WO2017070935A1 - Procédé de commande de contrôle d'accès, terminal, serveur et système de contrôle d'accès - Google Patents

Procédé de commande de contrôle d'accès, terminal, serveur et système de contrôle d'accès Download PDF

Info

Publication number
WO2017070935A1
WO2017070935A1 PCT/CN2015/093370 CN2015093370W WO2017070935A1 WO 2017070935 A1 WO2017070935 A1 WO 2017070935A1 CN 2015093370 W CN2015093370 W CN 2015093370W WO 2017070935 A1 WO2017070935 A1 WO 2017070935A1
Authority
WO
WIPO (PCT)
Prior art keywords
server
identifier
preset
terminal
access control
Prior art date
Application number
PCT/CN2015/093370
Other languages
English (en)
Chinese (zh)
Inventor
吴志勇
Original Assignee
深圳市奥星澳科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市奥星澳科技有限公司 filed Critical 深圳市奥星澳科技有限公司
Priority to PCT/CN2015/093370 priority Critical patent/WO2017070935A1/fr
Priority to CN201580000678.2A priority patent/CN105493475A/zh
Publication of WO2017070935A1 publication Critical patent/WO2017070935A1/fr

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Definitions

  • the present invention relates to the field of access control, and in particular, to an access control method, a terminal, a server, and an access control system.
  • the existing access control technology is composed of a central server unit, a access control unit and a communication terminal.
  • the central server unit and the access control unit are connected through a network, and the central server unit and the communication terminal are connected through the Internet;
  • the central server unit includes: the first communication a module, configured to connect the access control unit and the communication terminal, complete information transmission and reception;
  • the first data storage module is configured to store user registration information, user access control identity data, user access control permission data, user access control usage record, and access control
  • the unit processing management information configured to process the user registration, the user access control identity delivery and the legality verification, and the processing of the trick request;
  • the management module configured to send the corresponding access control operation instruction to each access control unit;
  • the access control unit includes: a second communication module, configured to connect to the central server unit to complete transmission and reception of information; a second processing module, configured to process information from the central server unit and report status information of the device; and the shackle module The shackle and the lockout command issued by
  • the present invention provides an access control method, a terminal, a server, and an access control system, which are designed to solve the problem that a user of an existing access control system needs to manually issue a trick request and then perform a user interaction operation before the user can access the access control device. Access control, resulting in slower access control system speed and low control efficiency Problem solution
  • the present invention is implemented as such, an access control method, and the access control method includes:
  • Another object of the present invention is to provide an access control method, the access control method comprising: [0013] generating a preset visitor identification, and adding the preset visitor identification to a right having a snore access control device In the white list; or obtain the default visitor ID;
  • the access device is configured to cause the access device to perform a cardia operation.
  • Another object of the present invention is to provide an access control method, the access control method comprising: [0020] a server generates a preset visitor identifier, and adds the preset visitor identifier to a slamming access control device a white list of permissions; or the server obtains a preset visitor ID;
  • the server sends a preset beacon identifier and the preset visitor identifier to the preset visitor identifier pair Terminal
  • the terminal receives the preset beacon identifier and the preset visitor identifier
  • the terminal receives a beacon identifier sent by the wireless beacon
  • the terminal determines whether the beacon identifier is consistent with the preset beacon identifier
  • the terminal sends the visitor identification to the server; or if yes, the terminal acquires the visitor identification, and determines whether the visitor identifier and the preset visitor identifier match, and if so, The terminal sends the determination result to the server;
  • the server receives the visitor identifier; or the server receives the determination result;
  • the server determines whether the visitor identifier is in the white list; or the server generates a control instruction according to the determination result;
  • the server sends a control command to the terminal; or the server sends the control command to the terminal;
  • the terminal receives the control command, and displays a control interface according to the control command;
  • the terminal acquires a confirmation instruction sent by the user on the control interface, and sends the confirmation instruction to the server;
  • the server receives the confirmation command, and sends a trick instruction to the access device according to the confirmation command to cause the access device to perform a cardiac operation.
  • Another object of the present invention is to provide a terminal, where the terminal includes:
  • a preset beacon identifier receiving module configured to receive a preset beacon identifier and a preset visitor identifier sent by the server
  • a first beacon identifier receiving module configured to receive a beacon identifier sent by the wireless beacon
  • a preset beacon identifier determining module configured to determine whether the beacon identifier is consistent with the preset beacon identifier
  • a visitor identification sending module configured to send a visitor identifier to the server; or a determination result sending module, configured to acquire a visitor identifier, and determine whether the visitor identifier and the preset visitor identifier match, and if yes, Sending the determination result to the server;
  • a display module configured to receive a control command sent by the server, and display a control interface according to the control command;
  • an obtaining module configured to acquire a confirmation instruction sent by the user on the control interface, and send the confirmation instruction to the server, so that the server receives the confirmation instruction, and sends a trick instruction to control the access control according to the confirmation instruction.
  • the device performs a trick operation.
  • Another object of the present invention is to provide a server, where the server includes:
  • a preset visitor identification generating module configured to generate a preset visitor identifier, and add the preset visitor identifier to a whitelist having the right to slam the access control device; or preset a visitor identifier obtaining module, configured to: Obtain a preset visitor ID;
  • a preset beacon identifier sending module configured to send the preset beacon identifier and the preset visitor identifier to a terminal corresponding to the preset visitor identifier
  • a visitor identifier receiving module configured to receive a visitor identifier sent by the terminal; or a determination result receiving module, configured to receive a determination result sent by the terminal;
  • a whitelist determination module configured to determine whether the visitor identifier is in the whitelist; or a control instruction generating module, configured to generate a control instruction according to the determination result;
  • a first control command sending module configured to send a control command to the terminal
  • a second control command sending module configured to send the control command to the terminal
  • the trick instruction transmitting module is configured to receive an acknowledgement command sent by the terminal, and send a trick instruction to the access control device according to the confirmation command to cause the access control device to perform a trick operation.
  • Another object of the present invention is to provide an access control system, characterized in that the system comprises the above-mentioned terminal and the above-mentioned server.
  • the first beacon identifier and the preset visitor identifier sent by the server are received first; then the beacon identifier sent by the wireless beacon is received and it is determined whether the beacon identifier is consistent with the preset beacon identifier, If yes, sending the visitor identification to the server or obtaining the visitor identification, and determining whether the visitor identification and the preset visitor identification match, and if so, transmitting the determination result to the server; receiving the control command sent by the server, and displaying the control according to the control command Interface; finally obtain the confirmation command sent by the user on the control interface, and send the confirmation command to the server to enable the server to receive the confirmation command, and according to the confirmation
  • the command sending the trick instruction controls the access control device to perform the trick operation; therefore, the user automatically opens the access control device after reaching the access control device, thereby improving the control efficiency.
  • Embodiment 1 is a flow chart of a method for controlling access control according to Embodiment 1 of the present invention
  • FIG. 2 is another flow chart of a method for controlling access control according to Embodiment 1 of the present invention.
  • FIG. 3 is a flowchart of a method for controlling access control according to Embodiment 2 of the present invention.
  • Embodiment 4 of the present invention is a schematic structural diagram of a terminal provided by Embodiment 4 of the present invention.
  • FIG. 6 is another schematic structural diagram of a terminal provided by Embodiment 4 of the present invention.
  • FIG. 7 is a schematic structural diagram of a server provided by Embodiment 5 of the present invention.
  • FIG. 8 is a schematic diagram of another structure of a server according to Embodiment 5 of the present invention.
  • FIG. 9 is a schematic structural diagram of an access control system according to Embodiment 6 of the present invention.
  • Embodiment 1 is a diagrammatic representation of Embodiment 1:
  • FIG. 1 shows an implementation flow of the access control method provided by this embodiment. For the convenience of description, only the parts related to the embodiment are shown, which are as follows:
  • step 101 the preset beacon identifier and the preset visitor identifier sent by the server are received.
  • the preset beacon identifier is a beacon identifier of the wireless beacon corresponding to the access control device. After receiving the preset beacon identifier and the preset visitor identifier sent by the server, the information that the authority to open the access control device has been obtained may be displayed, so that the user knows that the electronic ticket has been purchased. [0064] In step 102, a beacon identifier transmitted by the wireless beacon is received.
  • the wireless beacon includes a Bluetooth beacon and a WIFI beacon
  • the wireless beacon broadcasts a Bluetooth data frame or a WIFI data frame by radio every certain time interval, and the data frame may be included in addition to the beacon identification information. Any information.
  • a mobile terminal supporting Bluetooth 4.0 or WIFI can receive this data frame and then parse the data frame to obtain the beacon identification.
  • step 103 it is determined whether the beacon identifier is consistent with the preset beacon identifier, and if yes, step 104 is performed.
  • step 104a the visitor identification is sent to the server.
  • the preset visitor identifier and the visitor identifier may be passwords.
  • step 104b the visitor identification is obtained, and it is determined whether the visitor identification and the preset visitor identification match, and if so, the determination result is sent to the server.
  • the preset visitor identifier and the visitor identifier may be passwords and fingerprint information.
  • step 104a and step 104b perform only one of them.
  • step 105 a control command sent by the server is received, and the control interface is displayed according to the control command.
  • control interface may be a selection interface that prompts the user whether to confirm the trick. By setting up the control interface, the visitor can confirm that the access control device is illegal after entering the door.
  • step 106 the confirmation instruction issued by the user on the control interface is acquired, and the confirmation instruction is sent to the server to enable the server to receive the confirmation instruction, and the trick instruction is sent according to the confirmation instruction to control the access control device to perform the trick operation.
  • step 106 may include the following two situations:
  • A. Acquire an acknowledgment command sent by the user on the control interface, and send the confirmation command to the server to enable the server to receive the acknowledgment command, and directly send the slamming command to the access control device according to the acknowledgment command to control the access control device to perform the slamming operation.
  • step 100 is: sending a reservation Or buy ticketing information to the server.
  • step 107 is: receiving the trick result information sent by the server.
  • the result information of the trick is the information that the door lock has been activated, and may be a text description (for example, the door lock is snoring) or an indication picture.
  • the preset beacon identifier and the preset visitor identifier sent by the server are first received; then, the beacon identifier sent by the wireless beacon is received, and it is determined whether the beacon identifier is consistent with the preset beacon identifier, and if yes, Sending the visitor identification to the server or obtaining the visitor identification, and determining whether the visitor identification and the preset visitor identification match, if yes, sending the determination result to the server; receiving the control command sent by the server, and displaying the control interface according to the control command; Obtaining an acknowledgment command sent by the user on the control interface, and sending the confirmation command to the server to enable the server to receive the acknowledgment command, and sending the slamming command according to the acknowledgment command to control the access control device to perform the slamming operation; therefore, the user automatically arrives at the access control device The access control device is improved, and the control efficiency is improved.
  • Embodiment 2 is a diagrammatic representation of Embodiment 1:
  • FIG. 3 shows an implementation flow of the access control method provided by this embodiment. For the convenience of description, only the parts related to the embodiment are shown, which are as follows:
  • step 301 the reservation or purchase ticket information sent by the terminal is received.
  • the visitor purchases a ticket through the system to trigger the system to generate an electronic ticket.
  • step 302a a preset visitor identification is generated, and the preset visitor identification is added to the whitelist with the authority to slam the access control device.
  • the preset visitor identification can be a password.
  • a preset visitor identification is obtained.
  • the preset visitor identification may be a password and a fingerprint information.
  • step 303 the preset beacon identifier and the preset visitor identifier are sent to the terminal corresponding to the preset visitor identifier.
  • step 304a the visitor identification sent by the terminal is received.
  • step 304b the determination result sent by the terminal is received.
  • step 305a it is determined whether the visitor identification is in the white list, and if so, step 306 is performed.
  • step 305b a control instruction is generated based on the determination result.
  • step 306 a control command is sent to the terminal.
  • step 307 the confirmation command sent by the terminal is received, and the trick instruction is sent to the access control device according to the confirmation command to cause the access control device to perform the trick operation.
  • step 307 may include the following two situations:
  • step 308 the preset visitor identification is deleted from the whitelist.
  • step 309 the trick result information sent by the access control device is received, and the trick result information is forwarded to the terminal.
  • the trick result information is sent to the server, and the server forwards the trick result information to the terminal, and the visitor can know the authority to obtain the access control device.
  • the steps may be performed in the sequence of step 301, step 302a, step 303, step 304a, step 305a, step 306, step 307, step 308, and step 309, or step 301, step 302b, step 303 may be followed. Steps of step 304b, step 305b, step 306, step 307, step 308, and step 309 are performed.
  • a preset visitor identifier is first generated, and a preset visitor identifier is added to a white list having the authority of the snore access control device; then the preset beacon identifier and the preset visitor identifier are sent to the pre-predetermined Setting the terminal corresponding to the visitor identifier; receiving the visitor identifier sent by the terminal and determining whether the visitor identification is in the white list, and if so, sending a control command to the terminal; finally receiving the confirmation command sent by the terminal, and sending the trick instruction according to the confirmation command to
  • the access control device enables the access control device to perform the cardia operation; therefore, the user automatically opens the access control device after reaching the access control device, thereby improving the control efficiency.
  • Embodiment 3 is a diagrammatic representation of Embodiment 3
  • FIG. 4 shows an implementation flow of the access control method provided by this embodiment. For the convenience of description, only the parts related to the embodiment are shown, which are as follows:
  • step 401 the terminal transmits a reservation or purchase ticket information to the server.
  • step 402 the server receives the reservation or purchase ticket information.
  • step 403a the server generates a preset visitor identification and adds the preset visitor identification to the whitelist with the authority to snore the access control device.
  • step 403b the server acquires a preset visitor identification.
  • step 404 the server sends the preset beacon identifier and the preset visitor identifier to the terminal corresponding to the preset visitor identifier.
  • step 405 the terminal receives the preset beacon identifier and the preset visitor identifier.
  • step 406 the terminal receives the beacon identifier transmitted by the wireless beacon.
  • step 407 the terminal determines whether the beacon identifier is consistent with the preset beacon identifier, and if yes, executing step 408.
  • step 408a the terminal transmits the visitor identification to the server.
  • step 408b the terminal acquires the visitor identification and determines whether the visitor identifier and the preset visitor identifier match.
  • the terminal sends the determination result to the server.
  • the result of the determination is that the visitor identification matches the preset visitor identification.
  • step 409a the server receives the visitor identification.
  • step 40% the server receives the determination result.
  • step 4010a the server determines whether the visitor identification is in the whitelist, and if so, step 4011.
  • step 4010b the server generates a control command based on the determination result.
  • step 4011 the server sends a control command to the terminal.
  • step 4012 the terminal receives the control command and displays the control interface according to the control command.
  • step 4013 the terminal acquires an acknowledgement command issued by the user on the control interface, and sends the confirmation command to the server.
  • step 4014 the server receives the confirmation command and sends a trick command to the access device according to the confirmation command to cause the access device to perform the trick operation.
  • step 4014 may include the following two situations:
  • the server receives the confirmation command, and directly sends the trick instruction to the access device according to the confirmation command to cause the access device to perform the trick operation.
  • the server receives the confirmation command, and sends a trick instruction to the terminal according to the confirmation command, and the terminal forwards the trick instruction to the access control device to cause the access control device to perform the trick operation.
  • the server deletes the preset visitor identification from the whitelist.
  • step 4016 the server receives the trick result information sent by the access control device, and forwards the trick result information to the terminal.
  • step 4017 the terminal receives the trick result information.
  • the steps may be performed in the order of step 401, step 402, step 403a, step 404 to step 407, step 408a, step 409a, step 4010a, step 4011 to step 4017, and may be performed according to step 401, step 402, Step 403b, step 404 to step 407, step 408b, step 409b, step 4 010b.
  • the sequence of steps 4011 to 4017 is performed.
  • the server first generates a preset visitor identifier, and adds a preset visitor identifier to the whitelist, and sends the preset beacon identifier and the preset visitor identifier to the terminal corresponding to the preset visitor identifier; Then, the terminal receives the preset beacon identifier and the preset visitor identifier, receives the beacon identifier sent by the wireless beacon, and determines whether the beacon identifier is consistent with the preset beacon identifier, and if yes, sends the visitor identifier to the server; The visitor identifies and determines whether the visitor identification is in the white list, and if so, sends a control command to the terminal; the terminal receives the control command, and displays the control interface according to the control command, and obtains the confirmation command sent by the user on the control interface, and sends the confirmation command to The server receives the confirmation command, and sends the trick instruction to the access control device according to the confirmation command to enable the access control device to perform the trick operation; therefore, the
  • Embodiment 4 is a diagrammatic representation of [0131] Embodiment 4:
  • the present invention further provides a terminal 50, as shown in FIG. 5, including a preset beacon identifier receiving module 510 and a first beacon identifier receiving module. 520.
  • the preset beacon identifier receiving module 510 is configured to receive a preset beacon identifier and a preset visitor identifier sent by the server;
  • the first beacon identifier receiving module 520 is configured to receive a beacon identifier sent by the wireless beacon
  • the preset beacon identification determining module 530 is configured to determine whether the beacon identifier is consistent with the preset beacon identifier; [0136] a visitor identifier sending module 540a, configured to send the visitor identifier to the server; or determine a result sending module 540b, used to obtain a visitor identification, and determine whether the visitor identification and the preset visitor identification match, if , the judgment result is sent to the server.
  • the display module 550 is configured to receive a control command sent by the server, and display the control interface according to the control command;
  • the obtaining module 560 is configured to obtain an acknowledgement command sent by the user on the control interface, and send the confirmation command to the server to enable the server to receive the confirmation command, and send the trick instruction to control the access control device to perform the trick operation according to the confirmation command.
  • the terminal 60 further includes a ticket information transmitting module 570 and a trick result information receiving module 580.
  • the ticket information sending module 570 is configured to send a reservation or purchase ticket information to the server.
  • the trick result information receiving module 580 is configured to receive the trick result information sent by the server.
  • This embodiment first receives the preset beacon identifier and the preset visitor identifier sent by the server; then receives the beacon identifier sent by the wireless beacon and determines whether the beacon identifier is consistent with the preset beacon identifier, and if yes, Sending the visitor identification to the server or obtaining the visitor identification, and determining whether the visitor identification and the preset visitor identification match, and if yes, transmitting the determination result to the server; receiving the control command sent by the server, and according to the control The command displays the control interface; finally, the confirmation command sent by the user on the control interface is obtained, and the confirmation command is sent to the server to enable the server to receive the confirmation command, and the trick instruction is sent according to the confirmation command to control the access control device to perform the trick operation; therefore, the implementation is implemented.
  • the access control device is automatically activated, which improves the control efficiency.
  • Embodiment 5 is a diagrammatic representation of Embodiment 5:
  • the present invention further provides a server 70, as shown in FIG. 7, including a visitor identification generating module 710a, a preset visitor identification obtaining module 710b, and a preset.
  • the preset visitor identification generating module 710a is configured to generate a preset visitor identifier, and add the preset visitor identifier to the whitelist with the authority of the snore access control device. Or preset visitor identification obtaining module 710b for obtaining a preset visitor identifier
  • a preset beacon identification sending module 720 configured to send the preset beacon identifier and the preset visitor identifier to the pre-predetermined Setting a terminal corresponding to the tourist identification;
  • the visitor identification receiving module 730a is configured to receive the visitor identifier sent by the terminal.
  • the decision result receiving module 730b is configured to receive the determination result sent by the terminal.
  • the whitelist determination module 740a is configured to determine whether the visitor identification is in the whitelist.
  • the control command generation module 740b is configured to generate a control command based on the determination result.
  • the first control command transmitting module 750a or the second control command transmitting module 750b are both configured to send a control command to the terminal.
  • the trick instruction sending module 760 is configured to receive an acknowledgement command sent by the terminal, and send the trick instruction to the access control device according to the confirmation command to cause the access control device to perform the trick operation.
  • the server 80 further includes a deletion module 770 and a trick result information forwarding module.
  • the deleting module 770 is configured to delete the preset visitor identifier from the whitelist.
  • the trick result information forwarding module 780 is configured to receive the trick result information sent by the access control device, and forward the trick result information to the terminal.
  • the ticket information receiving module 790 is configured to receive the scheduled or purchased ticket information sent by the terminal.
  • the preset visitor identifier is first generated, and the preset visitor identifier is added to the whitelist with the authority of the snore access control device; then the preset beacon logo and the preset visitor identifier are sent to the pre-predetermined Setting the terminal corresponding to the visitor identifier; receiving the visitor identifier sent by the terminal and determining whether the visitor identification is in the white list, and if so, sending a control command to the terminal; finally receiving the confirmation command sent by the terminal, and sending the trick instruction according to the confirmation command to
  • the access control device enables the access control device to perform the cardia operation; therefore, the user automatically opens the access control device after reaching the access control device, thereby improving the control efficiency.
  • the present invention also provides an access control system 90 comprising the above terminal (50 or 60) and the above server (70 or 80).
  • a preset visitor identifier is generated by the server, and the preset visitor identifier is added to the whitelist, and the preset beacon identifier and the preset visitor identifier are sent to the terminal corresponding to the preset visitor identifier; Then, the terminal receives the preset beacon identifier and the preset visitor identifier, receives the beacon identifier sent by the wireless beacon, and determines whether the beacon identifier is consistent with the preset beacon identifier, and if yes, sends the visitor identifier to the server; The server then receives the visitor identification and determines whether the visitor identification is in the white list, and if so, sends a control command to the terminal; the terminal receives the control command, and displays the control interface according to the control command, and obtains the confirmation command issued by the user on the control interface, The confirmation command is sent to the server; finally, the server receives the confirmation command, and sends a trick instruction to the access control device according to the confirmation command to enable the access control device to perform
  • the above-mentioned access control method, terminal, server, and access control system can also be applied to the field of commodity sales, and the gate is automatically controlled after the purchase of the commodity.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)
  • Lock And Its Accessories (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé de commande de contrôle d'accès, un terminal, un serveur et un système de contrôle d'accès. Le procédé consiste en premier lieu à recevoir un identifiant de balise prédéfini et un identifiant de touriste prédéfini envoyé par un serveur (101) ; puis, à recevoir un identifiant de balise envoyé par une balise radio (102) ; à déterminer si l'identifiant de balise est compatible avec l'identifiant de balise prédéterminé (103) ; si oui, à envoyer un identifiant de touriste au serveur (104a) ou à acquérir l'identifiant de touriste, à déterminer si l'identifiant de touriste correspond à l'identifiant de touriste prédéfini, et si cela est le cas, à envoyer un résultat de détermination au serveur (104b) ; à recevoir ensuite un ordre de commande envoyé par le serveur, et à afficher une interface de commande conformément à l'ordre de commande (105) ; et enfin, à acquérir une instruction de confirmation envoyée par un utilisateur sur l'interface de commande, et à la transmettre au serveur, de manière à ce que le serveur envoie, conformément à l'instruction de confirmation, une instruction d'ouverture de porte afin de commander un appareil de contrôle d'accès pour qu'il exécute une opération d'ouverture de porte (106). Le procédé de commande de contrôle d'accès, le terminal, le serveur et le système de contrôle d'accès, permettent de faire en sorte que l'appareil de contrôle d'accès soit automatiquement ouvert après que l'utilisateur a atteint l'appareil de contrôle d'accès, cela permettant d'améliorer l'efficacité du contrôle.
PCT/CN2015/093370 2015-10-30 2015-10-30 Procédé de commande de contrôle d'accès, terminal, serveur et système de contrôle d'accès WO2017070935A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2015/093370 WO2017070935A1 (fr) 2015-10-30 2015-10-30 Procédé de commande de contrôle d'accès, terminal, serveur et système de contrôle d'accès
CN201580000678.2A CN105493475A (zh) 2015-10-30 2015-10-30 一种门禁控制方法、终端、服务器及门禁系统

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2015/093370 WO2017070935A1 (fr) 2015-10-30 2015-10-30 Procédé de commande de contrôle d'accès, terminal, serveur et système de contrôle d'accès

Publications (1)

Publication Number Publication Date
WO2017070935A1 true WO2017070935A1 (fr) 2017-05-04

Family

ID=55678514

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/093370 WO2017070935A1 (fr) 2015-10-30 2015-10-30 Procédé de commande de contrôle d'accès, terminal, serveur et système de contrôle d'accès

Country Status (2)

Country Link
CN (1) CN105493475A (fr)
WO (1) WO2017070935A1 (fr)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11671807B2 (en) 2016-11-11 2023-06-06 Carnival Corporation Wireless device and methods for making and using the same
US10499228B2 (en) 2016-11-11 2019-12-03 Carnival Corporation Wireless guest engagement system
US10045184B2 (en) 2016-11-11 2018-08-07 Carnival Corporation Wireless guest engagement system
CN108713199B (zh) * 2018-06-04 2022-03-11 深圳市奥星澳科技有限公司 权限管理方法、系统、移动终端、共享充电设备及服务器
CN110070652A (zh) * 2019-04-26 2019-07-30 广东昇辉电子控股有限公司 一种门禁控制方法、系统、电子设备及存储介质
CN111862428B (zh) * 2019-06-04 2023-01-20 维珍(深圳)数据技术有限公司 一种门禁控制方法和设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1797434A (zh) * 2004-12-30 2006-07-05 东方惠科防伪技术有限责任公司 一种门票管理系统及门票管理方法
US20070045412A1 (en) * 2005-08-29 2007-03-01 Industrial Technology Research Institute Guest-service-type convenience system for implementation at ticketing activity, touring activity and retail transaction
JP4808092B2 (ja) * 2006-06-26 2011-11-02 富士通株式会社 認証方法、認証システム、情報処理装置、コンピュータプログラム及び記録媒体
CN103460259A (zh) * 2011-03-29 2013-12-18 因温特奥股份公司 建筑物访问信息的分配
CN104809773A (zh) * 2014-01-23 2015-07-29 中国移动通信集团公司 一种门禁控制方法、装置和门禁系统

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103136819A (zh) * 2011-12-01 2013-06-05 联想(北京)有限公司 基于移动终端的门禁系统解锁方法及移动终端
CN104537735A (zh) * 2014-12-11 2015-04-22 应骏 电子锁及其解锁和设置方法
CN104766398B (zh) * 2015-04-28 2017-10-20 李翀 一种门禁控制系统及方法
CN104966343B (zh) * 2015-07-14 2018-10-09 深圳市亲邻科技有限公司 基于互联网的门禁控制方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1797434A (zh) * 2004-12-30 2006-07-05 东方惠科防伪技术有限责任公司 一种门票管理系统及门票管理方法
US20070045412A1 (en) * 2005-08-29 2007-03-01 Industrial Technology Research Institute Guest-service-type convenience system for implementation at ticketing activity, touring activity and retail transaction
JP4808092B2 (ja) * 2006-06-26 2011-11-02 富士通株式会社 認証方法、認証システム、情報処理装置、コンピュータプログラム及び記録媒体
CN103460259A (zh) * 2011-03-29 2013-12-18 因温特奥股份公司 建筑物访问信息的分配
CN104809773A (zh) * 2014-01-23 2015-07-29 中国移动通信集团公司 一种门禁控制方法、装置和门禁系统

Also Published As

Publication number Publication date
CN105493475A (zh) 2016-04-13

Similar Documents

Publication Publication Date Title
WO2017070935A1 (fr) Procédé de commande de contrôle d'accès, terminal, serveur et système de contrôle d'accès
CN108307674B (zh) 一种保障终端安全的方法和设备
US10616217B2 (en) Website authentication using an internet-connected device
WO2018041078A1 (fr) Procédé, système, serveur mandataire et support de stockage informatique d'authentification
US10237271B2 (en) Access terminal
CN111836085B (zh) 电视投屏的方法、装置、云端服务器及终端设备
CN108476226A (zh) 应用程序授权方法、终端及服务器
WO2015096757A1 (fr) Procédé et dispositif d'initialisation d'environnement d'exécution sécurisé
WO2014139441A1 (fr) Procédé, dispositif et système pour accéder à un réseau
RU2012108120A (ru) Система связи, устройство связи, способ связи и компьютерная программа
KR20150045920A (ko) 라우터 액세스 제어 방법, 장치, 시스템, 프로그램 및 기록매체
WO2018036233A1 (fr) Procédé de traitement d'informations, dispositif et support de stockage informatique
JP2014186655A (ja) 携帯型情報端末装置、プログラム及びサービス利用システム
CN108462710A (zh) 认证授权方法、装置、认证服务器及机器可读存储介质
JP2014160942A5 (fr)
CN108134789A (zh) 通过云进行设备间数据同步的方法和云服务器
KR101620254B1 (ko) 액세스 제어 방법, 장치, 프로그램 및 기록매체
CN110519764B (zh) 一种通信设备的安全验证方法、系统、计算机设备和介质
JP2016063417A (ja) Vpnアクセス制御システム、その作動方法及びプログラム、並びにvpnルータ及びサーバ
WO2019062356A1 (fr) Procédé de connexion de plateforme de gestion de contenu de profil, terminal et serveur
WO2018099407A1 (fr) Procédé et dispositif de connexion basée sur une authentification de compte
WO2017016058A1 (fr) Procédé de protection de carte virtuelle, processeur et terminal d'application, et support de stockage informatique
Schepers et al. A framework to test and fuzz wi-fi devices
JP5015043B2 (ja) 情報処理システム、情報端末、および、プログラム
JP5558689B2 (ja) 遠隔制御装置、遠隔制御プログラム、遠隔制御方法、及び、遠隔制御システム

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201580000678.2

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15906998

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 19/10/2018)

122 Ep: pct application non-entry in european phase

Ref document number: 15906998

Country of ref document: EP

Kind code of ref document: A1