CN212782126U - Access control system - Google Patents

Access control system Download PDF

Info

Publication number
CN212782126U
CN212782126U CN202021564541.4U CN202021564541U CN212782126U CN 212782126 U CN212782126 U CN 212782126U CN 202021564541 U CN202021564541 U CN 202021564541U CN 212782126 U CN212782126 U CN 212782126U
Authority
CN
China
Prior art keywords
module
terminal
access control
communication module
user information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202021564541.4U
Other languages
Chinese (zh)
Inventor
李宪辉
张昊
郑渝宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhutai Defense Intelligent Technology Co ltd
Original Assignee
Shenzhen Zhutai Defense Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhutai Defense Intelligent Technology Co ltd filed Critical Shenzhen Zhutai Defense Intelligent Technology Co ltd
Priority to CN202021564541.4U priority Critical patent/CN212782126U/en
Application granted granted Critical
Publication of CN212782126U publication Critical patent/CN212782126U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The utility model relates to the technical field of entrance guard equipment, and discloses an entrance guard control system, wherein the system comprises a terminal, a server and entrance guard equipment; the access control equipment comprises a first communication module, a first control module, at least one door lock switch and at least one NFC reading head; the server comprises a second communication module and a second control module; the terminal comprises a third communication module, a CPU module and an NFC module; the first communication module is used for keeping communication connection with the second communication module, and the third communication module is used for keeping communication connection with the second communication module; the first control module is used for controlling the state of the door lock switch. The application provides a pair of access control system carries out the mode of identification through adopting the terminal for the terminal has still possessed the function of entrance guard's card or label, thereby makes the terminal replace entrance guard's card or label, this very big saving the resource.

