WO2018014350A1 - 设备控制方法、终端和控制装置 - Google Patents

设备控制方法、终端和控制装置 Download PDF

Info

Publication number
WO2018014350A1
WO2018014350A1 PCT/CN2016/091076 CN2016091076W WO2018014350A1 WO 2018014350 A1 WO2018014350 A1 WO 2018014350A1 CN 2016091076 W CN2016091076 W CN 2016091076W WO 2018014350 A1 WO2018014350 A1 WO 2018014350A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
terminal
status code
perform
code
Prior art date
Application number
PCT/CN2016/091076
Other languages
English (en)
French (fr)
Inventor
石林
Original Assignee
深圳中兴力维技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳中兴力维技术有限公司 filed Critical 深圳中兴力维技术有限公司
Priority to PCT/CN2016/091076 priority Critical patent/WO2018014350A1/zh
Publication of WO2018014350A1 publication Critical patent/WO2018014350A1/zh

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/10Movable barriers with registering means

Definitions

  • the present invention relates to the field of electronic technologies, and in particular, to a device control method, a terminal, and a control device.
  • a device control method including: after receiving a first operation of a user to a terminal, generating a first status code indicating that the user is in a secure state; The user sends a request to the control device for controlling the device to perform a specified operation on the device; and the first status code and the preset identification code for indicating the authority of the user are issued for
  • the control device determines, according to the rights information and the identification code, which are preset to be used for recording operations that allow and/or prohibit the device to perform operations under different rights, whether the user has the right to command the device to perform the designation. In operation, if the result of the determination is yes and the first status code exists, the device is controlled to perform the specified operation.
  • the foregoing method further includes: after receiving the second operation of the user by the user, generating a second status code indicating that the user is in an unsecured state; Second status code and Sending the identification code for the control device to determine, according to the identification code, whether the user has the right to command the device to perform the specified operation, and the determination result is yes and the second status code exists. Send an alarm signal.
  • the first operation is an operation of the user on a button of the terminal and/or an operation of changing a posture of the terminal;
  • the second operation is The operation of the button of the terminal and/or the operation of changing the posture of the terminal.
  • the device belongs to an access control system.
  • a device control method comprising: receiving a request by a user to request a device to perform a specified operation; receiving a first terminal from the user to indicate that the user is in a secure state a status code and an identification code for indicating the authority that the user has; determining the user according to preset permission information for recording and/or prohibiting operations performed by the device under different rights and the identification code Whether there is permission to instruct the device to perform the specified operation, and if the result of the determination is yes and the first status code exists, the device is controlled to perform the specified operation.
  • the foregoing method further includes: receiving, by the terminal, a second status code indicating that the user is in a non-secure state, and the identifier code; determining the user according to the identifier code Whether there is permission to instruct the device to perform the specified operation, and if the result of the determination is yes and the second status code is present, an alarm signal is issued.
  • the foregoing method further includes: receiving new rights information to update the existing rights information.
  • the device belongs to an access control system.
  • a terminal including: a status code generating module, configured to generate, after receiving a first operation of a user by a user, a first a status code; wherein, the user sends a request to the control device for controlling the device, requesting to perform a specified operation on the device; and a sending module, configured to use the first status code and the preset to indicate the The identification code of the privilege that the user has sent is sent by the control device to determine the user according to the preset permission information for recording and/or prohibiting the operation performed by the device under different permissions and the identification code.
  • the status code generating module further generates a second status code indicating that the user is in an unsecured state after receiving the second operation of the user by the user And sending, by the sending module, the second status code and the identifier code, to be sent by the control device, and determining, according to the identification code, whether the user has permission to command the device to perform the specified operation, When the judgment result is yes and the second state code is present, an alarm signal is issued.
  • the first operation is an operation of the user on a button of the terminal and/or an operation of changing a posture of the terminal;
  • the second operation is The operation of the button of the terminal and/or the operation of changing the posture of the terminal.
  • the device belongs to an access control system.
  • a control apparatus including: a first receiving module, configured to receive a request that a user requests a device to perform a specified operation; and a second receiving module, configured to receive, from the user a first status code sent by the terminal to indicate that the user is in a safe state, and an identification code for indicating the authority that the user has; a control module, configured to allow and/or The permission information of the operation performed by the device is prohibited, and the identification code determines whether the user has the right to command the device to perform the specified operation, and if the determination result is yes and the first status code exists, the device is controlled Perform the specified operation.
  • the second receiving module is configured to receive a second status code from the terminal for indicating that the user is in an unsecured state, and the identifier code; The module determines, according to the identifier code, whether the user has the right to command the device to perform the specified operation, and sends an alarm signal when the determination result is yes and the second status code exists.
  • control device further includes: a rights update module, configured to receive new rights information, to update the existing rights information.
  • a rights update module configured to receive new rights information, to update the existing rights information.
  • the device belongs to an access control system.
  • the device control method, terminal and control device of the present invention have at least the following advantages:
  • the user not only sends the identification code to the control device of the device through the terminal, but also Sending a first status code to the control device, after the control device determines the authority of the user according to the first status code, performing the specified operation only when the first status code exists; this causes the first operation to be performed in a special case such as the user being coerced If the operation avoids the generation of the first status code, the device cannot be controlled only by the identification code to ensure the security of the device.
  • FIG. 1 is a flowchart of a device control method according to an embodiment of the present invention.
  • FIG. 2 is a flowchart of a device control method according to an embodiment of the present invention.
  • FIG. 3 is a flowchart of a device control method according to an embodiment of the present invention.
  • FIG. 4 is a flowchart of a device control method according to an embodiment of the present invention.
  • FIG. 5 is a block diagram of a terminal according to an embodiment of the present invention.
  • FIG. 6 is a block diagram of a control device according to an embodiment of the present invention.
  • FIG. 7 is a block diagram of a control device according to an embodiment of the present invention.
  • FIG. 8 is a schematic diagram of a terminal and a control device according to an embodiment of the present invention.
  • FIG. 9 is a flowchart of a working relationship between a terminal and a control device according to an embodiment of the present invention.
  • FIG. 10 is a flowchart of a working relationship between a terminal and a control device according to an embodiment of the present invention.
  • FIG. 11 is a flowchart of a working relationship between a terminal and a control device according to an embodiment of the present invention.
  • FIG. 13 is a flowchart of a working relationship between a terminal and a control device according to an embodiment of the present invention.
  • an embodiment of the present invention provides a device control method, including:
  • Step S110 After receiving the first operation of the user by the user, generating a first status code indicating that the user is in a safe state.
  • the user sends a request to the control device for controlling the device, and the request is set Prepare to perform the specified operation.
  • the terminal includes but is not limited to a mobile phone, and the first operation may be any operation performed by the user on the mobile phone.
  • the device type is not limited.
  • the device may specifically belong to the access control system, and the corresponding control device is an access controller.
  • the access controller is connected to the user terminal through an external Bluetooth card reader. And receiving the user's request, after there are multiple card readers, the terminal selects the card reader with the highest signal strength to connect.
  • the technical solution of the embodiment can be applied to a government office, a prison detention center, a petitioning unit, an IDC computer room, a high-end property, an intelligent building, etc., where access control is required; in this embodiment, the specified operation type is not limited, for example, For access control systems, the specified operations include the operation of the door.
  • Step S120 sending the first status code and the preset identification code for indicating the authority that the user has, for the control device to allow and/or prohibit the device from being executed according to the preset for recording different permissions.
  • the authority information and the identification code of the operation determine whether the user has the authority to command the device to perform the specified operation, and if the determination result is yes and the first status code exists, the control device performs the specified operation. It can be seen that in the embodiment, when the user does not perform the first operation to avoid generating the first status code in a special case such as the user being coerced, the device cannot be controlled only by the identification code to ensure the security of the device.
  • a mobile phone APP (application) can be implemented.
  • This embodiment requires the personal mobile phone to support the Bluetooth function.
  • the mobile APP is installed on the personal mobile phone.
  • the network management center automatically assigns the account and password to the user, and binds the ID (namely) to the account.
  • the ID is bound to the mobile phone to prevent theft.
  • the network management center can register the permission information of its ID number according to the level of the employee's position (record the ID number with the permission of the door, the date of the permission, the inter-segment and whether there is permission to upgrade the card reader, etc.).
  • the control device of the embodiment is specifically an access controller, and a Bluetooth card reader is provided to cooperate with the access controller, and the Bluetooth card reader is installed at all the doorways that need to be controlled by access (a door is equipped with a Bluetooth card reader, The door number corresponds to the Bluetooth card reader one by one).
  • the Bluetooth card reader actively scans the smartphone running the APP application in the area and attempts to connect with the mobile APP via Bluetooth.
  • the access controller is usually installed in the vicinity of the weak room or the door.
  • the access controller authenticates the ID number sent by the card reader. If the authentication is passed, the access controller performs a trick operation.
  • the network management center uniformly manages the user's information and permissions, and grasps the security dynamics of each gate.
  • an embodiment of the present invention provides a device control method, including:
  • Step S210 After receiving the first operation of the user by the user, generating a first status code indicating that the user is in a safe state.
  • the user issues a request to the control device for controlling the device to request a specified operation on the device.
  • the first operation is an operation of the user's button on the terminal and/or an operation of changing the terminal posture. For example, the user may perform an operation of shaking the mobile phone.
  • Step S220 sending the first status code and the preset identification code for indicating the authority that the user has, for the control device to allow and/or prohibit the device from being executed according to the preset for recording different permissions.
  • the authority information and the identification code of the operation determine whether the user has the authority to command the device to perform the specified operation, and if the determination result is yes and the first status code exists, the control device performs the specified operation.
  • Step S230 After receiving the second operation of the user by the user, generating a second status code indicating that the user is in an unsecured state.
  • the second operation is an operation of the user's button on the terminal and/or an operation of changing the posture of the terminal.
  • the operation performed by the user may be pressing and holding the volume button and shaking the mobile phone, by pressing or changing the button.
  • the user With the operation of the terminal gesture, the user can quickly and implicitly trigger the generation of the second status code, even in the coerced environment.
  • Step S240 the second status code and the identification code are sent out for the control device to determine, according to the identification code, whether the user has the authority to command the device to perform the specified operation, and if the determination result is yes and the second status code is present, the alarm is sent. signal.
  • the user can generate the alarm signal by triggering the second state code by the second operation, which greatly improves the security.
  • an APP application can be implemented: a smart phone with an APP application can be used as an access certificate, and the risk of loss of entry and exit and copying is avoided.
  • the control device of this embodiment is specifically an access controller, and the Bluetooth card reader works with the access controller.
  • the information interaction between the APP application and the Bluetooth card reader is encrypted and invisible to the user, which not only ensures the security of the information, but also avoids the user's anxiety.
  • the APP application sends a user ID number and a valid duress code to the Bluetooth card reader to notify the door control. This is the case where the user is under coercion.
  • the data communication format sent by the mobile APP to the Bluetooth card reader is as follows:
  • the ID is recorded in the ID information
  • the duress information is used to record a valid duress code or an invalid duress code.
  • the access controller fails to pass the authentication, the user is prompted to have no permission, and an alarm record is generated. When a duress code is detected, an alarm signal is sent to the network management center immediately. It can be seen that when the user is held in a hurry, the coercive notification can be sent in a concealed and covert manner, and the rescue can be implemented under the premise of ensuring the security of the user.
  • an embodiment of the present invention provides a device control method, including:
  • Step S310 Receive a request that the user requests the device to perform a specified operation.
  • the device type is not limited, and in this embodiment, it may specifically belong to the access control system, and the technical solution of the embodiment can be applied to government agencies, prison detention centers, petition units, IDC rooms, high-end properties, Intelligent buildings and other occasions where access control is required.
  • the terminal includes but is not limited to a mobile phone.
  • Step S320 Receive a first status code from the user's terminal indicating that the user is in a secure state and an identification code indicating the authority that the user has.
  • Step S330 determining, according to the preset authority information and the identification code for recording the operations allowed and/or prohibited by the device under different rights, whether the user has the authority to command the device to perform the specified operation, and the determination result is yes and exists.
  • a status code control device performs a specified operation. It can be seen that in the embodiment, in the special case that the user is intruded, the first operation is not performed to avoid generating the first status code, and the device cannot be controlled only by the identification code to ensure the security of the device.
  • a control device may be implemented, which may specifically be an access controller, and a Bluetooth card reader is provided to cooperate with the access controller.
  • This embodiment requires a personal mobile phone to support the Bluetooth function.
  • the mobile APP is installed on the personal mobile phone.
  • the network management center automatically assigns the account and password to the user, and binds the ID (namely) to the account.
  • the ID is bound to the mobile phone to prevent theft.
  • the network management center can register the authority information of its ID number according to the level of the employee's position (record the ID number with the authority to slam the door, the date of the trick, the inter-segment and whether there is permission to upgrade the card reader, etc.).
  • the Bluetooth card reader is installed at all doors that require access control (a door with a Bluetooth card reader, The door number corresponds to the Bluetooth card reader one by one).
  • the Bluetooth card reader actively scans the smartphone running the APP application in the area and attempts to connect with the mobile APP via Bluetooth. After the mobile phone APP and the Bluetooth card reader are successfully connected, when the user wants to open the door, first touch the panel of the card reader (equivalent to sending a request, the request is sent to the access controller via the card reader), and then shake one. shake
  • the APP application When the mobile phone, the APP application immediately sends the user ID number and the invalid duress code (a specific way of the first status code) to the Bluetooth card reader.
  • the access controller is typically installed in a weak room or near a door. The access controller authenticates the ID number sent by the card reader. If the authentication is passed, the access controller performs a trick operation.
  • the network management center uniformly manages the user's information and permissions, and grasps the security dynamics of each gate.
  • an embodiment of the present invention further provides a device control method, including:
  • Step S410 Receive a request that the user requests the device to perform the specified operation.
  • Step S420 Receive a first status code from the user's terminal indicating that the user is in a secure state and an identification code indicating the authority that the user has.
  • Step S430 determining, according to the preset authority information and the identification code for recording the operations allowed and/or inhibited by the device under different rights, whether the user has the authority to command the device to perform the specified operation, and the determination result is yes and exists.
  • a status code control device performs a specified operation.
  • Step S440 receiving a second status code and an identification code from the terminal for indicating that the user is in an unsecured state.
  • Step S450 Determine, according to the identification code, whether the user has the authority to command the device to perform the specified operation, and if the determination result is yes and the second status code exists, an alarm signal is sent.
  • the user can generate an alarm signal by triggering the second operation code by the second operation, which greatly improves the security.
  • a control device can be implemented as an access controller, and a Bluetooth card reader is provided to cooperate with the operation.
  • the smart phone with the APP application installed can be used as an entry and exit voucher, avoiding the risk of lost and duplicated access documents.
  • the information interaction between the APP application and the Bluetooth card reader is encrypted and invisible to the user, which not only ensures the security of the information, but also avoids the user's anxiety.
  • the APP app reads to Bluetooth
  • the card device sends the user ID number and the valid duress code to notify the access controller that the user is in a situation of being coerced.
  • the data communication format sent by the mobile APP to the Bluetooth card reader is as follows:
  • the ID is recorded in the ID information
  • the duress information is used to record a valid duress code or an invalid duress code.
  • the access controller fails to pass the authentication, the user is prompted to have no permission, and an alarm record is generated. When a duress code is detected, an alarm signal is sent to the network management center immediately. It can be seen that when the user is held in a hurry, the coercive notification can be sent in a concealed and covert manner, and the rescue can be implemented under the premise of ensuring the security of the user.
  • the method may further include: Step S460: Receive new rights information to update the existing rights information.
  • Step S460 Receive new rights information to update the existing rights information.
  • the Bluetooth card reader can integrate functions such as a conventional IC card and a keyboard.
  • functions such as a conventional IC card and a keyboard.
  • the transmission power of the Bluetooth card reader is controlled, and only when the user is close to the door, the Bluetooth card reader can Scan to the user's phone. If the card reader transmit power is adjusted to solve the above problem, the user can select the scanned card reader on the APP, or the APP application can determine the distance of the card reader to select the card reader closest to the user.
  • the administrator account Only the administrator account is logged in through the mobile APP, and the right to upgrade the Bluetooth card reader is available. Ordinary users only have the right to apply for a trick.
  • the administrator account obtains the software version number of the currently running program of the card reader through the mobile phone APP, and compares the version number with the version number of the network management center. If the currently running software version number is low, the card reader is first downloaded from the network management center. The latest version of the upgrade package is saved to the phone, and then the card reader is upgraded via the Bluetooth interface.
  • the card reader/reader of the access control system generally has only Wiegand and a power line, and the access control system is connected to the access control system.
  • the Wiegand interface of the card reader can only perform one-way communication: It can only send signals to the access control and cannot receive signals from the access controller, so the card reader can not be upgraded online through the access controller.
  • an embodiment of the present invention provides a terminal, including:
  • the status code generating module 510 after receiving the first operation of the user to the terminal, generates a first status code indicating that the user is in a secure state.
  • the user makes a request to the control device for controlling the device , requesting the specified action on the device.
  • the terminal includes but is not limited to a mobile phone, and the first operation may be any operation performed by the user on the mobile phone.
  • the device type is not limited.
  • the device may specifically belong to the access control system, and the corresponding control device is an access controller.
  • the access controller is connected to the user terminal through an external Bluetooth card reader. And receiving the user's request, after there are multiple card readers, the terminal selects the card reader with the highest signal strength to connect.
  • the technical solution of the embodiment can be applied to a government office, a prison detention center, a petitioning unit, an IDC computer room, a high-end property, an intelligent building, etc., where access control is required; in this embodiment, the specified operation type is not limited, for example, For access control systems, the specified operations include the operation of the door.
  • the sending module 520 sends the first status code and the preset identification code for indicating the authority that the user has, for the control device to receive and/or disable the device according to the preset for recording different permissions.
  • the authority information and the identification code of the executed operation determine whether the user has the authority to command the device to perform the specified operation, and if the judgment result is yes and the first status code exists, the control device performs the specified operation. It can be seen that in the embodiment, when the user does not perform the first operation to avoid generating the first status code in a special case such as the user being coerced, the device cannot be controlled only by the identification code, thereby ensuring the security of the device.
  • a mobile phone APP (application) can be implemented.
  • This embodiment requires the personal mobile phone to support the Bluetooth function.
  • the mobile APP is installed on the personal mobile phone.
  • the network management center automatically assigns the account and password to the user, and binds the ID (namely) to the account.
  • the ID is bound to the mobile phone to prevent theft.
  • the network management center can register the permission information of its ID number according to the level of the employee's position (record the ID number with the permission of the door, the date of the permission, the inter-segment and whether there is permission to upgrade the card reader, etc.).
  • the control device of the embodiment is specifically an access controller, and a Bluetooth card reader is provided to cooperate with the access controller, and the Bluetooth card reader is installed at all the doorways that need to be controlled by access (a door is equipped with a Bluetooth card reader, The door number corresponds to the Bluetooth card reader one by one).
  • the Bluetooth card reader actively scans the smartphone running the APP application in the area and attempts to connect with the mobile APP via Bluetooth.
  • the access controller is usually installed in the vicinity of the weak room or the door.
  • the access controller authenticates the ID number sent by the card reader. If the authentication is passed, the access controller performs a trick operation.
  • the network management center uniformly manages the information and permissions of the user, and grasps the security dynamics of each gate.
  • An embodiment of the present invention provides a terminal, including:
  • the status code generating module 510 after receiving the first operation of the user to the terminal, generates a first status code indicating that the user is in a secure state.
  • the user issues a request to the control device for controlling the device to request to perform a specified operation on the device.
  • the first operation is an operation of the user's button on the terminal and/or an operation of changing the posture of the terminal.
  • the operation performed by the user may be a shaking of the mobile phone.
  • the sending module 520 sends the first status code and the preset identification code for indicating the authority that the user has, so that the control device can receive and/or disable the device according to the preset for recording different permissions.
  • the authority information and the identification code of the executed operation determine whether the user has the authority to command the device to perform the specified operation, and if the judgment result is yes and the first status code exists, the control device performs the specified operation.
  • the status code generating module 530 after receiving the second operation of the user to the terminal, generates a second status code indicating that the user is in an unsecured state.
  • the second operation is an operation of the user's button on the terminal and/or an operation of changing the posture of the terminal.
  • the operation performed by the user may be pressing and holding the volume button and shaking the mobile phone, by pressing or changing the button.
  • the sending module 540 sends the second status code and the identification code for the control device to determine, according to the identification code, whether the user has the authority to command the device to perform the specified operation, and if the determination result is yes and the second status code is present, the alarm is sent. signal.
  • the user can generate an alarm signal by triggering the second operation code by the second operation, which greatly improves the security.
  • an APP application can be implemented: a smart phone with an APP application can be used as an access certificate, and the risk of lost and copied credentials is avoided.
  • the control device of this embodiment is specifically an access controller, and the Bluetooth card reader works with the access controller.
  • the information interaction between the APP application and the Bluetooth card reader is encrypted and invisible to the user, which not only ensures the security of the information, but also avoids the user's anxiety.
  • the APP application sends a user ID number and a valid duress code to the Bluetooth card reader to notify the door control. This is the case where the user is under coercion.
  • the data communication format sent by the mobile APP to the Bluetooth card reader is as follows:
  • the ID is recorded in the ID information
  • the duress information is used to record a valid duress code or an invalid duress code.
  • the access controller fails to pass the authentication, the user is prompted to have no authority and generates an alarm record.
  • an alarm signal is sent to the network management center immediately. It can be seen that when the user is held in a hurry, the coercive notification can be sent in a concealed and covert manner, and the rescue can be implemented under the premise of ensuring the security of the user.
  • an embodiment of the present invention provides a control apparatus, including:
  • the first receiving module 610 receives a request that the user requests the device to perform a specified operation.
  • the device type is not limited, and in this embodiment, it may specifically belong to the access control system, and the technical solution of the embodiment can be applied to government agencies, prison detention centers, petition units, IDC rooms, high-end properties, Intelligent buildings and other occasions where access control is required.
  • the device is connected by wireless means such as Bluetooth.
  • the terminal includes but is not limited to a mobile phone.
  • the second receiving module 620 receives a first status code from the user's terminal for indicating that the user is in a secure state, and an identification code for indicating the authority that the user has.
  • the control module 630 determines, according to the preset authority information and the identification code for recording an operation that allows and/or prohibits the device to perform operations under different rights, whether the user has the authority to command the device to perform the specified operation, and the determination result is yes and exists.
  • the first status code control device performs a specified operation. It can be seen that in the embodiment, in the special case that the user is intimidated, the first operation is not performed to avoid generating the first status code, and the device cannot be controlled by the identification code alone to ensure the security of the device.
  • a control device may be implemented, which may specifically be an access controller, and a Bluetooth card reader is provided to cooperate with the access controller.
  • This embodiment requires a personal mobile phone to support the Bluetooth function.
  • the mobile APP is installed on the personal mobile phone.
  • the network management center automatically assigns the account and password to the user, and binds the ID (namely) to the account.
  • the ID is bound to the mobile phone to prevent theft.
  • the network management center can register the authority information of its ID number according to the level of the employee's position (record the ID number with the authority to slam the door, the date of the trick, the inter-segment and whether there is permission to upgrade the card reader, etc.).
  • the Bluetooth card reader is installed at all doors that require access control (a door with a Bluetooth card reader, The door number corresponds to the Bluetooth card reader one by one).
  • the Bluetooth card reader actively scans the smartphone running the APP application in the area and attempts to connect with the mobile APP via Bluetooth. After the mobile phone APP and the Bluetooth card reader are successfully connected, when the user wants to open the door, first touch the panel of the card reader (equivalent to sending a request, the request is sent to the access controller via the card reader), and then shake one. shake
  • the APP application When the mobile phone, the APP application immediately sends the user ID number and the invalid duress code (a specific way of the first status code) to the Bluetooth card reader.
  • the access controller is typically installed in a weak room or near a door. The access controller authenticates the ID number sent by the card reader. If the authentication is passed, the access controller performs a trick operation.
  • the network management center uniformly manages the user's information and permissions, and grasps the security dynamics of each gate.
  • an embodiment of the present invention further provides a control apparatus, including:
  • the first receiving module 710 receives a request that the user requests the device to perform a specified operation.
  • the second receiving module 720 receives a first status code from the user's terminal for indicating that the user is in a secure state and an identification code for indicating the authority that the user has.
  • the control module 730 determines, according to the identification code, whether the user has the authority to command the device to perform the specified operation, and if the determination result is yes and the first status code exists, the control device performs the specified operation.
  • the second receiving module 720 receives a second status code from the terminal indicating that the user is in an unsecured state and an identification code.
  • the control module 730 determines, according to the preset authority information and the identification code for recording an operation that allows and/or prohibits the device to perform operations under different rights, whether the user has the authority to command the device to perform the specified operation, and the determination result is yes and exists.
  • the second status code sends an alarm signal. In this embodiment, it can be seen that the user can generate an alarm signal by triggering the second operation code by the second operation, which greatly improves the security.
  • a control device can be implemented as an access controller, and a Bluetooth card reader is provided to cooperate with the operation.
  • the smart phone with the APP application installed can be used as an entry and exit voucher, avoiding the risk of lost and duplicated access documents.
  • the information interaction between the APP application and the Bluetooth card reader is encrypted and invisible to the user, which not only ensures the security of the information, but also avoids the user's anxiety.
  • the APP application sends the user ID number and the valid duress code to the Bluetooth card reader, notifying the access controller that the user is under coercion.
  • the data communication format sent by the mobile APP to the Bluetooth card reader is as follows:
  • the ID is recorded in the ID information, and the duress information is used to record a valid duress code or an invalid duress code.
  • the access controller fails to pass the authentication, the user is prompted to have no authority and generates an alarm record. When a duress code is detected, an alarm signal is sent to the network management center immediately. It can be seen that when the user is held in a hurry, the coercive notification can be sent in a concealed and covert manner, and the rescue can be implemented under the premise of ensuring the security of the user.
  • the method may further include: a rights update module 740, which receives new rights information to update the existing rights information.
  • a rights update module 740 which receives new rights information to update the existing rights information.
  • the Bluetooth card reader can integrate functions such as a conventional IC card and a keyboard.
  • functions such as a conventional IC card and a keyboard.
  • the transmission power of the Bluetooth card reader is controlled, and only when the user is close to the door, the Bluetooth card reader can Scan to the user's phone. If the card reader transmit power is adjusted to solve the above problem, the user can select the scanned card reader on the APP, or the APP application can determine the distance of the card reader to select the card reader closest to the user.
  • the administrator account Only the administrator account is logged in through the mobile APP, and the right to upgrade the Bluetooth card reader is available. Ordinary users only have the right to apply for a trick.
  • the administrator account obtains the software version number of the currently running program of the card reader through the mobile phone APP, and compares the version number with the version number of the network management center. If the currently running software version number is low, the card reader is first downloaded from the network management center. The latest version of the upgrade package is saved to the phone, and then the card reader is upgraded via the Bluetooth interface.
  • the card reader/reader of the access control system generally has only Wiegand and a power line, and the access control system is connected to the access control system.
  • the Wiegand interface of the card reader can only perform one-way communication: It can only send signals to the access control and cannot receive signals from the access controller, so the card reader can not be upgraded online through the access controller.
  • the usage scenario of the access controller 802 is shown in Figure 8 (804 is the network management center).
  • the workflow is as follows:
  • Step 1 Start the application, the user arrives at the access control site, the mobile phone ⁇ Bluetooth, and the mobile phone APP.
  • Step 2 Establish a connection, the Bluetooth card reader scans to the smartphone that has smashed the APP application, and then requests to establish a connection, as shown in FIG. After scanning the Bluetooth name of the mobile phone, the card reader initiates a connection request. If only one card reader requests to connect, the mobile phone APP passes the authentication and establishes a connection with it; if more than one card reader sends a connection request, the mobile phone APP selects The strongest card reader establishes the connection.
  • Step 3 Apply for a trick, when the user wants to slam the door, first touch the card reader to wake up the card reader to receive the application for the mobile APP.
  • the user wants to slam the door, first touch the card reader to wake up the card reader to receive the application for the mobile APP.
  • normal tricks only Shake the phone and A PP will immediately send the ID number and invalid duress code to the reader. If it is under coercion, in order to protect personal safety, the user can hold down the volume button and shake the phone with the same voice.
  • the APP sends the ID number and the duress code to the access controller, as shown in Figure 10.
  • Step 4 authentication, as shown in FIG. 11, after receiving the ID number from the card reader, the access controller queries the ID number and its corresponding authority information; if the ID number, and If you have permission to the current gate, perform the trick operation immediately. As shown in Figure 12, if there is a duress code, immediately report the alarm to the network management center.
  • Step 5 Card reader upgrade.
  • the mobile APP uses the administrator account to log in to the network management center. After the connection with the Bluetooth card reader is successful, the software version number of the card reader is obtained. If the software version number of the Bluetooth card reader obtained is lower than the version number provided by the network management center, the network management center is obtained from the network management center. Download the latest software version and upgrade the Bluetooth card reader. The detailed process is shown in Figure 13. The upgraded Bluetooth card reader will run the latest software version.
  • the user not only sends the identification code to the control device of the device through the terminal, but also sends the first status code to the control device, and the control device determines the authority of the user according to the first status code, and only exists in the presence
  • the specified operation is performed only after the first status code; in this case, the user does not perform the first operation to avoid generating the first status code in a special case such as the user being coerced, and the device cannot be controlled only by the identification code to ensure the security of the device.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

本发明公开了一种设备控制方法、终端和控制装置,该方法包括:在接收到用户对终端的第一操作时,生成用于表示用户处于安全状态的第一状态码;其中,用户向用于控制设备的控制装置发出请求,请求对设备执行指定操作;将第一状态码以及预设的用于表示用户具有的权限的标识码发出,以供控制装置接收后根据预设的用于记录不同权限下允许和/或禁止设备执行的操作的权限信息和标识码判断用户是否有权限命令设备执行指定操作,在判断结果为是且存在第一状态码时控制设备执行指定操作。根据本发明,在用户被胁迫等特殊情况下,不执行第一操作避免生成第一状态码,则仅凭标识码无法对设备进行控制,保证设备的安全性。

Description

设备控制方法、 终端和控制装置 技术领域
[0001] 本发明涉及电子技术领域, 尤其涉及一种设备控制方法、 终端和控制装置。
背景技术
[0002] 目前门禁系统中普遍使用按键密码、 RFID (射频识别) 刷卡、 指纹等幵门技 术。 按键密码的方式安全性较低; RFID刷卡使用方便, 但是卡片可以被复制, 并且存在遗失的风险; 指纹的幵门方式虽然相对安全, 但是无法解决用户被胁 迫的情况。
[0003] 因此, 在用户被胁迫等特殊的情况下, 如何确保门禁系统的安全性, 就成为需 要解决的问题。
技术问题
[0004] 有鉴于此, 本发明的目的在于提供一种设备控制方法、 终端和控制装置,以在在 用户被胁迫等特殊情况下保证设备的安全性。
问题的解决方案
技术解决方案
[0005] 本发明解决上述技术问题所采用的技术方案如下:
[0006] 根据本发明的一个方面, 提供的一种设备控制方法, 包括: 在接收到用户对终 端的第一操作吋, 生成用于表示所述用户处于安全状态的第一状态码; 其中, 所述用户向用于控制设备的控制装置发出请求, 请求对所述设备执行指定操作 ; 将所述第一状态码以及预设的用于表示所述用户具有的权限的标识码发出, 以供所述控制装置根据接收后预设的用于记录不同权限下允许和 /或禁止所述设 备执行的操作的权限信息和所述标识码判断所述用户是否有权限命令所述设备 执行所述指定操作, 在判断结果为是且存在所述第一状态码吋控制所述设备执 行所述指定操作。
[0007] 可选地, 前述的方法, 还包括: 在接收到所述用户对所述终端的第二操作吋, 生成用于表示所述用户处于非安全状态的第二状态码; 将所述第二状态码以及 所述标识码发出, 以供所述控制装置接收后根据所述标识码判断所述用户是否 有权限命令所述设备执行所述指定操作, 在判断结果为是且存在所述第二状态 码吋发出告警信号。
[0008] 可选地, 前述的方法, 所述第一操作为所述用户对所述终端的按键的操作和 / 或改变所述终端姿态的操作; 所述第二操作为所述用户对所述终端的按键的操 作和 /或改变所述终端姿态的操作。
[0009] 可选地, 前述的方法, 所述设备属于门禁系统。
[0010] 依据本发明的另一方面, 提供的一种设备控制方法, 包括: 接收用户请求设备 执行指定操作的请求; 接收来自所述用户的终端的用于表示所述用户处于安全 状态的第一状态码以及用于表示所述用户具有的权限的标识码; 根据预设的用 于记录不同权限下允许和 /或禁止所述设备执行的操作的权限信息和所述标识码 判断所述用户是否有权限命令所述设备执行所述指定操作, 在判断结果为是且 存在所述第一状态码吋控制所述设备执行所述指定操作。
[0011] 可选地, 前述的方法, 还包括: 接收来自所述终端的用于表示所述用户处于非 安全状态的第二状态码以及所述标识码; 根据所述标识码判断所述用户是否有 权限命令所述设备执行所述指定操作, 在判断结果为是且存在所述第二状态码 吋发出告警信号。
[0012] 可选地, 前述的方法, 还包括: 接收新的权限信息, 以对已有的权限信息进行 更新。
[0013] 可选地, 前述的方法, 所述设备属于门禁系统。
[0014] 依据本发明的另一方面, 提供的一种终端, 包括: 状态码生成模块, 用于在接 收到用户对终端的第一操作吋, 生成用于表示所述用户处于安全状态的第一状 态码; 其中, 所述用户向用于控制设备的控制装置发出请求, 请求对所述设备 执行指定操作; 发送模块, 用于将所述第一状态码以及预设的用于表示所述用 户具有的权限的标识码发出, 以供所述控制装置接收后根据预设的用于记录不 同权限下允许和 /或禁止所述设备执行的操作的权限信息和所述标识码判断所述 用户是否有权限命令所述设备执行所述指定操作, 在判断结果为是且存在所述 第一状态码吋控制所述设备执行所述指定操作。 [0015] 可选地, 前述的终端, 所述状态码生成模块还在接收到所述用户对所述终端的 第二操作吋, 生成用于表示所述用户处于非安全状态的第二状态码; 所述发送 模块还将所述第二状态码以及所述标识码发出, 以供所述控制装置接收后根据 所述标识码判断所述用户是否有权限命令所述设备执行所述指定操作, 在判断 结果为是且存在所述第二状态码吋发出告警信号。
[0016] 可选地, 前述的终端, 所述第一操作为所述用户对所述终端的按键的操作和 / 或改变所述终端姿态的操作; 所述第二操作为所述用户对所述终端的按键的操 作和 /或改变所述终端姿态的操作。
[0017] 可选地, 前述的终端, 所述设备属于门禁系统。
[0018] 依据本发明的另一方面, 提供的一种控制装置, 包括: 第一接收模块, 用于接 收用户请求设备执行指定操作的请求; 第二接收模块, 用于接收来自所述用户 的终端发送的用于表示所述用户处于安全状态的第一状态码以及用于表示所述 用户具有的权限的标识码; 控制模块, 用于根据预设的用于记录不同权限下允 许和 /或禁止所述设备执行的操作的权限信息和所述标识码判断所述用户是否有 权限命令所述设备执行所述指定操作, 在判断结果为是且存在所述第一状态码 吋控制所述设备执行所述指定操作。
[0019] 可选地, 前述的控制装置, 所述第二接收模块用于接收来自所述终端的用于表 示所述用户处于非安全状态的第二状态码以及所述标识码; 所述控制模块根据 所述标识码判断所述用户是否有权限命令所述设备执行所述指定操作, 在判断 结果为是且存在所述第二状态码吋发出告警信号。
[0020] 可选地, 前述的控制装置, 还包括: 权限更新模块, 用于接收新的权限信息, 以对已有的权限信息进行更新。
[0021] 可选地, 前述的控制装置, 所述设备属于门禁系统。
发明的有益效果
有益效果
[0022] 根据以上技术方案, 本发明的设备控制方法、 终端和控制装置至少具有以下优 点:
[0023] 在本发明的技术方案中, 用户不但通过终端向设备的控制装置发送标识码, 还 向控制装置发送第一状态码, 控制装置根据第一状态码确定用户的权限后, 只 有在存在第一状态码下才执行指定操作; 这使得在用户被胁迫等特殊情况下, 不执行第一操作避免生成第一状态码, 则仅凭标识码无法对设备进行控制, 保 证设备的安全性。
对附图的简要说明
附图说明
[0024] 图 1为本发明实施例的一种设备控制方法的流程图;
[0025] 图 2为本发明实施例的一种设备控制方法的流程图;
[0026] 图 3为本发明实施例的一种设备控制方法的流程图;
[0027] 图 4为本发明实施例的一种设备控制方法的流程图;
[0028] 图 5为本发明实施例的一种终端的框图;
[0029] 图 6为本发明实施例的一种控制装置的框图;
[0030] 图 7为本发明实施例的一种控制装置的框图;
[0031] 图 8为本发明实施例的一种终端和控制装置的示意图;
[0032] 图 9为本发明实施例的一种终端和控制装置配合工作的流程图;
[0033] 图 10为本发明实施例的一种终端和控制装置配合工作的流程图;
[0034] 图 11为本发明实施例的一种终端和控制装置配合工作的流程图;
[0035] 图 12为本发明实施例的一种终端和控制装置配合工作的流程图;
[0036] 图 13为本发明实施例的一种终端和控制装置配合工作的流程图。
[0037] 本发明目的的实现、 功能特点及优点将结合实施例, 参照附图做进一步说明。
本发明的实施方式
[0038] 为了使本发明所要解决的技术问题、 技术方案及有益效果更加清楚、 明白, 以 下结合附图和实施例, 对本发明进行进一步详细说明。 应当理解, 此处所描述 的具体实施例仅仅用以解释本发明, 并不用于限定本发明。
[0039] 如图 1所示, 本发明的一个实施例中提供了一种设备控制方法, 包括:
[0040] 步骤 S110, 在接收到用户对终端的第一操作吋, 生成用于表示用户处于安全状 态的第一状态码。 其中, 用户向用于控制设备的控制装置发出请求, 请求对设 备执行指定操作。 在本实施例中, 终端包括但不限于手机, 第一操作可以是用 户在手机上完成的任何操作。 在本实施例中, 对设备类型不进行限制, 在本实 施例中其具体可以属于门禁系统, 则相应的控制装置为门禁控制器, 门禁控制 器通过外接的蓝牙读卡器与用户的终端连接以及接收用户的请求, 在存在多个 读卡器吋, 终端选择信号强度最高的读卡器进行连接。 本实施例的技术方案可 以应用于政府机关、 监狱看守所、 信访单位、 IDC机房、 高端物业、 智能大厦等 需要进行出入管制的场合; 在本实施例中, 对指定操作类型不进行限制, 例如 , 对于门禁系统则指定操作包括幵门操作。
[0041] 步骤 S120, 将第一状态码以及预设的用于表示用户具有的权限的标识码发出, 以供控制装置接收后根据预设的用于记录不同权限下允许和 /或禁止设备执行的 操作的权限信息和标识码判断用户是否有权限命令设备执行指定操作, 在判断 结果为是且存在第一状态码吋控制设备执行指定操作。 可见在本实施例中, 在 用户被胁迫等特殊情况下, 不执行第一操作避免生成第一状态码, 则仅凭标识 码无法对设备进行控制, 保证设备的安全性。
[0042] 基于本实施例的技术方案, 可实现一种手机 APP (应用) 。 本实施例要求个人 手机支持蓝牙功能。 公司员工入职吋将手机 APP安装在个人手机上, 通过网管中 心自动为用户分配账号与密码, 并将 ID (即标识码) 与账号绑定, 同吋该 ID与 手机绑定, 以防被盗用。 网管中心可以根据员工职务的级别登记其 ID号的权限 信息 (记录该 ID号有权限幵门的门岗、 准许幵门的日期、 吋间段和是否有权限 升级读卡器等信息) 。
本实施例的控制装置具体为门禁控制器, 且设置一个蓝牙读卡器配合门禁控制 器进行工作, 蓝牙读卡器安装在所有需要进行出入管制的门口 (一扇门配一个 蓝牙读卡器, 门号和蓝牙读卡器一一对应) 。 用户手机安装 APP应用并完成注册 得到账号、 密码, 打幵蓝牙功能, 运行 APP应用后使用账号、 密码登录 APP。 蓝 牙读卡器主动扫描区域内的运行了 APP应用的智能手机, 并尝试与手机 APP通过 蓝牙进行连接。 手机 APP和蓝牙读卡器连接成功后, 当用户想要幵门吋, 先触碰 一下读卡器的面板 (相当于发送请求, 该请求经由读卡器发送到门禁控制器) , 然后摇一摇 (第一操作的一种具体方式) 手机, APP应用会立即向蓝牙读卡器 发送用户 ID号和无效胁迫码 (第一状态码的一种具体方式) 。 门禁控制器, 一 般安装在弱电间或者门的附近。 门禁控制器对读卡器发送的 ID号进行鉴权。 如 果鉴权通过, 门禁控制器执行幵门操作。 本实施例中, 网管中心统一管理用户 的信息和权限, 并实吋掌握各个门岗的安全动态。
[0044] 如图 2所示, 本发明的一个实施例中提供了一种设备控制方法, 包括:
[0045] 步骤 S210, 在接收到用户对终端的第一操作吋, 生成用于表示用户处于安全状 态的第一状态码。 其中, 用户向用于控制设备的控制装置发出请求, 请求对设 备执行指定操作。 在本实施例中, 第一操作为用户对终端的按键的操作和 /或改 变终端姿态的操作, 例如, 用户所进行的操作可以是摇一摇手机。
[0046] 步骤 S220, 将第一状态码以及预设的用于表示用户具有的权限的标识码发出, 以供控制装置接收后根据预设的用于记录不同权限下允许和 /或禁止设备执行的 操作的权限信息和标识码判断用户是否有权限命令设备执行指定操作, 在判断 结果为是且存在第一状态码吋控制设备执行指定操作。
[0047] 步骤 S230, 在接收到用户对终端的第二操作吋, 生成用于表示用户处于非安全 状态的第二状态码。 在本实施例中, 第二操作为用户对终端的按键的操作和 /或 改变终端姿态的操作, 例如, 用户所进行的操作可以是按住音量键并摇一摇手 机, 通过按键操作或改变终端姿态的操作, 用户可以快速且隐秘地触发生成第 二状态码, 即使在被胁迫的环境下也可以完成操作。
[0048] 步骤 S240, 将第二状态码以及标识码发出, 以供控制装置接收后根据标识码判 断用户是否有权限命令设备执行指定操作, 在判断结果为是且存在第二状态码 吋发出告警信号。 在本实施例中, 可见用户只要通过第二操作触发生成第二状 态码, 即可生成报警信号, 这很大程度地提高了安全性。
[0049] 根据本实施例的技术方案可以实现一种 APP应用: 安装了 APP应用的智能手机 即可作为出入凭证, 避免了出入凭证丢失和被复制的风险。
[0050] 本实施例的控制装置具体为门禁控制器, 蓝牙读卡器配合门禁控制器进行工作 。 APP应用与蓝牙读卡器之间的信息交互都经过加密, 并且对用户不可见, 既保 证了信息的安全, 也避免引起用户的不安。 当用户被胁迫吋, 按住手机音量键 并摇一摇手机, APP应用向蓝牙读卡器发送用户 ID号和有效胁迫码, 通知门禁控 制器此吋用户处于被胁迫的情况。 手机 APP向蓝牙读卡器发送的数据通信格式如 下表所示:
Figure imgf000009_0001
[0052] 其中 ID信息中记录前述的 ID, 胁迫信息中用于记录有效胁迫码或无效胁迫码。
[0053] 门禁控制器如果鉴权不通过, 则提示用户无权限, 并生成告警记录。 当检测到 有胁迫码的吋候, 立即向网管中心发送告警信号。 可见当用户被挟持吋, 可以 及吋、 隐蔽地发送胁迫通知, 在保证用户安全的前提下实施营救。
[0054] 如图 3所示, 本发明的一个实施例中提供了一种设备控制方法, 包括:
[0055] 步骤 S310, 接收用户请求设备执行指定操作的请求。 在本实施例中, 对设备类 型不进行限制, 在本实施例中其具体可以属于门禁系统, 则本实施例的技术方 案可以应用于政府机关、 监狱看守所、 信访单位、 IDC机房、 高端物业、 智能大 厦等需要进行出入管制的场合。 在本实施例中, 终端包括但不限于手机。
[0056] 步骤 S320, 接收来自用户的终端的用于表示用户处于安全状态的第一状态码以 及用于表示用户具有的权限的标识码。
[0057] 步骤 S330, 根据预设的用于记录不同权限下允许和 /或禁止设备执行的操作的 权限信息和标识码判断用户是否有权限命令设备执行指定操作, 在判断结果为 是且存在第一状态码吋控制设备执行指定操作。 可见在本实施例中, 在用户被 胁迫等特殊情况下, 不执行第一操作避免生成第一状态码, 则仅凭标识码无法 对设备进行控制, 保证设备的安全性。
[0058] 基于本实施例的技术方案, 可实现一种控制装置, 具体可以为门禁控制器, 且 设置一个蓝牙读卡器配合门禁控制器进行工作。
[0059] 本实施例要求个人手机支持蓝牙功能。 公司员工入职吋将手机 APP安装在个人 手机上, 通过网管中心自动为用户分配账号与密码, 并将 ID (即标识码) 与账 号绑定, 同吋该 ID与手机绑定, 以防被盗用。 网管中心可以根据员工职务的级 别登记其 ID号的权限信息 (记录该 ID号有权限幵门的门岗、 准许幵门的日期、 吋间段和是否有权限升级读卡器等信息) 。
[0060] 蓝牙读卡器安装在所有需要进行出入管制的门口 (一扇门配一个蓝牙读卡器, 门号和蓝牙读卡器一一对应) 。 用户手机安装 APP应用并完成注册得到账号、 密 码, 打幵蓝牙功能, 运行 APP应用后使用账号、 密码登录 APP。 蓝牙读卡器主动 扫描区域内的运行了 APP应用的智能手机, 并尝试与手机 APP通过蓝牙进行连接 。 手机 APP和蓝牙读卡器连接成功后, 当用户想要幵门吋, 先触碰一下读卡器的 面板 (相当于发送请求, 该请求经由读卡器发送到门禁控制器) , 然后摇一摇
(第一操作的一种具体方式) 手机, APP应用会立即向蓝牙读卡器发送用户 ID号 和无效胁迫码 (第一状态码的一种具体方式) 。 门禁控制器, 一般安装在弱电 间或者门的附近。 门禁控制器对读卡器发送的 ID号进行鉴权。 如果鉴权通过, 门禁控制器执行幵门操作。 本实施例中, 网管中心统一管理用户的信息和权限 , 并实吋掌握各个门岗的安全动态。
[0061] 如图 4所示, 本发明的一个实施例中还提供一种设备控制方法, 包括:
[0062] 步骤 S410, 接收用户请求设备执行指定操作的请求。
[0063] 步骤 S420, 接收来自用户的终端的用于表示用户处于安全状态的第一状态码以 及用于表示用户具有的权限的标识码。
[0064] 步骤 S430, 根据预设的用于记录不同权限下允许和 /或禁止设备执行的操作的 权限信息和标识码判断用户是否有权限命令设备执行指定操作, 在判断结果为 是且存在第一状态码吋控制设备执行指定操作。
[0065] 步骤 S440, 接收来自终端的用于表示用户处于非安全状态的第二状态码以及标 识码。
[0066] 步骤 S450, 根据标识码判断用户是否有权限命令设备执行指定操作, 在判断结 果为是且存在第二状态码吋发出告警信号。 在本实施例中, 可见用户只要通过 第二操作触发生成第二状态码, 即可生成报警信号, 这很大程度地提高了安全 性。
[0067] 根据本实施例的技术方案, 可以实现一种控制装置为门禁控制器, 且设置一个 蓝牙读卡器配合其工作。 在本实施例中, 安装了 APP应用的智能手机即可作为出 入凭证, 避免了出入凭证丢失和被复制的风险。 APP应用与蓝牙读卡器之间的信 息交互都经过加密, 并且对用户不可见, 既保证了信息的安全, 也避免引起用 户的不安。 当用户被胁迫吋, 按住手机音量键并摇一摇手机, APP应用向蓝牙读 卡器发送用户 ID号和有效胁迫码, 通知门禁控制器此吋用户处于被胁迫的情况 。 手机 APP向蓝牙读卡器发送的数据通信格式如下表所示:
Figure imgf000011_0001
[0069] 其中 ID信息中记录前述的 ID, 胁迫信息中用于记录有效胁迫码或无效胁迫码。
[0070] 门禁控制器如果鉴权不通过, 则提示用户无权限, 并生成告警记录。 当检测到 有胁迫码的吋候, 立即向网管中心发送告警信号。 可见当用户被挟持吋, 可以 及吋、 隐蔽地发送胁迫通知, 在保证用户安全的前提下实施营救。
[0071] 进一步地, 还可以包括: 步骤 S460, 接收新的权限信息, 以对已有的权限信息 进行更新。 根据本实施例的技术方案, 通过对已有的权限信息进行更新, 可以 使得对用户的请求进行准确响应。
[0072] 在本实施例中, 蓝牙读卡器可以集成传统的 IC卡、 键盘等功能。 为了避免相邻 门之间距离太近而发生多个读卡器同吋扫描到手机的情况, 对蓝牙读卡器的发 射功率进行控制, 只有当用户靠近门的情况下, 蓝牙读卡器才能扫描到用户手 机。 如果调节读卡器发射功率也无法解决上述问题, 可以由用户在 APP上选择已 经扫描到的读卡器, 或者由 APP应用判定读卡器的距离而选择离用户最近的读卡 器。
[0073] 只有管理员账号通过手机 APP登录, 才有升级蓝牙读卡器的权限。 普通用户只 有申请幵门的权限。 管理员账号通过手机 APP获取读卡器当前运行程序的软件版 本号, 并将该版本号和网管中心的版本号相比较, 如果当前运行的软件版本号 低, 就先从网管中心下载读卡器的最新版本的升级包保存至手机, 然后通过蓝 牙接口完成读卡器升级。 而现有技术中, 门禁系统的读卡器 /读头, 接口一般只 有维根和电源线, 通过门禁控制器接入门禁系统。 读卡器的维根接口只能进行 单向通信: 只能向门禁控制发送信号, 无法接收来自门禁控制器的信号, 因此 无法通过门禁控制器实现读卡器在线升级。
[0074] 如图 5所示, 本发明的一个实施例中提供了一种终端, 包括:
[0075] 状态码生成模块 510, 在接收到用户对终端的第一操作吋, 生成用于表示用户 处于安全状态的第一状态码。 其中, 用户向用于控制设备的控制装置发出请求 , 请求对设备执行指定操作。 在本实施例中, 终端包括但不限于手机, 第一操 作可以是用户在手机上完成的任何操作。 在本实施例中, 对设备类型不进行限 制, 在本实施例中其具体可以属于门禁系统, 则相应的控制装置为门禁控制器 , 门禁控制器通过外接的蓝牙读卡器与用户的终端连接以及接收用户的请求, 在存在多个读卡器吋, 终端选择信号强度最高的读卡器进行连接。 本实施例的 技术方案可以应用于政府机关、 监狱看守所、 信访单位、 IDC机房、 高端物业、 智能大厦等需要进行出入管制的场合; 在本实施例中, 对指定操作类型不进行 限制, 例如, 对于门禁系统则指定操作包括幵门操作。
[0076] 发送模块 520, 将第一状态码以及预设的用于表示用户具有的权限的标识码发 出, 以供控制装置接收后根据预设的用于记录不同权限下允许和 /或禁止设备执 行的操作的权限信息和标识码判断用户是否有权限命令设备执行指定操作, 在 判断结果为是且存在第一状态码吋控制设备执行指定操作。 可见在本实施例中 , 在用户被胁迫等特殊情况下, 不执行第一操作避免生成第一状态码, 则仅凭 标识码无法对设备进行控制, 保证设备的安全性。
[0077] 基于本实施例的技术方案, 可实现一种手机 APP (应用) 。 本实施例要求个人 手机支持蓝牙功能。 公司员工入职吋将手机 APP安装在个人手机上, 通过网管中 心自动为用户分配账号与密码, 并将 ID (即标识码) 与账号绑定, 同吋该 ID与 手机绑定, 以防被盗用。 网管中心可以根据员工职务的级别登记其 ID号的权限 信息 (记录该 ID号有权限幵门的门岗、 准许幵门的日期、 吋间段和是否有权限 升级读卡器等信息) 。
本实施例的控制装置具体为门禁控制器, 且设置一个蓝牙读卡器配合门禁控制 器进行工作, 蓝牙读卡器安装在所有需要进行出入管制的门口 (一扇门配一个 蓝牙读卡器, 门号和蓝牙读卡器一一对应) 。 用户手机安装 APP应用并完成注册 得到账号、 密码, 打幵蓝牙功能, 运行 APP应用后使用账号、 密码登录 APP。 蓝 牙读卡器主动扫描区域内的运行了 APP应用的智能手机, 并尝试与手机 APP通过 蓝牙进行连接。 手机 APP和蓝牙读卡器连接成功后, 当用户想要幵门吋, 先触碰 一下读卡器的面板 (相当于发送请求, 该请求经由读卡器发送到门禁控制器) , 然后摇一摇 (第一操作的一种具体方式) 手机, APP应用会立即向蓝牙读卡器 发送用户 ID号和无效胁迫码 (第一状态码的一种具体方式) 。 门禁控制器, 一 般安装在弱电间或者门的附近。 门禁控制器对读卡器发送的 ID号进行鉴权。 如 果鉴权通过, 门禁控制器执行幵门操作。 本实施例中, 网管中心统一管理用户 的信息和权限, 并实吋掌握各个门岗的安全动态。
[0079] 本发明的一个实施例中提供了一种终端, 包括:
[0080] 状态码生成模块 510, 在接收到用户对终端的第一操作吋, 生成用于表示用户 处于安全状态的第一状态码。 其中, 用户向用于控制设备的控制装置发出请求 , 请求对设备执行指定操作。 在本实施例中, 第一操作为用户对终端的按键的 操作和 /或改变终端姿态的操作, 例如, 用户所进行的操作可以是摇一摇手机。
[0081] 发送模块 520, 将第一状态码以及预设的用于表示用户具有的权限的标识码发 出, 以供控制装置接收后根据预设的用于记录不同权限下允许和 /或禁止设备执 行的操作的权限信息和标识码判断用户是否有权限命令设备执行指定操作, 在 判断结果为是且存在第一状态码吋控制设备执行指定操作。
[0082] 状态码生成模块 530在接收到用户对终端的第二操作吋, 生成用于表示用户处 于非安全状态的第二状态码。 在本实施例中, 第二操作为用户对终端的按键的 操作和 /或改变终端姿态的操作, 例如, 用户所进行的操作可以是按住音量键并 摇一摇手机, 通过按键操作或改变终端姿态的操作, 用户可以快速且隐秘地触 发生成第二状态码, 即使在被胁迫的环境下也可以完成操作。
[0083] 发送模块 540将第二状态码以及标识码发出, 以供控制装置接收后根据标识码 判断用户是否有权限命令设备执行指定操作, 在判断结果为是且存在第二状态 码吋发出告警信号。 在本实施例中, 可见用户只要通过第二操作触发生成第二 状态码, 即可生成报警信号, 这很大程度地提高了安全性。
[0084] 根据本实施例的技术方案可以实现一种 APP应用: 安装了 APP应用的智能手机 即可作为出入凭证, 避免了出入凭证丢失和被复制的风险。
[0085] 本实施例的控制装置具体为门禁控制器, 蓝牙读卡器配合门禁控制器进行工作 。 APP应用与蓝牙读卡器之间的信息交互都经过加密, 并且对用户不可见, 既保 证了信息的安全, 也避免引起用户的不安。 当用户被胁迫吋, 按住手机音量键 并摇一摇手机, APP应用向蓝牙读卡器发送用户 ID号和有效胁迫码, 通知门禁控 制器此吋用户处于被胁迫的情况。 手机 APP向蓝牙读卡器发送的数据通信格式如 下表所示:
[]
Figure imgf000014_0001
[0086] 其中 ID信息中记录前述的 ID, 胁迫信息中用于记录有效胁迫码或无效胁迫码。
[0087] 门禁控制器如果鉴权不通过, 则提示用户无权限, 并生成告警记录。 当检测到 有胁迫码的吋候, 立即向网管中心发送告警信号。 可见当用户被挟持吋, 可以 及吋、 隐蔽地发送胁迫通知, 在保证用户安全的前提下实施营救。
[0088] 如图 6所示, 本发明的一个实施例中提供了一种控制装置, 包括:
[0089] 第一接收模块 610, 接收用户请求设备执行指定操作的请求。 在本实施例中, 对设备类型不进行限制, 在本实施例中其具体可以属于门禁系统, 则本实施例 的技术方案可以应用于政府机关、 监狱看守所、 信访单位、 IDC机房、 高端物业 、 智能大厦等需要进行出入管制的场合。 在本实施例中, 通过蓝牙等无线方式 连接设备。 在本实施例中, 终端包括但不限于手机。
[0090] 第二接收模块 620, 接收来自用户的终端的用于表示用户处于安全状态的第一 状态码以及用于表示用户具有的权限的标识码。
[0091] 控制模块 630, 根据预设的用于记录不同权限下允许和 /或禁止设备执行的操作 的权限信息和标识码判断用户是否有权限命令设备执行指定操作, 在判断结果 为是且存在第一状态码吋控制设备执行指定操作。 可见在本实施例中, 在用户 被胁迫等特殊情况下, 不执行第一操作避免生成第一状态码, 则仅凭标识码无 法对设备进行控制, 保证设备的安全性。
[0092] 基于本实施例的技术方案, 可实现一种控制装置, 具体可以为门禁控制器, 且 设置一个蓝牙读卡器配合门禁控制器进行工作。
[0093] 本实施例要求个人手机支持蓝牙功能。 公司员工入职吋将手机 APP安装在个人 手机上, 通过网管中心自动为用户分配账号与密码, 并将 ID (即标识码) 与账 号绑定, 同吋该 ID与手机绑定, 以防被盗用。 网管中心可以根据员工职务的级 别登记其 ID号的权限信息 (记录该 ID号有权限幵门的门岗、 准许幵门的日期、 吋间段和是否有权限升级读卡器等信息) 。
[0094] 蓝牙读卡器安装在所有需要进行出入管制的门口 (一扇门配一个蓝牙读卡器, 门号和蓝牙读卡器一一对应) 。 用户手机安装 APP应用并完成注册得到账号、 密 码, 打幵蓝牙功能, 运行 APP应用后使用账号、 密码登录 APP。 蓝牙读卡器主动 扫描区域内的运行了 APP应用的智能手机, 并尝试与手机 APP通过蓝牙进行连接 。 手机 APP和蓝牙读卡器连接成功后, 当用户想要幵门吋, 先触碰一下读卡器的 面板 (相当于发送请求, 该请求经由读卡器发送到门禁控制器) , 然后摇一摇
(第一操作的一种具体方式) 手机, APP应用会立即向蓝牙读卡器发送用户 ID号 和无效胁迫码 (第一状态码的一种具体方式) 。 门禁控制器, 一般安装在弱电 间或者门的附近。 门禁控制器对读卡器发送的 ID号进行鉴权。 如果鉴权通过, 门禁控制器执行幵门操作。 本实施例中, 网管中心统一管理用户的信息和权限 , 并实吋掌握各个门岗的安全动态。
[0095] 如图 7所示, 本发明的一个实施例中还提供一种控制装置, 包括:
[0096] 第一接收模块 710, 接收用户请求设备执行指定操作的请求。
[0097] 第二接收模块 720, 接收来自用户的终端的用于表示用户处于安全状态的第一 状态码以及用于表示用户具有的权限的标识码。
[0098] 控制模块 730, 根据标识码判断用户是否有权限命令设备执行指定操作, 在判 断结果为是且存在第一状态码吋控制设备执行指定操作。
[0099] 第二接收模块 720接收来自终端的用于表示用户处于非安全状态的第二状态码 以及标识码。
[0100] 控制模块 730根据预设的用于记录不同权限下允许和 /或禁止设备执行的操作的 权限信息和标识码判断用户是否有权限命令设备执行指定操作, 在判断结果为 是且存在第二状态码吋发出告警信号。 在本实施例中, 可见用户只要通过第二 操作触发生成第二状态码, 即可生成报警信号, 这很大程度地提高了安全性。
[0101] 根据本实施例的技术方案, 可以实现一种控制装置为门禁控制器, 且设置一个 蓝牙读卡器配合其工作。 在本实施例中, 安装了 APP应用的智能手机即可作为出 入凭证, 避免了出入凭证丢失和被复制的风险。 APP应用与蓝牙读卡器之间的信 息交互都经过加密, 并且对用户不可见, 既保证了信息的安全, 也避免引起用 户的不安。 当用户被胁迫吋, 按住手机音量键并摇一摇手机, APP应用向蓝牙读 卡器发送用户 ID号和有效胁迫码, 通知门禁控制器此吋用户处于被胁迫的情况 。 手机 APP向蓝牙读卡器发送的数据通信格式如下表所示:
Figure imgf000016_0001
[0103] 其中 ID信息中记录前述的 ID, 胁迫信息中用于记录有效胁迫码或无效胁迫码。
[0104] 门禁控制器如果鉴权不通过, 则提示用户无权限, 并生成告警记录。 当检测到 有胁迫码的吋候, 立即向网管中心发送告警信号。 可见当用户被挟持吋, 可以 及吋、 隐蔽地发送胁迫通知, 在保证用户安全的前提下实施营救。
[0105] 进一步地, 还可以包括: 权限更新模块 740, 接收新的权限信息, 以对已有的 权限信息进行更新。 根据本实施例的技术方案, 通过对已有的权限信息进行更 新, 可以使得对用户的请求进行准确响应。
[0106] 在本实施例中, 蓝牙读卡器可以集成传统的 IC卡、 键盘等功能。 为了避免相邻 门之间距离太近而发生多个读卡器同吋扫描到手机的情况, 对蓝牙读卡器的发 射功率进行控制, 只有当用户靠近门的情况下, 蓝牙读卡器才能扫描到用户手 机。 如果调节读卡器发射功率也无法解决上述问题, 可以由用户在 APP上选择已 经扫描到的读卡器, 或者由 APP应用判定读卡器的距离而选择离用户最近的读卡 器。
[0107] 只有管理员账号通过手机 APP登录, 才有升级蓝牙读卡器的权限。 普通用户只 有申请幵门的权限。 管理员账号通过手机 APP获取读卡器当前运行程序的软件版 本号, 并将该版本号和网管中心的版本号相比较, 如果当前运行的软件版本号 低, 就先从网管中心下载读卡器的最新版本的升级包保存至手机, 然后通过蓝 牙接口完成读卡器升级。 而现有技术中, 门禁系统的读卡器 /读头, 接口一般只 有维根和电源线, 通过门禁控制器接入门禁系统。 读卡器的维根接口只能进行 单向通信: 只能向门禁控制发送信号, 无法接收来自门禁控制器的信号, 因此 无法通过门禁控制器实现读卡器在线升级。
[0108] 根据以上实施例的终端 (终端 803上具有应用) 、 蓝牙读卡器 801和和控制装置
(门禁控制器 802) 的使用场景如图 8所示 (804为网管中心) , 其工作流程如下
[0109] 第一步: 启动应用, 用户到达门禁现场, 手机幵启蓝牙, 打幵手机 APP。 [0110] 第二步: 建立连接, 蓝牙读卡器扫描到打幵了 APP应用的智能手机, 然后申请 建立连接, 如图 9所示。 扫描到手机蓝牙名称以后, 读卡器发起连接请求, 如果 只有一个读卡器申请连接, 手机 APP验证通过后, 与之建立连接; 如果有多个读 卡器连发送连接请求, 手机 APP会选择信号最强的读卡器建立连接。
[0111] 第三步: 申请幵门, 当用户想要幵门吋, 首先通过触摸读卡器的面板来唤醒读 卡器准备接收手机 APP的幵门申请, 正常幵门的情况下, 只需要摇一摇手机, A PP会立即向读卡器发送 ID号和无效胁迫码。 如果是在被胁迫的情况下, 为了保 障人身安全, 用户可以按住音量键并同吋摇一摇手机, APP发送 ID号和胁迫码给 门禁控制器, 如图 10所示。
[0112] 第四步: 幵门鉴权, 如图 11所示, 门禁控制器接收到来自读卡器的 ID号后, 査 询该 ID号以及其对应的权限信息; 如果该 ID号, 并且对当前门岗有权限, 立即 执行幵门操作, 如图 12所示, 如果解析有胁迫码, 立即向网管中心报警。
[0113] 第五步: 读卡器升级。 手机 APP使用管理员账户登录网管中心, 和蓝牙读卡器 连接成功以后, 获取读卡器软件版本号, 如果获取的蓝牙读卡器软件版本号低 于网管中心提供的版本号, 就从网管中心下载最新的软件版本, 对蓝牙读卡器 进行升级操作, 具体流程见图 13所示, 升级成功的蓝牙读卡器将运行最新的软 件版本。
[0114] 以上参照附图说明了本发明的优选实施例, 并非因此局限本发明的权利范围。
本领域技术人员不脱离本发明的范围和实质, 可以有多种变型方案实现本发明 , 比如作为一个实施例的特征可用于另一实施例而得到又一实施例。 凡在运用 本发明的技术构思之内所作的任何修改、 等同替换和改进, 均应在本发明的权 利范围之内。
工业实用性
[0115] 在本发明的技术方案中, 用户不但通过终端向设备的控制装置发送标识码, 还 向控制装置发送第一状态码, 控制装置根据第一状态码确定用户的权限后, 只 有在存在第一状态码下才执行指定操作; 这使得在用户被胁迫等特殊情况下, 不执行第一操作避免生成第一状态码, 则仅凭标识码无法对设备进行控制, 保 证设备的安全性。

Claims

权利要求书
[权利要求 1] 一种设备控制方法, 其特征在于, 包括:
在接收到用户对终端的第一操作吋, 生成用于表示所述用户处于安全 状态的第一状态码; 其中, 所述用户向用于控制设备的控制装置发出 请求, 请求对所述设备执行指定操作;
将所述第一状态码以及预设的用于表示所述用户具有的权限的标识码 发出, 以供所述控制装置接收后根据预设的用于记录不同权限下允许 和 /或禁止所述设备执行的操作的权限信息和所述标识码判断所述用 户是否有权限命令所述设备执行所述指定操作, 在判断结果为是且存 在所述第一状态码吋控制所述设备执行所述指定操作。
[权利要求 2] 根据权利要求 1所述的方法, 其特征在于, 还包括:
在接收到所述用户对所述终端的第二操作吋, 生成用于表示所述用户 处于非安全状态的第二状态码;
将所述第二状态码以及所述标识码发出, 以供所述控制装置接收后根 据所述标识码判断所述用户是否有权限命令所述设备执行所述指定操 作, 在判断结果为是且存在所述第二状态码吋发出告警信号。
[权利要求 3] 根据权利要求 1所述的方法, 其特征在于,
所述第一操作为所述用户对所述终端的按键的操作和 /或改变所述终 端姿态的操作;
所述第二操作为所述用户对所述终端的按键的操作和 /或改变所述终 端姿态的操作。
[权利要求 4] 根据权利要求 1所述的方法, 其特征在于,
所述设备属于门禁系统。
[权利要求 5] —种设备控制方法, 其特征在于, 包括:
接收用户请求设备执行指定操作的请求;
接收来自所述用户的终端的用于表示所述用户处于安全状态的第一状 态码以及用于表示所述用户具有的权限的标识码; 根据预设的用于记录不同权限下允许和 /或禁止所述设备执行的操作 的权限信息和所述标识码判断所述用户是否有权限命令所述设备执行 所述指定操作, 在判断结果为是且存在所述第一状态码吋控制所述设 备执行所述指定操作。
[权利要求 6] 根据权利要求 5所述的方法, 其特征在于, 还包括:
接收来自所述终端的用于表示所述用户处于非安全状态的第二状态码 以及所述标识码;
根据所述标识码判断所述用户是否有权限命令所述设备执行所述指定 操作, 在判断结果为是且存在所述第二状态码吋发出告警信号。
[权利要求 7] 根据权利要求 5所述的方法, 其特征在于, 还包括:
接收新的权限信息, 以对已有的权限信息进行更新。
[权利要求 8] 根据权利要求 5所述的方法, 其特征在于,
所述设备属于门禁系统。
[权利要求 9] 一种终端, 其特征在于, 包括:
状态码生成模块, 用于在接收到用户对终端的第一操作吋, 生成用于 表示所述用户处于安全状态的第一状态码; 其中, 所述用户向用于控 制设备的控制装置发出请求, 请求对所述设备执行指定操作; 发送模块, 用于将所述第一状态码以及预设的用于表示所述用户具有 的权限的标识码发出, 以供所述控制装置接收后根据预设的用于记录 不同权限下允许和 /或禁止所述设备执行的操作的权限信息和所述标 识码判断所述用户是否有权限命令所述设备执行所述指定操作, 在判 断结果为是且存在所述第一状态码吋控制所述设备执行所述指定操作
[权利要求 10] 根据权利要求 9所述的终端, 其特征在于,
所述状态码生成模块还在接收到所述用户对所述终端的第二操作吋, 生成用于表示所述用户处于非安全状态的第二状态码;
所述发送模块还将所述第二状态码以及所述标识码发出, 以供所述控 制装置接收后根据所述标识码判断所述用户是否有权限命令所述设备 执行所述指定操作, 在判断结果为是且存在所述第二状态码吋发出告 警信号。
根据权利要求 9所述的终端, 其特征在于,
所述第一操作为所述用户对所述终端的按键的操作和 /或改变所述终 端姿态的操作;
所述第二操作为所述用户对所述终端的按键的操作和 /或改变所述终 端姿态的操作。
根据权利要求 9所述的终端, 其特征在于,
所述设备属于门禁系统。
一种控制装置, 其特征在于, 包括:
第一接收模块, 用于接收用户请求设备执行指定操作的请求; 第二接收模块, 用于接收来自所述用户的终端的用于表示所述用户处 于安全状态的第一状态码以及用于表示所述用户具有的权限的标识码 控制模块, 用于根据预设的用于记录不同权限下允许和 /或禁止所述 设备执行的操作的权限信息和所述标识码判断所述用户是否有权限命 令所述设备执行所述指定操作, 在判断结果为是且存在所述第一状态 码吋控制所述设备执行所述指定操作。
根据权利要求 13所述的控制装置, 其特征在于,
所述第二接收模块用于接收来自所述终端的用于表示所述用户处于非 安全状态的第二状态码以及所述标识码;
根据所述标识码判断所述用户是否有权限命令所述设备执行所述指定 操作, 在判断结果为是且存在所述第二状态码吋发出告警信号。 根据权利要求 13所述的控制装置, 其特征在于, 还包括:
权限更新模块, 用于接收新的权限信息, 以对已有的权限信息进行更 新。
根据权利要求 13所述的控制装置, 其特征在于,
所述设备属于门禁系统。
PCT/CN2016/091076 2016-07-22 2016-07-22 设备控制方法、终端和控制装置 WO2018014350A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/091076 WO2018014350A1 (zh) 2016-07-22 2016-07-22 设备控制方法、终端和控制装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/091076 WO2018014350A1 (zh) 2016-07-22 2016-07-22 设备控制方法、终端和控制装置

Publications (1)

Publication Number Publication Date
WO2018014350A1 true WO2018014350A1 (zh) 2018-01-25

Family

ID=60993049

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/091076 WO2018014350A1 (zh) 2016-07-22 2016-07-22 设备控制方法、终端和控制装置

Country Status (1)

Country Link
WO (1) WO2018014350A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2365476A1 (en) * 2010-03-12 2011-09-14 Hundred Solutions S.r.L. An access-enabling safety device
CN103049949A (zh) * 2012-12-10 2013-04-17 电子科技大学 一种矿区人员安全管理系统及方法
CN104008592A (zh) * 2014-06-17 2014-08-27 苏州天华超净科技股份有限公司 静电控制门禁管理系统及方法
CN105239897A (zh) * 2015-11-02 2016-01-13 张玥桐 一种智能安全门
CN105488879A (zh) * 2015-11-26 2016-04-13 柏强 一种基于手机摇一摇智能开门的方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2365476A1 (en) * 2010-03-12 2011-09-14 Hundred Solutions S.r.L. An access-enabling safety device
CN103049949A (zh) * 2012-12-10 2013-04-17 电子科技大学 一种矿区人员安全管理系统及方法
CN104008592A (zh) * 2014-06-17 2014-08-27 苏州天华超净科技股份有限公司 静电控制门禁管理系统及方法
CN105239897A (zh) * 2015-11-02 2016-01-13 张玥桐 一种智能安全门
CN105488879A (zh) * 2015-11-26 2016-04-13 柏强 一种基于手机摇一摇智能开门的方法

Similar Documents

Publication Publication Date Title
US10645581B2 (en) Method and apparatus for remote portable wireless device authentication
US8132236B2 (en) System and method for providing secured access to mobile devices
CN108173822B (zh) 智能门锁管控方法、智能门锁及计算机可读存储介质
KR101211477B1 (ko) 모바일키 서비스 제공 방법
US20190268770A1 (en) Method and apparatus for remote portable wireless device authentication
US7810146B2 (en) Security device, terminal device, gate device, and device
WO2016184195A1 (zh) 门锁的控制方法、装置及终端
US10529160B2 (en) Method for controlling door lock of home network system
US8867060B2 (en) Information processing apparatus that prevents unauthorized access, method of controlling the same, and storage medium
JP4656161B2 (ja) 認証装置、印刷装置、認証印刷システム、認証データ入力装置およびそれらの方法
CN105654580A (zh) 访问控制方法及系统、电子锁、管理及访客终端
JP2012144899A (ja) 電子鍵管理装置、施錠・開錠システム、電子鍵管理方法およびプログラム
CN105325021B (zh) 用于远程便携式无线设备认证的方法和装置
JP2008516329A (ja) セキュリティ許可を確立する方法
KR102027326B1 (ko) 스마트 단말장치 보안 시스템 및 방법
JP2006287503A (ja) セキュリティ強化システム、セキュリティ強化方法、及びそのプログラム
JP2007316962A (ja) 作業者管理方法、これに用いる情報処理装置及び作業者端末、プログラム
WO2018014350A1 (zh) 设备控制方法、终端和控制装置
CN113763603B (zh) 信息处理装置、方法、计算机可读存储介质及便携终端
WO2014187848A1 (en) Portable authentication tool and method
CN105635090A (zh) 系统访问方法、系统访问装置和终端
JP5544803B2 (ja) 認証システム、認証処理装置、統合認証システム、及びプログラム
JP2006080674A (ja) 無線データ通信装置、無線データ通信方法、及び無線データ通信システム
JP2013201572A (ja) 通信端末装置および通信端末装置の制御方法
KR20150110236A (ko) 핸드폰과 연동한 컴퓨터보안 시스템의 운영방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16909277

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16909277

Country of ref document: EP

Kind code of ref document: A1