TW201349133A - Cloud control the access control management system and the authentication method - Google Patents

Cloud control the access control management system and the authentication method Download PDF

Info

Publication number
TW201349133A
TW201349133A TW101125619A TW101125619A TW201349133A TW 201349133 A TW201349133 A TW 201349133A TW 101125619 A TW101125619 A TW 101125619A TW 101125619 A TW101125619 A TW 101125619A TW 201349133 A TW201349133 A TW 201349133A
Authority
TW
Taiwan
Prior art keywords
cloud
access control
function
user
management
Prior art date
Application number
TW101125619A
Other languages
Chinese (zh)
Inventor
Ming-Ta Hsu
Original Assignee
Ege Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ege Technology Co Ltd filed Critical Ege Technology Co Ltd
Priority to TW101125619A priority Critical patent/TW201349133A/en
Priority to CN201310242827.9A priority patent/CN103544749B/en
Publication of TW201349133A publication Critical patent/TW201349133A/en

Links

Abstract

A cloud control the access control management system and the authentication method used with one or a plurality of C-Lock connection management, the system includes at least: a system program and provide the management interface for programming operations, which contain five functional modules: a user module, a permission system module, a device management module, a virtual computing module and an event processing module combination; a database for storing the management information and function of identification information. Certification Department of the present invention is the use of multi-functional identification of cloud control lock mechanism through the encryption of network traffic and Cloud control the access control management system connection; it is close and remote two ways to achieve the purpose of certification.

Description

雲端控制門禁管理系統及其認證方法 Cloud control access control management system and its authentication method

本發明是有關於一種雲端控制門禁管理系統及其認證方法,係運用雲控鎖之多功能辨識機制透過加密式網路傳輸至門禁管理系統,提供近距及遠端認證之管理方法給管理者或使用者。 The invention relates to a cloud control access control management system and an authentication method thereof, which utilizes a multi-function identification mechanism of a cloud control lock to transmit to an access control management system through an encrypted network, and provides a management method for close and remote authentication to a manager. Or user.

傳統習知之門禁控制管理系統如圖1所示,使用者透過門禁控制器輸入身份辨識資料,再連結至門禁控制管理系統進行驗證,如通過者門禁控制器即會開啟讓使用者通行,門禁控制管理系統中亦會有通報服務管理程式可傳送訊息至通報接收裝置。而傳統習知之門禁控制管理系統有單機式亦有網路式,但皆存在以下之缺點: The conventional access control system is shown in Figure 1. The user inputs the identification data through the access controller and then connects to the access control management system for verification. If the access control controller is enabled, the user will be allowed to pass, and the access control is controlled. There will also be a notification service management program in the management system that can send messages to the notification receiving device. Traditionally known access control management systems are either stand-alone or network-based, but all have the following disadvantages:

(1)必須依賴部份的實體線路。有些是門禁控制器(門禁裝置)需實體線路連結至家中電腦,而門禁控制系統安裝在家中電腦;有些是門禁控制器(門禁裝置)與門禁控制系統之間需有實體線路連結,而門禁控制系統為一控制主機盒,其需指定特定網路位址(固定IP),再以網路連線(如:ADSL)進行門禁控制;以上皆有佈線成本高、不具美觀性、易被破壞、需具備特定網路位址(IP)或傳輸距離等缺失。 (1) Must rely on part of the physical line. Some are access control controllers (access control devices) that need physical connections to home computers, and access control systems are installed at home computers; some are physical line connections between access control controllers (access control devices) and access control systems, and access control The system is a control host box, which needs to specify a specific network address (fixed IP), and then uses a network connection (such as: ADSL) for access control; all of the above have high wiring cost, no aesthetics, and are easily destroyed. A specific network address (IP) or transmission distance is required.

(2)提供管理者管理之介面多數是電腦解析畫面,無法跟上近年行動手持設備(如:智慧型手機、i-PAD...)之潮流,使得管理者需以桌上型電腦或筆記型電腦始能進行管理,無法達到隨時隨地皆能監控管理之目的,顯得其不具便利性。 (2) The interface for providing administrator management is mostly computer analysis screens, which cannot keep up with the trend of mobile mobile devices (such as smart phones, i-PADs...) in recent years, so that managers need to use desktop computers or notes. The type of computer can be managed at first, and it can't achieve the purpose of monitoring and management anytime and anywhere, which makes it not convenient.

(3)雖可產生門禁記錄提供管理者及使用者查詢,但通報模式情境多為固定方式,使得管理者及使用者無法依照自行所需之通報方式進行設定,顯得其不夠人性化,且造成困擾。 (3) Although the access control record can be provided to provide managers and users with inquiries, but the notification mode situation is mostly fixed, which makes it impossible for managers and users to set according to the notification method required by themselves, which is not humanized and causes Troubled.

(4)提供之身份辨識方式不夠多元化,多為近距認證之方式(如:RFID、磁卡、磁扣...),即使有遠距方式,也是需要使用者傳送簡訊或撥打電話之方式,在使用上造成不便,且有通訊成本上之考量。 (4) The identification methods provided are not diversified, mostly in the form of close-up authentication (such as RFID, magnetic card, magnetic buckle...), even if there is a remote mode, it is a way for users to send text messages or make calls. It is inconvenient to use and has considerations for communication costs.

綜合以上,為習知技術之缺失,本發明為能有效改善其成本、美觀、安全性、便利性及人性化等問題,並同時考量行動手持設備(如:智慧型手機、i-PAD...)日後之發展必更為成熟及普及化,故以無線通訊整合門禁裝置管理系統及認證方法作為本發明之重要核心技術,詳細說明如后。 In summary, in view of the lack of the prior art, the present invention can effectively improve the cost, aesthetics, safety, convenience, and humanization, and at the same time consider mobile handheld devices (eg, smart phones, i-PAD.. .) In the future, the development will be more mature and popularized. Therefore, the wireless communication integrated access control device management system and the authentication method are important core technologies of the present invention, and the details are as follows.

本發明之目的一:為提供一種雲端控制門禁管理系統,其為五個功能模組及一資料庫組合而成。五個功能模組分別為:使用者模組,負責儲存管理者及使用者的基本資料、功能辨識資料及管理者設定之有效名單;再經權限系統模組,負責管理者或使用者與雲控鎖之關聯性及各項權限之設定;接著以設備管理模組,負責管理雲控鎖之基本資料描述與說明;再以虛擬運算模組將管理者或使用者輸入之資料或從雲控鎖接收的資訊做為運算判斷,並將運算結果傳送回雲控鎖更新資訊或做出對應之動作(如:開門),再利用加密式網路傳輸將從雲控鎖上取回之門禁記錄(含:文字記錄、影像...等)寫入資料庫;再以事件處理模組,依管理者或使用者的通報設定與雲控鎖的門禁記錄進行分析,決定是否需要執行通報(含:簡訊、電子郵件、語音、MSN、SKYPE...等)。有鑑於此,本發明研究出一種雲端控制門禁管理系統。 A first object of the present invention is to provide a cloud control access control management system, which is a combination of five functional modules and a database. The five functional modules are: user module, which is responsible for storing the basic data of the manager and the user, the function identification data and the effective list set by the administrator; and then the authority system module, responsible for the manager or user and the cloud Control the relevance of the lock and the setting of each authority; then use the device management module to manage the basic data description and description of the cloud control lock; then use the virtual computing module to input the data of the administrator or user or from the cloud control The information received by the lock is used as the operation judgment, and the operation result is transmitted back to the cloud control lock update information or the corresponding action (such as opening the door), and then the encrypted network transmission is used to retrieve the access control record from the cloud control lock. (including: text records, images, etc.) are written into the database; then the event processing module is used to analyze the access control records of the cloud control lock according to the notification settings of the administrator or the user, and determine whether the notification needs to be performed (including : newsletter, email, voice, MSN, SKYPE...etc.). In view of this, the present invention has developed a cloud control access control management system.

本發明之目的二:為提供一種雲端控制門禁管理系統之認證方式,其包含近距及遠端的功能辨識資料做為比對(含:磁卡、視網膜、掌紋、指紋、聲音、非接觸式感應、影像分析、手機)。近距認證方式至少包含以下步驟:首先管理者於雲端控制門禁管理系統建立功能辨識資料有效名單,透過加密式網路傳輸(如:一般網路VPN、電信網路MDVPN...等)將其資料更新至雲控鎖,讓管理者或使用者直接透過雲控鎖傳送功能辨識資料與有效名單做為比對,比對通過者雲控鎖即會接受控制命令做出對應動作(如:開門),反之亦然。遠端認證方式則至少包含以下步驟:首先管理者或使用者以具網路連線功能之行動設備(含:智慧型手機、i-PAD、筆記型電腦、桌上型電腦...等)進行認證,通過後於雲端控制門禁管理系統下達控制命令,再透過加密式網路傳輸(如:一般網路VPN、電信網路MDVPN...等)將控制命令 回傳至雲控鎖使其做出對應動作(如:開門)。 The second object of the present invention is to provide a cloud-based access control management system authentication method, which includes close-range and remote-end function identification data as comparisons (including: magnetic card, retina, palm print, fingerprint, sound, non-contact sensing) , image analysis, mobile phone). The short-range authentication method includes at least the following steps: First, the administrator establishes a valid list of function identification data in the cloud control access control management system, and transmits the encrypted network transmission (eg, general network VPN, telecommunication network MDVPN, etc.) The data is updated to the cloud control lock, so that the administrator or the user directly compares the function identification data with the valid list through the cloud control lock, and compares the passer cloud control lock to accept the control command to perform corresponding actions (for example, opening the door ),vice versa. The remote authentication method includes at least the following steps: First, the administrator or user uses a mobile device with network connection function (including: smart phone, i-PAD, notebook computer, desktop computer, etc.) After the authentication, the control command is issued in the cloud control access control management system, and then the control command is transmitted through the encrypted network transmission (eg, general network VPN, telecommunication network MDVPN, etc.). Return to the cloud control lock to make the corresponding action (such as: open the door).

綜上所述,本發明已明顯改善了習知門禁管理系統之各項缺失,以達其優點為: In summary, the present invention has significantly improved the various deficiencies of the conventional access control management system to achieve the following advantages:

(1)雲控鎖本身具有網路連線之功能,所以不需要連接管理者或使用者家中的網路線路或其他實體線路,亦無外接的控制主機盒,即可與雲端控制門禁管理系統連結;故不受限於網路位址(IP)、傳輸距離、實體線路及時間等因素,且不易被破壞、降低安裝成本(因其不需佈線),並提升其美觀性。 (1) The cloud control lock itself has the function of network connection, so there is no need to connect the network line or other physical lines in the manager or the user's home, and there is no external control host box, and the cloud control access control management system can be connected. Linked; therefore, it is not limited to network address (IP), transmission distance, physical line and time, etc., and is not easily damaged, reducing installation costs (because it does not need wiring), and enhances its aesthetics.

(2)除傳統網頁版本的管理系統外,因應近年來科技日新月異,如行動設備(含:智慧型手機、i-PAD...等)及網路電視之數位化興起,本發明已開發出多種媒體介面版本,讓管理者或使用者在應用上更節省時間,以達便利性。 (2) In addition to the management system of the traditional webpage version, the present invention has been developed in response to the rapid development of technology in recent years, such as the rise of mobile devices (including smart phones, i-PADs, etc.) and digital television. A variety of media interface versions allow administrators or users to save time and convenience in their applications.

(3)本發明之系統會主動讀取並儲存雲控鎖之門禁記錄,讓管理者及使用者隨時可查詢,且會主動以訊息通報,讓管理者隨時掌控雲控鎖之狀況,更可讓管理者及使用者自訂其需要的通報情境、通報方式與通報內容,讓其通報設定方式採多元化及人性化,以致不易出錯。 (3) The system of the present invention actively reads and stores the access control record of the cloud control lock, so that the administrator and the user can inquire at any time, and will actively inform the message, so that the manager can control the status of the cloud control lock at any time, and more Let managers and users customize the notification situation, notification method and notification content they need, so that their notification setting methods are diversified and humanized, so that it is not easy to make mistakes.

(4)本發明提供多種功能辨識方式,不受限於特定工具,可接受近距或遠端等多種認證方式,而遠端係使用加密式網路傳輸技術(如:一般網路VPN、電信網路MDVPN...等),故不需管理者及使用者負擔通話成本;本發明更可直接以系統擴充其他功能,提供管理者更多元化的方式,且可有效降低成本。 (4) The present invention provides multiple functional identification methods, which are not limited to specific tools, and can accept multiple authentication methods such as short-range or remote, while the remote system uses encrypted network transmission technologies (eg, general network VPN, telecommunications). The network MDVPN...etc.) does not require the administrator and the user to bear the cost of the call; the invention can directly expand other functions by the system, provide a more diversified management mode, and can effectively reduce the cost.

為達上述之目的、特徵及優點更能明顯易懂,如后以詳述實施例說明之。 The above objects, features and advantages will be more apparent and obvious, as described in the detailed description.

本發明之實施方式,首先,請參閱圖2所示,雲端控制門禁管理系統及其認證方法之架構圖,係包括:一行動設備101,具有網路連線功能(含:智慧型手機、i-PAD、筆記型電腦、桌上型電腦...等),係提供管理者10或使用者20操作雲端控制門禁管理系統50之一種工具; 一通訊設備102,可為手機、PDA、NB或PC等具有接收通報訊息(含:簡訊、電子郵件、語音、MSN、SKYPE...等)之裝置,用以通報指定之管理者10或使用者20;一功能辨識資料201,係指管理者10或使用者20之身份辨識資料,其功能包括生物特徵(如:視網膜、掌紋、指紋、聲音、影像分析),或為隨身之識別物(如:非接觸式感應、手機、磁卡及其他)等;一雲控鎖30,其中包含有:一功能辨識資料接收元件301用以接收管理者10或使用者20輸入之功能辨識資料201,一功能辨識資料有效名單302用以比對判斷接收之功能辨識資料201是否有效,此辨識結果存入一門禁記錄303;一加密式網路傳輸40,如:一般網路VPN、電信網路MDVPN...等;一雲端控制門禁管理系統50,其中包含有:一系統程式501及一資料庫502,其中系統程式501含一認證方法5011,其包括四個功能模組:一使用者模組a,其內分別為(a1)管理者及使用者的基本資料管理功能、(a2)多功能辨識資料管理功能、(a3)有效名單管理功能等組成,此模組主要負責儲存管理者10及使用者20的基本資料、功能辨識資料201及管理者10設定之有效名單;再經一權限系統模組b,其內分別為(b1)使用者與雲控鎖關聯管理功能及(b2)權限設定管理功能等組成,此模組負責管理者10或使用者20與雲控鎖30之關聯性及各項權限之設定;接著以一設備管理模組c,其內分別為(c1)雲控鎖基本資料管理功能及(c2)雲控鎖設定資料管理功能等組成,此模組負責管理雲控鎖30之基本資料描述與說明(如:MACID、安裝地點、硬體規格、設定檔...等);再以一虛擬運算模組d,其內分別為(d1)控制指令運算功能、(d2)雲控鎖資料交換功能及(d3)門禁記錄分析管理功能等組成,此模組負責將管理者10或使用者20輸入之資料或從雲控鎖30接收的資訊做運算判斷,並將運算結果傳送回雲控鎖30更新資訊或做出對應之動作(如:開門),再利用加密式網路傳輸40從雲控鎖30取回之門禁記錄303(含:文字記錄、影像...等)寫入資料庫502;再以一事件處理模組5012,其內分別為(1)事件分析功能及(2)訊息發送功能等組成, 此模組負責依管理者10或使用者20的通報設定與雲控鎖30的門禁記錄303進行分析,看是否需要執行通報(含:簡訊、電子郵件、語音、MSN、SKYPE...等)等;接著,在圖3所示,雲端控制門禁管理系統更新有效名單之運作流程圖,其步驟S1,管理者10用行動設備101透過加密式網路傳輸40連線至雲端控制門禁管理系統50,將其功能辨識資料201(含:磁卡、視網膜、掌紋、指紋、聲音、非接觸式感應、影像分析、手機)輸入。然後,步驟S2,雲端控制門禁管理系統50以使用者模組a接收管理者10輸入之資料,並連線至資料庫502,驗證管理者10是否具備管理權限;若為〝否〞,則無操作權限並結束流程,若為〝是〞,則執行步驟S3。接著,啟動設備管理模組b並連線至資料庫502,取得可控制的雲控鎖30清單。然後,進入步驟S4,管理者10選擇要控制的複數個雲控鎖30(如:1、2、3…N支)。接著,步驟S5,管理者10再進行編輯各雲控鎖30的有效名單,並將結果儲存至資料庫502。然後,步驟S6,運用虛擬運算模組d將各雲控鎖30的有效名單以加密式網路傳輸40更新至對應的雲控鎖30。最後,步驟S7,雲控鎖30接收到傳送之資料後,進行功能辨識資料更新有效名單302,以供後續使用者辨識之用,並結束本流程。然後,在圖4所示,雲端控制門禁管理系統近距認證方法之運作流程圖,步驟S1,雲控鎖30以功能辨識資料接收元件301接收管理者10或使用者20輸入的功能辨識資料201(含:磁卡、視網膜、掌紋、指紋、聲音、非接觸式感應、影像分析、手機)。然後,進入步驟S2,雲控鎖30將接收的功能辨識資料201與功能辨識資料有效名單302做比對;若為〝否〞,則退回步驟S3,鎖住雲控鎖30,以禁止使用者進入,並結束流程運作。若為〝是〞,即可執行步驟S4,雲控鎖30執行控制命令做出對應動作(如:開門)。接著,至步驟S5,雲控鎖30執行控制命令後,產生門禁記錄303,並將其透過加密式網路傳輸40,回傳至雲端控制門禁管理系統50。然後,進入步驟S6,雲端控制門禁管理系統50接收門禁記錄303,並進入虛擬運算模組d,經運算判斷是否正常;若為〝是〞,執行步驟S7,將門禁記錄303存入正常事件記錄, 及若為〝否〞,則執行步驟S8,則將門禁記錄303存入異常事件記錄後,進入步驟S9。接著,步驟S9,啟動事件處理模組5012,判斷該事件是否有需要進行訊息通報;若為〝否〞,則結束本流程運作,若為〝是〞,再執行步驟S10,雲端控制門禁管理系統50依管理者10或使用者20設定的方式及內容發出訊息通報(如:簡訊、電子郵件、語音、MSN、SKYPE...等)給管理者10,最後結束本流程。接著,在圖5所示,雲端控制門禁管理系統遠端認證方法之運作流程圖。首先,步驟S1,管理者10或使用者20利用行動設備101透過加密式網路傳輸40連線至雲端控制門禁管理系統50,將其功能辨識資料201(含:磁卡、視網膜、掌紋、指紋、聲音、非接觸式感應、影像分析、手機)輸入。然後,步驟S2,雲端控制門禁管理系統50啟動使用者模組a連線至資料庫502,驗證其輸入之功能辨識資料201是否有效;若為〝否〞,則執行步驟S3,鎖住雲控鎖30以禁止使用者20進入,並結束流程運作,若為〝是〞,進入步驟S4,啟動權限系統模組b,並連線至資料庫502,讀取管理者10或使用者20是否具備控制權限;若為〝否〞,則退回步驟S3,鎖住雲控鎖30以禁止使用者20進入,並結束流程運作。若為〝是〞,進行步驟S5,啟動設備管理模組c連線至資料庫502,取得可控制的複數個雲控鎖30資料(如:1、2、3...N筆資料),供管理者10或使用者20選擇要控制那一個雲控鎖30。接著,進入步驟S6,管理者10或使用者20選擇要控制的雲控鎖30後,再下達控制命令。然後,執行步驟S7,進入虛擬運算模組d,經運算比對後其結果是否符合有效;若為〝否〞,執行步驟S8,存入異常事件記錄;及若為〝是〞,則執行步驟S9,存入正常事件記錄。接著,進入步驟S10,將管理者10或使用者20操作之資訊透過加密式網路傳輸40至雲控鎖30。然後,進入步驟S11,雲控鎖30依雲端控制門禁管理系統50傳送之資訊執行動作(如:開門)後;接著,再進行步驟S12,啟動事件處理模組5012,判斷該事件是否有需要進行訊息通報;若為〝否〞,則結束本流程運作;若為〝是〞,進行步驟S13,雲端控制門禁管理系統50依管理者10或使用者20設定的方式及內容發出訊息通報(如:簡訊、電子郵件、語音、MSN、SKYPE...等)給管理者10,最 後結束本流程。然後,在參照圖6所示,雲端控制門禁管理系統更新有效名單之實施例示意圖,本實施例之運作方式為:管理者10以行動設備101透過加密式網路傳輸40連線至雲端控制門禁管理系統50,並登錄驗證資料至系統程式中,然後,以使用者模組a接收資訊並連結資料庫502,驗證身份合法性;若不通過該系統會告知身份驗證失敗的訊息,管理者無法進行管理;若通過則依權限系統模組b連結資料庫502驗證是否具備管理權限.若不通過權限驗證,系統會告知權限驗證失敗的訊息,管理者無法進行管理;若通過權限驗證,則再依設備管理模組c連結資料庫502,讀取可操作的複數個雲控鎖30(如:1、2、3…N支)提供管理者10管控,讓管理者10可對功能辨識有效名單進行編輯,接著以虛擬運算模組d進行運算,並將資料儲存回資料庫502,同時以加密式網路傳輸40方式連線至雲控鎖30,將資料回傳,更新其功能辨識有效名單302,協助管理者10有效進行管理。接著,在圖7所示,雲端控制門禁管理系統近距認證方法之實施例示意圖。本實施例之運作方式為:管理者10或使用者20將其功能辨識資料201(含:磁卡、視網膜、掌紋、指紋、聲音、非接觸式感應、影像分析、手機)直接透過雲控鎖30輸入,雲控鎖30以功能辨識資料接收元件301接收,接著,雲控鎖30將接收的功能辨識資料201與有效名單302做比對;若不符合,雲控鎖30維持鎖住狀態(如:門無動作),讓管理者10或使用者20無法進入;及若符合,則雲控鎖30執行控制命令做出對應動作(如:開門);接著,雲控鎖30會產生門禁記錄303,並透過加密式網路傳輸40回傳至雲端控制門禁管理系統50內,雲端控制門禁管理系統50以虛擬運算模組d接收門禁記錄303,並解析運算其內容是否正常,再儲存至資料庫502,接著,再啟動事件處理模組5012,執行該門禁記錄303是否有需要依管理者10或使用者20設定的方式進行訊息通報,(如:簡訊、電子郵件、語音、MSN、SKYPE...等),如有需要則自動發出訊息以通報管理者10或使用者20。最後,在圖8所示,雲端控制門禁管理系統遠端認證方法之實施例示意圖。本實施例之運作方式為:管理者10或使用者20以行動設備101 透過加密式網路傳輸40連線至雲端控制門禁管理系統50,將其功能辨識資料201(含:磁卡、視網膜、掌紋、指紋、聲音、非接觸式感應、影像分析、手機)輸入;然後,雲端控制門禁管理系統50以使用者模組a接收輸入之功能辨識資料201,並連線至資料庫502,驗證其是否合法;若不通過身份驗證者,系統告知身份辨識不合法,管理者10或使用者20無法通過身份認證,故雲控鎖30維持鎖住(如:門無動作),讓管理者10或使用者20無法進入;若通過身份驗證,則啟動權限系統模組b,並連線至資料庫502驗證是否具備控制權限;若不通過權限驗證,系統告知權限驗證不合法,管理者10或使用者20無法通過權限認證,故雲控鎖30維持鎖住(如:門無動作),讓管理者10或使用者20無法進入;若通過者權限驗證,再啟動設備管理模組c並連線至資料庫502,取得可控制的複數個雲控鎖30清單資料(如:1、2、3...N筆資料),提供管理者10或使用者20選擇要控制那一個雲控鎖30;接著,管理者10或使用者20下達控制命令;然後,進入虛擬運算模組d,經運算比對後其結果是否正常有效,並儲存事件記錄至資料庫502內;若為無效的異常事件,系統不會傳送控制指令至雲控鎖30,故雲控鎖30會鎖住,使管理者10或使用者20無法進入;若為正常有效的事件,則虛擬運算模組d會將資料透過加密式網路傳輸40回傳至雲控鎖30,雲控鎖30立即做出對應動作(如:開門),並產出門禁記錄303;其門禁記錄303也會自動回傳,並透過虛擬運算模組d解析;最後,連結至事件處理模組5012進行判斷是否有需要依管理者10或使用者20設定的方式進行訊息通報,(如:簡訊、電子郵件、語音、MSN、SKYPE...等),如有需要則自動發出訊息以通報管理者10或使用者20。 An embodiment of the present invention, first, referring to FIG. 2, the architecture diagram of the cloud control access control management system and the authentication method thereof includes: a mobile device 101 having a network connection function (including: a smart phone, i -PAD, notebook computer, desktop computer, etc.), which is a tool for the administrator 10 or the user 20 to operate the cloud control access control management system 50; A communication device 102 can be a device for receiving a notification message (including: SMS, email, voice, MSN, SKYPE, etc.) for a mobile phone, PDA, NB or PC, for notifying the designated administrator 10 or using 20; a function identification data 201 refers to the identification data of the manager 10 or the user 20, and the functions include biometrics (such as retina, palm print, fingerprint, sound, image analysis), or an identifier for the portable ( For example, a non-contact sensor, a mobile phone, a magnetic card, and the like; a cloud lock 30 includes: a function identification data receiving component 301 for receiving the function identification data 201 input by the manager 10 or the user 20, The function identification data valid list 302 is used for comparing whether the received function identification data 201 is valid, and the identification result is stored in an access control record 303; an encrypted network transmission 40, such as: general network VPN, telecommunication network MDVPN. A cloud control access control management system 50 includes a system program 501 and a database 502. The system program 501 includes an authentication method 5011, which includes four functional modules: a user module a. It is composed of (a1) basic data management functions of managers and users, (a2) multi-function identification data management function, and (a3) effective list management function. This module is mainly responsible for storage manager 10 and use. The basic information of the user 20, the function identification data 201, and the valid list set by the administrator 10; and after a permission system module b, respectively, (b1) the user and the cloud control lock association management function and (b2) the authority setting Management module, etc., this module is responsible for the association between the administrator 10 or the user 20 and the cloud control lock 30 and the setting of each authority; and then a device management module c, which is respectively (c1) cloud control lock Basic data management function and (c2) cloud control lock setting data management function, etc. This module is responsible for managing the basic data description and description of cloud control lock 30 (such as: MACID, installation location, hardware specification, configuration file... And then a virtual computing module d, which is composed of (d1) control command computing function, (d2) cloud lock data exchange function and (d3) access control record analysis management function, etc., this module is responsible for Manager 10 or user 20 input data or from cloud control 30 The received information is judged by the operation, and the operation result is transmitted back to the cloud control lock 30 to update the information or make a corresponding action (for example, opening the door), and then the encrypted access network 40 is used to retrieve the access control record from the cloud control lock 30. 303 (including: text record, image, etc.) is written into the database 502; and an event processing module 5012 is further composed of (1) an event analysis function and (2) a message transmission function. This module is responsible for analyzing the access control record 303 of the cloud control lock 30 according to the notification setting of the administrator 10 or the user 20 to see if the notification needs to be performed (including: newsletter, email, voice, MSN, SKYPE, etc.) Then, as shown in FIG. 3, the cloud control access control management system updates the active list operation flowchart. In step S1, the administrator 10 connects the mobile device 101 to the cloud control access control management system 50 via the encrypted network transmission 40. , input its function identification data 201 (including: magnetic card, retina, palm print, fingerprint, sound, non-contact sensing, image analysis, mobile phone). Then, in step S2, the cloud control access control management system 50 receives the data input by the administrator 10 from the user module a, and connects to the database 502 to verify whether the manager 10 has the management authority; if not, the The operation authority is terminated and the process is terminated. If yes, step S3 is performed. Next, the device management module b is activated and connected to the database 502 to obtain a list of controllable cloud locks 30. Then, proceeding to step S4, the manager 10 selects a plurality of cloud locks 30 (e.g., 1, 2, 3, ... N) to be controlled. Next, in step S5, the manager 10 further edits the valid list of each cloud lock 30 and stores the result in the database 502. Then, in step S6, the virtual operation module d is used to update the effective list of each cloud lock 30 to the corresponding cloud lock 30 in the encrypted network transmission 40. Finally, in step S7, after receiving the transmitted data, the cloud control lock 30 performs a function identification data update valid list 302 for subsequent user identification, and ends the process. Then, as shown in FIG. 4, the cloud control access control system close-up authentication method operation flowchart, in step S1, the cloud control lock 30 receives the function identification data 201 input by the manager 10 or the user 20 by the function identification data receiving component 301. (Including: magnetic card, retina, palm print, fingerprint, sound, non-contact sensing, image analysis, mobile phone). Then, proceeding to step S2, the cloud control lock 30 compares the received function identification data 201 with the function identification data valid list 302; if not, returns to step S3, and locks the cloud control lock 30 to prohibit the user. Enter and end the process. If 〝 is 〞, step S4 can be performed, and the cloud control lock 30 executes a control command to perform a corresponding action (eg, opening a door). Next, to step S5, after the cloud control lock 30 executes the control command, the access control record 303 is generated and transmitted to the cloud control access control management system 50 via the encrypted network transmission 40. Then, proceeding to step S6, the cloud control access control management system 50 receives the access control record 303, and enters the virtual operation module d, and determines whether it is normal through operation; if yes, YES, step S7 is performed, and the access control record 303 is stored in the normal event record. , If yes, if step S8 is executed, the access control record 303 is stored in the abnormal event record, and the process proceeds to step S9. Next, in step S9, the event processing module 5012 is started to determine whether the event needs to be notified; if not, the process is ended. If yes, then step S10 is executed, and the cloud control access control system is executed. 50 Send a message (such as: newsletter, email, voice, MSN, SKYPE, etc.) to the manager 10 according to the mode and content set by the manager 10 or the user 20, and finally end the process. Next, in FIG. 5, a flow chart of the operation of the remote authentication method of the cloud control access control management system is shown. First, in step S1, the administrator 10 or the user 20 uses the mobile device 101 to connect to the cloud control access control management system 50 through the encrypted network transmission 40, and the function identification data 201 (including: magnetic card, retina, palm print, fingerprint, Sound, non-contact sensing, image analysis, mobile phone) input. Then, in step S2, the cloud control access control management system 50 activates the user module a to connect to the database 502, and verifies whether the input function identification data 201 is valid; if not, step S3 is performed to lock the cloud control. The lock 30 prohibits the user 20 from entering, and ends the process operation. If yes, the process proceeds to step S4, the permission system module b is activated, and the data is connected to the database 502, and the read manager 10 or the user 20 is provided. Control authority; if not, return to step S3, lock the cloud lock 30 to prohibit the user 20 from entering, and end the process operation. If yes, proceed to step S5, and the device management module c is connected to the database 502 to obtain a plurality of controllable cloud control locks 30 (eg, 1, 2, 3...N data). The manager 10 or user 20 selects which cloud lock 30 to control. Next, proceeding to step S6, the manager 10 or the user 20 selects the cloud lock 30 to be controlled, and then issues a control command. Then, step S7 is executed to enter the virtual operation module d, and the result is valid after the operation comparison; if not, step S8 is performed, and the abnormal event record is stored; and if yes, the step is executed. S9, stored in the normal event record. Next, proceeding to step S10, the information operated by the administrator 10 or the user 20 is transmitted 40 to the cloud control lock 30 through the encrypted network. Then, the process proceeds to step S11, and the cloud control lock 30 performs the action (such as opening the door) according to the information transmitted by the cloud control access control management system 50. Then, step S12 is performed to start the event processing module 5012 to determine whether the event needs to be performed. If the message is not 〞, the process is terminated; if yes, step S13 is performed, and the cloud control access control system 50 sends a message according to the mode and content set by the manager 10 or the user 20 (eg: Newsletter, email, voice, MSN, SKYPE...etc) to manager 10, most After this process ends. Then, referring to FIG. 6, the cloud control access control management system updates the effective list. The operation mode of the embodiment is: the administrator 10 connects the mobile device 101 through the encrypted network transmission 40 to the cloud control access control. The management system 50 manages the data to the system program, and then receives the information from the user module a and links the database 502 to verify the identity of the identity; if the system fails to notify the authentication failure message, the administrator cannot Management; if passed, the permission system module b is linked to the database 502 to verify whether it has management rights. If the authorization verification is not passed, the system will notify the permission verification failure message, and the administrator cannot manage it; if the authorization verification is passed, the device management module c is connected to the database 502 to read a plurality of operable cloud control locks 30. (For example, 1, 2, 3...N) provides management 10 control, allowing the administrator 10 to edit the effective list of function identifications, then perform operations with the virtual computing module d, and store the data back to the database 502. At the same time, the encrypted network transmission 40 is connected to the cloud control lock 30, and the data is returned, and the function identification effective list 302 is updated to assist the administrator 10 to effectively manage. Next, in FIG. 7, a schematic diagram of an embodiment of a cloud-based access control management system proximity authentication method is shown. The operation mode of the embodiment is: the administrator 10 or the user 20 directly passes the function identification data 201 (including: magnetic card, retina, palm print, fingerprint, sound, non-contact sensing, image analysis, mobile phone) directly through the cloud control lock 30 Input, the cloud control lock 30 is received by the function identification data receiving component 301. Then, the cloud control lock 30 compares the received function identification data 201 with the valid list 302; if not, the cloud control lock 30 maintains the locked state (eg, : the door has no action), so that the manager 10 or the user 20 cannot enter; and if so, the cloud lock 30 executes a control command to perform a corresponding action (eg, opening the door); then, the cloud lock 30 generates an access control record 303. And transmitting the encrypted network transmission 40 back to the cloud control access control management system 50, and the cloud control access control management system 50 receives the access control record 303 by using the virtual operation module d, and parses and calculates whether the content is normal, and then stores the data in the database. 502. Then, the event processing module 5012 is restarted, and whether the access control record 303 needs to be notified according to the manner set by the administrator 10 or the user 20 (eg, newsletter, email, voice) MSN, SKYPE ..., etc.), if necessary automatically sent a message to inform the user manager 10 or 20. Finally, in FIG. 8, a schematic diagram of an embodiment of a remote authentication method for the cloud control access control management system is shown. The operation mode of this embodiment is: the administrator 10 or the user 20 takes the mobile device 101 The encrypted network transmission 40 is connected to the cloud control access control management system 50, and its function identification data 201 (including: magnetic card, retina, palm print, fingerprint, sound, non-contact sensing, image analysis, mobile phone) is input; then, The cloud control access control management system 50 receives the input function identification data 201 from the user module a, and connects to the data base 502 to verify whether it is legal; if not, the system informs that the identity identification is illegal, and the administrator 10 Or the user 20 cannot pass the identity authentication, so the cloud control lock 30 remains locked (eg, the door has no action), so that the administrator 10 or the user 20 cannot enter; if the authentication is performed, the permission system module b is activated, and Connect to the database 502 to verify whether there is control authority; if the authority verification is not passed, the system informs that the authority verification is illegal, and the administrator 10 or the user 20 cannot pass the authority authentication, so the cloud control lock 30 remains locked (eg, the door is not Action), the administrator 10 or the user 20 cannot enter; if the pass authority is verified, the device management module c is restarted and connected to the database 502 to obtain a plurality of controllable clouds. The lock 30 list data (eg, 1, 2, 3...N pen data), provides the manager 10 or the user 20 to select which cloud lock 30 to control; then, the manager 10 or the user 20 issues a control command Then, the virtual computing module d is entered, and the result is normal after the operation comparison, and the event record is stored in the database 502; if it is an invalid abnormal event, the system does not transmit the control command to the cloud lock 30. Therefore, the cloud control lock 30 will be locked, so that the administrator 10 or the user 20 cannot enter; if it is a normally valid event, the virtual computing module d will transmit the data back to the cloud control lock 30 through the encrypted network transmission 40. The cloud control lock 30 immediately responds (for example, opens the door) and generates the access control record 303; the access control record 303 is also automatically returned and parsed through the virtual computing module d; finally, the event processing module is connected. 5012 determines whether there is a need to notify the message according to the mode set by the administrator 10 or the user 20 (eg, newsletter, email, voice, MSN, SKYPE, etc.), and automatically sends a message to notify the management if necessary. 10 or user 20.

綜合以上所述,本發明已清楚揭露雲端控制門禁管理系統及其認證方法之實施例。只要是將功能辨識資料儲存於系統的資料庫中或雲控鎖中,並透過無線網路傳輸方式使得系統及雲控鎖可進行資訊交換認證者,皆不脫離本發明之技術範圍,然其並非用以限定本發明。本發明所屬技術領域中具有通常知識者,在不脫離本發明之精神和範圍內,當可作各種之更動與潤飾。因此,本發明之保護範圍當視後附之申請專利範圍所界定者為準。 In summary, the present invention has clearly disclosed embodiments of the cloud control access control management system and its authentication method. As long as the function identification data is stored in the database of the system or in the cloud lock, and the system and the cloud lock can be authenticated by the wireless network transmission, the technical scope of the present invention is not deviated from It is not intended to limit the invention. A person skilled in the art can make various changes and modifications without departing from the spirit and scope of the invention. Therefore, the scope of the invention is defined by the scope of the appended claims.

10‧‧‧管理者 10‧‧‧Manager

101‧‧‧行動設備 101‧‧‧Mobile equipment

102‧‧‧通訊設備 102‧‧‧Communication equipment

20‧‧‧使用者 20‧‧‧Users

201‧‧‧功能辨識資料 201‧‧‧Function identification data

30‧‧‧雲控鎖 30‧‧‧Cloud lock

301‧‧‧功能辨識資料接收元件 301‧‧‧Function identification data receiving component

302‧‧‧功能辨識資料有效名單 302‧‧‧Valid list of functional identification data

303‧‧‧門禁記錄 303‧‧‧Access records

40‧‧‧加密式網路傳輸 40‧‧‧Encrypted network transmission

50‧‧‧雲端控制門禁管理系統 50‧‧‧Cloud Control Access Control Management System

501‧‧‧系統程式 501‧‧‧ system program

5011‧‧‧認證方法 5011‧‧‧ Certification method

a‧‧‧使用者模組 A‧‧‧user module

b‧‧‧權限系統模組 b‧‧‧Permission System Module

c‧‧‧設備管理模組 c‧‧‧Device Management Module

d‧‧‧虛擬運算模組 D‧‧‧Virtual Computing Module

5012‧‧‧事件處理模組 5012‧‧‧Event Processing Module

502‧‧‧資料庫 502‧‧‧Database

圖一 習知門禁管理系統示意圖 Figure 1 Schematic diagram of the conventional access control management system

圖二 雲端控制門禁管理系統及其認證方法之架構圖 Figure 2 Architecture diagram of cloud-controlled access control management system and its authentication method

圖三 雲端控制門禁管理系統更新有效名單之運作流程圖 Figure III Operation flow chart of the cloud-controlled access control management system update effective list

圖四 雲端控制門禁管理系統近距認證方法之運作流程圖 Figure 4 Operation flow chart of the proximity authentication method of the cloud control access control management system

圖五 雲端控制門禁管理系統遠端認證方法之運作流程圖 Figure 5 Operation flow chart of the remote authentication method of the cloud control access control management system

圖六 雲端控制門禁管理系統更新有效名單之實施例示意圖 Figure 6 Schematic diagram of an example of a valid list of cloud-controlled access control management systems

圖七 雲端控制門禁管理系統近距認證方法之實施例示意圖 Figure 7 Schematic diagram of an embodiment of the proximity authentication method for the cloud-controlled access control management system

圖八 雲端控制門禁管理系統遠端認證方法之實施例示意圖 Figure 8 Schematic diagram of an embodiment of a remote authentication method for a cloud-controlled access control management system

10‧‧‧管理者 10‧‧‧Manager

101‧‧‧行動設備 101‧‧‧Mobile equipment

102‧‧‧通訊設備 102‧‧‧Communication equipment

20‧‧‧使用者 20‧‧‧Users

201‧‧‧功能辨識資料 201‧‧‧Function identification data

30‧‧‧雲控鎖 30‧‧‧Cloud lock

301‧‧‧功能辨識資料接收元件 301‧‧‧Function identification data receiving component

302‧‧‧功能辨識資料有效名單 302‧‧‧Valid list of functional identification data

303‧‧‧門禁記錄 303‧‧‧Access records

40‧‧‧加密式網路傳輸 40‧‧‧Encrypted network transmission

50‧‧‧雲端控制門禁管理系統 50‧‧‧Cloud Control Access Control Management System

501‧‧‧系統程式 501‧‧‧ system program

5011‧‧‧認證方法 5011‧‧‧ Certification method

a‧‧‧使用者模組 A‧‧‧user module

b‧‧‧權限系統模組 b‧‧‧Permission System Module

c‧‧‧設備管理模組 c‧‧‧Device Management Module

d‧‧‧虛擬運算模組 D‧‧‧Virtual Computing Module

5012‧‧‧事件處理模組 5012‧‧‧Event Processing Module

502‧‧‧資料庫 502‧‧‧Database

Claims (4)

一種雲端控制門禁管理系統,至少包括:一系統程式,為進行程式運算並提供多功能管理介面之用,其中包含五個功能模組:一使用者模組a,係至少具有:(a1)管理者及使用者的基本資料管理功能、(a2)多功能辨識資料管理功能及(a3)有效名單管理功能等組合而成,本模組主要負責儲存管理者及使用者的基本資料、功能辨識資料及管理者設定之有效名單;一權限系統模組b,係至少具有:(b1)使用者與雲控鎖關聯管理功能及(b2)權限設定管理功能,本模組主要負責控制管理者或使用者與雲控鎖之間關聯性及各項權限設定;一設備管理模組c,係至少具有:(c1)雲控鎖基本資料管理功能及(c2)雲控鎖設定資料管理功能,本模組主要負責管理雲控鎖之基本資料描述與說明;一虛擬運算模組d,係至少具有:(d1)控制指令運算功能、(d2)雲控鎖資料交換功能及(d3)門禁記錄分析管理功能,本模組主要負責將管理者或使用者輸入之資料或從至少一或複數個雲控鎖接收的資訊做運算判斷,並將運算結果傳送回至少一或複數個雲控鎖更新資訊或做出對應之動作,再利用一加密式網路傳輸從至少一或複數個雲控鎖上取回之門禁記錄儲存至資料庫中;一事件處理模組,係至少具有:(1)事件分析功能及(2)訊息發送功能,本模組主要負責管理者或使用者的通報設定與至少一或複數個雲控鎖的一門禁記錄進行分析,決定是否需要執行通報。 A cloud-controlled access control management system includes at least: a system program for performing program operations and providing a multi-function management interface, comprising five functional modules: a user module a having at least: (a1) management The basic data management function of the user and the user, (a2) multi-function identification data management function and (a3) effective list management function are combined. This module is mainly responsible for storing basic data and function identification data of managers and users. And a valid list set by the administrator; a permission system module b has at least: (b1) user and cloud control lock management function and (b2) authority setting management function, the module is mainly responsible for controlling the manager or using Correlation between the owner and the cloud control lock and various permission settings; a device management module c has at least: (c1) cloud control lock basic data management function and (c2) cloud control lock setting data management function, the model The group is mainly responsible for managing the basic data description and description of the cloud control lock; a virtual operation module d has at least: (d1) control command operation function, (d2) cloud lock data exchange function and (d3) access control Analysis management function, this module is mainly responsible for calculating the information input by the administrator or the user or the information received from at least one or a plurality of cloud control locks, and transmitting the operation result back to at least one or a plurality of cloud control lock updates. The information or the corresponding action, and then using an encrypted network transmission to retrieve the access control record retrieved from at least one or more cloud control locks into the database; an event processing module has at least: (1) The event analysis function and (2) the message sending function, the module is mainly responsible for analyzing the notification setting of the manager or the user and an access control record of at least one or a plurality of cloud control locks, and determining whether the notification needs to be performed. 如申請專利範圍第1項所述之雲端控制門禁管理系統,其內含至少一資料庫,為儲存各項管理資訊及多功能辨識資料,當各功能模組有需要判斷驗證資料或是讀取、儲存時,可隨時與資料庫連結進行資訊之交換。 For example, the cloud control access control management system described in claim 1 includes at least one database for storing various management information and multifunctional identification data, and each function module needs to judge verification data or read At the time of storage, the information can be exchanged at any time with the database. 一種雲端控制門禁近距認證方法,係提供管理者或使用者直接透過雲 控鎖輸入功能辨識資料進行認證,及提供管理者更新有效名單以供認證之用,該方法至少包括:一功能辨識資料,為具備管理者或使用者之身份辨識資料,其可為本身具有之生物特徵(如:視網膜、掌紋、指紋、聲音、影像分析),或為隨身之識別物(如:非接觸式感應、手機、磁卡)等;一雲控鎖,為具備通訊功能之門禁控制裝置,其又包含:一功能辨識資料接收元件、一功能辨識資料有效名單及一門禁記錄;一雲端控制門禁管理系統,提供管理者管理有效名單,並將有效名單傳送至雲控鎖進行更新,及取回雲控鎖之門禁記錄進行訊息通報判斷之用,其內容包含申請專利範圍第1項及第2項所述。 A cloud-controlled access control proximity authentication method, which provides a manager or a user directly through the cloud The lock input function identifies the data for authentication, and provides the manager to update the valid list for authentication. The method includes at least: a function identification data, which is an identification data of a manager or a user, which may have its own Biological characteristics (such as: retina, palm print, fingerprint, sound, image analysis), or portable identification (such as: non-contact sensing, mobile phones, magnetic cards); a cloud lock, for access control devices with communication functions The method further comprises: a function identification data receiving component, a function identification data effective list and an access control record; a cloud control access control management system, providing a management effective list, and transmitting the valid list to the cloud control lock for updating, and Retrieve the access control record of the cloud control lock for the purpose of message notification and judgment, and the content thereof includes the first and second items of the patent application scope. 一種雲端控制門禁遠端認證方法,用以提供管理者或使用者使用行動設備輸入多功能辨識資料,再透過加密式網路傳輸至雲端控制門禁管理系統進行認證,進而控制雲控鎖之方法,其至少包括:一通訊設備,為具備網路連線功能之通訊設備(含:智慧型手機、i-PAD、筆記型電腦、桌上型電腦...等);一功能辨識資料,為具備管理者或使用者之身份辨識資料,其可為本身具有之生物特徵(如:視網膜、掌紋、指紋、聲音、影像分析),或為隨身之識別物(如:非接觸式感應、手機、磁卡)等;一雲控鎖,為具備通訊功能之門禁控制裝置,其又包含:一功能辨識資料接收元件、一功能辨識資料有效名單及一門禁記錄;一雲端控制門禁管理系統,提供管理者或使用者輸入功能辨識資料及控制命令,其進行運算,與雲控鎖連結使其做出對應動作(如:開門),其內容包含申請專利範圍第1項及第2項所述。 A cloud-controlled access control remote authentication method for providing a method for a manager or a user to input a multi-function identification data by using a mobile device, and then transmitting it to a cloud-controlled access control management system through an encrypted network, thereby controlling the cloud control lock. The device includes at least: a communication device, which is a communication device with a network connection function (including: a smart phone, an i-PAD, a notebook computer, a desktop computer, etc.); a function identification data is provided Identification data of the administrator or user, which can be biological features (such as: retina, palm print, fingerprint, sound, image analysis), or portable identification (such as non-contact sensing, mobile phone, magnetic card) a cloud control lock, which is a communication control access control device, which further includes: a function identification data receiving component, a function identification data effective list and an access control record; a cloud control access control management system, providing a manager or The user inputs the function identification data and the control command, and performs calculations, and is connected with the cloud control lock to make corresponding actions (eg, opening the door), and the content package thereof Contains the first and second items of the patent application scope.
TW101125619A 2012-07-17 2012-07-17 Cloud control the access control management system and the authentication method TW201349133A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
TW101125619A TW201349133A (en) 2012-07-17 2012-07-17 Cloud control the access control management system and the authentication method
CN201310242827.9A CN103544749B (en) 2012-07-17 2013-06-19 Cloud control access control management system and authentication method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW101125619A TW201349133A (en) 2012-07-17 2012-07-17 Cloud control the access control management system and the authentication method

Publications (1)

Publication Number Publication Date
TW201349133A true TW201349133A (en) 2013-12-01

Family

ID=49968167

Family Applications (1)

Application Number Title Priority Date Filing Date
TW101125619A TW201349133A (en) 2012-07-17 2012-07-17 Cloud control the access control management system and the authentication method

Country Status (2)

Country Link
CN (1) CN103544749B (en)
TW (1) TW201349133A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105405195A (en) * 2015-12-15 2016-03-16 上海仪电(集团)有限公司 Intelligent access control management device and multi-system collaborative access control system

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104135480A (en) * 2014-08-05 2014-11-05 上海众人科技有限公司 Entrance guard authorization system and entrance guard authorization method
CN104167040B (en) * 2014-09-02 2016-11-02 深圳攀多物联科技有限公司 The long-range control method of a kind of electronic lock and system
CN104574587A (en) * 2014-12-09 2015-04-29 西安百利信息科技有限公司 Intelligent lock system and method for realizing remote control
CN105205892A (en) * 2015-10-08 2015-12-30 广东欧珀移动通信有限公司 Door access control method and system
CN105577805A (en) * 2015-12-29 2016-05-11 宁波艾谱实业有限公司 Remote control method of safe box and control system for realizing the method
US9619952B1 (en) * 2016-02-16 2017-04-11 Honeywell International Inc. Systems and methods of preventing access to users of an access control system
CN106228642A (en) * 2016-07-15 2016-12-14 颜芳俊 A kind of intelligent door lock system and control method thereof
CN106447876A (en) * 2016-11-24 2017-02-22 上海阜华信息技术有限公司 Cross connecting cabinet cloud control access management system and authentication method thereof
WO2023127040A1 (en) 2021-12-27 2023-07-06 東芝三菱電機産業システム株式会社 Scada web hmi client device and scada web hmi system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4752436B2 (en) * 2005-10-07 2011-08-17 パナソニック電工株式会社 Cooperation control apparatus and network management system
CN101059878A (en) * 2007-05-14 2007-10-24 杭州中正生物认证技术有限公司 Secondary door access system adopting biological character identification technology and control method
CN102096957A (en) * 2011-03-25 2011-06-15 南京仙朗科技发展有限公司 Access control management system and configuration method thereof
CN102497531A (en) * 2011-11-21 2012-06-13 上海凯卓信息科技有限公司 Human face recognition wireless video monitoring system based on cloud computing platform
CN102393980B (en) * 2011-12-14 2014-09-24 杭州市公安局拱墅区分局 Intelligent door control system
CN102561826B (en) * 2012-03-07 2014-02-19 南京物联传感技术有限公司 Wireless cloud intelligence lock and working method thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105405195A (en) * 2015-12-15 2016-03-16 上海仪电(集团)有限公司 Intelligent access control management device and multi-system collaborative access control system
CN105405195B (en) * 2015-12-15 2018-06-19 上海仪电(集团)有限公司 Intelligent entrance guard managing device and the access control system of multisystem collaboration

Also Published As

Publication number Publication date
CN103544749A (en) 2014-01-29
CN103544749B (en) 2016-05-25

Similar Documents

Publication Publication Date Title
TW201349133A (en) Cloud control the access control management system and the authentication method
KR101829018B1 (en) Digital doorlock system
US20170169698A1 (en) Integrated physical and logical security management via a portable device
CN103400067B (en) Right management method, system and server
US20220203933A1 (en) Method for Authenticating Identity of Digital Key, Terminal Device, and Medium
US20150095989A1 (en) Managing sharing of wireless network login passwords
CN104157029A (en) Access control system, mobile terminal based control method thereof and mobile terminal
US20090228962A1 (en) Access control and access tracking for remote front panel
US11677696B2 (en) Architecture for performing action in a third-party service by an email client
JP2009528582A (en) Wireless authentication
CN106462179A (en) Portable computing device access
US10582005B2 (en) Architecture for performing actions in a third-party service by an email client
US9218462B2 (en) Authentication using lights-out management credentials
CN102567667A (en) Intelligent information equipment and operation system thereof
CN110457890A (en) Right management method and device, electronic equipment and storage medium based on multisystem
CN109660514A (en) A kind of implementation method of smart machine system, smart machine control method and system
CN111478894B (en) External user authorization method, device, equipment and readable storage medium
CN103020542A (en) Technology for storing secret information for global data center
WO2015014173A1 (en) Method, device and system for automatically locking service offline
JP2008294502A (en) Access control system
CN101382983A (en) Programmable control mode for powering authority for on-line computer
JP6071109B2 (en) Portable terminal device and program
CN104054315A (en) Secure information access over network
JP6311804B2 (en) Terminal device and program
TWI468979B (en) System and method for integrating access control and information facilities