Description

Access control system
Technical Field
The utility model relates to an entrance guard's equipment technical field especially relates to an entrance guard control system.
Background
The existing access control equipment mostly adopts a handheld access control card or a handheld label containing an RFID chip to identify at an identifier end, and the access control card or the handheld label of the type can not be used in the working process after passing through the access control equipment, so that the waste of resources is caused. In addition, in real work and life, the access control card or the tag is often lost easily and is difficult to retrieve after being lost, which brings great inconvenience to the work and life of users.
SUMMERY OF THE UTILITY MODEL
An object of the utility model is to provide an access control system aims at solving prior art, and entrance guard's equipment still adopts entrance guard's card or label to carry out identification, causes the problem of wasting of resources.
The utility model is realized in this way, the utility model provides an access control system, which comprises a terminal, a server and an access device; the access control equipment comprises a first communication module, a first control module, at least one door lock switch and at least one NFC reading head; the server comprises a second communication module and a second control module; the terminal comprises a third communication module, a CPU module and an NFC module; the first communication module is used for keeping communication connection with the second communication module, and the third communication module is used for keeping communication connection with the second communication module; the NFC reading head is used for reading data in the NFC module;
the first control module is used for controlling the state of the door lock switch;
the second control module is used for controlling the second communication module to respectively establish communication connection with the first communication module and the third communication module.
Further, the second control module further comprises:
a generating unit for generating activation information according to the user information; and
and the comparison unit is used for comparing the acquired user information with the pre-stored user information, searching the corresponding terminal and sending the generated activation information.
Furthermore, the server also comprises a user information acquisition module, and the user information acquisition module is used for transmitting the acquired user information to the second control module.
Further, the user information acquisition module comprises one or more of an image acquisition unit, an audio acquisition unit and a fingerprint identification unit.
Compared with the prior art, the utility model discloses mainly there is following beneficial effect:
according to the access control system, the terminal has the function of the access card or the label by adopting the mode that the terminal identifies the identity, so that the terminal replaces the access card or the label, and resources are greatly saved; simultaneously in actual life, user's terminal also is more difficult to lose in access control card or label, even if lose also more easily find back to make access control safe convenient more.
Drawings
Fig. 1 is a schematic flowchart of an access control method provided by an embodiment of the present invention;
fig. 2 is a schematic specific flowchart of step S102 in an access control method according to an embodiment of the present invention;
fig. 3 is a schematic flowchart of an access control method according to another embodiment of the present invention;
fig. 4 is a schematic block diagram of an access control system according to an embodiment of the present invention.
Reference numerals: the system comprises 1-entrance guard equipment, 2-servers, 3-terminals, 11-first control modules, 12-first communication modules, 13-door lock switches, 14-NFC reading heads, 21-second control modules, 22-second communication modules, 31-CPU modules, 32-third communication modules and 33-NFC modules.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more clearly understood, the present invention is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The following describes the implementation of the present invention in detail with reference to specific embodiments.
Fig. 1 shows a schematic flow chart of an access control method provided by an embodiment of the present invention, and the following describes embodiments of the present invention in detail with reference to fig. 1. The present embodiment is applied to a server, and is a server serving a certain application.
A method for retrieving a terminal, the method comprising: step S101, step S102, and step S103.
Step S101: and acquiring user information.
Specifically, the user information may be input into the server 2 by a background manual input method, or the user information may be acquired from the terminal 3 by establishing a communication connection with the terminal 3. The user information of each user may correspond to one or more terminals, and the server 2 stores the user information of all the people who can open the access control device 1. Alternatively, the user information may be the user's name, cell phone number, job number, and the like.
Step S102: and sending activation information to the terminal 3 corresponding to the user information according to the user information.
Specifically, the terminal 3 corresponding to the user information is found according to the user information, and the activation information is sent to the terminal 3, and after receiving the activation information, the terminal 3 is in an activated state and can receive the AID value returned by the access control device 1. Wherein the activation information may be transmitted in the form of a two-dimensional code or a link.
Step S103: sending the user information to an access control device 1; the access control equipment 1 is used for matching the received user information with the user information prestored in the access control equipment 1.
Specifically, the access control device 1 is in communication connection with the server 2, user information is stored in the access control device 1 in advance, and when the user information received by the access control device 1 and sent by the server 2 is matched with one piece of user information stored in advance, the user is a legal user and is matched with an AID value stored in the access control device 1 in advance; meanwhile, the AID value can be transmitted to the server 2, and a plurality of AID values stored in the access control device 1 form an AID database.
The pre-stored user information may include user information of all persons who can open the access control device 1.
Wherein the AID value is a unique identification representing each terminal 3 user.
Step S104: receiving the AID value returned by the access control equipment 1, and sending the AID value to a terminal 3; the terminal 3 can establish an NFC connection with the NFC reading head 14 of the access control device 1, and send the received AID value to the access control device 1; and when the AID value is consistent with any AID value stored in the access control equipment 1, the access control equipment 1 controls the door to be opened.
Specifically, the terminal 3 can store the AID value transmitted by the server 2 in the terminal 3 after receiving the AID value. When the terminal 3 is used for opening the access control device 1 by a user, the NFC reading head 14 on the access control device 1 can sense and receive the AID value stored in the terminal 3, and simultaneously compare the received AID value with the AID value in the AID database in the access control device 1, and when the received AID value is consistent with any one AID value in the AID database, it indicates that the terminal 3 user is a legal user, and the access control device 1 controls the door to open.
In the access control method, the server 2 acquires the user information; sending activation information to the terminal 3 according to the user information; sending the user information to an access control device 1; receiving the AID value returned by the access control equipment 1, and sending the AID value to a terminal 3; and finally, the terminal 3 with the stored AID value is close to the NFC induction reading head of the access control device 1 for induction so as to achieve the purpose of identity recognition. By adopting the mode that the terminal 3 is used for identity recognition, the terminal 3 also has the function of an access card or a label, so that the terminal 3 replaces the access card or the label, and the resources are greatly saved; simultaneously in actual life, user's terminal 3 also is difficult to lose in comparison with entrance guard's card or label, even if lose also more easily find back to make entrance guard's control safe more convenient.
When the terminal 3 is adopted to enter a special area through the access control device (for example, a special meeting place, a prison and the like), the access control device 1 identifies a legal terminal 3 user, and after the terminal 3 user enters the special area, the feedback information that the terminal 3 user has entered the special area can be sent to the server 2, the server 2 establishes communication connection with the terminal 3, and the terminal 3 can be controlled, such as accessing an address book of the terminal 3, and the interfaces of the terminal 3, such as wifi and bluetooth, are closed.
Referring to fig. 2, based on the previous embodiment, fig. 2 shows a specific flowchart of step S102 in an access control method; it should be noted that step S102 specifically includes the following steps:
step S1021: and generating activation information according to the user information.
Specifically, the server 2 generates corresponding activation information according to different acquired user information.
Step S1022: and comparing the acquired user information with the pre-stored user information, searching the corresponding terminal 3, and sending the generated activation information.
Specifically, a user information database is formed by a plurality of pieces of user information stored in the server 2 in advance, the obtained user information is compared with records in the user information database, and the corresponding user information and the terminal 3 corresponding to the user information are found, so that the activation information is sent to the terminal 3.
Fig. 3 is a schematic flow chart illustrating a method for controlling an access control according to another embodiment of the present invention, and another embodiment of the present invention is described in detail with reference to fig. 3. The embodiment is applied to the terminal.
An access control method, the method comprising: step S201, step S202, and step S203.
Step S201: and receiving the activation information sent by the server 2.
Specifically, the activation information may be identified by scanning a two-dimensional code, and the two-dimensional code may include the activation information and registration information to be filled by the user of the terminal 3.
Step S202: and according to the activation information, registering and generating an AID value and storing the AID value.
Specifically, after the user fills in the registration information on the terminal 3, an AID value can be automatically generated; the access control equipment 1 is pre-stored with AID values of all terminal 3 users capable of opening the access control equipment 1, and a plurality of AID values stored in the access control equipment 1 form an AID database; the generated AID values can all correspondingly find a same AID value in an AID database of the access control device 1.
Step S203: establishing NFC connection with an NFC reading head 14 of the access control equipment 1, and comparing the registered AID value with the AID value stored in the access control equipment 1 in advance; when the AID value stored in the terminal 3 is consistent with the AID value stored in the access control device 1 in advance, the access control device 1 controls the door to be opened.
Specifically, when the terminal 3 is close to the NFC reading head 14, the NFC module 33 in the terminal 3 can establish NFC connection with the NFC reading head 14, the NFC reading head 14 can sense and receive an AID value stored in the terminal 3, and simultaneously compare the received AID value with an AID value in an AID database in the entrance guard device 1, and when the received AID value is consistent with any one AID value in the AID database, it indicates that the user of the terminal 3 is a legal user, and the door is opened by the entrance guard device 1.
The implementation process of the access control method is described in the above description, and the implementation process can be implemented by the following system, and the internal structure and function of the system are described below.
Referring to fig. 4, fig. 4 is a schematic block diagram of an access control system according to an embodiment of the present invention; the embodiment of the utility model provides a pair of access control system for carry out aforementioned access control method. The system comprises:
the system comprises a terminal 3, a server 2 and an access control device 1; the access control device 1 comprises a first communication module 12, a first control module 11, at least one door lock switch 13 and at least one NFC reading head 14; the server 2 comprises a second communication module 22 and a second control module 21; the terminal 3 comprises a 32, a CPU module 31 and an NFC module 33; the first communication module 12 is configured to be communicatively coupled to the second communication module 22, and the second communication module 32 is configured to be communicatively coupled to the second communication module 22; the NFC reader head 14 is used to read data in the NFC module 33;
the first control module 11 is used for controlling the state of a door lock switch 13;
the second control module 21 is configured to control the second communication module 22 to establish communication connections with the first communication module 12 and the third communication module 32, respectively.
Specifically, the state of the door lock switch 13 includes an open or closed state. When the door lock switch 13 is opened, it indicates that the user can open the door controlled by the access control device 1, and when the door lock switch 13 is closed, it indicates that the user cannot open the door controlled by the access control device 1.
According to the access control system, the terminal 3 has the function of an access card or a label by adopting the mode that the terminal 3 identifies the identity, so that the terminal 3 replaces the access card or the label, and the resources are greatly saved; simultaneously in actual life, user's terminal 3 also is difficult to lose in comparison with entrance guard's card or label, even if lose also more easily find back to make entrance guard's control safe more convenient.
In one embodiment, the first control module 11 can compare the AID value acquired by the NFC reading head 14 with a prestored AID value, and control the state of the door lock switch 13 according to the comparison result;
the second control module 21 can control the second communication module 22 to establish communication connection with the first communication modules 12 and 32, respectively, the second control module 21 can also control the second communication module 22 to send activation information and an AID value to the second communication module 32, respectively, and the second control module 21 can also control the second communication module 22 to send user information to the first communication module 12 and receive the AID value returned by the first communication module 12.
Specifically, the first control module 11 includes a first storage unit for storing the AID value.
Specifically, the second control module 21 further includes:
a generating unit for generating activation information according to the user information; and
and the comparison unit is used for comparing the acquired user information with the pre-stored user information, searching the corresponding terminal 3 and sending the generated activation information.
Preferably, the server 2 further comprises a user information collecting module, which is used for transmitting the collected user information to the second control module 21. The user information acquisition module is electrically connected with the second control module 21, the second control module 21 includes a second storage unit, and the second storage unit is used for storing the acquired user information.
Preferably, the user information collecting module comprises one or more of an image collecting unit, an audio collecting unit and a fingerprint identifying unit. The image acquisition unit is used for acquiring the appearance characteristic information of a user, such as a camera; the audio acquisition unit is used for acquiring sound information of a user, such as a recorder; the fingerprint identification unit is used for collecting fingerprint information of a user. Of course, the information collecting module may further include other various units for collecting the user information, which is not limited by the present invention.
It will be appreciated by those skilled in the art that the configurations within the systems described above are merely part of the configurations associated with the present application and do not constitute a limitation on the systems to which the present application is applied, and that a particular system may include more or less components than those described above, or some components may be combined, or have a different arrangement of components.
The above description is only exemplary of the present invention and should not be taken as limiting the scope of the present invention, as any modifications, equivalents, improvements and the like made within the spirit and principles of the present invention are intended to be included within the scope of the present invention.

Claims (2)

1. An access control system is characterized by comprising a terminal, a server and access control equipment; the access control equipment comprises a first communication module, a first control module, at least one door lock switch and at least one NFC reading head; the server comprises a second communication module and a second control module; the terminal comprises a third communication module, a CPU module and an NFC module; the first communication module is used for keeping communication connection with the second communication module, and the third communication module is used for keeping communication connection with the second communication module; the NFC reading head is used for reading data in the NFC module;
the first control module is used for controlling the state of the door lock switch;
the second control module is used for controlling the second communication module to respectively establish communication connection with the first communication module and the third communication module;
the server also comprises a user information acquisition module, and the user information acquisition module is used for transmitting the acquired user information to the second control module; the user information acquisition module comprises one or more of an image acquisition unit, an audio acquisition unit and a fingerprint identification unit.
2. The access control system of claim 1, wherein the second control module further comprises:
a generating unit for generating activation information according to user information; and
and the comparison unit is used for comparing the acquired user information with the pre-stored user information, searching the corresponding terminal and sending the generated activation information.
CN202021564541.4U 2020-07-31 2020-07-31 Access control system Active CN212782126U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202021564541.4U CN212782126U (en) 2020-07-31 2020-07-31 Access control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202021564541.4U CN212782126U (en) 2020-07-31 2020-07-31 Access control system

Publications (1)

Publication Number Publication Date
CN212782126U true CN212782126U (en) 2021-03-23

Family

ID=75049567

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202021564541.4U Active CN212782126U (en) 2020-07-31 2020-07-31 Access control system

Country Status (1)

Country Link
CN (1) CN212782126U (en)

Similar Documents

Publication Publication Date Title
US8190195B2 (en) System and method for data correlation and mobile terminal therefor
CN205015915U (en) Management system by oneself stays
CN103839318B (en) The gate control system of a kind of remote centralized certification and method
US20090277957A1 (en) Time stamp machine and method for checking attendance using the same
CN103295296B (en) Method for controlling access control system by utilizing embedded motherboard and embedded motherboard
CN106204853A (en) Server, access control equipment administrative center, mobile terminal, the method and system of access control
CN110188129A (en) Data processing method, device, system, equipment and the medium of testimony of a witness verification terminal
CN205302954U (en) Electron message equipment and system
CN108961449A (en) Attendance punch card method and attendance recorder
CN111768538A (en) Access control method and system
US10841368B2 (en) Method for presenting schedule reminder information, terminal device, and cloud server
CN212782126U (en) Access control system
CN108347730A (en) A kind of wireless communication process method and device
CN104167026B (en) Attendance method utilizing handheld device
CN110992534B (en) Device binding method and system, device to be bound, server and user side
CN112786045A (en) Device, server, method and system for conference recording
CN106355684A (en) Control method, device and system of controlled equipment
CN103279845A (en) Attendance data processing method and system based on internet of things mobile phone
CN107632916A (en) The method and apparatus for checking mobile terminal operation note
CN106101156B (en) Telephone query method and mobile terminal
CN205427857U (en) Identity identification system based on many biological characteristics combine equipment fingerprint
CN113129497A (en) Intelligent access control system of data center machine room
CN210377604U (en) Multifunctional community access control system
Farooq et al. An integrated approach towards designing an embedded wireless monitoring and access control system using RFID and MMS technologies
KR20080094205A (en) Rfid authentication system, terminal and method

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant