CN206584426U - A kind of Yunmen access control system - Google Patents
A kind of Yunmen access control system Download PDFInfo
- Publication number
- CN206584426U CN206584426U CN201720036639.4U CN201720036639U CN206584426U CN 206584426 U CN206584426 U CN 206584426U CN 201720036639 U CN201720036639 U CN 201720036639U CN 206584426 U CN206584426 U CN 206584426U
- Authority
- CN
- China
- Prior art keywords
- access controller
- management server
- cloud access
- control system
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Abstract
The utility model is related to a kind of Yunmen access control system.The system includes:Management server, at least one cloud access controller, at least one electric control lock, at least one identity recognition device, wherein, management server is used to configure systematic parameter, issue control instruction and the facility information in storage system and gate inhibition's usage record;Cloud access controller, which according to control instruction deploy troops on garrison duty, withdraws a garrison, subscriber identity information, switch door lock is obtained by identity recognition device and obtains and uploads gate inhibition's usage record;Cloud access controller connects cloud access controller by wireless network connection management server, identity recognition device by wireless network;Cloud access controller connects and controls electric control lock.By implementing the utility model, wirelessly all parts in connection system, can largely reduce wiring;The system provides a variety of modes of deploying troops on garrison duty simultaneously, improves security and Consumer's Experience.
Description
Technical field
The utility model is related to intelligent entrance guard field, more specifically to a kind of Yunmen access control system.
Background technology
With scientific and technological progress and the high speed development of China's economic, every profession and trade " come in and go out safety " also treated as a kind of life or
The symbol of craftmanship, and gate control system passes in and out the escape way of community, office space and other buildings as people, its
The quality of application directly concerns the person and property safety of people, when gate control system has become major building constructions now must
Option.
In the prior art, as shown in figure 1, user swipes the card on access-control card reader, access-control card reader transmits brushing card data
To access controller, access controller search access right list simultaneously judges whether this card has permission, and opens the door, haves no right not open if having the right
Door, and record of swiping the card is preserved, the record that will swipe the card is sent to access control system and inquired about for manager;Although so realizing gate inhibition
Management, but function is simple, it is impossible to be applied to as finance, bank, prison these requirements are safe, the place more than function.
In addition, various pieces are connected by wired mode in existing gate control system, it is therefore desirable to a large amount of wirings, cost compared with
Height, and bring many inconvenience to construction.
Utility model content
The technical problems to be solved in the utility model is that the above-mentioned gate control system for prior art needs a large amount of cloth
There is provided a kind of Yunmen access control system for the simple defect of line, function.
The utility model solves the technical scheme that its technical problem used:A kind of Yunmen access control system is constructed, including:Pipe
Server, at least one cloud access controller, at least one electric control lock, at least one identity recognition device are managed, wherein,
The management server be used for configure systematic parameter, issue control instruction and storage system in facility information
With gate inhibition's usage record;
The cloud access controller, which according to the control instruction deploy troops on garrison duty, withdraws a garrison, is obtained by the identity recognition device
Subscriber identity information, switch door lock and obtain and upload gate inhibition's usage record;
The cloud access controller connects the management server by wireless network, and the identity recognition device passes through nothing
Cloud access controller described in line network connection;The cloud access controller connects and controls the electric control lock.
Preferably, Yunmen access control system described in the utility model, the management server includes administrative unit and database,
The administrative unit is used for management system configuration parameter, management system equipment and issues the control instruction;
The database uses note for the facility information in storage system, subscriber identity information, authority information, gate inhibition
Record, alarm logging.
Preferably, Yunmen access control system described in the utility model, the cloud access controller includes:
For obtain gate inhibition's recording unit of gate inhibition's usage record, the time limit period table unit for setting gate inhibition's time limit,
For sending the alarm output unit of alarm command, the data receipt unit for receiving external data, for obtaining and verifying
The authority name single unit of the access right of user, the list of withdrawing a garrison of deploying troops on garrison duty withdrawn a garrison for gate inhibition deploy troops on garrison duty according to control instruction
It is member, the unlocking output unit for sending unlocking instruction, multi-door for setting multiple door locks to be mutually related according to control instruction
Interlocking unit.
Preferably, Yunmen access control system described in the utility model, in addition to:At least one detector, at least one alarm
Device, the detector and alarm connect the cloud access controller;
The cloud access controller detects the environmental information around gate inhibition by the detector, and by the environmental information
It is uploaded to the management server;
When the cloud access controller has been deployed troops on garrison duty or detected disabled user, the alarm equipment alarm is driven.
Preferably, Yunmen access control system described in the utility model, in addition to mobile terminal, the mobile terminal passes through wireless
Network connection is provided with for switch door lock and the APP registered on the mobile terminal to the management server.
Preferably, Yunmen access control system described in the utility model, the identity recognition device is connected by WLAN
Connect the cloud access controller;
The management server, cloud access controller, identity recognition device all include wireless sending module and wireless receiving
Module.
In addition, a kind of cloud access control management method is also disclosed in the utility model, Yunmen access control system above-mentioned for managing, including:
Cloud access controller obtains user profile by identity recognition device or detector;
Whether region deploys troops on garrison duty according to residing for the user profile judges user;
If region residing for the user has been deployed troops on garrison duty, the cloud access controller drives alarm equipment alarm, and reports to pipe
Manage server;If region residing for the user is not deployed troops on garrison duty, judge whether the user has enabling authority and the power of opening the door
Before the deadline whether limit;
If the user exceedes the term of validity, the cloud access control without the enabling authority or the enabling authority
Device drives alarm equipment alarm, and reports to the management server;If the user has the enabling authority and the enabling
Before the deadline, then the cloud access controller sends unlocking instruction to electric control lock to authority, and the electric control lock is opened, and preserves simultaneously
User profile and record of unlocking;
After enabling, by preset time, whether detection gate inhibition closes;
If gate inhibition is not turned off after preset time, the cloud access controller drives alarm equipment alarm, and reports to
The management server.
Preferably, cloud access control management method described in the utility model, in addition to:
The management server judges whether to need to increase the cloud access controller newly;
If desired, then connect and configure the cloud access controller, and configure what is be connected with the cloud access controller
Identity recognition device, electric control lock, detector, alarm;
The cloud access controller carry out the download of authority list, the download of time limit period table, blacklist download, record queries,
Remote rights are downloaded;
The management server sets parameter, region of deploying troops on garrison duty, authority of deploying troops on garrison duty, the cloth of withdrawing a garrison of deploying troops on garrison duty of the cloud access controller
The anti-period;
The management server sets multi-door interlocking by the cloud access controller, and sets multi-door interlocking parameter.
Preferably, cloud access control management method described in the utility model, in addition to:
The user logs in the management server by mobile terminal, and selection needs the door opened, and send enabling please
Ask;
The management server detects whether whether the user have enabling authority and the enabling authority effective
In phase;
If the user has enabling authority, the enabling authority before the deadline, is opened according to the enabling request simultaneously
Door, while recording user profile and the record that opens the door.
Preferably, cloud access control management method described in the utility model, the user logs in the pipe by mobile terminal
Server is managed, including:
The wechat service number that the user is installed by mobile terminal logs in the management server;
Methods described also includes:
The user enters the work attendance page by the wechat service number;
Start the current location information that positioning service obtains the user;
Select work attendance project to carry out work attendance, record the work attendance time, and attendance data is checked by the work attendance page.
Implement a kind of Yunmen access control system of the present utility model, have the advantages that:The system includes:Management service
Device, at least one cloud access controller, at least one electric control lock, at least one identity recognition device, wherein, the management service
Device is used to configure systematic parameter, issue control instruction and the facility information in storage system and gate inhibition's usage record;The cloud
Access controller according to the control instruction carry out deploy troops on garrison duty withdraw a garrison, by the identity recognition device obtain subscriber identity information,
Switch door lock and obtain and upload gate inhibition's usage record;The cloud access controller connects the management by wireless network
Server, the identity recognition device connects the cloud access controller by wireless network;The cloud access controller connection
And control the electric control lock.By implementing the utility model, wirelessly all parts in connection system, can largely be reduced
Wiring;The system provides a variety of modes of deploying troops on garrison duty simultaneously, improves security and Consumer's Experience.
Brief description of the drawings
Below in conjunction with drawings and Examples, the utility model is described in further detail, in accompanying drawing:
Fig. 1 is the structural representation of gate control system in the prior art by wired connection;
Fig. 2 is a kind of structural representation of Yunmen access control system of the utility model;
Fig. 3 is the schematic flow sheet of the utility model Yunmen access control system management method;
Fig. 4 is the flow chart of addition cloud access controller in the utility model Yunmen access control system management method;
Fig. 5 is mobile terminal control flow chart in the utility model Yunmen access control system management method;
Fig. 6 is by wechat service number control flow chart in the utility model Yunmen access control system management method;
Fig. 7 is by wechat service number work attendance flow chart in the utility model Yunmen access control system management method.
Embodiment
In order to be more clearly understood to technical characteristic of the present utility model, purpose and effect, accompanying drawing is now compareed detailed
Illustrate embodiment of the present utility model.
Fig. 2 is a kind of structural representation of Yunmen access control system of the utility model.
Specifically, Yunmen access control system includes:Management server, at least one cloud access controller, at least one is automatically controlled
Lock, at least one identity recognition device, at least one detector, at least one alarm, at least one mobile terminal, wherein,
Cloud access controller connects cloud access control by wireless network connection management server, identity recognition device by wireless network
Device, cloud access controller connects and controls electric control lock, detector and alarm connection cloud access controller.Preferably, Yunmen is prohibited
System includes also including network state detection unit, when management server detects the cloud access controller connected or identity knowledge
When other device disconnects or can not transmit data, management server alert, and display alarm gate inhibition position information,
Prompting keeper is handled.
It is appreciated that cloud access controller, identity recognition device, electric control lock, detector, alarm in the utility model
Device, the number of mobile terminal can be designed according to actual requirement of engineering, not do particular number restriction herein.
The principle and function to system components are illustrated individually below.
Management server is used to configure systematic parameter, issue control instruction and facility information and door in storage system
Prohibit usage record;Preferably, management server includes administrative unit and database, and administrative unit is used for management system and configures ginseng
Number, management system equipment and issue control instruction etc.;Database is for the facility information in storage system, user identity letter
Breath, authority information, gate inhibition's usage record, alarm logging etc..
Preferably, system also includes management terminal, and the management terminal is connected with management server, and user is by managing eventually
End to system components carry out parameter setting, priority assignation, deploy troops on garrison duty withdraw a garrison settings, door lock interconnection setting, warning message check, door
Prohibit usage record to check.For example, the on off state of each door lock is shown in real time in management terminal in system, facilitate keeper
Check.
The control instruction that cloud access controller is issued according to management server completes to deploy troops on garrison duty to withdraw a garrison, by identity recognition device
Obtain subscriber identity information, switch door lock and obtain and upload gate inhibition's usage record etc..Identity recognition device is to utilize user
Identity information user is recognized, identity recognition device includes but is not limited to:Camera device, IC-card card reader, near field lead to
T unit, speech recognizing device, fingerprint identification device etc..The identity information of user includes:The biological information or use of user
The identity tag thing that family is carried, the biological information of user includes but is not limited to fingerprint, face, palmmprint, refers to vein, view
Film, sound etc., the identity tag thing that user carries include but is not limited to:IC-card, mobile phone etc..It is appreciated that the body of above user
Part information needs to be registered in systems in advance, as validated user.
Preferably, cloud access controller includes:For obtaining gate inhibition's recording unit of gate inhibition's usage record, for setting door
The time limit period table unit in taboo time limit, the alarm output unit for sending alarm command, the data for receiving external data
Receiving unit, the authority name single unit of access right for obtaining and verifying user, for being entered according to control instruction to gate inhibition
Row deploy troops on garrison duty deploying troops on garrison duty of withdrawing a garrison withdraw a garrison unit, the unlocking output unit for sending unlocking instruction, for being set according to control instruction
Multiple door locks are mutually related multi-door interlocking unit.
For multi-door interlocking unit, specifically, interrelated for multiple door locks, refer between more than two door locks
With relevance, this relevance is shown:Correlation Criteria is set, and the door lock that is mutually related needs to meet Correlation Criteria and could beaten
Open.Correlation Criteria includes but is not limited to:Multiple door locks are opened simultaneously, multiple door locks are opened successively, multiple door locks can only preset
Time in open, multiple door locks lock different users open simultaneously, multiple door locks lock different users open successively, it is many
Door-lock opening etc. is only capable of in individual door lock simultaneously.
For example, setting, door lock A and door lock B is interrelated, and Correlation Criteria is:Door lock A and door lock B needs to be unlocked simultaneously
It could open;Now, it is necessary to which two users are gone to open door lock A and door lock B respectively simultaneously, and two door locks could be opened.And example
Such as, setting door lock A and door lock B is interrelated, and Correlation Criteria is:The unlocking order of door lock, the condition opened in door lock A are set
Under, door lock B could be opened;Now, it is necessary to which user first opens door lock A, door lock B could be opened.In another example, set door lock A and
Door lock B is interrelated, and Correlation Criteria is:Door lock A and door lock B have been only capable of a door-lock opening;Now, opened when door lock A is in
During state, door lock B can not just be opened, similarly, and when door lock B is in open mode, door lock A can not just be opened.
Above Correlation Criteria is configured by management server, issues control instruction to the multi-door interlocking of cloud access controller
Unit, multi-door interlocking unit completes the interlocking between multiple door locks according to control instruction.After being provided with, if the door lock is received
After the subscriber identity information that identity recognition device is sent, condition detection is associated according to subscriber identity information, only meets and closes
During bracing part, corresponding door lock is just opened.
Cloud access controller detects the environmental information around gate inhibition by detector, and environmental information is uploaded into management clothes
Business device;
When cloud access controller is in state of having deployed troops on garrison duty or detects disabled user, alarm equipment alarm is driven, and will alarm
Information and alarm logging are uploaded to management server.
Preferably, mobile terminal is connected on management server, mobile terminal by wireless network is provided with for switching
Door lock and the APP (application program) registered.It is not limited to for example, mobile terminal includes seeing:Mobile phone, tablet personal computer, intelligent watch etc.,
Can be special APP installed in the APP of mobile phone, or service number or small routine in wechat.Furthermore, it is contemplated that system
Security, management server should set the authority of mobile terminal, only open the not high gate inhibition of safety requirements or function supplies user
Use.
It is appreciated that according to wireless connection demand, management server, cloud access controller, identity recognition device all include
Wireless sending module and wireless receiving module, it is necessary to be carried out in advance with management server when cloud access controller enters system
Match somebody with somebody, set up connection, and preserve;Similarly, identity recognition device is matched with cloud access controller in advance, is established a connection,
And preserve.
Preferably, identity recognition device connects cloud access controller by WLAN, and the WLAN is used
Independent local area network wireless communication, it is reliable and stable;Also, due to WLAN independence, external equipment can not be by long-range
Gate control system is accessed, the security of system is improved from physical isolation.WLAN using WIFI, WLAN, 802.11 be
The technologies such as the standard such as row, 3G, 4G, the utility model is not limited.It is appreciated that because part gate inhibition is located at indoor or basement,
Radio signal quality is bad, so should strengthen the emissive porwer of wireless signal, or sets wireless in the bad region of wireless signal
Signal Booster or wireless signal amplifier or relay wireless signals device, so as to strengthen wireless signal covering.
Fig. 3 is the schematic flow sheet of the utility model Yunmen access control system management method.
Specifically, the cloud access control management method is used to manage above-mentioned Yunmen access control system, as described above, Yunmen access control system
Completion is configured, management method includes:
Step 101:Cloud access controller obtains user profile by identity recognition device or detector.
Specifically, identity recognition device is recognized using the identity information of user to user, user identity is determined.Identity
Identifying device includes but is not limited to:Camera device, IC-card card reader, speech recognizing device, fingerprint identification device etc..The body of user
Part information includes:The identity tag thing that the biological information of user or user carry, the biological information of user include but
It is not limited to fingerprint, face, palmmprint, refers to vein, retina, sound etc., the identity tag thing that user carries includes but is not limited to:IC
Card, mobile phone etc..It is appreciated that the identity information of above user needs to be registered in systems in advance, as validated user.
The subscriber identity information of acquisition is uploaded in management server, management server and prestored by identity recognition device
The information of registered user, includes effective time etc. of subscriber identity information, user right information and user right.
Step 102:Whether region deploys troops on garrison duty according to residing for user profile judges user.
Specifically, including the positional information of gate inhibition residing for user or the position letter of user's Location in user profile
Breath, cloud access controller sends user profile to management server, and management server is according to latch position information or user position
Confidence breath judges whether the region deploys troops on garrison duty.It is appreciated that management server has set region of deploying troops on garrison duty in advance, the region of deploying troops on garrison duty is deposited
Storage is in management server, and management server is that can determine that whether user is in cloth defence area using gate inhibition's list or electronic map
Domain.
Step 103:If region has been deployed troops on garrison duty residing for user, cloud access controller driving alarm equipment alarm, and report to pipe
Manage server.
Specifically, by comparing, when region has been deployed troops on garrison duty residing for user, then cloud access controller drives alarm equipment alarm,
And management server is reported to, terminate to perform.
Step 104:If region is not deployed troops on garrison duty residing for user, judge whether user has enabling authority and enabling authority to be
It is no before the deadline.
Specifically, the authority information and authorization-duration of the advance configured user of management server.In area residing for user
When domain is not deployed troops on garrison duty, examine whether the user has enabling authority according to user profile, if so, whether determining whether enabling authority
Before the deadline, if before the deadline, performing next step.Preferably, if the door lock has been set to many door lock associations, also
Check whether to meet Correlation Criteria.If being unsatisfactory for Correlation Criteria, terminate;If meeting Correlation Criteria, next step is performed.
Step 105:If user exceedes the term of validity, cloud access controller driving report without enabling authority or enabling authority
Alert device alarm, and report to management server.
Specifically, by above-mentioned judgement, if being unsatisfactory for enabling authority and/or enabling authority more than the term of validity, Yunmen
Prohibit controller driving alarm equipment alarm, and report to management server, while marking the user as illegal list, and preserve this
Illegal list.
Step 106:If user has enabling authority and enabling authority is before the deadline, cloud access controller, which is sent, unlocks
Instruction to electric control lock, electric control lock is opened, while preserving user profile and record of unlocking.
Step 107:After enabling, by preset time, whether detection gate inhibition closes.
Specifically, to ensure safety, it is necessary to close door after experience preset time of opening the door, therefore passing through preset time
After need detection gate inhibition whether close.Preferably, it can detect whether gate inhibition closes in the following manner:Pass through door sensor signal detection door
Whether taboo closes, or detects whether gate inhibition closes by infrared sensor, or detects whether gate inhibition closes by range sensor,
Or judge whether gate inhibition closes by graphical analysis.
Step 108:If gate inhibition is not turned off after preset time, cloud access controller driving alarm equipment alarm, and on
Report to management server.
Step 109:If gate inhibition closes after preset time, terminate.
Fig. 4 is the flow chart of addition cloud access controller in the utility model Yunmen access control system management method.
Specifically, controlling in system initial setting up or, it is necessary to which new Yunmen is prohibited when needing to add new cloud access controller
Device processed connects and is registered to management server.Afterwards, keeper is configured by management server to cloud access controller.Tool
Body, the process of cloud access controller is added in cloud access control management method of the present utility model to be included:
Step 201:Management server judges whether to need newly-increased cloud access controller.
Specifically, when adding new cloud access controller, can be sent by cloud access controller to management server please
Ask instruction, or management server search new equipment;After new equipment is detected, management server checks networking solicited message, and
Judge whether to need newly-increased cloud access controller.
Step 202:If desired, then connect and configure cloud access controller, and configure what is be connected with cloud access controller
Identity recognition device, electric control lock, detector, alarm;
Specifically, by judging, if newly-increased cloud access controller meets adding conditional, management server allows the cloud
Access controller access system, the part as system, and obtain all information of the cloud access controller.Afterwards, configure
Cloud access controller, and configure identity recognition device, electric control lock, detector, alarm being connected with cloud access controller etc..
Step 203:Cloud access controller is carried out under parameter setting, the download of authority list, the download of time limit period table, blacklist
Load, record queries, remote rights download, Remote Open and closing door lock.
Step 204:Management server sets parameter, region of deploying troops on garrison duty, authority of deploying troops on garrison duty, the cloth of withdrawing a garrison of deploying troops on garrison duty of cloud access controller
It is anti-to withdraw a garrison the period, also remotely it can deploy troops on garrison duty and withdraw a garrison.
Step 205:Management server sets multi-door interlocking by cloud access controller, and sets multi-door interlocking parameter.
Specifically, for multi-door interlocking, referring to that there is relevance, this association sex expression between more than two door locks
:Correlation Criteria is set, and the door lock that is mutually related needs to meet Correlation Criteria and could opened.Correlation Criteria includes but is not limited to:
Multiple door locks are opened simultaneously, multiple door locks are opened successively, multiple door locks can only be opened within the default time, the locking of multiple door locks
Different user opens simultaneously, multiple door locks lock different users open successively, in multiple door locks while being only capable of a door lock
Open etc..
For example, setting, door lock A and door lock B is interrelated, and Correlation Criteria is:Door lock A and door lock B needs to be unlocked simultaneously
It could open;Now, it is necessary to which two users are gone to open door lock A and door lock B respectively simultaneously, and two door locks could be opened.And example
Such as, setting door lock A and door lock B is interrelated, and Correlation Criteria is:The unlocking order of door lock, the condition opened in door lock A are set
Under, door lock B could be opened;Now, it is necessary to which user first opens door lock A, door lock B could be opened.In another example, set door lock A and
Door lock B is interrelated, and Correlation Criteria is:Door lock A and door lock B have been only capable of a door-lock opening;Now, opened when door lock A is in
During state, door lock B can not just be opened, similarly, and when door lock B is in open mode, door lock A can not just be opened.
Above Correlation Criteria is configured by management server, issues control instruction to the multi-door interlocking of cloud access controller
Unit, multi-door interlocking unit completes the interlocking between multiple door locks according to control instruction.After being provided with, if the door lock is received
After the subscriber identity information that identity recognition device is sent, condition detection is associated according to subscriber identity information, only meets and closes
During bracing part, corresponding door lock is just opened.
Fig. 5 is mobile terminal control flow chart in the utility model Yunmen access control system management method.
Specifically, Yunmen access control system that the utility model is provided wirelessly carries out the connection between various pieces,
Present ripe mobile network and intelligent terminal are applied in Yunmen access control system, can realize that user is remotely accessed and part is controlled
System, is user-friendly.Mobile terminal control flow includes in cloud access control management method of the present utility model:
Step 301:User logs in management server by mobile terminal, and selection needs the door opened, and send enabling please
Ask.
Specifically, mobile terminal needs to be registered in management server in advance, the validated user as system.Management clothes
Business device sets the authority and authorization-duration of the mobile terminal.When user needs switch lock, mobile wireless network can be passed through
The request of access-in management server is sent, management server checking information of mobile terminal if registered validated user, then allows to connect
Enter system.After access system, the door for needing to open may be selected in mobile terminal, sends request of opening the door.Request of opening the door is interior comprising movement
End message or user profile.
Step 302:Whether before the deadline whether management server detection user have enabling authority and enabling authority.
Specifically, management server receive open the door request after, according to open the door ask carry information of mobile terminal or
Before the deadline whether user profile judge whether with enabling authority and enabling authority.
Step 303:If user have enabling authority simultaneously enabling authority before the deadline, according to enabling door opening request,
User profile is recorded simultaneously and the record that opens the door.
Step 304:Management server sets multi-door interlocking by cloud access controller, and sets multi-door interlocking parameter.Then
Needing to meet Correlation Criteria to unlock.The specific setting up procedure for associating door lock refers to the above-mentioned explanation to multi-door interlocking, herein
Repeat no more.
Preferably, the service number in special APP or wechat is installed on mobile terminal or the small routine in wechat is (micro-
Letter, is the application program that one of Tencent provides instant messaging service for intelligent terminal), wechat server number and wechat are small
Program has a similar APP function, and feasible system accesses and realized partial function, for example, the clothes such as can carry out switch lock, register
Business.Preferably, the present embodiment is illustrated from wechat service number.First, function is carried out in the service number of wechat in advance to set
Put, user pays close attention to the wechat service number (wechat public account) in wechat, and is registered as validated user;Be registered as validated user
Afterwards, management server sets the access right of user.After being provided with, switch gate and label can be carried out by miniature service number
Arrive, illustrate individually below.
Fig. 6 is by wechat service number control flow chart in the utility model Yunmen access control system management method.Detailed process
Including:
Step 401:The wechat service number that user is installed by mobile terminal logs in management server, and selection needs what is opened
Door, and send enabling request;
Step 402:Whether before the deadline whether management server detection user have enabling authority and enabling authority;
Step 403:If user have enabling authority simultaneously enabling authority before the deadline, according to enabling door opening request,
User profile is recorded simultaneously and the record that opens the door;
Step 404:Management server sets multi-door interlocking by cloud access controller, and sets multi-door interlocking parameter.Tool
Body refers to the above-mentioned explanation to multi-door interlocking, will not be repeated here.
Fig. 7 is by wechat service number work attendance flow chart in the utility model Yunmen access control system management method.
User can also carry out work attendance by APP or wechat service number, such as on and off duty registers and sign-out, detailed process
Including:
Step 501:The wechat service number that user is installed by mobile terminal logs in management server;
Step 502:User enters the work attendance page by wechat service number, clicks on positioning;
Step 503:Start positioning service, the current location information of user is obtained from map;
Step 504:Select work attendance project to carry out work attendance, record the work attendance time, and attendance data is checked by the work attendance page.
By implementing the utility model, wirelessly all parts in connection system, can largely reduce wiring;Simultaneously
The system provides a variety of modes of deploying troops on garrison duty, and improves security and Consumer's Experience.
Above example is only to illustrate technical concepts and features of the present utility model, and its object is to allow be familiar with technique
Personage can understand content of the present utility model and implement accordingly, protection domain of the present utility model can not be limited.It is all with
The equivalent changes and modifications that the utility model right is done, all should belong to the utility model claim covers model
Enclose.
Claims (10)
1. a kind of Yunmen access control system, it is characterised in that including:Management server, at least one cloud access controller, at least one
Electric control lock, at least one identity recognition device, wherein,
The management server is used to configure systematic parameter, issue control instruction and facility information and door in storage system
Prohibit usage record;
The cloud access controller, which according to the control instruction deploy troops on garrison duty, withdraws a garrison, obtains user by the identity recognition device
Identity information, switch door lock and obtain and upload gate inhibition's usage record;
The cloud access controller connects the management server by wireless network, and the identity recognition device passes through wireless network
Network connects the cloud access controller;The cloud access controller connects and controls the electric control lock.
2. Yunmen access control system according to claim 1, it is characterised in that the management server includes administrative unit sum
According to storehouse,
The administrative unit is used for management system configuration parameter, management system equipment and issues the control instruction;
The database is for the facility information in storage system, subscriber identity information, authority information, gate inhibition's usage record, report
Alert record.
3. Yunmen access control system according to claim 1, it is characterised in that the cloud access controller includes:
For obtaining gate inhibition's recording unit of gate inhibition's usage record, the time limit period table unit for setting gate inhibition's time limit, being used for
Send the alarm output unit of alarm command, the data receipt unit for receiving external data, for obtaining and verifying user
Access right authority name single unit, for being withdrawn a garrison unit, use according to control instruction to gate inhibition deploy troops on garrison duty deploying troops on garrison duty of withdrawing a garrison
In sending the unlocking output unit of unlocking instruction, for setting the multi-door interlocking that is mutually related of multiple door locks single according to control instruction
Member.
4. Yunmen access control system according to claim 1, it is characterised in that also include:At least one detector, at least one
Alarm, the detector and alarm connect the cloud access controller;
The cloud access controller detects the environmental information around gate inhibition by the detector, and the environmental information is uploaded
To the management server;
When the cloud access controller has been deployed troops on garrison duty or detected disabled user, the alarm equipment alarm is driven.
5. Yunmen access control system according to claim 1, it is characterised in that also including mobile terminal, the mobile terminal leads to
Cross wireless network and be connected on the management server, the mobile terminal and be provided with for switch door lock and the APP registered.
6. Yunmen access control system according to claim 1, it is characterised in that the identity recognition device passes through WLAN
Network connects the cloud access controller.
7. Yunmen access control system according to claim 1, it is characterised in that the management server, cloud access controller, body
Part identifying device all includes wireless sending module and wireless receiving module.
8. Yunmen access control system according to claim 1, it is characterised in that also include:It is connected with the management server
Management terminal, user by the management terminal to system components carry out parameter setting, priority assignation, deploy troops on garrison duty withdraw a garrison setting,
Door lock interconnection is set, warning message is checked, gate inhibition's usage record is checked.
9. Yunmen access control system according to claim 1, it is characterised in that the identity recognition device includes:Camera device,
One or more in IC-card card reader, near field communication means, speech recognizing device, fingerprint identification device.
10. Yunmen access control system according to claim 1, it is characterised in that also include:For strengthening the wireless of wireless signal
Signal Booster or wireless signal amplifier.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201720036639.4U CN206584426U (en) | 2017-01-12 | 2017-01-12 | A kind of Yunmen access control system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201720036639.4U CN206584426U (en) | 2017-01-12 | 2017-01-12 | A kind of Yunmen access control system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN206584426U true CN206584426U (en) | 2017-10-24 |
Family
ID=60110323
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201720036639.4U Expired - Fee Related CN206584426U (en) | 2017-01-12 | 2017-01-12 | A kind of Yunmen access control system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN206584426U (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106875523A (en) * | 2017-01-12 | 2017-06-20 | 深圳达实信息技术有限公司 | A kind of Yunmen access control system and its management method |
CN107845172A (en) * | 2017-11-14 | 2018-03-27 | 南京物联传感技术有限公司 | A kind of smart lock security system and method for work with autonomous classification ability |
CN107993324A (en) * | 2017-12-15 | 2018-05-04 | 青岛英飞凌电子技术有限公司 | A kind of multifunction entrance guard control device |
CN108269332A (en) * | 2017-12-13 | 2018-07-10 | 山东省科学院情报研究所 | A kind of intelligent access control system and method based on mobile terminal APP |
CN108537924A (en) * | 2018-04-04 | 2018-09-14 | 安恒世通(北京)网络科技有限公司 | A kind of implementation method of network intelligent lock |
CN108564687A (en) * | 2018-03-16 | 2018-09-21 | 辽宁红沿河核电有限公司 | A kind of air lock door electronization register system |
CN109491896A (en) * | 2018-10-26 | 2019-03-19 | 深圳点猫科技有限公司 | A kind of the wechat small routine form validation method and electronic equipment of educational system |
WO2019128375A1 (en) * | 2017-12-29 | 2019-07-04 | 深圳市欧瑞博科技有限公司 | Smart door lock-based coercion alarm method and device |
CN111764637A (en) * | 2020-07-30 | 2020-10-13 | 浙江维安建筑支护科技有限公司 | Intelligent unlocking scaffold |
CN113645371A (en) * | 2021-06-08 | 2021-11-12 | 天津大学 | Device and method for eliminating noise of fixed-phase mode in row direction of time-of-flight sensor |
-
2017
- 2017-01-12 CN CN201720036639.4U patent/CN206584426U/en not_active Expired - Fee Related
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106875523A (en) * | 2017-01-12 | 2017-06-20 | 深圳达实信息技术有限公司 | A kind of Yunmen access control system and its management method |
CN107845172A (en) * | 2017-11-14 | 2018-03-27 | 南京物联传感技术有限公司 | A kind of smart lock security system and method for work with autonomous classification ability |
CN108269332B (en) * | 2017-12-13 | 2020-12-29 | 山东省科学院情报研究所 | Intelligent access control system and method based on mobile terminal APP |
CN108269332A (en) * | 2017-12-13 | 2018-07-10 | 山东省科学院情报研究所 | A kind of intelligent access control system and method based on mobile terminal APP |
CN107993324A (en) * | 2017-12-15 | 2018-05-04 | 青岛英飞凌电子技术有限公司 | A kind of multifunction entrance guard control device |
WO2019128375A1 (en) * | 2017-12-29 | 2019-07-04 | 深圳市欧瑞博科技有限公司 | Smart door lock-based coercion alarm method and device |
CN108564687A (en) * | 2018-03-16 | 2018-09-21 | 辽宁红沿河核电有限公司 | A kind of air lock door electronization register system |
CN108537924A (en) * | 2018-04-04 | 2018-09-14 | 安恒世通(北京)网络科技有限公司 | A kind of implementation method of network intelligent lock |
CN109491896A (en) * | 2018-10-26 | 2019-03-19 | 深圳点猫科技有限公司 | A kind of the wechat small routine form validation method and electronic equipment of educational system |
CN109491896B (en) * | 2018-10-26 | 2022-06-21 | 深圳点猫科技有限公司 | WeChat applet form verification method of education system and electronic equipment |
CN111764637A (en) * | 2020-07-30 | 2020-10-13 | 浙江维安建筑支护科技有限公司 | Intelligent unlocking scaffold |
CN113645371A (en) * | 2021-06-08 | 2021-11-12 | 天津大学 | Device and method for eliminating noise of fixed-phase mode in row direction of time-of-flight sensor |
CN113645371B (en) * | 2021-06-08 | 2023-10-17 | 天津大学 | Device and method for eliminating phase fixed mode noise in line direction of flight time sensor |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN206584426U (en) | A kind of Yunmen access control system | |
CN106875523A (en) | A kind of Yunmen access control system and its management method | |
US9818244B2 (en) | Method and system for permitting remote check-in and coordinating access control | |
US11205312B2 (en) | Applying image analytics and machine learning to lock systems in hotels | |
CN206431720U (en) | Wireless intelligent access control system | |
EP2877983B1 (en) | Access control of an in-room safe | |
CN106652106A (en) | Door lock control method, device and terminal | |
CN104134253A (en) | Entrance guard system and entrance guard opening method | |
CN109712287A (en) | A kind of intelligent district access control system | |
CN106373237A (en) | Remote control door lock system based on Wechat | |
CN105574967A (en) | Intelligent access control system and operation method thereof | |
CN106327647A (en) | Remotely controlled access control system | |
CN107067518A (en) | Intelligent positioning enabling control system and method | |
CN102647318A (en) | Intelligent household system controlled through human characteristic information and working method thereof | |
CN106373233A (en) | Remote-control door access system | |
CN106327648A (en) | Community access control lock system with remote control function | |
CN109410379A (en) | A kind of wireless method for unlocking, system | |
CN110288727A (en) | The intelligent system on duty in unmanned laboratory | |
CN108389289A (en) | A kind of intelligent door lock, unlocking method and locking method | |
CN108091005A (en) | access control system and access control management method | |
CN110796770A (en) | Access control method and device, storage medium and electronic device | |
CN106204865A (en) | A kind of community's gate inhibition's lock system with remote control function | |
CN202679395U (en) | Intelligent household system controlled by human body characteristic information | |
EP3267307A1 (en) | Access control system and method | |
KR101226645B1 (en) | Method for Managing Digital Locking Apparatus By Using Bionic Information, System And Managing Apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20171024 Termination date: 20220112 |
|
CF01 | Termination of patent right due to non-payment of annual fee |