CN210155755U - Mobile terminal for block chain access control system - Google Patents

Mobile terminal for block chain access control system Download PDF

Info

Publication number
CN210155755U
CN210155755U CN201921511774.5U CN201921511774U CN210155755U CN 210155755 U CN210155755 U CN 210155755U CN 201921511774 U CN201921511774 U CN 201921511774U CN 210155755 U CN210155755 U CN 210155755U
Authority
CN
China
Prior art keywords
authentication
module
entrance guard
control device
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201921511774.5U
Other languages
Chinese (zh)
Inventor
李远军
陈鸿睿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunnan Jiuji Information Technology Co Ltd
Original Assignee
Yunnan Jiuji Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunnan Jiuji Information Technology Co Ltd filed Critical Yunnan Jiuji Information Technology Co Ltd
Priority to CN201921511774.5U priority Critical patent/CN210155755U/en
Application granted granted Critical
Publication of CN210155755U publication Critical patent/CN210155755U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The utility model discloses a mobile terminal for a block chain access control system, which comprises an identity verification device, an access control sensing device, an identity authentication control device and an access control authentication control device; the identity verification device is connected with the identity authentication control device, and the entrance guard sensing device is connected with the entrance guard authentication control device; the identity authentication device can be in communication connection with the user terminal and is used for authenticating the user terminal; and entrance guard perception device can use terminal communication connection with the user for the perception needs the entrance guard that passes through. The utility model discloses an use the credible mobile terminal authorized through the authentication, combine the equipment that removes the end simultaneously to bind, fingerprint identification, portrait discernment, location and network equipment information etc. when richening entrance guard's authentication mode, make full use of mobile terminal's characteristic has reduced the reliance to entrance guard's equipment to identification device.

Description

Mobile terminal for block chain access control system
Technical Field
The utility model relates to an entrance guard's technical field, more specifically relates to a block chain is mobile terminal for access control system.
Background
A company office building has many people, including visitors, employees, etc., that enter and exit everyday. In order to ensure convenience and security of the employee entering and exiting the company, an entity key such as an IC card or an NFC card is generally used, or biometric features such as fingerprint recognition and portrait recognition are used as an authentication key. The entity key is in risk of losing, resulting in insecurity of the office building. Although the risk of entity key loss is avoided by means of fingerprint identification, portrait identification and the like, a large amount of fingerprint information, face information and the like need to be managed, for office buildings with large scale, the management complexity is increased, information inconsistency is easy to occur, and the safety problem of the office buildings is brought.
SUMMERY OF THE UTILITY MODEL
An object of the utility model is to overcome prior art not enough, provide a block chain is mobile terminal for access control system, when richening entrance guard's authentication mode, make full use of mobile terminal's characteristic reduces the reliance to entrance guard's equipment to identification device.
The purpose of the utility model is realized through the following technical scheme:
a mobile terminal for a block chain access control system comprises an identity verification device, an access control sensing device, an identity authentication control device and an access control authentication control device; the identity verification device is connected with the identity authentication control device, and the entrance guard sensing device is connected with the entrance guard authentication control device; the identity authentication device can be in communication connection with the user terminal and is used for authenticating the user terminal; the entrance guard sensing device can be in communication connection with a user terminal and is used for sensing an entrance guard which needs to pass through; the identity verification device comprises the following components: one or more of a touch screen module, a fingerprint identification module, a first camera module and a first NFC sensor module; entrance guard's perception device contains following subassembly: one or more of a WIFI module, a Bluetooth module, a GPS module, a second NFC module and a second camera module.
Further, the touch screen module is connected with an identity authentication control device.
Further, the fingerprint identification module is connected with an identity authentication control device.
Further, the first camera module is connected with an identity authentication control device.
Further, the first NFC sensor module is connected to an identity authentication control device.
Further, the WIFI module is connected with the gate inhibition authentication control device.
Further, the bluetooth module is connected with the gate inhibition authentication control device.
Further, the GPS module is connected to the gate inhibition authentication control device.
Furthermore, the second NFC module is connected to the access authentication control device.
Furthermore, the second camera module is connected with the access authentication control device.
The utility model has the advantages that:
(1) the utility model discloses an use the credible mobile terminal who authorizes through the authentication, combine the equipment of removal end to bind simultaneously, fingerprint identification, portrait discernment, location and modes such as network equipment information. The entrance guard authentication mode is enriched, and meanwhile, the characteristics of the mobile terminal are fully utilized, so that the dependence on the entrance guard equipment on the identity recognition device is reduced.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a block diagram of the present invention.
Detailed Description
The technical solution of the present invention is described in further detail below with reference to the accompanying drawings, but the scope of the present invention is not limited to the following description. Any feature disclosed in this specification (including any accompanying claims, abstract and drawings), may be replaced by alternative features serving equivalent or similar purposes, unless expressly stated otherwise. That is, unless expressly stated otherwise, each feature is only an example of a generic series of equivalent or similar features.
The technical solutions in the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only some embodiments of the present invention, not all embodiments. Based on the embodiments in the present invention, all other embodiments obtained by a person skilled in the art without creative efforts belong to the protection scope of the present invention.
Before describing the embodiments, some necessary terms need to be explained. For example:
if the terms "first," "second," etc. are used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. Thus, a "first" element discussed below could also be termed a "second" element without departing from the teachings of the present invention. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. In contrast, when an element is referred to as being "directly connected" or "directly coupled" to another element, there are no intervening elements present.
The various terms appearing in this application are used for the purpose of describing particular embodiments only and are not intended as limitations on the invention, except where the context clearly dictates otherwise, the singular is intended to include the plural as well.
When the terms "comprises" and/or "comprising" are used in this specification, these terms are intended to specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence and/or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
As shown in fig. 1, a mobile terminal for a block chain access control system includes an identity verification device, an access sensing device, an identity authentication control device, and an access authentication control device; the identity verification device is connected with the identity authentication control device, and the entrance guard sensing device is connected with the entrance guard authentication control device; the identity authentication device can be in communication connection with the user terminal and is used for authenticating the user terminal; the entrance guard sensing device can be in communication connection with a user terminal and is used for sensing an entrance guard which needs to pass through; the identity verification device comprises the following components: one or more of a touch screen module, a fingerprint identification module, a first camera module and a first NFC sensor module; entrance guard's perception device contains following subassembly: one or more of a WIFI module, a Bluetooth module, a GPS module, a second NFC module and a second camera module.
Further, the touch screen module is connected with an identity authentication control device.
Further, the fingerprint identification module is connected with an identity authentication control device.
Further, the first camera module is connected with an identity authentication control device.
Further, the first NFC sensor module is connected to an identity authentication control device.
Further, the WIFI module is connected with the gate inhibition authentication control device.
Further, the bluetooth module is connected with the gate inhibition authentication control device.
Further, the GPS module is connected to the gate inhibition authentication control device.
Furthermore, the second NFC module is connected to the access authentication control device.
Furthermore, the second camera module is connected with the access authentication control device.
Example one
As shown in fig. 1, a mobile terminal for a block chain access control system includes an identity verification device, an access sensing device, an identity authentication control device, and an access authentication control device; the identity verification device is connected with the identity authentication control device, and the entrance guard sensing device is connected with the entrance guard authentication control device; the identity authentication device can be in communication connection with the user terminal and is used for authenticating the user terminal; the entrance guard sensing device can be in communication connection with a user terminal and is used for sensing an entrance guard which needs to pass through; the identity verification device comprises the following components: one or more of a touch screen module, a fingerprint identification module, a first camera module and a first NFC sensor module; entrance guard's perception device contains following subassembly: one or more of a WIFI module, a Bluetooth module, a GPS module, a second NFC module and a second camera module.
In this embodiment, the mobile terminal for the access control system includes an identity verification module, an access sensing module, an identity authentication control device, and an access authentication control device. The identity authentication module comprises the following components: touch-sensitive screen, fingerprint identification, camera, NFC sensor, or other authentication module. One of the above components or a combination of any of the above components may be used. The user using the terminal can be verified to be a credible user through the identity verification module, and the terminal obtains the authentication information after verification to become a credible terminal. The entrance guard perception module comprises the following components: WIFI, Bluetooth, GPS, NFC, camera. One of the above components or a combination of any of the above components may be used. Through entrance guard perception module, the terminal can perceive which entrance guard that needs pass through is which. The identity authentication device and the entrance guard authentication device finish identity authentication and authentication by calling the identity authentication module and the entrance guard sensing module. When the entrance guard needs to be opened, the device firstly checks the user authentication state, if the user is not authenticated, the device acquires the user information by calling the identity verification module, and checks the user validity through the network interface. And after the verification is passed, obtaining the authentication information of the user. If the user is authenticated, the entrance guard to be authenticated currently is confirmed by calling the entrance guard sensing module, and then authentication is initiated through the network interface. And after the authentication is passed, the access control system informs the access control system of opening the access control system, and if the access control system fails, corresponding prompt information is returned.
Example two
As a further optimization of the above-described solution,
when a user initiates an entrance guard opening action, the authentication state in the current equipment is detected.
And if the user is not authenticated or the authentication is time-efficient, the user is required to be authenticated through the fingerprint identification module. The identity authentication device and the entrance guard authentication device send fingerprint information of a user to the entrance guard system through a network interface, and if the fingerprint information passes verification, the current authentication information is stored.
When the user passes the authentication, the identity authentication device and the entrance guard authentication device call the camera, and the user scans the two-dimensional code which is refreshed on the entrance guard at regular time through the camera to sense the entrance guard to be opened.
After the scanning is successful, the identity authentication device and the access control authentication device submit user information and access control information needing to be opened to the access control system for authentication.
If the authentication is passed, the access control system informs the access control to open, and if the authentication is failed, the mobile terminal prompts the user to apply the access control authority.
EXAMPLE III
As a further optimization of the above-described solution,
when a user initiates an entrance guard opening action, the authentication state in the current equipment is detected.
And if the user is not authenticated or the authentication is time-efficient, the user is required to be authenticated through the NFC module. The NFC module scans an entity NFC card of a user, the identity authentication device and the entrance guard authentication device send entity NFC card information of the user to an entrance guard system through a network interface, the user information is verified, and if the verification is passed, the current authentication information is stored.
When the user passes the authentication, the identity authentication device and the entrance guard authentication device call the Bluetooth module to scan the nearby entrance guard signals.
Further, the entrance guard equipment uses the iBeacon protocol to send entrance guard information.
After the scanning is successful, the identity authentication device and the access control authentication device submit user information and access control information needing to be opened to the access control system for authentication.
If the authentication is passed, the access control system informs the access control to open, and if the authentication is failed, the mobile terminal prompts the user to apply the access control authority.
Example four
As a further optimization of the above-described solution,
the identity authentication control device and the entrance guard authentication control device detect the authentication state in the current equipment when a user initiates an entrance guard opening action.
And if the user is not authenticated or the authentication is time-efficient, the user is required to input a user name and a password through the touch screen, the identity authentication device and the access control authentication device send the user name and the password to the access control system through the network interface, and if the user passes the authentication, the current authentication information is stored.
When the user passes the authentication, the identity authentication device and the entrance guard authentication device call the camera, and the user scans the two-dimensional code which is refreshed on the entrance guard at regular time through the camera to sense the entrance guard to be opened.
After the scanning is successful, the identity authentication device and the access control authentication device submit user information and access control information needing to be opened to the access control system for authentication.
If the authentication is passed, the access control system informs the access control to open, and if the authentication is failed, the mobile terminal prompts the user to apply the access control authority.
Furthermore, part of the access control devices require that the user can open the access control device through face recognition, and then in authentication failure information, the mobile terminal is required to be a terminal passing face recognition authentication, and then the identity authentication device and the access control authentication device call the camera to obtain face information, submit the face information to the access control system, and perform face authentication.
And after the authentication is passed, the camera is called again to scan the two-dimensional code for authentication.
In other technical features in this embodiment, those skilled in the art can flexibly select the technical features according to actual situations to meet different specific actual requirements. However, it will be apparent to one of ordinary skill in the art that: it is not necessary to employ these specific details to practice the invention. In other instances, well-known components, structures or parts are not described in detail in order to avoid obscuring the present invention, and the technical scope of the present invention is defined by the claims.
In the description of the present invention, unless otherwise expressly specified or limited, the terms "disposed," "mounted," "connected," and "connected" are used in a generic sense as is understood by those skilled in the art. For example, the components may be fixedly connected, movably connected, integrally connected, or partially connected, mechanically connected, electrically connected, directly connected, indirectly connected through an intermediate medium, or connected inside two elements, and the like, and for those skilled in the art, the specific meanings of the above terms in the present invention can be understood according to specific situations, that is, the expression of the language and the implementation of the actual technology can flexibly correspond, and the expression of the language (including the drawings) of the specification of the present invention does not constitute any single restrictive interpretation of the claims.
Modifications and variations may be made by those skilled in the art without departing from the spirit and scope of the invention, which should be limited only by the claims appended hereto. In the previous description, numerous specific details were set forth in order to provide a thorough understanding of the present invention. However, it will be apparent to one of ordinary skill in the art that: it is not necessary to employ these specific details to practice the invention. In other instances, well-known techniques, such as specific construction details, operating conditions, and other technical conditions, have not been described in detail in order to avoid obscuring the present invention.

Claims (10)

1. A mobile terminal for a block chain access control system is characterized by comprising an identity verification device, an access control sensing device, an identity authentication control device and an access control authentication control device; the identity verification device is connected with the identity authentication control device, and the entrance guard sensing device is connected with the entrance guard authentication control device; the identity authentication device can be in communication connection with the user terminal and is used for authenticating the user terminal; the entrance guard sensing device can be in communication connection with a user terminal and is used for sensing an entrance guard which needs to pass through;
the identity verification device comprises the following components: one or more of a touch screen module, a fingerprint identification module, a first camera module and a first NFC sensor module; entrance guard's perception device contains following subassembly: one or more of a WIFI module, a Bluetooth module, a GPS module, a second NFC module and a second camera module.
2. The mobile terminal for a blockchain access control system according to claim 1, wherein the touch screen module is connected to an authentication control device.
3. The mobile terminal of claim 1, wherein the fingerprint module is connected to an authentication control device.
4. The mobile terminal of claim 1, wherein the first camera module is connected to an authentication control device.
5. The mobile terminal for a blockchain access control system according to claim 1, wherein the first NFC sensor module is connected to an authentication control device.
6. The mobile terminal for the block chain access control system according to claim 1, wherein the WIFI module is connected with an access authentication control device.
7. The mobile terminal for a blockchain access control system according to claim 1, wherein the bluetooth module is connected to an access authentication control device.
8. The mobile terminal for a blockchain access control system according to claim 1, wherein the GPS module is connected to an access authentication control device.
9. The mobile terminal for a blockchain access control system according to claim 1, wherein the second NFC module is connected to an access authentication control device.
10. The mobile terminal for a blockchain access control system according to claim 1, wherein the second camera module is connected to an access authentication control device.
CN201921511774.5U 2019-09-11 2019-09-11 Mobile terminal for block chain access control system Expired - Fee Related CN210155755U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201921511774.5U CN210155755U (en) 2019-09-11 2019-09-11 Mobile terminal for block chain access control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201921511774.5U CN210155755U (en) 2019-09-11 2019-09-11 Mobile terminal for block chain access control system

Publications (1)

Publication Number Publication Date
CN210155755U true CN210155755U (en) 2020-03-17

Family

ID=69767590

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201921511774.5U Expired - Fee Related CN210155755U (en) 2019-09-11 2019-09-11 Mobile terminal for block chain access control system

Country Status (1)

Country Link
CN (1) CN210155755U (en)

Similar Documents

Publication Publication Date Title
US11568695B1 (en) Information-based, biometric, asynchronous access control system
US20170264608A1 (en) Visual biometric authentication supplemented with a time-based secondary authentication factor
KR101420149B1 (en) Two-factor authentication login server system and method thereof
US11080953B2 (en) Method, system, and door lock device for controlling door lock
US10171444B1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
KR101960799B1 (en) biometric recognition access control system having IoT and its control methods
CN108806041A (en) Building access control method, Cloud Server and computer readable storage medium
CN103021045A (en) Intelligent entrance guard system for mobile terminal user verification
CN105427413A (en) Intelligent unlocking method and intelligent lock
CN104182670A (en) Method for authenticating by virtue of wearable equipment and wearable equipment
CN111612950A (en) Intelligent lockset and unlocking authentication method and device thereof
KR101852599B1 (en) An entrance control system and method using an mobile device
CN105574967A (en) Intelligent access control system and operation method thereof
KR101855494B1 (en) Door system and method using mobile device
AU2019415478A1 (en) Method and device for authenticating near-field information, electronic apparatus, and computer storage medium
KR101345018B1 (en) Teminal and security certification system therewith
WO2018137309A1 (en) Wireless communication processing method and device
CN210155755U (en) Mobile terminal for block chain access control system
CN110516427B (en) Terminal user identity authentication method and device, storage medium and computer equipment
KR102108346B1 (en) Method and apparatus for unlocking door-lock using time sliced password, and system therefor
KR20170052903A (en) Method for Converging Certification of Remote Facing and Non-facing Certification
CN210155752U (en) Comprehensive authentication terminal for access control system
CN109165490A (en) A kind of data inputting method and device
US10645070B2 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
CN112202752A (en) Identity authentication system and method

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200317

Termination date: 20210911