WO2020134525A1 - Access control management method, apparatus and system - Google Patents
Access control management method, apparatus and system Download PDFInfo
- Publication number
- WO2020134525A1 WO2020134525A1 PCT/CN2019/114106 CN2019114106W WO2020134525A1 WO 2020134525 A1 WO2020134525 A1 WO 2020134525A1 CN 2019114106 W CN2019114106 W CN 2019114106W WO 2020134525 A1 WO2020134525 A1 WO 2020134525A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- access control
- state
- instruction
- lock
- target access
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B47/00—Operating or controlling locks or other fastening devices by electric or magnetic means
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B47/00—Operating or controlling locks or other fastening devices by electric or magnetic means
- E05B47/0001—Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof
- E05B47/0002—Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof with electromagnets
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/18—Status alarms
Definitions
- the present disclosure relates to the field of security technology, and in particular to an access control management method, device and system.
- the electric mortise lock on the access control can be locked and unlocked.
- the electric mortise lock When the electric mortise lock is locked, the access control cannot be pulled apart by human power or external force.
- the access control is in the locked state.
- the electric mortise lock When the electric mortise lock is unlocked, the access control can be humanized. Or the external force is pulled away.
- the electric mortise lock mainly includes two parts, namely the lock tongue and the lock hole.
- the lock tongue can be set on the door, and the lock hole can be set on the door frame.
- the motor inside the electric mortise lock When the motor inside the electric mortise lock receives the control command to run, it can push the lock tongue into the lock hole, the electric mortise lock is in the locked state, when the motor inside the electric mortise lock runs in the reverse direction, the lock can be driven When the tongue leaves the lock hole, the electric mortise lock is unlocked.
- the card reader needs to be swiped for identity confirmation. If the user is confirmed to be a legitimate user, the card reader will send a lock control instruction to the access controller such as Unlock instruction, the access controller can control the electric mortise lock to perform unlock operation based on the unlock instruction. After the legal user enters the place, the access control will automatically rebound. After the preset lock time, the access control controller automatically controls the electric mortise lock to perform the locking operation.
- Unlock instruction Unlock instruction
- Unlock instruction the access controller can control the electric mortise lock to perform unlock operation based on the unlock instruction.
- the access control After the legal user enters the place, the access control will automatically rebound. After the preset lock time, the access control controller automatically controls the electric mortise lock to perform the locking operation.
- a method for access control management including:
- the lock control instruction determine the theoretical state of the target access control after performing the action corresponding to the lock control instruction
- the determining the theoretical state of the target access control after performing the action corresponding to the lock control instruction includes:
- determining the theoretical state of the target access control after performing the action corresponding to the lock control instruction includes that the electric lock of the target access control is in the locked state and the door magnetism of the access control It is the pull-in state;
- the acquiring the actual state of the target access control after performing the action corresponding to the lock control instruction includes:
- the method further includes:
- the configuration state includes a normal state and an unconventional state
- the unconventional state includes a non-automatic lock state and an advanced permission unlock state
- the configuration state of the target access control is updated based on the current configuration state of the target access control and the lock control instruction of the target access control.
- the method further includes:
- the current state of the target access control is obtained, and based on the current configuration state of the target access control, it is determined whether the current state of the target access control is normal, and if not, the access control is sent to the designated terminal Exception indication message.
- the acquiring a lock control instruction for a target access control includes: receiving an alarm event, and when the alarm event is a first type event, acquiring a non-automatic locking instruction for the access control related to the alarm event; when the When the alarm event is a second type event, obtain an advanced permission unlocking instruction related to the access control related to the alarm event.
- the method further includes:
- an unlocking instruction After sending an unlocking instruction with advanced authority to the access control related to the alarm event, if an unlocking instruction is obtained, it is determined whether the user authority corresponding to the unlocking instruction is advanced authority, and if so, the unlocking is sent to the access control specified by the unlocking instruction instruction;
- the lock instruction After sending a non-automatic lock instruction to the access control related to the alarm event, if a lock instruction is obtained, the lock instruction is sent to the access control specified by the lock instruction.
- the acquiring the lock control instruction for the target access control includes:
- the arming plan includes the start time of the advanced permission unlocking state and the end time of the advanced permission unlocking state, and when the start time of the advanced permission unlocking state is reached, obtain the advanced permission unlocking instruction for the target access control ; When the end time of the unlocking state of the advanced authority is reached, obtain a lock instruction for the target access control.
- the access control abnormality indication message includes a target access control identifier, so that the designated terminal displays the target access control on a map according to the access control abnormality indication message after receiving the access control abnormality indication message Abnormal state
- the access control abnormality indication message includes: a target access control associated camera identifier, so that after receiving the access control abnormality indication message, the designated terminal displays the target access control associated camera collection according to the access control abnormality indication message Video.
- the acquiring the actual state of the target access control after performing the action corresponding to the lock control instruction includes:
- the actual state of the electric mortise lock in the target access control after performing the action corresponding to the lock control instruction is determined.
- an access control management device comprising:
- the acquisition module is used to acquire the lock control instruction for the target access control
- a determining module configured to determine the theoretical state of the target access control after performing the action corresponding to the lock control instruction according to the lock control instruction;
- the acquiring module is further configured to acquire the actual state of the target access control after performing the action corresponding to the lock control instruction;
- the sending module is configured to send an access control abnormality indication message to the designated terminal when the theoretical state and the actual state are inconsistent.
- the determination module is configured to, when the lock control instruction is an unlock instruction, determine that the theoretical state of the target access control after performing the action corresponding to the lock control instruction includes the electric lock of the target access control Is in a locked state and the door magnet of the access control is in a pull-in state;
- the acquisition module is configured to acquire the actual state of the target access control after performing the action corresponding to the lock control instruction when the current lock control command of the target access control reaches the preset duration.
- the theoretical state of the target access control after performing the action corresponding to the lock control instruction is determined.
- the obtaining module is further configured to obtain the current configuration state of the target access control, wherein the configuration state includes a normal state and an unconventional state, and the unconventional state includes a non-automatic lock state and an advanced permission unlock status;
- the device also includes:
- the update module is configured to update the configuration state of the target access control based on the current configuration state of the target access control and the lock control instruction of the target access control.
- the acquisition module is also used to:
- the current state of the target access control is obtained, and based on the current configuration state of the target access control, it is determined whether the current state of the target access control is normal, and if not, the access control is sent to the designated terminal Exception indication message.
- the acquisition module is used to:
- the sending module is also used to:
- an unlocking instruction After sending an unlocking instruction with advanced authority to the access control related to the alarm event, if an unlocking instruction is obtained, it is determined whether the user authority corresponding to the unlocking instruction is advanced authority, and if so, the unlocking is sent to the access control specified by the unlocking instruction instruction;
- the lock instruction After sending a non-automatic lock instruction to the access control related to the alarm event, if a lock instruction is obtained, the lock instruction is sent to the access control specified by the lock instruction.
- the acquisition module is used to:
- the arming plan includes the start time of the advanced permission unlocking state and the end time of the advanced permission unlocking state, and when the start time of the advanced permission unlocking state is reached, obtain the advanced permission unlocking instruction for the target access control ; When the end time of the unlocking state of the advanced authority is reached, obtain a lock instruction for the target access control.
- the access control abnormality indication message includes a target access control identifier, so that the designated terminal displays the target access control on a map according to the access control abnormality indication message after receiving the access control abnormality indication message Abnormal state
- the access control abnormality indication message includes: a target access control associated camera identifier, so that after receiving the access control abnormality indication message, the designated terminal displays the target access control associated camera collection according to the access control abnormality indication message Video.
- the acquisition module is used to:
- the actual state of the electric mortise lock in the target access control after performing the action corresponding to the lock control instruction is determined.
- an access control management system includes a target access control and an access control platform, wherein:
- the access control platform is used to obtain a lock control instruction for the target access control; according to the lock control instruction, determine a theoretical state of the target access control after performing an action corresponding to the lock control instruction; obtain the target The actual state of the access control after the action corresponding to the lock control instruction is executed; if the theoretical state is inconsistent with the actual state, an access control abnormality indication message is sent to the designated terminal.
- a server includes a processor, a communication interface, a memory, and a communication bus, where:
- the processor, the communication interface, and the memory complete communication with each other through the communication bus;
- the memory is used to store computer programs
- the processor is used to execute a program stored on the memory to implement the above access control management method.
- a computer-readable storage medium in which a computer program is stored, and when the computer program is executed by a processor, the above access control management method is implemented.
- the theoretical state of the target access control after executing the lock control instruction can be determined, and at the same time, the actual state of the target access control after executing the lock control instruction can be determined. If the status is inconsistent, you can determine that the target access control is abnormal and send the access control exception message to the designated terminal accordingly. In this way, the designated terminal can perform the corresponding prompt operation, and the access control administrator can view the prompt information of the access control exception and perform the corresponding processing. Furthermore, the specific conditions of access control can be grasped in real time, and the safety of the place can be guaranteed.
- Fig. 1 is a schematic flowchart of an access control management method according to an exemplary embodiment
- Fig. 2 is a schematic structural diagram of an access control management system according to an exemplary embodiment
- Fig. 3 is a schematic flowchart of an access control management method according to an exemplary embodiment
- Fig. 4 is a schematic flowchart of an access control management method according to an exemplary embodiment
- Fig. 5 is a schematic structural diagram of an access control management device according to an exemplary embodiment
- Fig. 6 is a schematic structural diagram of a server according to an exemplary embodiment.
- An exemplary embodiment of the present disclosure provides an access control management method. As shown in FIG. 1, the processing flow of the method may include the following steps:
- Step S110 Acquire a lock control instruction for target access control.
- the access control can be made of hard metal, rigid glass and other materials, the access control equipment is not easy to be destroyed by violence.
- the lock control instruction may include a lock instruction and an unlock instruction.
- the access control platform can obtain the lock control instruction for the target access control.
- the access control platform can be set in the background server. If the access control is a smart access control, the access control platform can also be set on the smart access control.
- the lock control command can be generated by the client installed in the terminal to control the target access control remotely, or it can be generated by the front-end access control controller after the user performs the card swiping operation to authenticate the card data. It can also be generated automatically according to the access control deployment plan, etc., and the lock control command can be generated in different ways, which can meet the control requirements of the access control in different scenarios at the same time. As shown in Figure 2, no matter how the lock control instruction for the target access control is generated, it can be reported to the access control platform.
- a card reader needs to be swiped for identity confirmation. If the user is confirmed to be a legitimate user, the access control controller will generate an unlock instruction. At the same time, the access control controller can also send an unlock instruction for the target access control to the access control platform.
- other authentication methods such as face recognition and fingerprint recognition can also be used to confirm whether the user who is going to enter the place where the access control system is installed is a legitimate user.
- the following describes an example of generating a lock control instruction through an authentication method, taking the example of a user swiping a card, that is, the following description uses an example of a user swiping a card to perform authentication to generate a lock control instruction as an example for access control management, other
- Step S120 according to the lock control instruction, determine the theoretical state of the target access control after performing the action corresponding to the lock control instruction.
- the corresponding relationship between the lock control command and the theoretical state may be pre-stored in the access control platform. By searching the corresponding relationship, after receiving the lock control command, the theoretical state corresponding to the received lock control command can be determined.
- the access control platform can determine the theoretical state of the target access control after executing the action corresponding to the lock control instruction based on the acquired lock control instruction.
- the theoretical state may include the state of the door sensor and the state of the electric mortise lock.
- Step S130 Acquire the actual state of the target access control after executing the action corresponding to the lock control instruction.
- the access controller may obtain the actual state after the action corresponding to the lock control instruction is executed, and report the actual state after the action corresponding to the lock control instruction to the access control platform.
- the access control platform can obtain the actual state of the target access control after executing the action corresponding to the lock control instruction.
- the actual state may include the state of the door sensor and the state of the electric mortise lock. It should be noted that if there are other electric components similar to the door magnet and electric mortise lock on the access control, the status of these electric components can also be obtained.
- step S140 if the theoretical state and the actual state are inconsistent, an access control abnormality indication message is sent to the designated terminal.
- the access control platform can compare the two states after acquiring the theoretical state of the target access control after performing the action corresponding to the lock control instruction and the actual state of the target access control after performing the action corresponding to the lock control instruction. If the theoretical state is not consistent with the actual state, an access control abnormality indication message can be sent to the designated terminal; if the theoretical state is consistent with the actual state, an access control normal indication message can be sent to the designated terminal.
- the designated terminal may be a terminal used by the access control administrator, and may be bound to the access control system to receive a prompt message sent by the access control system, or the access control administrator may query the status of the access control through the designated terminal.
- a client connected to the access control platform can be installed in the designated terminal. The administrator can open the client and enter the user name and password in the client to log in to the access control platform. The access control platform can push some messages, such as access control exception indication messages, to the client.
- the designated terminal may not prompt the access control normal indication message after receiving the access control normal indication message.
- the access control administrator checks the status of the access control, it will prompt that the access control is normal status. Since the situation where the access control is in the normal state is not the state that the access control administrator is mainly concerned about, it is possible to record the information of the access control in the normal state only in the background. When the access control is not in the normal state, it is the state that the access control manager is more concerned about. Therefore, a prompt box can be popped up in the designated terminal only when the access control is not in the normal state to prompt the access control administrator.
- step S120 may include: if the lock control instruction is an unlock instruction, determine the theoretical state of the target access control after performing the action corresponding to the lock control instruction includes that the electric lock of the target access control is in the locked state and the door magnetism of the access control is Pull-in state; step S130 may include: when the current lock control instruction of the target access control is acquired and the preset time period is reached, the actual state of the target access control after the action corresponding to the lock control instruction is executed.
- the access control platform can determine whether the acquired lock control instruction is a lock instruction or an unlock instruction. If the lock control instruction is an unlock instruction, the target can be acquired when the preset lock duration is reached after acquiring the current lock control instruction of the target access control The actual state of the access control after the action corresponding to the lock control instruction.
- the preset duration can be the system default, or can be set by the access control administrator.
- the preset duration can be N seconds. The average user can open the door and pass through the door. The time can be N seconds. The user can count the time for the user to open the door and pass through the door. The experience value is N seconds.
- the user can push the target access control away and enter the venue.
- the electric mortise lock is in the unlocked state and the door magnet is in the unsucked state.
- the access control will automatically rebound.
- the access control controller automatically controls the electric mortise lock to perform the locking operation.
- the electric mortise lock is switched to the locked state and the door magnet is switched to the pull-in state. Therefore, the access controller can detect that the state of the electric mortise lock is the locked state and the state of the door magnet is the pull-in state.
- the access controller can report the detected state of the electric mortise lock and the state of the door magnet to the access control platform .
- the access control platform can obtain the actual state of the target access control after executing the action corresponding to the lock control instruction.
- the access control controller can detect the state of the electric mortise lock and the state of the door sensor in the following ways.
- the state detection circuit of the electric mortise lock and the state detection circuit of the door magnet can be provided in the electric circuit corresponding to the electric mortise lock of the access control and the door sensor.
- the state detection circuit of the electric mortise lock outputs The first electrical signal is to the access control controller.
- the state detection circuit of the electrical mortise lock outputs a second electrical signal to the access control controller.
- the door sensor's state detection circuit when the door sensor is in the pull-in state, the door sensor's state detection circuit outputs a third electrical signal to the access control controller, and when the door sensor is in the non-switch-in state, the door sensor's state detection circuit outputs the fourth electric signal to Access Controller.
- the access controller can receive the above electrical signal and determine the state of the electrical mortise lock and door magnet according to the electrical signal.
- the access control platform determines that the actual status of the target access control after executing the action corresponding to the lock control instruction is that the electric lock is unlocked and the door magnet is not in the closed state, it can determine that the target access control is in an abnormal state and send an access control exception to the specified terminal Indication message.
- the access control platform determines that the actual state of the target access control after performing the action corresponding to the lock control instruction is that the electric mortise lock is unlocked and the door magnet is in the pull-in state. It can also determine that the access control is in an abnormal state and send it to the designated terminal Access control exception indication message.
- the access control platform determines that the actual state of the target access control after performing the action corresponding to the lock control instruction is that the electric mortise lock is locked and the door magnet is not engaged, and it can also be determined that the access control is in an abnormal state.
- the specified terminal sends an access control exception indication message.
- the access control abnormality indication message may include: the target access control identification, so that the designated terminal displays the abnormal state of the target access control on the map according to the access control abnormality indication message after receiving the access control abnormality indication message;
- the camera identification so that the designated terminal displays the video collected by the camera associated with the target access control according to the access control abnormality indication message after receiving the access control abnormality indication message.
- the access control abnormality indication message may include: the target access control identification, so that the designated terminal displays the abnormal state of the target access control on the map according to the access control abnormality indication message after receiving the access control abnormality indication message; or the camera identification associated with the target access control , So that the designated terminal displays the video collected by the camera associated with the target access control according to the access control abnormality indication message after receiving the access control abnormality indication message.
- the place may not only be provided with one access control, but also multiple access control.
- each access control can be assigned a unique access control identification. As shown in Figure 2, if a new physical access control is added to the venue, a virtual access control corresponding to the new physical access control can be added to the access control platform, and the physical access control can be identified by the virtual access control.
- the target access control is abnormal, you can obtain the target access control logo, carry the target access control logo in the access control exception indication message and send it to the designated terminal, so that the designated terminal can receive the access control exception indication message according to the access control exception indication message.
- the location of the target access control is marked on the preset map, and the type of abnormality that occurs is prompted.
- the designated terminal may perform a pop-up operation according to the access control abnormality indication message, and display the logo, position, and abnormality information of the target access control in which the abnormality occurs in the pop-up window.
- While specifying the terminal to perform prompting operations it can also provide control options for the abnormal access control, such as the lock option, so that the access control administrator can quickly perform related operations on the abnormal access control.
- the access control management platform can also determine the identity of the camera managed by the target access control, and carry the identity of the camera managed by the target access control in the access control exception indication message to the designated terminal, so that the designated terminal can receive the access control exception indication message , According to the access control exception indication message, display the video collected by the target access control associated camera. In this way, by automatically retrieving the live screen obtained by the monitor near the access control where the abnormality occurs, the access control administrator can quickly check whether an illegal user has performed illegal operations on the access control.
- the access control administrator needs to pay special attention to the access control in the state where the certificate is not required to open the door, and can send corresponding prompt information to the designated terminal.
- the method provided by the embodiment of the present disclosure may further include: acquiring the current configuration state of the target access control; updating based on the current configuration state of the target access control and the lock control command of the target access control Target access control configuration status.
- the configuration state includes a normal state and an unconventional state
- the unconventional state includes a non-automatic lock state and an advanced permission unlock state.
- the normal state may be a state in which a credential is required to open the door, that is, when a user needs to pass the door, a card reader needs to be swiped to confirm the identity.
- the normal state can also be an automatic lock state.
- the non-routine state may include a non-automatic lock state and an advanced permission unlock state.
- the non-automatic lock state can also be called a normally open state, that is, when the access control springs back, the electric mortise lock is controlled not to perform an automatic locking operation, so that the access control is in a state where no certificate is required to open the door, and any user can push the access control to enter the place Inside.
- This state can be used when a team visits a place, a large number of users need to pass through the access control in sequence. If the access control is in a normally open state, a large number of users do not need to swipe through in sequence. They can pass through the access control under the leadership of relevant personnel and enter the site. .
- the unlocked state of advanced rights can also be called normally closed state.
- Legal users can be divided into legal users with advanced rights and ordinary legal users.
- the cards held by legal users with advanced rights are different from the cards held by ordinary legal users. They have the rights It is also different.
- the access controller can control the electric mortise lock to unlock.
- swipe the card on the card reader to confirm the identity, even if the identity is confirmed to be legal, but the permission level is not high enough, the access controller will not control the electric mortise lock to unlock the operation.
- the current configuration state of the target access control can be recorded in the access control platform.
- the target access control configuration can be updated based on the current configuration state of the target access control and the lock control command of the target access control status. For example, if the current configuration state of the target access control is an unconventional state, when the updated configuration state of the target access control is the normal state based on the current configuration state of the target access control and the lock control instruction of the target access control, the configuration state of the target access control can be changed Switch to the normal state, and send an instruction message to the designated terminal instructing to switch the configuration state of the access control to the normal state.
- the target access control configuration is switched to an abnormal state, and an instruction message instructing to switch the configuration state of the access control to an abnormal state is sent to the designated terminal.
- the current configuration state of the access control can be obtained. If the current configuration state of the access control is the advanced permission unlocking state (normally closed state), you can switch the configuration state of the access control to the normal state and send an instruction message to the designated terminal to switch the configuration state of the access control to the normal state. Or, after the access control platform obtains the lock instruction for the access control, the current configuration state of the access control can be obtained. If the current configuration state of the access control is a non-automatic lock state (normally open state), you can switch the configuration state of the access control to the normal state and send an instruction message to the designated terminal to switch the configuration state of the access control to the normal state.
- the unlocking instruction may be an unlocking instruction sent when a legal user with advanced authority passes the authentication.
- the access control administrator may perform a card swiping operation, or the access control administrator may log in to the management account and select the unlocking option. Wait.
- the lock instruction may be generated when the user performs a preset toggle operation on the electric mortise lock, or may be generated when an access control administrator logs in to the management account and selects the lock option.
- the method provided by the embodiment of the present disclosure may further include: receiving a configuration message corresponding to the target configuration state sent by the specified terminal. Switch the configuration state of access control to the target configuration state.
- the target configuration state includes a normal state and an unconventional state
- the unconventional state includes a non-automatically locked state and an advanced permission unlocked state.
- whether the configuration state of the access control is the normal state or the unconventional state may be determined based on the operation of the access control administrator. For example, if the access control administrator logs in to the management account of the specified terminal and sets the configuration state of the access control to an irregular state, the access control platform can receive the configuration message corresponding to the target configuration state sent by the specified terminal, and then change the configuration state of the access control Set to an irregular state. After that, the access control configuration status continues to be unconventional until the access control administrator logs in to the management account again to switch the access control configuration status to the normal status, or until the access control configuration command is received, the access control configuration status is automatically switched to Regular status.
- the method provided by the embodiment of the present disclosure may further include: acquiring an arming plan of the target access control, the arming plan includes a start time of the unlocking state of the advanced authority and an end time of the unlocking state of the advanced authority, when the start time of the unlocking state of the advanced authority is reached At the time, obtain the advanced permission unlocking instruction for the target access control; when the end time of the advanced permission unlocking state is reached, obtain the locking instruction for the target access control.
- the administrator can set the target access control arming plan by specifying the terminal, and upload the target access control arming plan to the access control platform, and the access control control platform executes the target access control arming plan.
- the access control platform can obtain the arming plan of the target access control.
- the arming plan includes the start time of the unlocking state of the advanced authority and the end time of the unlocking state of the advanced authority.
- the access control platform obtains the unlocking instruction of the advanced authority for the target access control; when the end time of the unlocking state of the advanced authority is reached, the access control platform obtains the locking instruction of the target access control.
- the access control platform can obtain the lock instruction for the target access control and send the lock instruction to the target access control to set the target access control to the normal state.
- the access control controller may determine the state of the electric mortise lock and the state of the door magnet by the following method: if the access controller detects an interruption event of the electric mortise lock state port, based on the level of the electric mortise lock state port Signal to determine the state of the electric mortise lock. If the access controller detects an interrupt event of the door status port, it determines the state after the door status changes based on the level signal of the door status port. The access control controller can report the changed state of the electric mortise lock and the state of the door magnet to the access control platform.
- the access controller does not need to detect the state of the electric mortise lock and door magnet in real time, nor does it need to report the state of the electric mortise lock and door magnet in real time. It can only detect electricity when the state of the electric mortise lock or door magnet changes.
- the state of the mortise lock or door sensor and report the state of the electric mortise lock and door sensor.
- the pin of the electric mortise lock state detection circuit output level signal can be connected to the electric mortise lock state port of the access controller. If the electric mortise lock is in the unlocked state, the electric mortise lock state detection circuit output level The voltage of the signal is 1-3V.
- the voltage of the output signal of the state detection circuit of the electric mortise lock is 0.8-0V.
- the electric mortise lock is in the locked state for a long time, and the voltage of the output signal of the state detection circuit of the electric mortise lock is 0.8-0V, which is a low level.
- the voltage of the output level signal of the detection circuit is 1-3V, which is a high level. In this way, there is a transition of the level signal, which changes from a low level to a high level, triggering an interrupt event.
- the access control controller When the access control controller detects the interruption event of the electrical mortise lock state port, based on the level signal of the electrical mortise lock state port, it determines the state of the electrical mortise lock after change, and reports the changed state of the electrical mortise lock to the access control platform, The access control platform can determine whether it is necessary to send an instruction message indicating the changed state of the electric mortise lock to the designated terminal. When an instruction message indicating the changed state of the electric mortise lock needs to be sent to the designated terminal, the access control platform may send an instruction message indicating the changed state of the electric mortise lock to the designated terminal.
- the principle of detecting the state of the door sensor is similar, and will not be described here.
- the method provided by the embodiment of the present disclosure may further include: whenever the preset detection period is reached, acquiring the current state of the target access control, and based on the current configuration state of the target access control, determining whether the current state of the target access control is a normal state , If not, send an access control exception indication message to the specified terminal.
- the occupancy rate of the access controller is higher, and it is easier to lose interrupt events.
- the access controller may lose the interrupt event.
- the actual electromagnetic lock may already be in the locked state, but the access controller has not detected the changed state of the electromagnetic lock, nor has the electromagnetic lock changed If the status is reported to the access control platform, the access control platform still stores the information that the electromagnetic lock is currently unlocked, so the information stored in the access control platform is wrong.
- a patrol inspection mechanism can be set for the electromagnetic lock and door sensor.
- the access control platform can actively obtain the level signal of the electrical latch state port through the access controller, and determine the current state of the electrical latch according to the level signal of the electrical latch state port.
- the access control platform can actively obtain the level signal of the door sensor status port through the access controller, and determine the current state of the door sensor according to the level signal of the door sensor status port.
- the access control platform can determine whether the current state of the target access control is normal based on the current configuration state of the target access control, and if not, send an access control exception indication message to the designated terminal. For example, if the target access control executes the unlocking instruction, after a preset time, you can obtain the actual status of the target access control after executing the unlocking instruction, or you can obtain the actual status of the target access control after executing the unlocking instruction through the inspection mechanism. If the status is inconsistent, it can be judged that the current state of the target access control is not the normal state, and an access control abnormality indication message is sent to the designated terminal.
- receive an alarm event and when the alarm event is a first type event, obtain a non-automatic lock instruction for the alarm event related access control; when the alarm event is a second type event, obtain an advanced permission unlock for the alarm event related access control instruction.
- the access control platform can also receive messages carrying alarm events sent by designated terminals.
- the access control management interface of the designated terminal can provide one-key access control for normally closed places. In this way, when a violent incident or a theft incident occurs in the premises, the access control administrator can select this option to allow the designated terminal to generate a second type of event and carry the second type of event in the message to the access control platform.
- the access control platform can receive alarm events. When the alarm event is the second type of event, it can obtain the advanced permission unlock instruction for the alarm related to the alarm event, and send the advanced permission unlock instruction to the access control in the local area of the venue to The configuration state of the access control in the local area is set to the normally closed state to control the suspect to escape from the scene.
- the alarm event may also be reported by an alarm device, which is not limited in this embodiment of the present application.
- the access control management interface of the designated terminal can provide all access control options for one-key normally open places. In this way, when an emergency such as a fire occurs in the venue, the access control administrator can select this option to allow the designated terminal to generate the first type of event and carry the first type of event in the message to the access control platform.
- the access control platform can receive alarm events. When the alarm event is the first type of event, it obtains the non-automatic locking instructions for the alarm-related access control and sends non-automatic locking instructions to all relevant access control in the venue to configure all the access control in the venue.
- the state is set to the normally open state, so that the personnel in the place can quickly evacuate the scene.
- the method provided by the embodiment of the present disclosure may further include: after sending the unlocking instruction of the advanced authority to the access control related to the alarm event, if the unlocking instruction is obtained, it is determined whether the user authority corresponding to the unlocking instruction is the advanced authority, and if so, then The access control specified by the unlock command sends an unlock command; after sending a non-automatic lock command to the access control related to the alarm event, if a lock command is obtained, a lock command is sent to the access control specified by the lock command.
- the access control platform sends the advanced permission unlocking instruction to the alarm event-related access control, if the unlocking instruction is obtained, it can determine whether the user authority corresponding to the unlocking instruction is the advanced authority. instruction. In practical applications, if the suspect has been caught, the administrator can open the door to allow personnel to pass normally.
- the lock instruction is sent to the door designated by the lock instruction.
- the administrator can set the access control to the normal state, and the access control is in a state that requires a certificate to open the door.
- the theoretical state of the target access control after executing the lock control instruction can be determined, and at the same time, the actual state of the target access control after executing the lock control instruction can be determined. If the status is inconsistent, you can determine that the target access control is abnormal and send the access control exception message to the designated terminal accordingly. In this way, the designated terminal can perform the corresponding prompt operation, and the access control administrator can view the prompt information of the access control exception and perform the corresponding processing. Furthermore, the specific conditions of access control can be grasped in real time, and the safety of the place can be guaranteed.
- the device includes:
- the obtaining module 510 is used to obtain a lock control instruction for the target access control
- the determining module 520 is configured to determine the theoretical state of the target access control after performing the action corresponding to the lock control instruction according to the lock control instruction;
- the obtaining module 510 is further configured to obtain the actual state of the target access control after performing the action corresponding to the lock control instruction;
- the sending module 530 is configured to send an access control abnormality indication message to the designated terminal when the theoretical state and the actual state are inconsistent.
- the determining module 520 is configured to, when the lock control instruction is an unlock instruction, determine that the theoretical state of the target access control after performing the action corresponding to the lock control instruction includes the electrical insertion of the target access control The lock is in a locked state and the door magnet of the access control is in a pull-in state;
- the acquiring module 510 is configured to acquire the actual state of the target access control after performing the action corresponding to the lock control instruction when the preset lock time is reached after acquiring the current lock control command of the target access control.
- the lock control instruction determine the theoretical state of the target access control after performing the action corresponding to the lock control instruction
- the obtaining module 510 is further configured to obtain the current configuration state of the target access control, wherein the configuration state includes a regular state and an irregular state, and the irregular state includes a non-automatic lock state and advanced permissions Unlocked state
- the device also includes:
- the update module is configured to update the configuration state of the target access control based on the current configuration state of the target access control and the lock control instruction of the target access control.
- the obtaining module 510 is also used to:
- the current state of the target access control is obtained, and based on the current configuration state of the target access control, it is determined whether the current state of the target access control is normal, and if not, the access control is sent to the designated terminal Exception indication message.
- the obtaining module 510 is used to:
- the sending module 530 is also used to:
- an unlocking instruction After sending an unlocking instruction with advanced authority to the access control related to the alarm event, if an unlocking instruction is obtained, it is determined whether the user authority corresponding to the unlocking instruction is advanced authority, and if so, the unlocking is sent to the access control specified by the unlocking instruction instruction;
- the lock instruction is sent to the access control related to the alarm event.
- the lock instruction is sent to the access control specified by the lock instruction.
- the obtaining module 510 is used to:
- the arming plan includes the start time of the advanced permission unlocking state and the end time of the advanced permission unlocking state, and when the start time of the advanced permission unlocking state is reached, obtain the advanced permission unlocking instruction for the target access control When the end time of the unlocking state of the advanced authority is reached, obtain a lock instruction for the target access control.
- the access control abnormality indication message includes a target access control identifier, so that the designated terminal displays the target access control on a map according to the access control abnormality indication message after receiving the access control abnormality indication message Abnormal state
- the access control abnormality indication message includes: a target access control associated camera identifier, so that after receiving the access control abnormality indication message, the designated terminal displays the target access control associated camera collection according to the access control abnormality indication message Video.
- the obtaining module 510 is used to:
- the actual state of the electric mortise lock in the target access control after performing the action corresponding to the lock control instruction is determined.
- the theoretical state of the target access control after executing the lock control instruction can be determined, and at the same time, the actual state of the target access control after executing the lock control instruction can be determined. If the status is inconsistent, you can determine that the target access control is abnormal and send the access control exception message to the designated terminal accordingly. In this way, the designated terminal can perform the corresponding prompt operation, and the access control administrator can view the prompt information of the access control exception and perform the corresponding processing. Furthermore, the specific conditions of access control can be grasped in real time, and the safety of the place can be guaranteed.
- the access control management device performs access control
- only the above-mentioned division of each functional module is used as an example for illustration.
- the above-mentioned functions can be allocated by different functional modules according to needs.
- the access control management device and the access control management method embodiments provided in the above embodiments belong to the same concept. For the specific implementation process, see the method embodiments, and details are not described here.
- Yet another exemplary embodiment of the present disclosure provides an access control management system, the system includes a target access control and an access control platform, wherein:
- the access control platform is used to obtain a lock control instruction for the target access control; according to the lock control instruction, determine a theoretical state of the target access control after performing an action corresponding to the lock control instruction; obtain the target The actual state of the access control after the action corresponding to the lock control instruction is executed; if the theoretical state is inconsistent with the actual state, an access control abnormality indication message is sent to the designated terminal.
- FIG. 6 shows a schematic structural diagram of a server 1900 provided by an exemplary embodiment of the present disclosure.
- the server 1900 may have a relatively large difference due to different configurations or performance, and may include one or more central processing units (CPU) 1910 and one or more memories 1920. Wherein, at least one instruction is stored in the memory 1920, and the at least one instruction is loaded and executed by the processor 1910 to implement the access control method described in the foregoing embodiment.
- CPU central processing units
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Lock And Its Accessories (AREA)
- Alarm Systems (AREA)
Abstract
Description
Claims (21)
- 一种门禁管理方法,其特征在于,所述方法包括:An access control management method, characterized in that the method includes:获取针对目标门禁的锁控制指令;Obtain the lock control instruction for the target access control;根据所述锁控制指令,确定所述目标门禁在执行所述锁控制指令对应的动作之后的理论状态;According to the lock control instruction, determine the theoretical state of the target access control after performing the action corresponding to the lock control instruction;获取所述目标门禁在执行所述锁控制指令对应的动作之后的实际状态;Acquiring the actual state of the target access control after performing the action corresponding to the lock control instruction;如果所述理论状态与所述实际状态不一致,则向指定终端发送门禁异常指示消息。If the theoretical state is inconsistent with the actual state, an access control abnormality indication message is sent to the designated terminal.
- 根据权利要求1所述的方法,其特征在于,所述确定所述目标门禁在执行所述锁控制指令对应的动作之后的理论状态,包括:The method according to claim 1, wherein the determining the theoretical state of the target access control after performing the action corresponding to the lock control instruction includes:如果所述锁控制指令为解锁指令,则确定所述目标门禁在执行所述锁控制指令对应的动作之后的理论状态包括所述目标门禁的电插锁为上锁状态且所述门禁的门磁为吸合状态;If the lock control instruction is an unlock instruction, determining the theoretical state of the target access control after performing the action corresponding to the lock control instruction includes that the electric lock of the target access control is in the locked state and the door magnetism of the access control It is the pull-in state;所述获取所述目标门禁在执行所述锁控制指令对应的动作之后的实际状态,包括:The acquiring the actual state of the target access control after performing the action corresponding to the lock control instruction includes:当获取目标门禁当前的锁控制指令后达到预设时长时,获取所述目标门禁在执行所述锁控制指令对应的动作之后的实际状态。When the current lock control instruction of the target access control is acquired and the preset duration is reached, the actual state of the target access control after the action corresponding to the lock control instruction is executed is acquired.
- 根据权利要求1所述的方法,其特征在于,在获取针对目标门禁的锁控制指令之后,所述方法还包括:The method according to claim 1, wherein after acquiring the lock control instruction for the target access control, the method further comprises:获取所述目标门禁当前的配置状态,其中,所述配置状态包括常规状态和非常规状态,所述非常规状态包括非自动锁定状态和高级权限解锁状态;Acquiring the current configuration state of the target access control, wherein the configuration state includes a normal state and an unconventional state, and the unconventional state includes a non-automatic lock state and an advanced permission unlock state;基于所述目标门禁当前的配置状态和所述目标门禁的锁控制指令,更新所述目标门禁的配置状态。The configuration state of the target access control is updated based on the current configuration state of the target access control and the lock control instruction of the target access control.
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method according to claim 1, wherein the method further comprises:每当到达预设的检测周期时,获取所述目标门禁当前的状态,基于所述目标门禁当前的配置状态,判断所述目标门禁当前的状态是否为正常状态,若否,向指定终端发送门禁异常指示消息。Whenever the preset detection period is reached, the current state of the target access control is obtained, and based on the current configuration state of the target access control, it is determined whether the current state of the target access control is normal, and if not, the access control is sent to the designated terminal Exception indication message.
- 根据权利要求1所述的方法,其特征在于,所述获取针对目标门禁的锁控制指令,包括:接收告警事件,当所述告警事件为第一类型事件时,获取针 对所述告警事件相关门禁的非自动锁定指令;当所述告警事件为第二类型事件时,获取针对所述告警事件相关门禁的高级权限解锁指令。The method according to claim 1, wherein the acquiring a lock control instruction for a target access control comprises: receiving an alarm event, and when the alarm event is a first type event, acquiring an access control related to the alarm event Non-automatic lock instruction; when the alarm event is a second type event, obtain a high-level permission unlock instruction for the access control related to the alarm event.
- 根据权利要求5所述的方法,其特征在于,所述方法还包括:The method according to claim 5, wherein the method further comprises:在向所述告警事件相关门禁发送高级权限解锁指令之后,若获取到解锁指令,判断所述解锁指令对应的用户权限是否为高级权限,若是,则向所述解锁指令指定的门禁发送所述解锁指令;After sending an unlocking instruction with advanced authority to the access control related to the alarm event, if an unlocking instruction is obtained, it is determined whether the user authority corresponding to the unlocking instruction is advanced authority, and if so, the unlocking is sent to the access control specified by the unlocking instruction instruction;在向所述告警事件相关的门禁发送非自动锁定指令之后,若获取到上锁指令,则向所述上锁指令指定的门禁发送所述上锁指令。After the non-automatic lock instruction is sent to the access control related to the alarm event, if the lock instruction is obtained, the lock instruction is sent to the access control specified by the lock instruction.
- 根据权利要求1所述的方法,其特征在于,所述获取针对目标门禁的锁控制指令,包括:The method according to claim 1, wherein the acquiring the lock control instruction for the target access control comprises:获取目标门禁的布防计划,所述布防计划包括高级权限解锁状态的开始时间与高级权限解锁状态的结束时间,当到达所述高级权限解锁状态的开始时间时,获取针对目标门禁的高级权限解锁指令;当到达所述高级权限解锁状态的结束时刻时,获取针对目标门禁的上锁指令。Obtain the target access control arming plan, the arming plan includes the start time of the advanced permission unlocking state and the end time of the advanced permission unlocking state, and when the start time of the advanced permission unlocking state is reached, obtain the advanced permission unlocking instruction for the target access control When the end time of the unlocking state of the advanced authority is reached, obtain a lock instruction for the target access control.
- 根据权利要求1所述的方法,其特征在于,所述门禁异常指示消息包括:目标门禁的标识,以使得所述指定终端在接收到所述门禁异常指示消息之后,根据所述门禁异常指示消息,在地图上展示所述目标门禁的异常状态;The method according to claim 1, wherein the access control abnormality indication message includes: a target access control identifier, so that the designated terminal receives the access control abnormality indication message according to the access control abnormality indication message after receiving the access control abnormality indication message , Display the abnormal state of the target access control on the map;和/或,and / or,所述门禁异常指示消息包括:目标门禁关联的摄像机标识,以使得所述指定终端在接收到所述门禁异常指示消息之后,根据所述门禁异常指示消息,展示所述目标门禁关联的摄像机所采集的视频。The access control abnormality indication message includes: a target access control associated camera identifier, so that after receiving the access control abnormality indication message, the designated terminal displays the target access control associated camera collection according to the access control abnormality indication message Video.
- 根据权利要求1所述的方法,其特征在于,所述获取所述目标门禁在执行所述锁控制指令对应的动作之后的实际状态,包括:The method according to claim 1, wherein the acquiring the actual state of the target access control after performing the action corresponding to the lock control instruction includes:基于电插锁状态端口的电平信号,确定所述目标门禁中的电插锁在执行所述锁控制指令对应的动作之后的实际状态。Based on the level signal of the electric mortise lock status port, the actual state of the electric mortise lock in the target access control after performing the action corresponding to the lock control instruction is determined.
- 一种门禁管理装置,其特征在于,所述装置包括:An access control management device, characterized in that the device includes:获取模块,用于获取针对目标门禁的锁控制指令;The acquisition module is used to acquire the lock control instruction for the target access control;确定模块,用于根据所述锁控制指令,确定所述目标门禁在执行所述锁控制指令对应的动作之后的理论状态;A determining module, configured to determine the theoretical state of the target access control after performing the action corresponding to the lock control instruction according to the lock control instruction;所述获取模块,还用于获取所述目标门禁在执行所述锁控制指令对应的动作之后的实际状态;The acquiring module is further configured to acquire the actual state of the target access control after performing the action corresponding to the lock control instruction;发送模块,用于当所述理论状态与所述实际状态不一致时,向指定终端发送门禁异常指示消息。The sending module is configured to send an access control abnormality indication message to the designated terminal when the theoretical state and the actual state are inconsistent.
- 根据权利要求10所述的装置,其特征在于,所述确定模块,用于当所述锁控制指令为解锁指令时,确定所述目标门禁在执行所述锁控制指令对应的动作之后的理论状态包括所述目标门禁的电插锁为上锁状态且所述门禁的门磁为吸合状态;The device according to claim 10, wherein the determination module is configured to determine the theoretical state of the target access control after performing the action corresponding to the lock control instruction when the lock control instruction is an unlock instruction The electric mortise lock including the target access control is in a locked state and the door magnet of the access control is in a pull-in state;所述获取模块,用于当获取目标门禁当前的锁控制指令后达到预设时长时,获取所述目标门禁在执行所述锁控制指令对应的动作之后的实际状态。The acquisition module is configured to acquire the actual state of the target access control after performing the action corresponding to the lock control instruction when the current lock control command of the target access control reaches the preset duration.
- 根据权利要求10所述的装置,其特征在于,所述获取模块,还用于获取所述目标门禁当前的配置状态,其中,所述配置状态包括常规状态和非常规状态,所述非常规状态包括非自动锁定状态和高级权限解锁状态;The device according to claim 10, wherein the acquiring module is further configured to acquire the current configuration state of the target access control, wherein the configuration state includes a normal state and an irregular state, and the irregular state Including non-automatic lock status and advanced permission unlock status;所述装置还包括:The device also includes:更新模块,用于基于所述目标门禁当前的配置状态和所述目标门禁的锁控制指令,更新所述目标门禁的配置状态。The update module is configured to update the configuration state of the target access control based on the current configuration state of the target access control and the lock control instruction of the target access control.
- 根据权利要求10所述的装置,其特征在于,所述获取模块,还用于:The apparatus according to claim 10, wherein the acquisition module is further configured to:每当到达预设的检测周期时,获取所述目标门禁当前的状态,基于所述目标门禁当前的配置状态,判断所述目标门禁当前的状态是否为正常状态,若否,向指定终端发送门禁异常指示消息。Whenever the preset detection period is reached, the current state of the target access control is obtained, and based on the current configuration state of the target access control, it is determined whether the current state of the target access control is normal, and if not, the access control is sent to the designated terminal Exception indication message.
- 根据权利要求10所述的装置,其特征在于,所述获取模块,用于:The apparatus according to claim 10, wherein the acquisition module is configured to:接收告警事件,当所述告警事件为第一类型事件时,获取针对所述告警事件相关门禁的非自动锁定指令;当所述告警事件为第二类型事件时,获取针对所述告警事件相关门禁的高级权限解锁指令。Receive an alarm event, and when the alarm event is a first type event, obtain a non-automatic lock instruction for the access control related to the alarm event; when the alarm event is a second type event, obtain the access control related to the alarm event Unlock instructions for advanced permissions.
- 根据权利要求14所述的装置,其特征在于,所述发送模块,还用于:The apparatus according to claim 14, wherein the sending module is further configured to:在向所述告警事件相关门禁发送高级权限解锁指令之后,若获取到解锁指令,判断所述解锁指令对应的用户权限是否为高级权限,若是,则向所述解锁指令指定的门禁发送所述解锁指令;After sending an unlocking instruction with advanced authority to the access control related to the alarm event, if an unlocking instruction is obtained, it is determined whether the user authority corresponding to the unlocking instruction is advanced authority, and if so, the unlocking is sent to the access control specified by the unlocking instruction instruction;在向所述告警事件相关的门禁发送非自动锁定指令之后,若获取到锁指令,则向所述锁指令指定的门禁发送所述锁指令。After sending a non-automatic lock instruction to the access control related to the alarm event, if a lock instruction is obtained, the lock instruction is sent to the access control specified by the lock instruction.
- 根据权利要求10所述的装置,其特征在于,所述获取模块,用于:The apparatus according to claim 10, wherein the acquisition module is configured to:获取目标门禁的布防计划,所述布防计划包括高级权限解锁状态的开始时间与高级权限解锁状态的结束时间,当到达所述高级权限解锁状态的开始时间时,获取针对目标门禁的高级权限解锁指令;当到达所述高级权限解锁状态的结束时刻时,获取针对目标门禁的锁指令。Obtain the target access control arming plan, the arming plan includes the start time of the advanced permission unlocking state and the end time of the advanced permission unlocking state, and when the start time of the advanced permission unlocking state is reached, obtain the advanced permission unlocking instruction for the target access control ; When the end time of the unlocking state of the advanced authority is reached, obtain a lock instruction for the target access control.
- 根据权利要求10所述的装置,其特征在于,所述门禁异常指示消息包括:目标门禁的标识,以使得所述指定终端在接收到所述门禁异常指示消息之后,根据所述门禁异常指示消息,在地图上展示所述目标门禁的异常状态;The apparatus according to claim 10, wherein the access control abnormality indication message includes: a target access control identifier, so that the designated terminal receives the access control abnormality indication message according to the access control abnormality indication message after receiving the access control abnormality indication message , Display the abnormal state of the target access control on the map;和/或,and / or,所述门禁异常指示消息包括:目标门禁关联的摄像机标识,以使得所述指定终端在接收到所述门禁异常指示消息之后,根据所述门禁异常指示消息,展示所述目标门禁关联的摄像机所采集的视频。The access control abnormality indication message includes: a target access control associated camera identifier, so that after receiving the access control abnormality indication message, the designated terminal displays the target access control associated camera collection according to the access control abnormality indication message Video.
- 根据权利要求10所述的装置,其特征在于,所述获取模块,用于:The apparatus according to claim 10, wherein the acquisition module is configured to:基于电插锁状态端口的电平信号,确定所述目标门禁中的电插锁在执行所述锁控制指令对应的动作之后的实际状态。Based on the level signal of the electric mortise lock status port, the actual state of the electric mortise lock in the target access control after performing the action corresponding to the lock control instruction is determined.
- 一种门禁管理系统,其特征在于,所述系统包括目标门禁和门禁控制平台,其中:An access control management system, characterized in that the system includes a target access control and an access control platform, wherein:所述门禁控制平台,用于获取针对所述目标门禁的锁控制指令;根据所述锁控制指令,确定所述目标门禁在执行所述锁控制指令对应的动作之后的理论状态;获取所述目标门禁在执行所述锁控制指令对应的动作之后的实际状态;如果所述理论状态与所述实际状态不一致,则向指定终端发送门禁异常指示消息。The access control platform is used to obtain a lock control instruction for the target access control; according to the lock control instruction, determine a theoretical state of the target access control after performing an action corresponding to the lock control instruction; obtain the target The actual state of the access control after the action corresponding to the lock control instruction is executed; if the theoretical state is inconsistent with the actual state, an access control abnormality indication message is sent to the designated terminal.
- 一种服务器,其特征在于,所述服务器包括处理器、通信接口、存储器和通信总线,其中:A server, characterized in that the server includes a processor, a communication interface, a memory, and a communication bus, wherein:所述处理器、所述通信接口和所述存储器通过所述通信总线完成相互间的通信;The processor, the communication interface, and the memory complete communication with each other through the communication bus;所述存储器,用于存放计算机程序;The memory is used to store computer programs;所述处理器,用于执行所述存储器上所存放的程序,以实现权利要求1-9 任一所述的方法步骤。The processor is configured to execute the program stored on the memory to implement the method steps of any one of claims 1-9.
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质内存储有计算机程序,所述计算机程序被处理器执行时实现权利要求1-9任一所述的方法步骤。A computer-readable storage medium, characterized in that a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a processor, the method steps of any one of claims 1-9 are realized.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811623110.8 | 2018-12-28 | ||
CN201811623110.8A CN111402452A (en) | 2018-12-28 | 2018-12-28 | Access control management method, device and system |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020134525A1 true WO2020134525A1 (en) | 2020-07-02 |
Family
ID=71129663
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/114106 WO2020134525A1 (en) | 2018-12-28 | 2019-10-29 | Access control management method, apparatus and system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN111402452A (en) |
WO (1) | WO2020134525A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111987797A (en) * | 2020-07-31 | 2020-11-24 | 西安西拓电气股份有限公司 | Control method and device of switch cabinet |
CN113160534A (en) * | 2021-03-02 | 2021-07-23 | 广州朗国电子科技有限公司 | Method, equipment and storage medium for alarming abnormity of intelligent access control system |
CN115951623B (en) * | 2023-03-10 | 2023-06-23 | 北京市农林科学院信息技术研究中心 | Control method, device, system, mobile body, electronic apparatus, and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH05298562A (en) * | 1992-04-23 | 1993-11-12 | Matsushita Electric Works Ltd | Security burglar prevention system |
JP2013229031A (en) * | 2013-05-09 | 2013-11-07 | Hochiki Corp | Access control device |
CN104050743A (en) * | 2014-06-30 | 2014-09-17 | 重庆米润科技有限公司 | Fortification monitoring system and method of access control system |
CN205050228U (en) * | 2015-10-14 | 2016-02-24 | 北京华想互联科技有限公司 | National treasury access control system of bank based on iris discernment |
CN106296924A (en) * | 2016-08-15 | 2017-01-04 | Tcl商用信息科技(惠州)股份有限公司 | A kind of gate inhibition's state monitoring method and system |
CN106875523A (en) * | 2017-01-12 | 2017-06-20 | 深圳达实信息技术有限公司 | A kind of Yunmen access control system and its management method |
CN206833543U (en) * | 2017-04-14 | 2018-01-02 | 上海博超联石智能科技有限公司 | A kind of electronic access control system with barcode scanning identification |
CN207092724U (en) * | 2017-06-02 | 2018-03-13 | 瑞高科技(深圳)有限责任公司 | A kind of intelligent electronic lock and intelligent safety door |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202257702U (en) * | 2011-08-25 | 2012-05-30 | 佛山市汇泰龙五金卫浴制造有限公司 | Electronic anti-theft lock system with normally open mode |
CN103208147B (en) * | 2013-04-07 | 2016-04-13 | 四川长虹电器股份有限公司 | A kind of intelligent alarm gate inhibition's method for supervising and system |
CN205068527U (en) * | 2015-09-22 | 2016-03-02 | 苏州工业园区职业技术学院 | Automatic access control device stage by stage |
US9816297B2 (en) * | 2015-12-14 | 2017-11-14 | Checkpoint Systems, Inc. | Security device with multiple control states |
CN206058325U (en) * | 2016-08-23 | 2017-03-29 | 四川志文网络工程有限公司 | A kind of intelligent automatic door control system |
CN108537929B (en) * | 2018-04-12 | 2021-10-15 | 京东方科技集团股份有限公司 | Remote unlocking system and remote unlocking method |
CN108961501A (en) * | 2018-06-28 | 2018-12-07 | 云丁网络技术(北京)有限公司 | A kind of intelligent door lock control method, relevant device and system |
-
2018
- 2018-12-28 CN CN201811623110.8A patent/CN111402452A/en active Pending
-
2019
- 2019-10-29 WO PCT/CN2019/114106 patent/WO2020134525A1/en active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH05298562A (en) * | 1992-04-23 | 1993-11-12 | Matsushita Electric Works Ltd | Security burglar prevention system |
JP2013229031A (en) * | 2013-05-09 | 2013-11-07 | Hochiki Corp | Access control device |
CN104050743A (en) * | 2014-06-30 | 2014-09-17 | 重庆米润科技有限公司 | Fortification monitoring system and method of access control system |
CN205050228U (en) * | 2015-10-14 | 2016-02-24 | 北京华想互联科技有限公司 | National treasury access control system of bank based on iris discernment |
CN106296924A (en) * | 2016-08-15 | 2017-01-04 | Tcl商用信息科技(惠州)股份有限公司 | A kind of gate inhibition's state monitoring method and system |
CN106875523A (en) * | 2017-01-12 | 2017-06-20 | 深圳达实信息技术有限公司 | A kind of Yunmen access control system and its management method |
CN206833543U (en) * | 2017-04-14 | 2018-01-02 | 上海博超联石智能科技有限公司 | A kind of electronic access control system with barcode scanning identification |
CN207092724U (en) * | 2017-06-02 | 2018-03-13 | 瑞高科技(深圳)有限责任公司 | A kind of intelligent electronic lock and intelligent safety door |
Also Published As
Publication number | Publication date |
---|---|
CN111402452A (en) | 2020-07-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7216101B2 (en) | Access control system and access control method using the same | |
WO2020134525A1 (en) | Access control management method, apparatus and system | |
US10171444B1 (en) | Securitization of temporal digital communications via authentication and validation for wireless user and access devices | |
US9355278B2 (en) | Server chassis physical security enforcement | |
CN106506442A (en) | A kind of smart home multi-user identification and its Rights Management System | |
AU2016348413A1 (en) | Systems and methods for controlling access to physical space | |
CN103871139B (en) | School's access control management method and embedded main board | |
CN103370717A (en) | Always-available embedded theft reaction subsystem | |
CN107005414B (en) | Information processing apparatus, information processing method, computer-readable storage medium, and information processing system | |
KR101910105B1 (en) | Method and system for controlling doorlock | |
CN106027789A (en) | Anti-theft cellphone and anti-theft method for cellphone | |
CN110322603A (en) | A kind of temporary password security protection method and system for intelligent door lock | |
CN105913513A (en) | Control method and system for door lock system | |
KR20180060901A (en) | Meothod for controlling locking device | |
CN105608763A (en) | Antitheft control method, device and system, server and mobile terminal | |
WO2017196319A1 (en) | Electronic device access control | |
CN106150271A (en) | A kind of anti-theft device, system and safety cabinet | |
CN116506579A (en) | Data server monitoring method and monitoring system | |
WO2016155242A1 (en) | Main control board for electronic lock, and control circuit, system and method for electronic lock | |
CN107835170B (en) | Intelligent Pos equipment safety authorization dismantling system and method | |
CN110288727A (en) | The intelligent system on duty in unmanned laboratory | |
CN112950834A (en) | Multi-mode-based electric door control method and safety door control system | |
JP2006227756A (en) | Cooperation controller | |
WO2018006319A1 (en) | Alarm method and system | |
EP3921757B1 (en) | Dynamic application security posture change based on physical vulnerability |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19902552 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19902552 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19902552 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 07/02/2022) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19902552 Country of ref document: EP Kind code of ref document: A1 |