least one collector through a wired interface with authorized user access information in the updated local database, and opening the access control corresponding to the collector when the comparison is successful.
6. The method according to claim 5, wherein the target account number logged on the terminal device is bound with at least one controller;
the sending of the update information to the bound controller includes:
and in response to the selection operation of at least one controller, sending the update information to the selected bound controller.
7. An access control system, comprising a controller and a collector, the controller and the collector being in wired connection, wherein:
the collector is used for collecting user access information;
the controller is used for receiving the user access information through a wired interface;
the controller is used for analyzing the user access information collected by the collector and acquiring the analyzed user access information;
and the controller is used for comparing the analyzed user access information with authorized user access information in a local database, and opening the access control corresponding to the collector when the comparison is successful.
8. A controller, characterized in that the controller is adapted to implement the steps of the method of any of claims 1 to 4.
9. A terminal device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor realizes the steps of the method of claim 5 or 6 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 6.
CN202210734446.1A 2022-06-27 2022-06-27 Access control method, device, system, controller and terminal equipment Pending CN115171259A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210734446.1A CN115171259A (en) 2022-06-27 2022-06-27 Access control method, device, system, controller and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210734446.1A CN115171259A (en) 2022-06-27 2022-06-27 Access control method, device, system, controller and terminal equipment

Publications (1)

Publication Number Publication Date
CN115171259A true CN115171259A (en) 2022-10-11

Family

ID=83486427

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210734446.1A Pending CN115171259A (en) 2022-06-27 2022-06-27 Access control method, device, system, controller and terminal equipment

Country Status (1)

Country Link
CN (1) CN115171259A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894406A (en) * 2010-08-09 2010-11-24 惠州市华阳多媒体电子有限公司 Network access control system
CN101986351A (en) * 2010-11-01 2011-03-16 深圳市中控生物识别技术有限公司 Networking type access control device and method based on biometric identification technology
CN102354409A (en) * 2011-09-28 2012-02-15 福州海景科技开发有限公司 Access control system based on face recognition
CN205862403U (en) * 2016-07-27 2017-01-04 成都甄识科技有限公司 A kind of gate control system based on biological characteristic
CN107730662A (en) * 2017-01-22 2018-02-23 西安艾润物联网技术服务有限责任公司 Gate inhibition's data processing method and device
CN107818623A (en) * 2017-12-22 2018-03-20 厦门大学嘉庚学院 Distributed wireless gate control system and application method
CN108846925A (en) * 2018-06-04 2018-11-20 深圳云天励飞技术有限公司 Face recognition door control system
CN108924492A (en) * 2018-07-05 2018-11-30 广东赛翼智能科技有限公司 A kind of wisdom visual entrance guard intercom system based on WIFI networking model
CN111583485A (en) * 2020-04-16 2020-08-25 北京澎思科技有限公司 Community access control system, access control method and device, access control unit and medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894406A (en) * 2010-08-09 2010-11-24 惠州市华阳多媒体电子有限公司 Network access control system
CN101986351A (en) * 2010-11-01 2011-03-16 深圳市中控生物识别技术有限公司 Networking type access control device and method based on biometric identification technology
CN102354409A (en) * 2011-09-28 2012-02-15 福州海景科技开发有限公司 Access control system based on face recognition
CN205862403U (en) * 2016-07-27 2017-01-04 成都甄识科技有限公司 A kind of gate control system based on biological characteristic
CN107730662A (en) * 2017-01-22 2018-02-23 西安艾润物联网技术服务有限责任公司 Gate inhibition's data processing method and device
CN107818623A (en) * 2017-12-22 2018-03-20 厦门大学嘉庚学院 Distributed wireless gate control system and application method
CN108846925A (en) * 2018-06-04 2018-11-20 深圳云天励飞技术有限公司 Face recognition door control system
CN108924492A (en) * 2018-07-05 2018-11-30 广东赛翼智能科技有限公司 A kind of wisdom visual entrance guard intercom system based on WIFI networking model
CN111583485A (en) * 2020-04-16 2020-08-25 北京澎思科技有限公司 Community access control system, access control method and device, access control unit and medium

Similar Documents

Publication Publication Date Title
CN108475447B (en) System and method for controlling access to a physical space
CN104134253A (en) Entrance guard system and entrance guard opening method
CN107564144A (en) A kind of intelligent robot gate control system and control method
CN107492173A (en) A kind of cloud password access control system and method
CN105574496A (en) Face talkback recognition system
CN108765656A (en) Visitor's verification management system and method
CN106023363A (en) Identity verification method and system
CN103729925A (en) Intelligent automatic door management system
CN106023373A (en) Big data and human face identification based access control system for school dormitory
CN107743082A (en) A kind of intelligent home equipment control method of identity-based identification
US11539922B2 (en) Point-to-point visual communications in a security monitoring system
CN204926231U (en) Entrance guard and access control system
CN204204069U (en) Gate inhibition's intelligent controller and gate inhibition's intelligent control system
CN103544749A (en) Cloud control access control management system and authentication method thereof
US11948411B2 (en) Electronic lock, system, and take over lock module, and method of managing the same
CN111968275A (en) Intelligent lock, and communication method and device of intelligent building visual intercom system
CN106097490A (en) A kind of intelligent lock, the door-locking system being made up of lockset and method for unlocking
Akanbi et al. A prototype model of an iot-based door system using double-access fingerprint technique
CN207817817U (en) A kind of Identification of Images gate inhibition equipment Internet-based
CN214752023U (en) Fingerprint acquisition device and fingerprint management system
JP6218671B2 (en) Automatic door electronic lock control system
CN209000095U (en) Intelligent networking locking device based on resident identification card real-name authentication
CN115171259A (en) Access control method, device, system, controller and terminal equipment
CN106845370A (en) A kind of electronic peephole viewer accessory system, terminal device and electronic peephole viewer
CN110796770A (en) Access control method and device, storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination