WO2010127563A1 - 一种门禁系统及合法用户远程遥控开锁的方法 - Google Patents

一种门禁系统及合法用户远程遥控开锁的方法 Download PDF

Info

Publication number
WO2010127563A1
WO2010127563A1 PCT/CN2010/070029 CN2010070029W WO2010127563A1 WO 2010127563 A1 WO2010127563 A1 WO 2010127563A1 CN 2010070029 W CN2010070029 W CN 2010070029W WO 2010127563 A1 WO2010127563 A1 WO 2010127563A1
Authority
WO
WIPO (PCT)
Prior art keywords
control device
authentication
terminal
lock control
authenticated
Prior art date
Application number
PCT/CN2010/070029
Other languages
English (en)
French (fr)
Inventor
蔡成亮
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to EP10771966.8A priority Critical patent/EP2428937A4/en
Priority to US13/258,582 priority patent/US8933777B2/en
Publication of WO2010127563A1 publication Critical patent/WO2010127563A1/zh

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/0042Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
    • G07C2009/00476Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically
    • G07C2009/005Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically whereby the code is a random code

Definitions

  • the present invention relates to a wireless terminal technology, and in particular, to a door access system and a method for remote remote unlocking by a legitimate user. Background technique
  • some of the current access control systems transmit card information, fingerprint information, etc. to the access control system by means of an ic card, password or fingerprint, etc., and the software determines whether the request entrant is legitimate by comparison. This means that only legitimate users with the above authorization information can enter the building through the authentication of the access control system.
  • the technical problem to be solved by the present invention is to provide a method for remote access and unlocking of an access control system and a legitimate user, so as to overcome the defect that a legitimate user cannot open a door for a visitor who is allowed to enter but does not have permission to enter when the legal user is not in the house.
  • the present invention provides an access control system, including a lock control device, an authentication terminal, and a terminal to be authenticated, wherein
  • the authentication terminal is configured to send the identity information of the user to the lock control device for authentication, and is further configured to generate a random authorization code after receiving the authentication pass message replied by the lock control device. Do not send to the terminal to be authenticated and the lock control device;
  • the lock control device stores the identity information of the legal user; the user is used to authenticate the identity information sent by the authentication terminal, and replies to the authentication terminal with the authentication pass message after the authentication is passed; After receiving the random authorization code, the terminal is interconnected with the to-be-authenticated terminal, and it is determined that the random 4 authorized codes of the two are unlocked;
  • the to-be-authenticated terminal is configured to save the received random authorization code, and is further configured to perform interworking between the random authorization code and the lock control device.
  • the identity information sent by the authentication terminal to the lock control device is identification information of the authentication terminal, or user name and password information input by a user who uses the authentication terminal.
  • the lock control device further stores standard voice information of all legal users; the lock control device is further configured to: after confirming that the identity information is legal according to the identity information sent by the authentication terminal, the legal The standard voice information corresponding to the user is sent to the authentication terminal, and the received voice information sent by the authentication terminal is compared with the standard voice information, and it is determined that the two are from the same person, and then the authentication terminal is Responding to the authentication pass message; the authentication terminal is further configured to: after receiving the standard voice information sent by the lock control device, prompting the user to repeat; and further, sending the voice information repeated by the user to the lock control Device.
  • lock control device is further configured to delete or invalidate the random authorization code saved by itself after unlocking.
  • the lock control device includes: a wireless transceiver module, a storage module, an authentication module, an interworking module, and an electromagnetic lock;
  • the storage module is configured to save identity information of all legal users
  • the wireless transceiver module is configured to receive the identity information sent by the authentication terminal, and is further configured to send the authentication pass message sent by the authentication module to the authentication terminal, and is further configured to receive the random authorization code and send the identifier
  • the interworking module ;
  • the authentication module is configured to: according to identity information of a legal user saved in the storage module The received identity information is authenticated, and the authentication pass message is sent to the wireless transceiver module after the authentication is passed;
  • the interworking module is configured to interwork the received random authorization code with the to-be-authenticated terminal, and determine that the random authorization codes of the two are consistent to indicate that the electromagnetic lock is unlocked.
  • the present invention also provides an access control system, including a lock control device, an authentication terminal, and a terminal to be authenticated; the authentication terminal and the lock control device store the same 4 authorized code;
  • the authentication terminal sends the 4 authorized code to the to-be-authenticated terminal;
  • the lock control device is configured to communicate with the terminal to be authenticated, and determine that the authorization codes of the two are consistent;
  • the to-be-authenticated terminal is configured to save the received authorization code, and is further configured to perform interworking between the authorization code and the lock control device.
  • the invention also provides a method for remotely unlocking a remote user by a legitimate user, the method comprising: the legal user using the authentication terminal to send the identity information of the user to the lock control device for authentication;
  • the lock control device authenticates the identity information sent by the authentication terminal, and returns an authentication pass message to the authentication terminal after the authentication is passed;
  • the authentication terminal After receiving the authentication pass message returned by the lock control device, the authentication terminal generates a random authorization code, and sends the random authorization code to the terminal to be authenticated and the lock control device respectively;
  • the lock control device After receiving the random authorization code, the lock control device communicates with the terminal to be authenticated, and determines that the random authorization codes of the two are unlocked.
  • the identity information is identity information of the authentication terminal, or user name and password information input by using the legal user.
  • the lock control device also stores standard voice information of all legal users; the lock control device authenticates the identity information sent by the authentication terminal, and returns the authentication pass message to the authentication terminal after the authentication is passed, specifically including : After the lock control device confirms that the identity information is legal according to the identity information sent by the authentication terminal, the standard voice information corresponding to the legal user is sent to the authentication terminal;
  • the authentication terminal After receiving the standard voice information sent by the lock control device, the authentication terminal prompts the user to repeat, and sends the voice information repeated by the user to the lock control device;
  • the lock control device compares the received voice information sent by the authentication terminal with the standard voice information, and if it is determined that the two are from the same person, the authentication pass message is replied to the authentication terminal.
  • the method further includes: after unlocking, the lock control device deletes or invalidates the saved random authorization code.
  • the invention also provides a method for remote unlocking of a legitimate user, comprising:
  • the legal user saves the same authorization code in the authentication terminal and the lock control device
  • the authentication terminal sends the authorization code to the terminal to be authenticated
  • the lock control device communicates with the terminal to be authenticated, and determines that the authorization codes of the two are the same, and the lock control device is unlocked.
  • a legitimate user can open the door by remote control, allowing a person who allows and does not have the right to open the door to enter.
  • the authentication terminal and the lock control device communicate using the wireless network, no wiring is required when the access control system is installed, and no cost is incurred due to an increase in legitimate users.
  • FIG. 1 is a structural block diagram of an access control system according to an embodiment of the present invention.
  • FIG. 2 is a flowchart of a method for remotely unlocking a legal user by a legitimate user according to an embodiment of the present invention. detailed description
  • the invention provides an access control system, which is applied to a situation in which a legitimate user remotely controls unlocking.
  • the access control system includes: an authentication terminal 10, a terminal to be authenticated 20, and a lock control device 30. among them,
  • the authentication terminal 10 is configured to send its own identity information to the lock control device 30 for authentication, and is further configured to generate a random authorization code and send it to the terminal to be authenticated 20 after receiving the authentication pass message replied by the lock control device 30. And the lock device 30.
  • the lock control device 30 stores the identity information of the legitimate user, which is used to authenticate the identity information sent by the authentication terminal 10, and returns an authentication pass message to the authentication terminal 10 after the authentication is passed; After the authorization code is communicated with the terminal 10 to be authenticated, it is determined that the random authorization codes of the two are the same, and the lock is unlocked.
  • the interworking between the lock control device 30 and the terminal to be authenticated is limited by the distance.
  • the distance range between the terminal 10 to be authenticated and the lock control device 30 can be set according to the needs of the actual application, such as a distance of 2 meters.
  • the lock control device 30 and the terminal 10 to be authenticated can communicate with each other. Since the distance is relatively close, the intercommunication is referred to as close-range intercommunication.
  • the terminal to be authenticated 20 is configured to save the received random authorization code, and is also used for performing close-range intercommunication with the random control code by the lock control device 30.
  • the identity information sent by the authentication terminal 10 to the lockup device 30 may be the identifier (such as number) information of the authentication terminal 10, or may be the username and password information input by the user using the authentication terminal 10.
  • the standard voice information of all legal users is also stored in the lock control device 30.
  • the lock control device 30 can also be used to confirm the identity information according to the identity information sent by the authentication terminal 10, and corresponding to the legal user.
  • the standard voice information is sent to the authentication terminal 10, and the received voice information sent by the authentication terminal 10 is compared with the standard voice information, and it is determined that the two are from the same person, and then the authentication terminal 10 is returned to the authentication terminal 10.
  • the authentication terminal 10 is configured to prompt the user to repeat after receiving the standard voice information sent by the lock control device 30, and is also used to send the voice information repeated by the user to the lock control device 30.
  • the lock control device 30 is further configured to delete or invalidate the random 4 authorized code on the lock after the unlocking, to prevent the user holding the random authorization code from entering and leaving at random, further ensuring the security of the access control system. .
  • the lock control device 30 includes: a storage module 31, a wireless transceiver module 32, an authentication module 33, an interworking module 34, and an electromagnetic lock 35, wherein:
  • the storage module 31 is configured to save identity information of all legitimate users
  • the wireless transceiver module 32 is configured to receive the identity information sent by the authentication terminal 10, and is further configured to send the authentication message sent by the authentication module 33 to the authentication terminal 10, and is further configured to receive the random authorization code and send the message to the interworking module 34. ;
  • the authentication module 33 is configured to authenticate the received identity information according to the identity information of the legal user saved in the storage module 31, and send the authentication pass message to the wireless transceiver module 32 after passing the authentication;
  • the interworking module 34 is configured to perform close-range intercommunication with the terminal 20 to be authenticated after receiving the random authorization code, and determine that the random authorization codes of the two are consistent to indicate that the electromagnetic lock 35 is unlocked.
  • the method for remotely unlocking a legitimate user is applied to the case where the legitimate user wants to unlock the visitor but cannot manually unlock the lock, including the following steps:
  • Step 201 The legal user sends its identity information to the lock control device for authentication by using the authentication terminal.
  • the identity information may be an identifier (such as a number) information of the authentication terminal, or may be a username and password information input by a user using the authentication terminal.
  • Step 202 The lock control device authenticates the identity information sent by the authentication terminal, and returns an authentication pass message to the authentication terminal after the authentication is passed.
  • the standard voice information of all legal users can also be saved in the lock control device.
  • the lock control device sends the standard voice information corresponding to the legal user to the Authentication terminal; the authentication terminal receives the lock control device After the standard voice information is sent, the user is prompted to repeat, and the voice information repeated by the user is sent to the lock control device; the lock control device compares the received voice information sent by the authentication terminal with the standard voice information, and determines the second The person from the same person, and then reply to the authentication terminal to reply to the authentication pass message.
  • Step 203 After receiving the authentication pass message returned by the lock control device, the authentication terminal generates a random authorization code, and sends the random authorization code to the terminal to be authenticated and the lock control device.
  • Step 204 After receiving the random authorization code, the lock control device performs near-macro communication with the terminal to be authenticated.
  • Steps 205 ⁇ 206 The lock control device determines whether the random authorization code of the terminal to be authenticated is consistent. If yes, step 206 is performed to unlock; if not, the process ends.
  • the lock control device can delete or invalidate the random authorization code on the lock control device to prevent the user who holds the random authorization code from entering and leaving at random, further ensuring the security of the access control system.
  • another access control system also includes a lock control device, an authentication terminal, and a terminal to be authenticated, and the same authorization code is stored in the authentication terminal and the lock control device;
  • the authentication terminal is configured to send the 4 authorized code to the terminal to be authenticated
  • the lock control device is configured to perform close-range intercommunication with the terminal to be authenticated, and determine that the authorization codes of the two are unlocked;
  • the terminal to be authenticated is used to store the received authorization code, and is also used for performing close-range communication with the lock control device for the authorization code.
  • the legal user saves the same authorization code in the authentication terminal and the lock control device
  • the authentication terminal sends the 4 authorized code to the terminal to be authenticated
  • the lock control device and the terminal to be authenticated communicate with each other at a close distance, and it is determined that the authorization codes of the two are the same, and the lock control device is unlocked.
  • the authentication terminal can send its 4 authorized code to its trusted to be authenticated.
  • the terminal, the terminal to be authenticated can enter the door with the 4 authorized code.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)

Description

一种门禁系统及合法用户远程遥控开锁的方法 技术领域
本发明涉及一种无线终端技术, 尤其涉及一种门禁系统及合法用户远 程遥控开锁的方法。 背景技术
众所周知, 目前的一些门禁系统都是通过 ic卡、 密码或指纹等 4受权信 息的方式将卡片的信息、 指纹的信息等传送给门禁系统, 由软件通过比较 来判断请求进入者是否合法。 这就意味着, 只有拥有上述授权信息的合法 用户才可以通过门禁系统的认证, 进入楼内。
当有其他不具备授权信息的用户来拜访合法用户, 且该合法用户不在 屋内不能为该访客开门时, 该访客只能被拒之门外或尾随其他合法用户进 入楼内, 这为用户的使用带来了极大的不便。
此外, 现有门禁系统在安装之前要进行众多的布线, 投入成本较大, 而且一旦 IC卡片损坏或者丟失将不能再使用门禁系统。 发明内容
本发明要解决的技术问题是提供一种门禁系统及合法用户远程遥控开 锁的方法, 以克服当合法用户不在屋内时, 无法为其允许进入但没有权限 进入的访客开门的缺陷。
为解决上述问题, 本发明提供了一种门禁系统, 包括锁控装置、 认证 终端和待认证终端, 其中,
所述认证终端, 用于将自身的身份信息发送给锁控装置进行认证, 还 用于在接收到所述锁控装置回复的认证通过消息后, 生成随机授权码并分 别发送给所述待认证终端和所述锁控装置;
所述锁控装置中保存有合法用户的身份信息; 其用于对所述认证终端 发来的身份信息进行认证, 并在认证通过后向所述认证终端回复所述认证 通过消息; 还用于在接收到所述随机授权码后与所述待认证终端进行互通, 判断出二者的随机 4受权码一致则开锁;
所述待认证终端, 用于保存接收到的所述随机授权码, 还用于与所述 锁控装置进行所述随机授权码的互通。
进一步地, 所述认证终端向所述锁控装置发送的身份信息为所述认证 终端的标识信息, 或为使用所述认证终端的用户输入的用户名和密码信息。
进一步地, 所述锁控装置中还保存有所有合法用户的标准语音信息; 所述锁控装置, 还用于在根据所述认证终端发来的身份信息确认该身 份信息合法后, 将该合法用户对应的标准语音信息发送给所述认证终端, 并将接收到的所述认证终端发来的语音信息与上述标准语音信息进行比 对, 判断出二者出自同一人, 再向所述认证终端回复所述认证通过消息; 所述认证终端, 还用于在收到所述锁控装置发来的标准语音信息后, 提示用户复读; 还用于将用户复读的语音信息发送给所述锁控装置。
进一步地, 锁控装置还用于在开锁后, 将自身保存的随机授权码删除 或置为无效。
进一步地, 所述锁控装置中包含: 无线收发模块、 存储模块、 认证模 块、 互通模块及电磁锁;
所述存储模块用于保存所有合法用户的身份信息;
所述无线收发模块用于接收所述认证终端发来的身份信息; 还用于将 认证模块发来的认证通过消息发送给所述认证终端; 还用于接收所述随机 授权码, 并发送给所述互通模块;
所述认证模块用于根据所述存储模块中保存的合法用户的身份信息对 所述接收到的身份信息进行认证, 并将认证通过后将所述认证通过消息发 送给所述无线收发模块;
所述互通模块用于将接收到的所述随机授权码后与所述待认证终端进 行互通, 判断出二者的随机授权码一致则指示所述电磁锁开锁。
本发明还提供了一种门禁系统, 包括锁控装置、 认证终端和待认证终 端; 所述认证终端和所述锁控装置中保存有相同的 4受权码;
所述认证终端将所述 4受权码发送给所述待认证终端;
所述锁控装置用于与所述待认证终端进行互通, 判断出二者的授权码 一致则开锁;
所述待认证终端用于保存接收到的所述授权码, 还用于与所述锁控装 置进行所述授权码的互通。
本发明还提供了一种合法用户远程遥控开锁的方法, 该方法包括: 所述合法用户使用认证终端将自身的身份信息发送给锁控装置进行认 证;
所述锁控装置对认证终端发来的身份信息进行认证, 并在认证通过后 向所述认证终端回复认证通过消息;
所述认证终端在接收到锁控装置回复的认证通过消息后, 生成随机授 权码, 并分别发送给待认证终端和锁控装置;
所述锁控装置在接收到上述随机授权码后, 与所述待认证终端进行互 通, 判断出二者的随机授权码一致则开锁。
进一步地, 所述身份信息为所述认证终端的标识信息, 或为使用所述 合法用户输入的用户名和密码信息。
进一步地, 锁控装置中还保存有所有合法用户的标准语音信息; 所述锁控装置对认证终端发来的身份信息进行认证, 并在认证通过后 向所述认证终端回复认证通过消息具体包括: 所述锁控装置在根据所述认证终端发来的身份信息确认该身份信息合 法后, 将该合法用户对应的标准语音信息发送给所述认证终端;
所述认证终端在收到锁控装置发来的标准语音信息后, 提示用户复读, 并将用户复读的语音信息发送给所述锁控装置;
所述锁控装置将接收到的认证终端发来的语音信息与上述标准语音信 息进行比对, 如判断出二者出自同一人, 则向所述认证终端回复所述认证 通过消息。
进一步地, 该方法还包括: 在开锁后, 所述锁控装置将自身保存的随 机授权码删除或置为无效。
本发明还提供了一种合法用户远程遥控开锁的方法, 包括:
所述合法用户在认证终端和锁控装置中保存相同的授权码;
所述认证终端将所述授权码发送给待认证终端;
所述锁控装置与所述待认证终端进行互通, 判断出二者的授权码一致 则锁控装置开锁。
采用本发明后, 合法用户可以通过远程遥控开门, 让自己允许而又无 权开门的人进入。 而且, 由于认证终端与锁控装置之间利用无线网络进行 通信, 因此在安装该门禁系统时无需布线, 而且也不会因合法用户增加而 产生费用。 附图说明
图 1为本发明实施例中门禁系统的结构框图;
图 2为本发明实施例中合法用户远程遥控开锁的方法流程图。 具体实施方式
下面将结合附图及实施例对本发明的技术方案进行更详细的说明。 本发明提供了一种门禁系统, 应用于合法用户远程控制开锁的情形, 如图 1所示, 该门禁系统包括: 认证终端 10、 待认证终端 20和锁控装置 30。 其中,
认证终端 10, 用于将自身的身份信息发送给锁控装置 30进行认证,还 用于在接收到锁控装置 30回复的认证通过消息后, 生成一随机授权码并分 别发送给待认证终端 20和锁控装置 30。
锁控装置 30中保存有合法用户的身份信息, 其用于对认证终端 10发 来的身份信息进行认证,并在认证通过后向认证终端 10回复认证通过消息; 还用于在接收到上述随机授权码后与待认证终端 10进行互通, 判断出二者 的随机授权码一致则开锁。 其中锁控装置 30与待认证终端 10的互通受到 距离的限制, 如可以根据实际应用的需要, 设定一个待认证终端 10和锁控 装置 30互通时的距离范围、 如在距离 2米的范围内时, 锁控装置 30与待 认证终端 10才能进行互通, 由于该距离比较近, 所以将该互通称为近距离 互通。
待认证终端 20, 用于保存接收到的随机授权码, 还用于与锁控装置 30 进行随机授权码的近距离互通。
其中, 认证终端 10向锁控装置 30发送的身份信息可以为该认证终端 10的标识(如号码)信息, 也可以为使用该认证终端 10的用户输入的用户 名和密码信息。
锁控装置 30中还保存有所有合法用户的标准语音信息; 相应地, 该锁 控装置 30还可用于在根据认证终端 10发来的身份信息确认该身份信息合 法后, 将该合法用户对应的标准语音信息发送给该认证终端 10, 并将接收 到的认证终端 10发来的语音信息与上述标准语音信息进行比对, 判断出二 者出自同一人, 再向认证终端 10回复认证通过消息。 而认证终端 10用于 在收到锁控装置 30发来的标准语音信息后, 提示用户复读; 还用于将用户 复读的语音信息发送给锁控装置 30。 此外, 锁控装置 30还用于在开锁后, 将其上的随机 4受权码删除或置为 无效, 以防止持有该随机授权码的用户随意频繁的进出, 进一步保证了门 禁系统的安全性。
其中, 锁控装置 30中包含: 存储模块 31、 无线收发模块 32、 认证模 块 33、 互通模块 34及电磁锁 35 , 其中:
存储模块 31 , 用于保存所有合法用户的身份信息;
无线收发模块 32, 用于接收认证终端 10发来的身份信息; 还用于将认 证模块 33发来的认证通过消息发送给认证终端 10;还用于接收随机授权码, 并发送给互通模块 34;
认证模块 33 ,用于根据存储模块 31中保存的合法用户的身份信息对接 收到的身份信息进行认证, 并将认证通过后将认证通过消息发送给无线收 发模块 32;
互通模块 34,用于在接收到随机授权码后与待认证终端 20进行近距离 互通, 判断出二者的随机授权码一致则指示电磁锁 35开锁。
如图 2所示, 合法用户远程遥控开锁的方法, 应用于该合法用户想为 其访客开锁但不能亲自手动开锁的情况下, 包括以下步骤:
步骤 201、合法用户使用其认证终端将自身的身份信息发送给锁控装置 进行认证。
其中, 该身份信息可以为该认证终端的标识 (如号码)信息, 也可以 为使用该认证终端的用户输入的用户名和密码信息。
步骤 202、锁控装置对认证终端发来的身份信息进行认证, 并在认证通 过后向认证终端回复认证通过消息。
锁控装置中还可以保存所有合法用户的标准语音信息; 相应地, 该锁 控装置在根据认证终端发来的身份信息确认该身份信息合法后, 将该合法 用户对应的标准语音信息发送给该认证终端; 认证终端在收到锁控装置发 来的标准语音信息后, 提示用户复读, 并将用户复读的语音信息发送给锁 控装置; 锁控装置将接收到的认证终端发来的语音信息与上述标准语音信 息进行比对, 判断出二者出自同一人, 再向认证终端回复认证通过消息。
步骤 203、认证终端在接收到锁控装置回复的认证通过消息后, 生成一 随机授权码, 并分别发送给待认证终端和锁控装置。
步骤 204、锁控装置在接收到上述随机授权码后, 与待认证终端进行近 巨离互通。
步骤 205~206、锁控装置判断与待认证终端的随机授权码是否一致,如 果是, 执行步骤 206, 开锁; 如果否, 该流程结束。
在开锁后, 锁控装置可以将其上的随机授权码删除或置为无效, 以防 止持有该随机授权码的用户随意频繁的进出, 进一步保证了门禁系统的安 全性。
此外, 另一种门禁系统, 也包括锁控装置、 认证终端和待认证终端, 且认证终端和锁控装置中保存有相同的授权码;
认证终端用于将 4受权码发送给待认证终端;
锁控装置用于与待认证终端进行近距离互通, 判断出二者的授权码一 致则开锁;
待认证终端用于保存接收到的授权码, 还用于与锁控装置进行授权码 的近距离互通。
而与之相对应的合法用户远程遥控开锁的方法, 包括:
合法用户在认证终端和锁控装置中保存相同的授权码;
认证终端将该 4受权码发送给待认证终端;
锁控装置与待认证终端进行近距离互通, 判断出二者的授权码一致则 锁控装置开锁。
从上述说明可以看出, 认证终端可以将其 4受权码发给其信赖的待认证 终端, 待认证终端凭该 4受权码即可进门。
当然, 本发明还可有其他多种实施例, 在不背离本发明精神及其实质 变形, 但这些相应的改变和变形都应属于本发明所附的权利要求的保护范 围。

Claims

权利要求书
1、 一种门禁系统, 其特征在于, 包括锁控装置、 认证终端和待认证终 端, 其中,
所述认证终端, 用于将自身的身份信息发送给锁控装置进行认证, 还 用于在接收到所述锁控装置回复的认证通过消息后, 生成随机授权码并分 别发送给所述待认证终端和所述锁控装置;
所述锁控装置中保存有合法用户的身份信息; 其用于对所述认证终端 发来的身份信息进行认证, 并在认证通过后向所述认证终端回复所述认证 通过消息; 还用于在接收到所述随机授权码后与所述待认证终端进行互通, 判断出二者的随机 4受权码一致则开锁;
所述待认证终端, 用于保存接收到的所述随机授权码, 还用于与所述 锁控装置进行所述随机授权码的互通。
2、 如权利要求 1所述的门禁系统, 其特征在于,
所述认证终端向所述锁控装置发送的身份信息为所述认证终端的标识 信息, 或为使用所述认证终端的用户输入的用户名和密码信息。
3、 如权利要求 1所述的门禁系统, 其特征在于,
所述锁控装置中还保存有所有合法用户的标准语音信息;
所述锁控装置, 还用于在根据所述认证终端发来的身份信息确认该身 份信息合法后, 将该合法用户对应的标准语音信息发送给所述认证终端, 并将接收到的所述认证终端发来的语音信息与上述标准语音信息进行比 对, 判断出二者出自同一人, 再向所述认证终端回复所述认证通过消息; 所述认证终端, 还用于在收到所述锁控装置发来的标准语音信息后, 提示用户复读; 还用于将用户复读的语音信息发送给所述锁控装置。
4、 如权利要求 1~3中任一项所述的门禁系统, 其特征在于,
锁控装置还用于在开锁后, 将自身保存的随机 4受权码删除或置为无效。
5、 如权利要求 1所述的门禁系统, 其特征在于,
所述锁控装置中包含: 无线收发模块、 存储模块、 认证模块、 互通模 块及电磁锁;
所述存储模块用于保存所有合法用户的身份信息;
所述无线收发模块用于接收所述认证终端发来的身份信息; 还用于将 认证模块发来的认证通过消息发送给所述认证终端; 还用于接收所述随机 授权码, 并发送给所述互通模块;
所述认证模块用于根据所述存储模块中保存的合法用户的身份信息对 所述接收到的身份信息进行认证, 并将认证通过后将所述认证通过消息发 送给所述无线收发模块;
所述互通模块用于将接收到的所述随机授权码后与所述待认证终端进 行互通, 判断出二者的随机授权码一致则指示所述电磁锁开锁。
6、 一种门禁系统, 其特征在于, 包括锁控装置、 认证终端和待认证终 端; 所述认证终端和所述锁控装置中保存有相同的 4受权码;
所述认证终端将所述 4受权码发送给所述待认证终端;
所述锁控装置用于与所述待认证终端进行互通, 判断出二者的授权码 一致则开锁;
所述待认证终端用于保存接收到的所述授权码, 还用于与所述锁控装 置进行所述授权码的互通。
7、 一种合法用户远程遥控开锁的方法, 其特征在于, 该方法包括: 所述合法用户使用认证终端将自身的身份信息发送给锁控装置进行认 证;
所述锁控装置对认证终端发来的身份信息进行认证, 并在认证通过后 向所述认证终端回复认证通过消息;
所述认证终端在接收到锁控装置回复的认证通过消息后, 生成随机授 权码, 并分别发送给待认证终端和锁控装置;
所述锁控装置在接收到上述随机授权码后, 与所述待认证终端进行互 通, 判断出二者的随机授权码一致则开锁。
8、 如权利要求 7所述的方法, 其特征在于,
所述身份信息为所述认证终端的标识信息, 或为使用所述合法用户输 入的用户名和密码信息。
9、 如权利要求 7所述的方法, 其特征在于,
锁控装置中还保存有所有合法用户的标准语音信息;
所述锁控装置对认证终端发来的身份信息进行认证, 并在认证通过后 向所述认证终端回复认证通过消息具体包括:
所述锁控装置在根据所述认证终端发来的身份信息确认该身份信息合 法后, 将该合法用户对应的标准语音信息发送给所述认证终端;
所述认证终端在收到锁控装置发来的标准语音信息后, 提示用户复读, 并将用户复读的语音信息发送给所述锁控装置;
所述锁控装置将接收到的认证终端发来的语音信息与上述标准语音信 息进行比对, 如判断出二者出自同一人, 则向所述认证终端回复所述认证 通过消息。
10、 如权利要求 7~9中任一项所述的方法, 其特征在于, 还包括: 在开锁后, 所述锁控装置将自身保存的随机 4受权码删除或置为无效。
11、 一种合法用户远程遥控开锁的方法, 其特征在于, 包括: 所述合法用户在认证终端和锁控装置中保存相同的授权码;
所述认证终端将所述授权码发送给待认证终端;
所述锁控装置与所述待认证终端进行互通, 判断出二者的授权码一致 则锁控装置开锁。
PCT/CN2010/070029 2009-05-04 2010-01-06 一种门禁系统及合法用户远程遥控开锁的方法 WO2010127563A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP10771966.8A EP2428937A4 (en) 2009-05-04 2010-01-06 PORTILON CONTROL SYSTEM AND METHOD FOR REMOTE UNLOCKING BY AUTHORIZED USERS
US13/258,582 US8933777B2 (en) 2009-05-04 2010-01-06 Gate control system and method of remote unlocking by validated users

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200910137655.2 2009-05-04
CN 200910137655 CN101551920A (zh) 2009-05-04 2009-05-04 一种门禁系统及合法用户远程遥控开锁的方法

Publications (1)

Publication Number Publication Date
WO2010127563A1 true WO2010127563A1 (zh) 2010-11-11

Family

ID=41156148

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/070029 WO2010127563A1 (zh) 2009-05-04 2010-01-06 一种门禁系统及合法用户远程遥控开锁的方法

Country Status (4)

Country Link
US (1) US8933777B2 (zh)
EP (1) EP2428937A4 (zh)
CN (1) CN101551920A (zh)
WO (1) WO2010127563A1 (zh)

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101551920A (zh) 2009-05-04 2009-10-07 中兴通讯股份有限公司 一种门禁系统及合法用户远程遥控开锁的方法
CN103023539A (zh) * 2012-12-04 2013-04-03 中兴通讯股份有限公司 一种实现电子设备功能开启的方法及系统
CN103456062B (zh) * 2013-09-09 2015-10-28 桂林理工大学 一种带双向认证的光控门禁装置
CN103426221B (zh) * 2013-09-09 2015-10-28 桂林理工大学 带双向认证的光控门禁方法
CN104753898B (zh) * 2013-12-31 2018-08-03 中国移动通信集团公司 一种验证方法、验证终端、验证服务器
CN104809773A (zh) * 2014-01-23 2015-07-29 中国移动通信集团公司 一种门禁控制方法、装置和门禁系统
CN105528816A (zh) * 2014-09-28 2016-04-27 中国移动通信集团辽宁有限公司 一种智能门禁实现方法、终端、门禁识别装置及用户授权服务中心
CN104504789A (zh) * 2014-12-05 2015-04-08 深圳天珑无线科技有限公司 一种门禁管理方法及装置
US10257185B2 (en) * 2014-12-12 2019-04-09 Visa International Service Association Automated access data provisioning
GB2531865B (en) * 2015-07-31 2019-12-25 Legrand Electric Ltd Electronic device connection method
CN105187419B (zh) * 2015-08-26 2019-01-11 宇龙计算机通信科技(深圳)有限公司 一种授权方法、装置、终端及系统
CN105405185B (zh) * 2015-10-23 2018-10-26 东莞酷派软件技术有限公司 安全验证方法及装置
CN105678871A (zh) * 2015-12-28 2016-06-15 美的集团股份有限公司 临时开锁方法和系统、移动终端
CN107040289B (zh) * 2016-12-01 2021-06-08 广州捷泰通贸易有限公司 基于近距离通讯的信息传输方法及其装置
CN106600771A (zh) * 2016-12-05 2017-04-26 苏州维盟韵联网络科技有限公司 一种物联网智能门控系统
CN107909682A (zh) * 2017-10-23 2018-04-13 林楚莲 一种门禁控制方法、装置及防盗门
CN108418830A (zh) * 2018-03-23 2018-08-17 无锡海德曼医疗设备有限公司 牙科注油机物料加注的控制方法及控制系统
WO2019186789A1 (ja) * 2018-03-28 2019-10-03 三菱電機株式会社 無線通信機及び入退室管理システム
CN108765661A (zh) * 2018-05-30 2018-11-06 努比亚技术有限公司 一种远程开锁控制、认证方法、设备、智能锁及存储介质
US10498727B1 (en) 2018-08-29 2019-12-03 Capital One Services, Llc Systems and methods of authentication using vehicle data
CN110381199B (zh) * 2019-07-03 2022-02-01 吉利汽车研究院(宁波)有限公司 一种手机作为汽车钥匙的开锁方法和开锁系统
CN111818377A (zh) * 2020-07-09 2020-10-23 华为技术有限公司 一种多媒体单元的控制方法、电子设备和遥控装置
CN115664865B (zh) * 2022-12-27 2023-05-12 深圳巨隆基科技有限公司 一种验证数据传输方法、系统、计算机设备及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1127133A (zh) * 1995-08-22 1996-07-24 才晶莹 一种清音利咽润喉保健制品及其生产工艺
JPH11107593A (ja) * 1997-10-06 1999-04-20 Yazaki Corp 送信装置、受信装置、および車両用遠隔操作システム
JP2002213126A (ja) * 2001-01-18 2002-07-31 Mitsubishi Electric Corp 入退室管理システム及びその制御方法
CN201145918Y (zh) * 2008-01-16 2008-11-05 湖南工业职业技术学院 一种联网安全门禁装置
CN101345626A (zh) * 2008-08-29 2009-01-14 广东南方信息安全产业基地有限公司 电子锁和电子钥匙之间的验证方法
CN101551920A (zh) * 2009-05-04 2009-10-07 中兴通讯股份有限公司 一种门禁系统及合法用户远程遥控开锁的方法

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2324679A1 (en) * 2000-10-26 2002-04-26 Lochisle Inc. Method and system for physical access control using wireless connection to a network
US20020122571A1 (en) * 2001-03-01 2002-09-05 Shawn Bradley Identity verification using biometrics in analog format
EP1388126B1 (en) * 2001-05-17 2013-03-27 Nokia Corporation Remotely granting access to a smart environment
US7114178B2 (en) * 2001-05-22 2006-09-26 Ericsson Inc. Security system
EP1411475A1 (en) * 2002-10-18 2004-04-21 Hitachi, Ltd. System and method of communication including first and second access point
WO2004077848A2 (en) * 2003-02-21 2004-09-10 Ge Interlogix, Inc. Key control with real time communications to remote locations
SE529849C2 (sv) 2006-04-28 2007-12-11 Sics Swedish Inst Of Comp Scie Accesstyrsystem och förfarande för att driva systemet
US8058971B2 (en) * 2006-06-07 2011-11-15 Utc Fire & Security Americas Corporation, Inc. Access control system
CN100576256C (zh) 2007-09-11 2009-12-30 中国移动通信集团湖北有限公司 门禁远程管理方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1127133A (zh) * 1995-08-22 1996-07-24 才晶莹 一种清音利咽润喉保健制品及其生产工艺
JPH11107593A (ja) * 1997-10-06 1999-04-20 Yazaki Corp 送信装置、受信装置、および車両用遠隔操作システム
JP2002213126A (ja) * 2001-01-18 2002-07-31 Mitsubishi Electric Corp 入退室管理システム及びその制御方法
CN201145918Y (zh) * 2008-01-16 2008-11-05 湖南工业职业技术学院 一种联网安全门禁装置
CN101345626A (zh) * 2008-08-29 2009-01-14 广东南方信息安全产业基地有限公司 电子锁和电子钥匙之间的验证方法
CN101551920A (zh) * 2009-05-04 2009-10-07 中兴通讯股份有限公司 一种门禁系统及合法用户远程遥控开锁的方法

Also Published As

Publication number Publication date
CN101551920A (zh) 2009-10-07
US20120038454A1 (en) 2012-02-16
EP2428937A1 (en) 2012-03-14
EP2428937A4 (en) 2014-09-10
US8933777B2 (en) 2015-01-13

Similar Documents

Publication Publication Date Title
WO2010127563A1 (zh) 一种门禁系统及合法用户远程遥控开锁的方法
US10171444B1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
JP6604921B2 (ja) モニタリングシステムの信頼性を高めるための方法及び装置
US10219154B1 (en) Frictionless or near-frictionless 3 factor user authentication method and system by use of triad network
US20170096123A1 (en) System and method for controlling access
CN112330855B (zh) 一种电子锁安全管理方法、设备及系统
EP3453578B1 (en) Unlocking control system and unlocking control method
JP2009257046A (ja) 携帯電話を利用した解錠・施錠システム
JP2008065829A (ja) アクセス装置の権限データを更新する方法およびサービスセンタ
WO2010075644A1 (zh) 实现终端设备锁网的方法、系统及终端设备
CN106899581A (zh) 一种基于云账号的门禁方法及门禁系统
US20190325677A1 (en) Home security system with automatic authorization functionality
AU2018263282A1 (en) Access control system
JP2019173523A (ja) 電気錠システムおよび錠制御端末
KR20230104921A (ko) 보호 장치에 의해 달성되는 오브젝트의 보호를 중단하는 방법
US20210216619A1 (en) Method and apparatus for authenticating a user of a compartment installation
JP4752436B2 (ja) 連携制御装置及びネットワーク管理システム
JP7057944B2 (ja) 認証システム及び認証方法
JP2007308873A (ja) 入室管理システム
CN114615309B (zh) 客户端接入控制方法、装置、系统、电子设备及存储介质
CN111354109B (zh) 一种基于大数据的保安防盗监控系统及方法
US10645070B2 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
CN108990043A (zh) 一种基于核心网通信的远程开锁方法及其智能门锁
KR102344754B1 (ko) 일회성 보안키를 이용한 도어락 보안 강화 시스템
US20220375288A1 (en) Enabling remote unlock of a lock

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10771966

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2010771966

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 13258582

Country of ref document: US

Ref document number: 2010771966

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE