WO2017107418A1 - 一种门禁监控方法和系统 - Google Patents

一种门禁监控方法和系统 Download PDF

Info

Publication number
WO2017107418A1
WO2017107418A1 PCT/CN2016/086936 CN2016086936W WO2017107418A1 WO 2017107418 A1 WO2017107418 A1 WO 2017107418A1 CN 2016086936 W CN2016086936 W CN 2016086936W WO 2017107418 A1 WO2017107418 A1 WO 2017107418A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
access control
mobile terminal
terminal
voice
Prior art date
Application number
PCT/CN2016/086936
Other languages
English (en)
French (fr)
Inventor
赵培杰
Original Assignee
歌尔股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 歌尔股份有限公司 filed Critical 歌尔股份有限公司
Priority to US15/517,336 priority Critical patent/US9928670B2/en
Publication of WO2017107418A1 publication Critical patent/WO2017107418A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/29Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Definitions

  • the present invention relates to the field of access control technologies, and in particular, to an access control monitoring method and system.
  • domestic access control systems mainly implement identity verification through card devices, fingerprints and face recognition technologies.
  • the card type equipment is easy to be lost and forgotten, which is not only inconvenient for identity verification, but also has security risks. If it is obtained by criminals, theft can be carried out.
  • the existing access control systems mostly use fingerprint recognition and face recognition.
  • fingerprint recognition can solve the shortage of card products, but about 5% of the population can not use fingerprint recognition, and the way of contact recognition is easy to spread diseases, fingerprints
  • face recognition technology is limited by illumination, gestures and decorations.
  • the present invention provides an access control monitoring method and system to improve the convenience and security of user identity authentication.
  • the present invention provides an access control monitoring method, which is applicable to a control area having a plurality of rooms, each of which is provided with an access control terminal, and the access control monitoring method includes:
  • the control access terminal uses the short-range wireless communication function of the mobile terminal to identify the mobile terminal in the monitoring area;
  • the user identity information of the user to which the mobile terminal belongs is authenticated
  • the voice recognition mode is activated, the access control terminal is controlled to play the identification prompt tone to the user, and the identity of the user is verified according to the user response voice returned by the access control terminal, and the access control is controlled to open or close according to the voice verification result.
  • the present invention also provides an access control monitoring system, which is applicable to a control area having a plurality of rooms, the access control monitoring system includes an access control terminal and an access control monitoring server disposed in each room, and the access control monitoring server includes:
  • a matching unit configured to match with a mobile terminal configured with a short-range wireless communication function on the user side, and establish an authentication list that records user identity information
  • the identification unit is configured to: when the monitoring function is turned on, control the access terminal to identify the mobile terminal in the monitoring area by using the short-range wireless communication function of the mobile terminal;
  • An authentication unit configured to authenticate user identity information of a user to which the mobile terminal belongs when the mobile terminal is identified
  • a positioning unit configured to: when the user identity information is authenticated, locate the user to which the mobile terminal belongs;
  • the voice identity verification unit is configured to start a voice recognition mode for the user who successfully locates, control the access control terminal to play the identity recognition prompt tone to the user, and verify the identity of the user according to the user response voice returned by the access control terminal, and control according to the voice verification result.
  • the opening or closing of the door is configured to start a voice recognition mode for the user who successfully locates, control the access control terminal to play the identity recognition prompt tone to the user, and verify the identity of the user according to the user response voice returned by the access control terminal, and control according to the voice verification result.
  • the present invention combines the short-range wireless communication function and the voice recognition function to replace the traditional access control authentication method of the credit card, fingerprint or face recognition type, and utilizes the short-distance wireless communication function of the mobile terminal in the user. Unconsciously discovering and identifying the user's mobile terminal, when the mobile terminal is successfully identified, and the user to which the mobile terminal belongs reaches the target area, the voice recognition mode is controlled to be turned on, and the user identity is verified by automatic voice recognition.
  • the authentication method of the user identity is more convenient and safer than the existing contact authentication method (such as swiping or fingerprinting) and the face recognition authentication method, and can effectively improve the user experience.
  • FIG. 1 is a flowchart of a method for monitoring an access control according to Embodiment 1 of the present invention
  • FIG. 2 is a flowchart of a method for monitoring an access control when entering a room according to Embodiment 2 of the present invention
  • FIG. 3 is a flowchart of a method for monitoring an access control when leaving a room according to Embodiment 2 of the present invention
  • FIG. 4 is a schematic structural diagram of a structure of an access control monitoring system according to Embodiment 1 of the present invention.
  • short-range wireless communication devices Due to the low-cost, low-power, peer-to-peer communication features and advantages of short-range wireless communication technologies, short-range wireless communication devices are widely used, especially in mobile phones or wearable devices. Low power consumption feature allows users' mobile terminals to send wirelessly all the way out signal.
  • Speech recognition is also a very common means of identification, which distinguishes different users according to the uniqueness of specific voice information such as the timbre or frequency of the user's voice.
  • the overall design idea of the present invention is: discovering and recognizing the location of the user through the short-range wireless communication function, controlling the voice recognition mode to be turned on when the user reaches the target area, and verifying the identity of the user by means of automatic voice recognition, thereby controlling the access control. Open and close.
  • Embodiment 1 is a diagrammatic representation of Embodiment 1:
  • the present embodiment provides an access control monitoring method suitable for a control area having a plurality of rooms, each room of which is provided with an access control terminal.
  • FIG. 1 is a flowchart of a method for monitoring an access control according to an embodiment of the present invention. As shown in FIG. 1 , the method in FIG. 1 includes:
  • S110 Matching with a mobile terminal provided with a short-range wireless communication function on the user side, and establishing an authentication list in which user identity information is recorded.
  • Short-range wireless communication technologies mainly include Bluetooth Low Energy (BLE), ZigBee ZigBee, Near Field Communication (NFC) and Wireless Local Area Networks (WLAN), due to BLE technology.
  • BLE Bluetooth Low Energy
  • NFC Near Field Communication
  • WLAN Wireless Local Area Networks
  • a mobile terminal having a WLAN function, a ZigBee function, or an NFC function can also be used to verify the identity of the user to which it belongs.
  • the user identity information in step S110 includes an identifier that uniquely identifies the mobile terminal, and the identifier is a Universally Unique Identifier (UUID) of the mobile terminal, and the UUID can ensure that all devices in the same time and space are unique, thereby Ability to uniquely identify the user to which the mobile device belongs.
  • UUID Universally Unique Identifier
  • the identification code is a Bluetooth universal unique identifier
  • the length of the standard UUID is 128 bits, when the mobile terminal is applied to the BLE function.
  • the 16-bit or 32-bit of the standard UUID is usually used as the base UUID to uniquely identify the user.
  • control access terminal uses the short-range wireless communication function of the mobile terminal to identify the mobile terminal in the monitoring area.
  • S150 Start a voice recognition mode for the user who successfully locates, control the access control terminal to play an identification prompt tone to the user, and verify the identity of the user according to the user response voice returned by the access control terminal, and control the opening or closing of the access control according to the voice verification result.
  • the specific contents of the above steps S110 to S150 may be performed by the access control monitoring server.
  • the embodiment combines the short-range wireless communication function and the voice recognition function to replace the traditional access control authentication method of the credit card, fingerprint or face recognition type, and discovers and recognizes the user unconsciously by using the short-distance wireless communication function of the mobile terminal.
  • the mobile terminal when successfully identifying the mobile terminal, and the user to which the mobile terminal belongs reaches the target area, controls the voice recognition mode to be turned on, and authenticates the user identity by means of automatic voice recognition.
  • the authentication mode of the user identity is more convenient and safer than the existing contact authentication mode (such as swiping or fingerprinting) and the face recognition authentication mode, and the user experience can be effectively improved.
  • the step S140 of performing the positioning of the user to which the mobile terminal belongs includes: identifying a mobile state of the mobile terminal;
  • step S150 the voice recognition mode is activated for the user who is successfully located.
  • the voice recognition mode is started, and voice verification is started.
  • the access control terminal When the mobile terminal moves away from the room, the access control terminal is opened to open the access control, and the access control is closed to close the access control.
  • the implementation solution determines the motion state of the mobile terminal according to the mobile state of the mobile terminal, and starts the voice recognition mode when the user to which the mobile terminal belongs wants to enter the room, when the user of the mobile terminal wants to go from the room.
  • the access control is opened, so that the access control terminal can perform corresponding control according to the intention of the user, thereby better improving the user experience.
  • the user identity information recorded in the authentication list established in step S110 includes an identifier that uniquely identifies the mobile terminal
  • step S130 when the mobile terminal is identified, the user identity information of the user to which the mobile terminal belongs is authenticated as follows:
  • the wireless response signal is a signal that the mobile terminal feeds back to the broadcast signal sent by the access terminal, and the broadcast signal is a signal sent by the access control terminal to identify the mobile terminal.
  • the user identity information recorded in the above authentication list further includes user voice information
  • the user rights of the authentication may be different, that is, the user identity information recorded in the authentication list may further include user rights information.
  • step S150 the voice recognition mode is activated for the user who is successfully located, and further includes:
  • the voice recognition mode Determining whether to start the voice recognition mode according to the user authority information corresponding to the identifier, if the user right corresponding to the identifier is a normal right, the voice recognition mode is started; if the user right corresponding to the identifier is a special right, the voice is skipped Verify that the access control terminal is opened to open the access control.
  • the access control terminal may identify multiple mobile terminals in its monitoring area. In this case, it is first determined whether the identified multiple mobile terminals are the same registered user, and if they are the same registered user, The positioning of any one of the mobile terminals may be performed. If the users of the plurality of mobile terminals are different, the plurality of mobile terminals are located, and when the plurality of mobile terminals are successfully located, the multi-user processing mode is switched.
  • the authenticating the identified mobile terminal in the foregoing step S130 further includes:
  • the corresponding multi-user processing mode is set according to the application scenario of the access control terminal.
  • the multi-user processing mode is: controlling the access control terminal to play the identification prompt tone, and sequentially acquiring each The user who locates the successful response voice, records the time when the corresponding user answers the voice, and verifies the obtained user response voice successfully, and controls the opening or closing of the access control according to the voice verification result.
  • This processing method verifies the identity of multiple users at the same time, identifies and records the identity of each person, and can meet the needs of the check-in.
  • the multi-user processing mode is: control
  • the access terminal plays one by one to verify the identity prompt tone, and only obtains the user response voice of one of the successfully located users at a time. After the user's response voice verification of the successfully located user ends, the access control terminal is controlled to obtain another user response voice successfully located. Perform voice verification until all successfully located users have voice verification.
  • This type of processing verifies the identity of multiple users at the same time, and by identifying the identity of each person, each person entering and leaving the room is a legitimate person with high security.
  • the multi-user processing mode is: controlling the access control terminal to play the identification prompt tone, obtaining only the user response voice of one of the successfully located users, and verifying the user response voice of the successfully located user. , according to the voice verification result to control the opening or closing of the access control.
  • This processing method verifies the identity of one of the multiple users that appear at the same time, and can meet the requirements of special rights management.
  • control access terminal uses the short-range wireless communication function of the mobile terminal to identify the mobile terminal in the monitoring area, specifically:
  • the mobile terminal is identified when the wireless response signal that the mobile terminal feeds back the broadcast signal to the access control terminal through the short-range wireless communication function is acquired.
  • step S140 when the user identity information is authenticated, the location of the user to which the mobile terminal belongs is specifically:
  • the infrared function of the access control terminal may be used to calculate the real-time distance between the user and the access control terminal.
  • the real-time distance between the user and the access control terminal may be calculated according to the strength of the acquired wireless response signal, or the real-time distance between the user and the access control terminal may be calculated by using the infrared function of the access control terminal, and the acquired wireless response signal may also be combined.
  • the strength of the weak and the infrared function of the access control terminal to calculate the real-time distance between the user and the access control terminal.
  • Embodiment 2 is a diagrammatic representation of Embodiment 1:
  • the access control method in the first embodiment is used to control the access control of the access control terminal.
  • the access control of the access control terminal when the access control of the access control terminal is controlled to be opened and closed, the user identity is first entered. That is, by matching with the mobile terminal provided with the short-range wireless communication function on the user side, the authentication list in which the user identity information is recorded is established to realize the entry of the user identity.
  • the user identity information in this embodiment includes an identifier that uniquely identifies the mobile terminal, user voice information, and user rights information, where the identifier of the mobile terminal is the UUID of the mobile terminal.
  • the monitoring method of the access control terminal of the access control system of this embodiment is shown in FIG. 2 and FIG. 3, and the access control monitoring system can be implemented by the main control computer in practical applications.
  • FIG. 2 is a flowchart of a method for monitoring an access control when entering a room according to an embodiment of the present invention
  • FIG. 3 is a flowchart of a method for monitoring an access control when leaving a room according to an embodiment of the present invention.
  • the access control device shown in FIG. 2 and FIG. 3 is used in this embodiment. The method details the opening logic of the present invention.
  • the access control method in Figure 2 is as follows:
  • the control access terminal sends a broadcast signal including the access terminal information every time interval, and waits for a response of the nearby mobile terminal.
  • this step extracts the UUID of each mobile terminal.
  • step S213. Determine whether the UUID of the mobile terminal exists in the authentication list, if yes, execute step S214, otherwise perform step S2111.
  • the UUIDs of the multiple mobile terminals are acquired, it is also determined whether the user information of the UUIDs of the multiple mobile terminals are the same. If they are the same, the mobile terminal is located. If not, the positioning is performed. A plurality of mobile terminals enter a multi-user processing mode when successfully locating a plurality of mobile terminals.
  • step S216 Determine, according to the permission information of the user, whether to start the voice recognition mode. If the user rights of the user are normal rights, perform step S217, if the user rights of the user are special rights, Then step S219 is performed.
  • step S218 Determine whether the user response voice is consistent with the user voice information. If yes, step S219 is performed. If not, step S2110 is performed.
  • the access control terminal is controlled to open the access control, and after the user leaves, the access control is closed, and the process returns to step S210.
  • step S2110 Control the access control terminal to keep the access control closed, and prompt the user to fail voice verification, and return to step S210.
  • S2111 Control the access terminal to play a prompt tone that is not authenticated by the user, and keep the access control closed, and return to step S210.
  • the access control method when leaving the room is shown in Figure 3.
  • the access control method in Figure 3 is as follows:
  • the control access terminal sends a broadcast signal including the access terminal information every time interval, and waits for a response of the nearby mobile terminal.
  • step S311 when a plurality of responding mobile terminals are found in step S311, this step preferably only locates the user of any one of the mobile terminals.
  • Embodiment 3 is a diagrammatic representation of Embodiment 3
  • the present embodiment provides an access control monitoring system that is applicable to a control area having a plurality of rooms.
  • FIG. 4 is a schematic structural diagram of the access control monitoring system provided in this embodiment, as shown in FIG. 4, the access control monitoring system in this embodiment includes an access control terminal 40 and an access control monitoring server 41 disposed in each room;
  • the access control monitoring server 41 is configured to complete the user identity entry, interact with the data of each access control terminal 40, and control each access terminal 40;
  • the access terminal 40 is configured to play broadcast information to the environment, play a prompt tone to the user, and perform data interaction with the access control monitoring server 41 under the control of the access control monitoring server 41, and cooperate with the access control monitoring server 41 to implement recognition of the mobile terminal. Positioning and voice verification of the user to which the mobile terminal belongs.
  • the access control monitoring server 41 includes a matching unit 411, an identification unit 412, an authentication unit 413, a positioning unit 414, and a voice identity verification unit 415.
  • the matching unit 411 is configured to perform matching with the mobile terminal provided with the short-range wireless communication function on the user side, and establish an authentication list in which the user identity information is recorded.
  • the identifying unit 412 is configured to: when the monitoring function is turned on, control the access terminal to identify the mobile terminal in the monitoring area by using the short-range wireless communication function of the mobile terminal.
  • the authentication unit 413 is configured to authenticate the user identity information of the user to which the mobile terminal belongs when the mobile terminal is identified.
  • the locating unit 414 is configured to locate the user to which the mobile terminal belongs when the user identity information is authenticated.
  • the voice identity verification unit 415 is configured to start a voice recognition mode for the user who successfully locates, control the access control terminal to play the identity recognition prompt tone, and verify the identity of the user according to the user response voice returned by the access control terminal, according to the voice verification result. Control the opening or closing of the access control.
  • the access control monitoring system of the embodiment combines the short-range wireless communication function and the voice recognition function to replace the traditional access control authentication method of the credit card, the fingerprint or the face recognition type, and the user is unaware of the short-distance wireless communication function by using the mobile device.
  • the user's mobile device is found and identified.
  • the voice recognition mode is controlled to be activated, and the user identity is verified by automatic voice recognition.
  • the access control system of the embodiment is more convenient and safer than the existing contact authentication method (such as swiping or fingerprinting) and the face recognition authentication method, and can effectively improve the user experience.
  • the access control monitoring system in FIG. 4 further includes a control unit
  • a positioning unit 414 configured to identify a mobile state of the mobile terminal when positioning the user to which the mobile terminal belongs;
  • the voice identity verification unit 415 is configured to start the voice recognition mode when the positioning unit 414 recognizes that the mobile state of the mobile terminal is entering the room;
  • the control unit is configured to control the access terminal 40 to open the access control when the positioning unit 414 recognizes that the mobile terminal moves away from the room, and closes the access control after the user leaves.
  • the user identity information in the matching unit 411 includes an identification code that uniquely identifies the mobile terminal.
  • the authentication unit 413 is specifically configured to acquire the mobile terminal from a wireless response signal sent by the mobile terminal. If the identification code exists in the authentication list, the user identity information of the user to which the mobile terminal belongs is authenticated; if the identification code does not exist in the authentication list, the user identity information of the user to which the mobile terminal belongs is not authenticated. Passing; wherein the wireless response signal is a signal that the mobile terminal feeds back to the broadcast signal sent by the access control terminal, and the broadcast signal is a signal sent by the access control terminal to identify the mobile terminal.
  • the matching unit 411 in the implementation is a device having the same short-range wireless communication function as the mobile terminal, so as to verify or detect the identification of the user-side mobile terminal when matching the mobile terminal on the user side. code.
  • the user identity information in the matching unit 411 further includes user voice information
  • the voice identity verification unit 415 is specifically configured to control the access control terminal to play the identity recognition prompt tone to the user, and obtain the user response voice returned by the access control terminal; and determine whether the acquired user response voice is consistent with the user voice information in the authentication list. If they are consistent, the access control terminal is opened to open the access control; if not, the control access control terminal keeps the access control closed, and prompts the user that the voice verification fails.
  • the matching unit 411 in this implementation has a voice input device to facilitate entry of user voice information.
  • the authenticated user rights may be different, that is, the user identity information recorded in the certificate list may further include user rights information.
  • the voice identity verification unit 415 is specifically configured to acquire the user rights information corresponding to the identifier of the mobile terminal, and determine whether the user rights information corresponding to the identifier is based on the user rights information corresponding to the identifier.
  • the voice recognition mode is activated. If the user right corresponding to the identification code is a normal right, the voice recognition mode is started. If the user right corresponding to the identification code is a special right, the drive control unit controls the access control terminal to open the access control.
  • the voice identity verification unit 415 when the positioning unit 414 locates a plurality of users successfully, the voice identity verification unit 415 enters a multi-user processing mode, controls the access control terminal to play an identity recognition prompt tone, and sequentially acquires each of the successfully positioned users. The user responds to the voice and records the time when the corresponding user answers the voice, and at the same time verifies the obtained user response voice successfully, and controls the opening or closing of the access control according to the voice verification result;
  • the identifying unit 412 is specifically configured to: the driving control unit controls the access control terminal to send a broadcast signal including the access terminal information every time interval, and obtains the mobile terminal through the short-range wireless communication function thereof When the access control terminal feeds back the wireless response signal of the broadcast signal, the mobile terminal is identified.
  • the positioning unit 414 is specifically configured to calculate a real-time distance between the user to which the mobile terminal belongs and the access control terminal according to the strength of the wireless response signal of the mobile terminal, and determine whether the user enters the target area of the access control terminal according to the calculated real-time distance. When the user to which the mobile terminal belongs enters the target area, the user to which the mobile terminal belongs is successfully located.
  • the infrared function of the access control terminal may be used to calculate the real-time distance between the user and the access control terminal.
  • the positioning unit 41 is specifically configured to drive the control unit to control the access control terminal to turn on the infrared function, and the positioning unit 41 calculates the user and the access terminal of the mobile terminal according to the strength of the wireless response signal of the mobile terminal and/or the infrared signal sent by the access control terminal. Real-time distance.
  • the short-range wireless communication function of the mobile terminal in this embodiment is preferably a Bluetooth low-power function, and the identification code of the mobile terminal is preferably a Bluetooth universal unique identification code.
  • the present invention provides an access control monitoring method and system.
  • the present invention combines a short-range wireless communication function and a voice recognition function to replace a conventional access authentication method for swiping, fingerprinting or face recognition, by using a mobile terminal.
  • the short-range wireless communication function discovers and recognizes the user's mobile terminal unconsciously, and when the mobile terminal is successfully identified, and the user to which the mobile terminal belongs reaches the target area, the voice recognition mode is controlled to be turned on, and the automatic voice recognition mode is adopted. Verify the user's identity.
  • the technical solution of the present invention is more convenient and safer than the existing contact authentication methods (such as swiping or fingerprinting) and the face recognition type authentication method, and can effectively improve the user experience.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Telephonic Communication Services (AREA)
  • Lock And Its Accessories (AREA)
  • Telephone Function (AREA)

Abstract

一种门禁监控方法和系统,该方法包括:与用户侧的设置有短距离无线通信功能的移动终端进行匹配,并建立记录有用户身份信息的认证列表(S110);当监控功能开启时,控制门禁终端对其监控区域中的移动终端进行识别(S120);在识别到移动终端时对移动终端所属用户的用户身份信息进行认证(S130);当用户信息认证通过时,对该移动终端所属用户进行定位(S140);对定位成功的用户,启动语音识别模式,控制门禁终端向用户播放身份识别提示音,并根据门禁终端返回的用户应答语音对用户的身份进行验证,根据验证结果控制门禁的打开或闭合(S150)。该技术方案相对于现有解除类认证方式和人脸识别类认证方式更方便、安全,且能够有效地提高用户体验。

Description

一种门禁监控方法和系统 技术领域
本发明涉及门禁控制技术领域,特别涉及一种门禁监控方法和系统。
发明背景
目前,国内的门禁系统主要通过卡类设备、指纹和人脸识别技术实现身份验证。
其中,卡类设备易丢失、遗忘,不但不方便身份验证,而且还存在安全隐患,如果被不法分子获得,即可实施盗窃。现有门禁系统多采用指纹类识别和人脸识别,其中指纹类识别可以解决卡类产品的不足,但约有5%左右的人群无法用指纹识别,而且接触识别的方式容易传播疾病,指纹类识别还存在遇到换季或气候干燥季节,需要连续多次才可以成功识别指纹的问题;人脸识别技术受限于光照、姿态和装饰品,在人脸比对时,若用户剃了胡须、多了眼镜或者变了表情都可能导致系统认证失败,给用户身份验证带来极大的不便。
发明内容
鉴于上述问题,本发明提供了一种门禁监控方法和系统,以提高用户身份认证的便捷性、安全性。
为达到上述目的,本发明的技术方案是这样实现的:
一方面,本发明提供了一种门禁监控方法,适用于具有多个房间的管制区域,每个房间设置有门禁终端,该门禁监控方法包括:
与用户侧的设置有短距离无线通信功能的移动终端进行匹配,并建立记录有用户身份信息的认证列表;
当监控功能开启时,控制门禁终端利用移动终端的短距离无线通信功能对其监控区域中的移动终端进行识别;
在识别到移动终端时,对移动终端所属用户的用户身份信息进行认证;
当用户身份信息认证通过时,对该移动终端所属用户进行定位;
对定位成功的用户,启动语音识别模式,控制门禁终端向用户播放身份识别提示音,并根据门禁终端返回的用户应答语音对用户的身份进行验证,根据语音验证结果控制门禁的打开或闭合。
另一方面,本发明还提供了一种门禁监控系统,适用于具有多个房间的管制区域,该门禁监控系统包括设置在每个房间的门禁终端和门禁监控服务器,门禁监控服务器包括:
匹配单元,用于与用户侧的设置有短距离无线通信功能的移动终端进行匹配,并建立记录有用户身份信息的认证列表;
识别单元,用于当监控功能开启时,控制门禁终端利用移动终端的短距离无线通信功能对其监控区域中的移动终端进行识别;
认证单元,用于在识别到移动终端时,对移动终端所属用户的用户身份信息进行认证;
定位单元,用于当用户身份信息认证通过时,对该移动终端所属用户进行定位;
语音身份验证单元,用于对定位成功的用户,启动语音识别模式,控制门禁终端向用户播放身份识别提示音,并根据门禁终端返回的用户应答语音对用户的身份进行验证,根据语音验证结果控制门禁的打开或闭合。
本发明实施例的有益效果是:本发明结合短距离无线通信功能和语音识别功能来代替传统的刷卡、指纹或人脸识别类的门禁认证方法,通过利用移动终端的短距离无线通信功能在用户不知不觉中发现并识别用户的移动终端,在成功识别到移动终端,且该移动终端所属用户到达目标区域时,控制语音识别模式开启,通过自动语音识别的方式验证用户身份。
本发明对用户身份的认证方式相较于现有接触类认证方式(如刷卡或指纹)和人脸识别类认证方式更为方便、安全,且能够有效地提高用户体验。
附图简要说明
附图用来提供对本发明的进一步理解,并且构成说明书的一部分,与本发明实施例一起用于解释本发明,并不构成对本发明的限制。在附图中:
图1为本发明实施例一提供的门禁监控方法流程图;
图2为本发明实施例二提供的进入房间时的门禁监控方法流程图;
图3为本发明实施例二提供的离开房间时的门禁监控方法流程图;
图4为本发明实施例一提供的门禁监控系统组成结构示意图。
实施本发明的方式
为使本发明的目的、技术方案和优点更加清楚,下面将结合附图对本发明实施方式作进一步地详细描述。
由于短距离无线通信技术具有低成本、低功耗、对等通信的特征和优势,短距离无线通信设备应用非常广泛,特别是在手机或可穿戴设备上得到了广泛的应用,该功能的这种低功耗特征使得用户的移动终端可以一直向外发送无线 信号。
语音识别也是一种非常常见的身份识别手段,其依据用户语音的音色或频率等特定语音信息的唯一性区分不同的用户。
基于上述描述,本发明的整体设计思想为:通过短距离无线通信功能发现并识别用户位置,在用户到达目标区域时控制语音识别模式开启,通过自动语音识别的方式验证用户身份,从而控制门禁的开和闭。
实施例一:
本实施例提供了一种适用于具有多个房间的管制区域的门禁监控方法,该管制区域的每个房间设置有门禁终端。
图1为本实施例提供的门禁监控方法流程图,如图1所示,图1中的方法包括:
S110,与用户侧的设置有短距离无线通信功能的移动终端进行匹配,并建立记录有用户身份信息的认证列表。
短距离无线通信技术主要包括蓝牙低功耗(Bluetooth Low Energy,BLE)、紫蜂协议ZigBee、近距离无线通信(Near Field Communication,NFC)和无线局域网(Wireless Local Area Networks,WLAN),由于BLE技术应用的广泛性,如手机端和手环等移动设备上的BLE功能,本实施例优选地利用移动设备的BLE功能对其所属用户进行身份验证。当然对于特定或专有场所,也可以利用具有WLAN功能、ZigBee功能或NFC功能的移动终端进行其所属用户的身份的验证。
步骤S110中的用户身份信息包括唯一标识移动终端的识别码,该识别码为移动终端的通用唯一识别码(Universally Unique Identifier,UUID),UUID能够保证同一时空中的所有设备都是唯一的,从而能够唯一标识移动设备所属用户。
需要说明的是,当本实施例中的移动终端为设置有BLE功能的移动终端时,其识别码为蓝牙通用唯一识别码,由于标准UUID的长度为128位,当应用在BLE功能的移动终端时,通常将标准UUID的16位或32位作为base UUID唯一标识用户。
S120,当监控功能开启时,控制门禁终端利用移动终端的短距离无线通信功能对其监控区域中的移动终端进行识别。
S130,在识别到移动终端时,对移动终端所属用户的用户身份信息进行认证。
S140,当用户身份信息认证通过时,对该移动终端所属用户进行定位。
S150,对定位成功的用户,启动语音识别模式,控制门禁终端向用户播放身份识别提示音,并根据门禁终端返回的用户应答语音对用户的身份进行验证,根据语音验证结果控制门禁的打开或闭合。
示例性的,可以由门禁监控服务器执行上述步骤S110至S150的具体内容。
本实施例结合短距离无线通信功能和语音识别功能来代替传统的刷卡、指纹或人脸识别类的门禁认证方法,通过利用移动终端的短距离无线通信功能在用户不知不觉中发现并识别用户的移动终端,在成功识别到移动终端,且该移动终端所属用户到达目标区域时,控制语音识别模式开启,通过自动语音识别的方式验证用户身份。
本实施例对用户身份的认证方式相较于现有接触类认证方式(如刷卡或指纹)和人脸识别类认证方式更为方便、安全,能够有效地提高用户体验。
在本实施例的一个实现方案中,上述步骤S140对该移动终端所属用户进行定位包括:识别移动终端的移动状态;
则上述步骤S150对定位成功的用户,启动语音识别模式具体为:当移动终端的移动状态为进入房间时,启动语音识别模式,开始语音验证;
当移动终端的移动状态为离开房间时,控制门禁终端打开门禁,待用户离开后关闭门禁。
本实现方案通过识别移动终端的移动状态,根据移动终端的移动状态判断其所属用户的运动状态,当移动终端所属用户想要进入房间时,启动语音识别模式,当移动终端所属用户想要从房间内离开时,打开门禁,使得门禁终端能够根据用户的意图进行相应的控制,更好的提升用户体验。
在本实施例的另一个实现方案中,步骤S110中建立的认证列表中记录的用户身份信息包括唯一标识移动终端的识别码;
则在上述步骤S130中,当识别到移动终端时,对移动终端所属用户的用户身份信息进行认证具体为:
从移动终端发送的无线响应信号中获取该移动终端的识别码,若该识别码存在于认证列表中,则该移动终端所属用户的用户身份信息认证通过;若该识别码未存在于认证列表中,则该移动终端所属用户的用户身份信息认证不通过;其中,无线响应信号为移动终端针对门禁终端发送的广播信号而反馈的信号,广播信号为门禁终端为识别移动终端而发出的信号。
显然,上述认证列表中记录的用户身份信息还包括用户语音信息;
则在上述步骤S150中,语音验证的具体过程为:
控制门禁终端向用户播放身份识别提示音,并获取门禁终端返回的用户应答语音;判断获取的用户应答语音是否与认证列表中的用户语音信息一致,若一致,控制门禁终端打开门禁;若不一致,控制门禁终端保持门禁闭合,并提示用户语音验证失败。
此外,考虑门禁终端的应用场景、管理方式等因素,认证的用户权限有可能不同,即认证列表中记录的用户身份信息还可以包括用户权限信息。
当步骤S110中建立的认证列表中记录有用户权限信息时,则在步骤S150中,对定位成功的用户,启动语音识别模式还包括:
获取该移动终端的识别码对应的用户权限信息;
根据该识别码对应的用户权限信息判断是否启动语音识别模式,若该识别码对应的用户权限为普通权限,则启动语音识别模式;若该识别码对应的用户权限为特殊权限,则跳过语音验证,控制门禁终端打开门禁。
在本实施例的另一实现方案中,门禁终端在其监控区域中可能识别到多个移动终端,此时首先判断识别到的多个移动终端是否为同一注册用户,如果为同一注册用户,则对任意一移动终端进行定位即可,如果多个移动终端所属用户不同,则定位该多个移动终端,当成功定位多个移动终端时,转向多用户处理模式。
具体的,当门禁终端在其监控区域中可能识别到多个移动终端时,上述步骤S130中对识别到的移动终端进行认证还包括:
获取每个移动终端的识别码,并判断每个移动终端的识别码的用户信息是否相同,若相同,则对任意一移动终端进行定位;若不相同,则定位该多个移动终端,在成功定位到多个移动终端时,进入多用户处理模式。
在本实现方案中,根据门禁终端的应用场景设置相应的多用户处理模式,当门禁终端应用于打卡签到的场景中,多用户处理模式为:控制门禁终端播放身份识别提示音,依次获取每个定位成功的用户应答语音,并记录获取到相应用户应答语音的时间,同时对获取的其中一定位成功的用户应答语音进行验证,根据语音验证结果控制门禁的打开或闭合。这种处理方式对同时出现的多个用户的身份进行验证,鉴别并记录每个人员的身份,能够满足打卡签到的需求。
当门禁终端应用在安全级别高的应用场景中时,多用户处理模式为:控制 门禁终端播放逐一验证身份提示音,每次只获取其中一定位成功用户的用户应答语音,在对该定位成功用户的用户应答语音验证结束后,再控制门禁终端获取另一定位成功的用户应答语音进行语音验证,直至所有成功定位到的用户都进行语音验证。这种处理方式逐一对同时出现的多个用户的身份进行验证,通过鉴别每个人员的身份,保证进出房间的每一个人员都是合法人员,安全性高。
当门禁终端应用于其他相应场景中时,多用户处理模式为:控制门禁终端播放身份识别提示音,只获取其中一定位成功用户的用户应答语音,并对该定位成功用户的用户应答语音进行验证,根据语音验证结果控制门禁的打开或闭合。这种处理方式对同时出现的多个用户中的一个用户的身份进行验证,能够满足特殊权限管理的需求。
在本实施例的又一实现方案中,在上述步骤S120中,控制门禁终端利用移动终端的短距离无线通信功能对其监控区域中的移动终端进行识别具体为:
控制门禁终端每时间间隔发送包含该门禁终端信息的广播信号;
在获取到移动终端通过短距离无线通信功能向门禁终端反馈广播信号的无线响应信号时,识别到移动终端。
则在步骤S140中,当用户身份信息认证通过时,对该移动终端所属用户进行定位具体为:
根据移动终端的无线响应信号的强弱计算该移动终端所属用户与门禁终端的实时距离;
根据计算到的移动终端所属用户与门禁终端的实时距离判断该移动终端所属用户是否进入门禁终端的目标区域,当其进入门禁终端的目标区域时,对该移动终端所属用户定位成功。
由于用户侧不同的BLE设备在门禁终端的监控区域的同一位置处,门禁终端获得的无线响应信号的强度会有一定的差异,因此还可以利用门禁终端的红外线功能计算用户与门禁终端的实时距离。
在本实现方案中,可以根据获取的无线响应信号的强弱计算用户与门禁终端的实时距离,也可以利用门禁终端的红外线功能计算用户与门禁终端的实时距离,还可以结合获取的无线响应信号的强弱和门禁终端的红外线功能来计算用户与门禁终端的实时距离。
实施例二:
本实施例采用实施例一中的门禁监控方法控制门禁终端的门禁。
本实施例在控制门禁终端的门禁的开和闭时,先完成用户身份的录入。即通过与用户侧的设置有短距离无线通信功能的移动终端进行匹配,建立记录有用户身份信息的认证列表实现用户身份的录入。
需要说明的是,本实施例中的用户身份信息包括唯一标识移动终端的识别码、用户语音信息和用户权限信息,其中移动终端的识别码为移动终端的UUID。
本实施例的门禁监控系统对门禁终端的监控方法如图2和图3所示,门禁监控系统在实际应用中可采用主控电脑实现。
图2为本实施例提供的进入房间时的门禁监控方法流程图,图3为本实施例提供的离开房间时的门禁监控方法流程图,本实施例通过图2和图3所示的门禁监控方法详细说明本发明的开门逻辑。
其中,进入房间时的门禁监控方法如图2所示,图2中的门禁监控方法如下:
S210,控制门禁终端每时间间隔发送包含该门禁终端信息的广播信号,等待附近的移动终端的响应。
S211,发现移动终端响应。
在本步骤中,当获取到移动终端通过短距离无线通信功能向门禁终端反馈广播信号的无线响应信号时,发现响应的移动终端。
S212,从获取的无线响应信号中提取该移动终端的UUID。
需要说明的是,当在步骤S211中发现多个响应的移动终端时,本步骤提取每个移动终端的UUID。
S213,判断上述移动终端的UUID是否存在于认证列表中,若存在则执行步骤S214,否则执行步骤S2111。
需要说明的是,当获取到多个移动终端的UUID时,还需判断多个移动终端的UUID的用户信息是否相同,若相同,则对任意一移动终端进行定位;若不相同,则定位该多个移动终端,在成功定位到多个移动终端时,进入多用户处理模式。
S214,定位移动终端所属用户。
S215,在移动终端所属用户到达目标区域,且该移动终端所属用户的运动状态为进入房间时,获取移动终端所属用户的权限信息。
S216,根据所属用户的权限信息判断是否启动语音识别模式,若所属用户的用户权限为普通权限,则执行步骤S217,若所属用户的用户权限为特殊权限, 则执行步骤S219。
S217,启动语音识别模式,获取用户应答语音。
S218,判断用户应答语音是否与用户语音信息一致,若一致则执行步骤S219,若不一致则执行步骤S2110。
S219,控制门禁终端打开门禁,待用户离开后关闭门禁,返回步骤S210。
S2110,控制门禁终端保持门禁闭合,并提示用户语音验证失败,返回步骤S210。
S2111,控制门禁终端播放用户未认证的提示音,并保持门禁闭合,返回步骤S210。
离开房间时的门禁监控方法如图3所示,图3中的门禁监控方法如下:
S310,控制门禁终端每时间间隔发送包含该门禁终端信息的广播信号,等待附近的移动终端的响应。
S311,发现移动终端响应。
在本步骤中,当获取到移动终端通过短距离无线通信功能向门禁终端反馈广播信号的无线响应信号时,发现响应的移动终端。
S312,定位移动终端所属用户。
需要说明的是,当在步骤S311中发现多个响应的移动终端时,本步骤优选地只对其中任意一移动终端的所属用户进行定位即可。
S313,在移动终端所属用户到达目标区域,且该移动终端所属用户的运动状态为离开房间时,控制门禁终端打开门禁,待用户离开后关闭门禁。
实施例三:
基于与实施例一或实施例二相同的技术构思,本实施例提供了一种门禁监控系统,该门禁监控系统适用于具有多个房间的管制区域。
图4为本实施例提供的门禁监控系统组成结构示意图,如图4所示,本实施例中的门禁监控系统包括设置在每个房间的门禁终端40和门禁监控服务器41;
门禁监控服务器41,用于完成用户身份的录入,与各门禁终端40的数据交互以及对各门禁终端40进行控制;
门禁终端40,用于在门禁监控服务器41的控制下,向环境中播放广播信息、向用户播放提示音,以及与门禁监控服务器41进行数据交互,配合门禁监控服务器41实现对移动终端的识别、定位和移动终端所属用户的语音验证。
其中,门禁监控服务器41包括:匹配单元411、识别单元412、认证单元413、定位单元414和语音身份验证单元415。
匹配单元411,用于与用户侧设置有短距离无线通信功能的移动终端进行匹配,并建立记录有用户身份信息的认证列表。
识别单元412,用于当监控功能开启时,控制门禁终端利用移动终端的短距离无线通信功能对其监控区域中的移动终端进行识别。
认证单元413,用于在识别到移动终端时,对移动终端所属用户的用户身份信息进行认证。
定位单元414,用于当用户身份信息认证通过时,对该移动终端所属用户进行定位。
语音身份验证单元415,用于对定位成功的用户,启动语音识别模式,控制门禁终端向用户播放身份识别提示音,并根据门禁终端返回的用户应答语音对用户的身份进行验证,根据语音验证结果控制门禁的打开或闭合。
本实施例的门禁监控系统结合短距离无线通信功能和语音识别功能来代替传统的刷卡、指纹或人脸识别类的门禁认证方法,通过利用移动设备的短距离无线通信功能在用户不知不觉中发现并识别用户的移动设备,在成功识别到移动设备,且该移动终端所属用户到达目标区域时,控制语音识别模式开启,通过自动语音识别的方式验证用户身份。
本实施例的门禁监控系统对用户身份的认证方式相较于现有接触类认证方式(如刷卡或指纹)和人脸识别类认证方式更为方便、安全,能够有效地提高用户体验。
在本实施例的一个实现方案中,图4中的门禁监控系统还包括控制单元;
定位单元414,用于在对移动终端所属用户进行定位时,识别移动终端的移动状态;
语音身份验证单元415,用于当定位单元414识别到移动终端的移动状态为进入房间时,启动语音识别模式;
控制单元,用于当定位单元414识别到移动终端的移动状态为离开房间时,控制门禁终端40打开门禁,待用户离开后关闭门禁。
在本实施例的另一个实现方案中,匹配单元411中的用户身份信息包括唯一标识移动终端的识别码。
认证单元413,具体用于从移动终端发送的无线响应信号中获取该移动终端 的识别码,若该识别码存在于认证列表中,则该移动终端所属用户的用户身份信息认证通过;若该识别码未存在于认证列表中,则该移动终端所属用户的用户身份信息认证不通过;其中,无线响应信号为移动终端针对门禁终端发送的广播信号而反馈的信号,广播信号为门禁终端为识别移动终端而发出的信号。
需要说明的是,本实现方案中的匹配单元411为具有与移动终端相同的短距离无线通信功能的设备,以便于在对用户侧的移动终端进行匹配时,验证或检测用户侧移动终端的识别码。
显然,匹配单元411中的用户身份信息还包括用户语音信息;
则语音身份验证单元415,具体用于控制门禁终端向用户播放身份识别提示音,并获取门禁终端返回的用户应答语音;以及用于判断获取的用户应答语音是否与认证列表中的用户语音信息一致,若一致,控制门禁终端打开门禁;若不一致,控制门禁终端保持门禁闭合,并提示用户语音验证失败。
需要说明的是,本实现方案中的匹配单元411具有语音录入设备,以便于录入用户语音信息。
此外,考虑门禁终端的应用场景、管理方式等因素,认证的用户权限有可能不同,即证列表中记录的用户身份信息还可以包括用户权限信息。
当匹配单元411中的用户身份信息还包括用户权限信息时,则语音身份验证单元415,具体用于获取该移动终端的识别码对应的用户权限信息,根据该识别码对应的用户权限信息判断是否启动语音识别模式,若该识别码对应的用户权限为普通权限,则启动语音识别模式;若该识别码对应的用户权限为特殊权限,则驱动控制单元控制门禁终端打开门禁。
在本实施例的另一实现方案中,当定位单元414定位成功多个用户时,语音身份验证单元415进入多用户处理模式,控制门禁终端播放身份识别提示音,依次获取每个定位成功用户的用户应答语音,并记录获取到相应用户应答语音的时间,同时对获取的其中一定位成功的用户应答语音进行验证,根据语音验证结果控制门禁的打开或闭合;
或者,控制门禁终端播放身份识别提示音,只获取其中一定位成功用户的用户应答语音,对该定位成功用户的用户应答语音进行验证,根据语音验证结果控制门禁的打开或闭合;
或者,控制门禁终端播放逐一验证身份提示音,只获取其中一定位成功用户的用户应答语音,在对该定位成功用户语音验证结束后,再控制门禁终端获 取另一定位成功用户的用户应答语音进行语音验证,直至所有成功定位到的用户都进行语音验证。
在本实施例的又一实现方案中,识别单元412,具体用于驱动控制单元控制门禁终端每时间间隔发送包含该门禁终端信息的广播信号,在获取到移动终端通过其短距离无线通信功能向门禁终端反馈广播信号的无线响应信号时,识别到移动终端。
则定位单元414,具体用于根据移动终端的无线响应信号的强弱计算该移动终端所属用户与门禁终端的实时距离;以及用于根据计算得到的实时距离判断用户是否进入门禁终端的目标区域,当该移动终端所属用户进入目标区域时,对该移动终端所属用户定位成功。
由于用户侧不同的BLE设备在门禁终端的监控区域的同一位置处,门禁终端获得的无线响应信号的强度会有一定的差异,因此还可以利用门禁终端的红外线功能计算用户与门禁终端的实时距离。
具体的,定位单元41,具体用于驱动控制单元控制门禁终端开启红外线功能,定位单元41根据移动终端的无线响应信号的强弱和/或门禁终端发送的红外线信号计算移动终端所属用户与门禁终端的实时距离。
本实施例中移动终端的短距离无线通信功能优选为蓝牙低功耗功能,移动终端的识别码优选为蓝牙通用唯一识别码。
综上所述,本发明提供了一种门禁监控方法和系统,本发明结合短距离无线通信功能和语音识别功能来代替传统的刷卡、指纹或人脸识别类的门禁认证方法,通过利用移动终端的短距离无线通信功能在用户不知不觉中发现并识别用户的移动终端,在成功识别到移动终端,且该移动终端所属用户到达目标区域时,控制语音识别模式开启,通过自动语音识别的方式验证用户身份。本发明的技术方案相较于现有接触类认证方式(如刷卡或指纹)和人脸识别类认证方式更为方便、安全,且能够有效地提高用户体验。
以上所述仅为本发明的较佳实施例而已,并非用于限定本发明的保护范围。凡在本发明的精神和原则之内所作的任何修改、等同替换、改进等,均包含在本发明的保护范围内。

Claims (15)

  1. 一种门禁监控方法,适用于具有多个房间的管制区域,每个房间设置有门禁终端,其中,所述门禁监控方法包括:
    与用户侧的设置有短距离无线通信功能的移动终端进行匹配,并建立记录有用户身份信息的认证列表;
    当监控功能开启时,控制所述门禁终端利用移动终端的短距离无线通信功能对其监控区域中的移动终端进行识别;
    在识别到移动终端时,对所述移动终端所属用户的用户身份信息进行认证;
    当用户身份信息认证通过时,对该移动终端所属用户进行定位;
    对定位成功的用户,启动语音识别模式,控制所述门禁终端向用户播放身份识别提示音,并根据所述门禁终端返回的用户应答语音对用户的身份进行验证,根据语音验证结果控制门禁的打开或闭合。
  2. 根据权利要求1所述的门禁监控方法,其中,所述对该移动终端所属用户进行定位包括:
    识别所述移动终端的移动状态;
    则对定位成功的用户,启动语音识别模式包括:
    当所述移动终端的移动状态为进入房间时,启动语音识别模式;
    当所述移动终端的移动状态为离开房间时,控制所述门禁终端打开门禁,待用户离开后关闭门禁。
  3. 根据权利要求1所述的门禁监控方法,其中,所述用户身份信息包括唯一标识所述移动终端的识别码;
    所述在识别到移动终端时,对所述移动终端所属用户的用户身份信息进行认证具体为:
    从移动终端发送的无线响应信号中获取该移动终端的识别码,若该识别码存在于所述认证列表中,则该移动终端所属用户的用户身份信息认证通过;若该识别码未存在于所述认证列表中,则该移动终端所属用户的用户身份信息认证不通过;所述无线响应信号为移动终端针对门禁终端发送的广播信号而反馈的信号,所述广播信号为门禁终端为识别移动终端而发出的信号。
  4. 根据权利要求3所述的门禁监控方法,其中,所述用户身份信息还包括用户权限信息,所述对定位成功的用户,启动语音识别模式还包括:
    获取该移动终端的识别码对应的用户权限信息;
    根据该识别码对应的用户权限信息判断是否启动语音识别模式,若该识别码对应的用户权限为普通权限,则启动语音识别模式;若该识别码对应的用户权限为特殊权限,则跳过语音验证,控制所述门禁终端打开门禁。
  5. 根据权利要求1所述的门禁监控方法,其中,当成功定位到多个用户时,所述启动语音识别模式,控制所述门禁终端向用户播放身份识别提示音,并根据所述门禁终端返回的用户应答语音对用户的身份进行验证包括:
    进入多用户处理模式,控制所述门禁终端播放身份识别提示音,依次获取每个定位成功用户的用户应答语音,并记录获取到相应用户应答语音的时间,同时对获取的其中一定位成功的用户应答语音进行验证,根据语音验证结果控制门禁的打开或闭合;
    或者,控制所述门禁终端播放身份识别提示音,只获取其中一定位成功的用户应答语音,对该定位成功用户的用户应答语音进行验证,根据语音验证结果控制门禁的打开或闭合;
    或者,控制所述门禁终端播放逐一验证身份提示音,只获取其中一定位成功的用户应答语音,在对该定位成功的用户应答语音验证结束后,再控制所述门禁终端获取另一定位成功的用户应答语音并进行语音验证,直至所有定位成功的用户都进行语音验证。
  6. 根据权利要求1所述的门禁监控方法,其中,所述控制门禁终端利用移动终端的短距离无线通信功能对其监控区域中的移动终端进行识别包括:
    控制所述门禁终端每时间间隔发送包含该门禁终端信息的广播信号;
    在获取到移动终端通过短距离无线通信功能向门禁终端反馈所述广播信号的无线响应信号时,识别到移动终端。
  7. 根据权利要求6所述的门禁监控方法,其中,所述当用户身份信息认证通过时,对该移动终端所属用户进行定位具体为:
    根据所述移动终端的无线响应信号的强弱和/或根据所述门禁终端的红外线功能计算该移动终端所属用户与所述门禁终端的实时距离;
    根据计算得到的所述实时距离判断用户是否进入所述门禁终端的目标区域,当该移动终端所属用户进入所述目标区域时,对该移动终端所属用户定位成功。
  8. 根据权利要求6所述的门禁监控方法,其中,所述移动终端的短距离无 线通信功能为蓝牙低功耗功能,所述识别码为蓝牙通用唯一识别码。
  9. 一种门禁监控系统,适用于具有多个房间的管制区域,其中,所述门禁监控系统包括设置在每个房间的门禁终端和门禁监控服务器,所述门禁监控服务器包括:
    匹配单元,用于与用户侧设置有短距离无线通信功能的移动终端进行匹配,并建立记录有用户身份信息的认证列表;
    识别单元,用于当监控功能开启时,控制所述门禁终端利用移动终端的短距离无线通信功能对其监控区域中的移动终端进行识别;
    认证单元,用于在识别到移动终端时,对所述移动终端所属用户的用户身份信息进行认证;
    定位单元,用于当用户身份信息认证通过时,对该移动终端所属用户进行定位;
    语音身份验证单元,用于对定位成功的用户,启动语音识别模式,控制所述门禁终端向用户播放身份识别提示音,并根据所述门禁终端返回的用户应答语音对用户的身份进行验证,根据语音验证结果控制门禁的打开或闭合。
  10. 根据权利要求9所述的门禁监控系统,其中,所述门禁监控系统还包括控制单元;
    所述定位单元,用于在对移动终端所属用户进行定位时,识别所述移动终端的移动状态;
    所述语音身份验证单元,用于当所述定位单元识别到所述移动终端的移动状态为进入房间时,启动语音识别模式;
    所述控制单元,用于当所述定位单元识别到所述移动终端的移动状态为离开房间时,控制所述门禁终端打开门禁,待用户离开后关闭门禁。
  11. 根据权利要求9所述的门禁监控系统,其中,所述匹配单元中的用户身份信息包括唯一标识所述移动终端的识别码;
    所述认证单元,具体用于从移动终端发送的无线响应信号中获取该移动终端的识别码,若该识别码存在于所述认证列表中,则该移动终端所属用户的用户身份信息认证通过;若该识别码未存在于所述认证列表中,则该移动终端所属用户的用户身份信息认证不通过;所述无线响应信号为移动终端针对门禁终端发送的广播信号而反馈的信号,所述广播信号为门禁终端为识别移动终端而发出的信号。
  12. 根据权利要求11所述的门禁监控系统,其中,所述匹配单元中的用户身份信息还包括用户权限信息;
    所述语音身份验证单元,具体用于获取该移动终端的识别码对应的用户权限信息;以及,根据该识别码对应的用户权限信息判断是否启动语音识别模式,若该识别码对应的用户权限为普通权限,则启动语音识别模式;若该识别码对应的用户权限为特殊权限,则跳过语音验证,驱动所述控制单元控制所述门禁终端打开门禁。
  13. 根据权利要求9所述的门禁监控系统,其中,当所述定位单元成功定位到多个用户时,所述语音身份验证单元进入多用户处理模式,控制所述门禁终端播放身份识别提示音,依次获取每个定位成功用户的用户应答语音,并记录获取到相应用户应答语音的时间,同时对获取的其中一定位成功的用户应答语音进行验证,根据语音验证结果控制门禁的打开或闭合;
    或者,控制所述门禁终端播放身份识别提示音,只获取其中一定位成功的用户应答语音,并对该定位成功的用户应答语音进行验证,根据语音验证结果控制门禁的打开或闭合;
    或者,控制所述门禁终端播放逐一验证身份提示音,只获取其中一定位成功的用户应答语音,在对该定位成功的用户应答语音验证结束后,再控制所述门禁终端获取另一定位成功的用户应答语音并进行语音验证,直至所有定位成功的用户都进行语音验证。
  14. 根据权利要求9所述的门禁监控系统,其中,所述识别单元,具体用于控制所述门禁终端每时间间隔发送包含该门禁终端信息的广播信号;在获取到移动终端通过短距离无线通信功能向门禁终端反馈所述广播信号的无线响应信号时,识别到移动终端。
  15. 根据权利要求14所述的门禁监控系统,其中,所述定位单元,用于根据所述移动终端的无线响应信号的强弱和/或根据所述门禁终端的红外线功能计算该移动终端所属用户与所述门禁终端的实时距离;根据计算得到的所述实时距离判断用户是否进入所述门禁终端的目标区域,当该移动终端所属用户进入所述目标区域时,对该移动终端所属用户定位成功。
PCT/CN2016/086936 2015-12-24 2016-06-23 一种门禁监控方法和系统 WO2017107418A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/517,336 US9928670B2 (en) 2015-12-24 2016-06-23 Method and system for access control monitoring

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201511002952.8A CN105654584B (zh) 2015-12-24 2015-12-24 一种门禁监控方法和系统
CN201511002952.8 2015-12-24

Publications (1)

Publication Number Publication Date
WO2017107418A1 true WO2017107418A1 (zh) 2017-06-29

Family

ID=56478085

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/086936 WO2017107418A1 (zh) 2015-12-24 2016-06-23 一种门禁监控方法和系统

Country Status (3)

Country Link
US (1) US9928670B2 (zh)
CN (1) CN105654584B (zh)
WO (1) WO2017107418A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111066068A (zh) * 2017-09-19 2020-04-24 三菱电机株式会社 出入室管理装置以及出入室管理系统
CN113516805A (zh) * 2021-03-09 2021-10-19 北京戴纳实验科技有限公司 一种细胞间门禁系统及细胞间安全出入方法

Families Citing this family (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105654584B (zh) 2015-12-24 2018-05-08 歌尔股份有限公司 一种门禁监控方法和系统
US9807568B1 (en) * 2016-04-19 2017-10-31 Siemens Industry, Inc. System and method for passive building information discovery
KR102193036B1 (ko) * 2016-07-05 2020-12-18 삼성전자주식회사 디스플레이장치, 디스플레이장치의 구동방법 및 컴퓨터 판독가능 기록매체
TWM535833U (zh) * 2016-08-25 2017-01-21 Ma Frank Tsu-Yuan 應用藍牙技術之短距媒合模組
CN106652137B (zh) * 2016-12-27 2020-04-24 上海斐讯数据通信技术有限公司 一种基于wifi的景区门禁查验系统及其使用方法
CN106898069B (zh) * 2017-02-24 2019-10-01 广东林盟科技有限公司 门禁系统
AU2018251060B2 (en) 2017-04-10 2021-07-08 Inventio Ag Visitor access control system with radio identification and facial recognition
US11238684B2 (en) 2017-04-10 2022-02-01 Inventio Ag Access control system for radio and facial recognition
CN107071710B (zh) * 2017-04-10 2021-12-28 胡渐佳 基于用户识别的进出门语音智能播放系统
CN107657695A (zh) * 2017-09-19 2018-02-02 上海斐讯数据通信技术有限公司 一种基于云的开锁方法及系统
EP3729384A1 (de) * 2017-12-20 2020-10-28 Inventio AG Zugangskontrollsystem mit funk- und gesichtserkennung
CN108492452A (zh) * 2018-03-20 2018-09-04 郴州多特科技发展有限公司 一种机器人贩卖系统及其对应的操作方法
CN109086669B (zh) * 2018-06-29 2020-06-09 汉王科技股份有限公司 人脸识别身份验证方法、装置、电子设备
CN108922000A (zh) * 2018-07-19 2018-11-30 惠州Tcl家电集团有限公司 智能门锁控制方法、装置及计算机可读存储介质
CN109273009A (zh) * 2018-08-02 2019-01-25 平安科技(深圳)有限公司 门禁控制方法、装置、计算机设备和存储介质
CN109214158A (zh) * 2018-08-30 2019-01-15 东莞广宇精密电子有限公司 一种刷卡人脸识别控制系统
CN109461242A (zh) * 2018-12-28 2019-03-12 上海与德通讯技术有限公司 一种门禁控制方法、装置、终端及存储介质
US20220200973A1 (en) * 2019-04-15 2022-06-23 Bear System, LLC Blockchain schema for secure data transmission
US11483143B2 (en) * 2019-04-15 2022-10-25 Smart Security Systems, Llc Enhanced monitoring and protection of enterprise data
CN112184936B (zh) * 2019-07-02 2023-08-29 鸿富锦精密电子(郑州)有限公司 电子装置及刷卡侦测方法
CN110728807B (zh) * 2019-09-27 2022-02-11 深圳市海雀科技有限公司 智能门铃的防拆方法及装置
CN113257241A (zh) * 2020-02-11 2021-08-13 青岛海尔空调器有限总公司 一种智能家电及其语音控制方法
CN111599076A (zh) * 2020-05-11 2020-08-28 安徽民生信息股份有限公司 一种基于物联网门禁管理的报警装置
CN111882740A (zh) * 2020-07-21 2020-11-03 中国工商银行股份有限公司 门禁验证方法、门禁装置、服务器及系统
CN112927412A (zh) * 2021-01-30 2021-06-08 上海电机学院 一种用于风力发电机的门禁系统
CN114220206A (zh) * 2021-12-08 2022-03-22 全民认证科技(杭州)有限公司 适用于多场景的智能门禁控制方法及系统
CN114257458A (zh) * 2022-01-08 2022-03-29 广州市成格信息技术有限公司 一种全光网络多功能网关
CN115083417A (zh) * 2022-06-11 2022-09-20 南京龙垣信息科技有限公司 一种基于语音识别技术的智能安防系统
CN115051877B (zh) * 2022-08-12 2022-11-01 国网浙江省电力有限公司杭州供电公司 基于零信任模型的电网云业务安全访问方法
CN115482626B (zh) * 2022-08-17 2023-08-29 宁波美喵科技有限公司 共享单车语音播报方法、装置、设备及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1120752A1 (de) * 2000-01-24 2001-08-01 Franke & Co. Verwaltungs KG System zur Kontrolle von Zugangs- bzw. Zugriffsberechtigungen
US20080224859A1 (en) * 2007-03-15 2008-09-18 Shih-Hsiung Li Door lock control system integrated with sensing and audio/image identification functions
CN201965672U (zh) * 2010-09-21 2011-09-07 深圳市丰泰瑞达实业有限公司 一种校园安全管理系统
CN102306412A (zh) * 2011-08-23 2012-01-04 厦门大学 电话声纹门禁系统
CN104063931A (zh) * 2014-06-18 2014-09-24 大连智慧城科技有限公司 一种基于无线信号标识的移动互联网门禁系统和实现方法
CN105654584A (zh) * 2015-12-24 2016-06-08 歌尔声学股份有限公司 一种门禁监控方法和系统

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2966627B1 (fr) * 2010-10-26 2012-12-21 Somfy Sas Procede de fonctionnement d'une unite mobile de commande d'une installation domotique.
US8831677B2 (en) * 2010-11-17 2014-09-09 Antony-Euclid C. Villa-Real Customer-controlled instant-response anti-fraud/anti-identity theft devices (with true-personal identity verification), method and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without NFC component and system, with cellular/satellite phone/internet/multi-media functions
US20160012445A1 (en) * 2011-11-10 2016-01-14 Antony-Euclid C. Villa-Real Customer-controlled instant-response anti-fraud/anti-identity theft devices (with true-personal identity verification), methods and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without nfc component and system, with cellular/satellite phone/internet/multi-media functions
CN103902860A (zh) * 2012-12-27 2014-07-02 方正国际软件(北京)有限公司 一种双重身份验证方法及系统
CN203340288U (zh) * 2013-01-25 2013-12-11 歌尔声学股份有限公司 一种室内无线定位系统和智能终端
CN203376792U (zh) * 2013-07-04 2014-01-01 纳米新能源(唐山)有限责任公司 基于移动终端的门禁管理系统及门禁终端
CN103821413B (zh) * 2014-03-11 2015-12-30 重庆金瓯科技发展有限责任公司 一种蓝牙电子自动锁系统及其开关方法
CN104063930A (zh) * 2014-06-18 2014-09-24 大连智慧城科技有限公司 一种基于位置的多门禁智能识别系统和方法
CN204255372U (zh) * 2014-12-11 2015-04-08 深圳市猎梦者文化科技有限公司 基于门禁系统的定位装置
CN104867214B (zh) * 2015-05-22 2017-11-14 青岛歌尔声学科技有限公司 基于声波识别的开门方法和系统
CN105118125B (zh) * 2015-08-28 2017-12-19 移康智能科技(上海)股份有限公司 一种电子门锁的智能解锁方法及系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1120752A1 (de) * 2000-01-24 2001-08-01 Franke & Co. Verwaltungs KG System zur Kontrolle von Zugangs- bzw. Zugriffsberechtigungen
US20080224859A1 (en) * 2007-03-15 2008-09-18 Shih-Hsiung Li Door lock control system integrated with sensing and audio/image identification functions
CN201965672U (zh) * 2010-09-21 2011-09-07 深圳市丰泰瑞达实业有限公司 一种校园安全管理系统
CN102306412A (zh) * 2011-08-23 2012-01-04 厦门大学 电话声纹门禁系统
CN104063931A (zh) * 2014-06-18 2014-09-24 大连智慧城科技有限公司 一种基于无线信号标识的移动互联网门禁系统和实现方法
CN105654584A (zh) * 2015-12-24 2016-06-08 歌尔声学股份有限公司 一种门禁监控方法和系统

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111066068A (zh) * 2017-09-19 2020-04-24 三菱电机株式会社 出入室管理装置以及出入室管理系统
CN111066068B (zh) * 2017-09-19 2022-07-15 三菱电机株式会社 出入室管理装置以及出入室管理系统
CN113516805A (zh) * 2021-03-09 2021-10-19 北京戴纳实验科技有限公司 一种细胞间门禁系统及细胞间安全出入方法
CN113516805B (zh) * 2021-03-09 2023-01-17 北京戴纳实验科技有限公司 一种细胞间门禁系统及细胞间安全出入方法

Also Published As

Publication number Publication date
US9928670B2 (en) 2018-03-27
CN105654584A (zh) 2016-06-08
CN105654584B (zh) 2018-05-08
US20180047226A1 (en) 2018-02-15

Similar Documents

Publication Publication Date Title
WO2017107418A1 (zh) 一种门禁监控方法和系统
KR102536924B1 (ko) 비콘 신호를 이용하여 도어 출입을 관리하기 위한 방법 및 시스템
JP5816693B2 (ja) セキュアリソースへのアクセス方法およびシステム
WO2016049898A1 (zh) 身份认证的方法、装置及用户设备
US10230723B2 (en) Method and system for authenticating a session on a communication device
US20170004296A1 (en) Biometric authentication method and biometric authentication system
CN110149618B (zh) 基于声纹授权的智能设备接入方法、装置、设备及介质
KR20170078316A (ko) 사용자 모바일 단말을 이용한 보안 관리 시스템 및 그 방법
KR101407443B1 (ko) 근거리무선통신 기능을 이용한 사용자 인증 시스템 및 사용자 인증 방법
KR101968167B1 (ko) 신체정보 및 행동정보를 이용한 보안 서비스를 운영하는 방법 및 시스템
WO2017016027A1 (zh) 连接建立方法、连接建立装置和通信系统
AU2019286536A1 (en) Universal personal identification signal
WO2016101272A1 (zh) 一种网络模式的调整方法及装置
JP2023094976A (ja) 情報処理装置、プログラム及び制御方法
TWM565383U (zh) 保全設定裝置與保全系統
WO2017020421A1 (zh) 基于生物识别的设备配对方法及装置
TW201627903A (zh) 存取服務授權系統及其方法

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 15517336

Country of ref document: US

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16877231

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16877231

Country of ref document: EP

Kind code of ref document: A1