WO2020164104A1 - Processing chip, master control device, and access control system and unlocking method thereof - Google Patents

Processing chip, master control device, and access control system and unlocking method thereof Download PDF

Info

Publication number
WO2020164104A1
WO2020164104A1 PCT/CN2019/075210 CN2019075210W WO2020164104A1 WO 2020164104 A1 WO2020164104 A1 WO 2020164104A1 CN 2019075210 W CN2019075210 W CN 2019075210W WO 2020164104 A1 WO2020164104 A1 WO 2020164104A1
Authority
WO
WIPO (PCT)
Prior art keywords
unlocking
access control
control device
unlock
request
Prior art date
Application number
PCT/CN2019/075210
Other languages
French (fr)
Chinese (zh)
Inventor
白海
Original Assignee
深圳市汇顶科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市汇顶科技股份有限公司 filed Critical 深圳市汇顶科技股份有限公司
Priority to CN201980000381.4A priority Critical patent/CN109983514A/en
Priority to PCT/CN2019/075210 priority patent/WO2020164104A1/en
Publication of WO2020164104A1 publication Critical patent/WO2020164104A1/en

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network

Definitions

  • This application relates to the technical field of access control, in particular to a master control device, an access control system and an unlocking method thereof.
  • the cloud server receives the unlock request from the smart terminal and determines whether to allow unlocking according to the unlock request; that is, the cloud server is an important part of remote unlocking, and it stores terminal users and access control unlocking Core data.
  • the purpose of some embodiments of this application is to provide a processing chip, a main control device, an access control system and an unlocking method thereof, which can improve the security of the access control system.
  • the embodiment of the present application provides an access control system, including: a master control device, a door lock device, a cloud server, and at least one smart terminal; the master control device is connected to the cloud server and the door lock device, and the smart The terminal is connected to the cloud server; the smart terminal is used to send an unlocking request to the master control device through the cloud server when in the first mode; the master control device is used to send an unlocking request to the master control device when the unlock request is received When determining whether to allow unlocking according to the unlocking request, and when it is determined that unlocking is permitted, control the door lock device to unlock.
  • the embodiment of the present application also provides an unlocking method of an access control system, which is applied to the master control device in the access control system.
  • the access control system further includes a cloud server, a door lock device, and at least one smart terminal;
  • the unlocking method includes: when receiving the unlocking request, judging whether to allow unlocking according to the unlocking request; When unlocking is allowed, control the door lock device to unlock.
  • the embodiment of the present application also provides a processing chip connected to at least one memory.
  • the memory stores instructions executable by the processing chip.
  • the instructions are executed by the processing chip so that the processing chip can Perform the unlocking method of the aforementioned access control system.
  • An embodiment of the present application also provides a main control device including the above-mentioned processing chip.
  • the master control device determines whether to allow unlocking. Since the master control device in this case is equivalent to an edge node in a complex network structure, compared to the cloud server as the network center ( In the prior art, the cloud server determines whether to allow unlocking), which is more difficult to be illegally invaded, so the security of the access control system can be improved.
  • the cloud server is also used to send an early warning signal to the main control device when a preset event is monitored; the main control device is also used to enter a preset control when the early warning signal is received mode.
  • the cloud server can actively monitor the preset event, and notify the master control device when the preset event occurs, so that the master control device enters the preset control mode, which can meet the needs of more practical application scenarios.
  • the cloud server includes a plurality of distributed sites; each of the distributed sites is used to send the early warning signal to the main control device when the preset event is monitored; the main control device It is used to enter a preset control mode when receiving the early warning signal sent by each of the distributed stations.
  • the cloud server has a distributed structure, and the main control device enters the preset control mode only after receiving early warning signals from multiple distributed sites at the same time, which is more reliable.
  • the smart terminal includes an administrator terminal and an ordinary user terminal; the ordinary user terminal is used to send an emergency unlock request to the administrator terminal when a preset emergency event occurs; wherein, in the emergency When an event occurs, the ordinary user terminal does not have the unlocking authority; the administrator terminal is used to authenticate the emergency unlock request, and send the authenticated emergency unlock request to the master control device; After receiving the authenticated emergency unlock request, the main control device controls the door lock device to unlock.
  • an ordinary user terminal that does not have the unlocking authority can implement emergency unlocking by sending an emergency unlocking request to the administrator terminal; this can meet the needs of more practical application scenarios.
  • the access control system further includes an auxiliary positioning device connected to the smart terminal; the smart terminal is also used to obtain the positioning information of the smart terminal through the auxiliary positioning device when in the first mode,
  • the unlock request includes the positioning information.
  • the positioning information can be combined to determine whether to allow unlocking, which can meet the requirements of more practical application scenarios.
  • the access control system further includes a storage device connected to the master control device; the master control device is further configured to generate an unlock record of the unlock request after determining whether unlocking is permitted according to the unlock request, and The unlocking record is stored in the storage device; wherein the unlocking record at least includes: the user who sent the unlocking request identified by the master control device according to the unlocking request, and whether the unlocking is successful.
  • the process of each unlock request can be recorded.
  • the door lock device is installed in a movable device.
  • the movable device is illegally stolen, because it cannot be connected to the main control device, the thief cannot unlock it through software intrusion, which improves the security to a certain extent.
  • the smart terminal is also configured to send the unlock request to the master control device based on the short-range wireless transmission technology when in the second mode.
  • This embodiment provides another way for the smart terminal to send the unlock request to the master control device.
  • the unlocking method of the access control system before the generating the unlocking record of the unlocking request and uploading the unlocking record to the storage device for storage, it further includes: determining that the master control device is based on the The access control permission corresponding to the user obtained by the unlock request does not include the anonymous permission.
  • the unlocking request of a user with anonymous permission is not recorded; this embodiment enriches the types of access control permissions of the user, and can meet the requirements of more practical application scenarios.
  • Figure 1 is a schematic diagram of an access control system according to a first embodiment of the present application
  • Fig. 2 is another schematic diagram of the access control system according to the first embodiment of the present application.
  • Figure 3 is a schematic diagram of an access control system according to a third embodiment of the present application.
  • Figure 4 is a schematic diagram of an access control system according to a fourth embodiment of the present application.
  • Fig. 5 is a schematic diagram of an access control system according to a fifth embodiment of the present application.
  • Fig. 6 is a flowchart of an unlocking method of an access control system according to a sixth embodiment of the present application.
  • FIG. 7 is a specific flowchart of the step of judging whether to allow unlocking according to the unlocking request in the sixth embodiment of the present application.
  • FIG. 8 is a flowchart of an unlocking method of an access control system according to a seventh embodiment of the present application.
  • FIG. 9 is a specific flowchart of the step of determining whether to allow unlocking according to the unlocking request in the eighth embodiment of the present application.
  • FIG. 10 is a flowchart of an unlocking method of an access control system according to a ninth embodiment of the present application.
  • FIG. 11 is a schematic diagram of the connection between the processing chip and the memory according to the tenth embodiment of the present application.
  • the first embodiment of the present application relates to an access control system.
  • the access control system includes: a main control device 10, a door lock device 11, a cloud server 12, and at least one smart terminal 13; the main control device 10 is connected to the cloud server 12 and the door lock device 11, the smart terminal 13 is connected to the cloud server 12; the smart terminal 13 is used to send an unlock request to the main control device 10 through the cloud server 12 when in the first mode; the main control device 10 is used to When unlocking is requested, it is determined whether unlocking is permitted according to the unlocking request, and when it is determined that unlocking is permitted, the door lock device 11 is controlled to unlock.
  • only one smart terminal 13 is shown in FIG. 1, but it is not limited thereto.
  • the main control device 10 in this embodiment may be a small workstation, or may be an intelligent device such as a personal computer.
  • the door lock device 11 may include a microcontroller, a mechanical lock, and a driving mechanism; the main control device 10 controls the door lock device 11 to unlock, specifically, the main control device 10 sends an unlock command to the microcontroller of the door lock device 11.
  • the controller receives the unlocking command, the mechanical lock is driven to open by the driving mechanism to realize the unlocking.
  • the cloud server 12 there may be multiple communication modes between the cloud server 12 and the main control device 10, such as but not limited to the following two: wide area network WAN and narrowband Internet of Things NB-IOT.
  • the communication method between the smart terminal 13 and the main control device can also be multiple.
  • it can also be based on short-range wireless transmission technology.
  • Two short-range wireless transmission methods are shown in Figure 2. Bluetooth and wireless local area network WIFI; however, it is not limited to this, and other types of short-distance wireless transmission technologies such as infrared technology, microwave technology, etc. can be applied in this embodiment.
  • the smart terminal 13 may have a variety of different modes. In different modes, different communication paths are selected to send the unlock request to the main control device. In this embodiment, the smart terminal 13 may be in the first mode or the second mode.
  • the smart terminal 13 When the smart terminal 13 is in the first mode, it sends an unlocking request to the cloud server 12 to send the unlocking request to the main control device 10 through the cloud server 12.
  • the cloud server 12 receives the unlocking request, it can choose any path of WAN or NB-IOT to send the unlocking request to the door lock device 11. In this way, when one of the paths is congested or cannot be connected, the other path can be selected to send the unlocking Request; so as to avoid affecting normal unlocking when one of the transmission paths is blocked or interrupted.
  • the smart terminal 13 When the smart terminal 13 is in the second mode, it can send an unlock request to the main control device 10 based on the short-range wireless transmission technology; an independent WIFI device 14 (such as a router) is set in the WIFI path shown in FIG. To broaden the coverage of WIFI; however, it is not limited to this.
  • an independent WIFI device 14 such as a router
  • the door lock device 11 in this embodiment can be applied to various scenarios.
  • the door lock device 11 can be installed at the gates of public places such as movie theaters, factory warehouses, subways, etc.; or, it can also be installed on personal items such as safes. .
  • a movable device such as a safe
  • the door lock device 11 is installed on a movable device such as a safe
  • the movable device is stolen by criminals, it must be unlocked based on the master control device, and the movable device is stolen because it is far away from the master control device.
  • the device cannot be connected with the main control device signal, so criminals cannot illegally unlock the mobile device by using software intrusion, which improves the security to a certain extent (in the prior art, when the short-range wireless communication technology is used to When the mobile device sends an unlock request, the microcontroller in the door lock device determines whether unlocking is allowed. Therefore, after the mobile device is not stolen, the microcontroller in the door lock device can be illegally unlocked by software intrusion) .
  • the main control device 10 is configured to determine whether unlocking is permitted according to the unlocking request when receiving the unlocking request, and when it is determined that the unlocking is permitted, control the door lock device 11 to unlock.
  • the master control device 10 may identify characteristic information according to the unlock request, and the characteristic information may include the identity information of the user who sent the unlock request; the master control device 10 obtains the access control authority corresponding to the user and at least determines whether it is allowed or not according to the obtained access control authority Unlock.
  • the master control device 10 may store the corresponding relationship between the user and the access control authority, and the master control device 10 obtains the corresponding access control authority of the user who sent the unlock request according to the corresponding relationship between the user and the access control authority.
  • the user’s identity information can be, for example, the user’s account information as the only indicator of the user’s identity; the access control authority can be unlocking authority or no unlocking authority.
  • the master device It is determined that unlocking is allowed and the door lock device is controlled to unlock; when the user's corresponding access control authority is no unlocking authority, the master control device determines that unlocking is not allowed.
  • the characteristic information may include an unlocking password.
  • the master control device 10 recognizes the unlocking password from the unlocking request, and determines whether the unlocking password is consistent with a preset standard password, and if it is consistent, it determines that unlocking is allowed.
  • the characteristic information may include the user's identity information and the unlocking password
  • the master control device determines whether the unlocking password is consistent with the preset standard password when determining that the user's corresponding access control authority has unlocking authority; if If they are consistent, unlocking is allowed; otherwise, unlocking is not allowed.
  • this embodiment does not impose any restriction on the specific manner in which the master control device 10 determines whether to allow unlocking according to the unlocking request, and the above is only an example for description.
  • the master control device determines whether unlocking is allowed, that is, the master control device 10 stores the core data for unlocking determination.
  • the core data is the corresponding relationship between the user and the access control authority in the above example, the standard password, and the specific Unlocking judgment methods, etc.; in the prior art, cloud servers store these core data. Since the main control device in this case is equivalent to the edge node in the complex network structure, compared to the cloud server as the central node of the network, the edge node is more difficult to be illegally invaded, that is, the core data is safe in the edge node. The performance is higher, so this embodiment can improve the security of the access control system; in addition, the main control device as the edge node has to process relatively few services, and its processing speed will be relatively faster.
  • the permission type of the access control permission may include, but is not limited to, one or any combination of the following types: restricted location, restricted time, restricted access direction, and so on.
  • restricted location means that it has the unlocking authority only in a preset area; for example, the master control device 10 can be set to only allow the unlocking request of the smart terminal 13 to be received based on the short-range wireless technology, that is, the smart terminal 13 can only be unlocked in the vicinity The unlock request can only be sent within the distance (the coverage of short-range wireless technology).
  • Time restriction means that the unlocking authority is only available within a preset time period; for example, the master control device 10 can be set to the preset time period, and the master control device 10 records the receiving time of the unlock request or the characteristic information of the unlock request Contains the sending time of the unlocking request recorded by the smart terminal 13. If the receiving time or the sending time is within a preset time period, unlocking is allowed.
  • Restricted direction of passage means that only users are allowed to enter or leave. For an access control system that can pass in both directions, if there are two gate channels, corresponding to two directions of passage; after the user sends an unlock request, the master device will only unlock The gate in the direction that allows the user to pass.
  • the access control system of this embodiment also supports offline unlocking such as NFC, fingerprint password, or digital password. That is, the door lock device can be equipped with NFC module, fingerprint recognition module, and input module as needed. And so on, so as to achieve offline unlocking.
  • the second embodiment of the present application relates to an access control system.
  • the second embodiment is roughly the same as the first embodiment. The difference is that, in the second embodiment, please refer to FIG. 1 or FIG. Set up an event to notify the master control device to take action when a preset event occurs.
  • the cloud server 12 may send an early warning signal to the main control device 10 when it detects that a preset event occurs, and the main control device 10 is also configured to enter the preset control mode when receiving the early warning signal.
  • the cloud server 12 can monitor preset events through the network.
  • the preset events can be some high-risk events, such as floods, earthquakes, celestial body impacts, fires and other major disasters;
  • the preset control mode can be but not limited to the following methods: directly control the door
  • the lock device is unlocked, or unconditionally unlocked; among them, unconditional unlock means that as long as the unlock request sent by the smart terminal 13 is received, the door lock device 11 is controlled to unlock.
  • the main control device 10 can also detect whether there is someone inside the door lock device 11, and if there is someone, control the door lock device 11 to unlock, wherein the main control device 10 can be pre-installed on the door lock
  • Multiple sensors on the inner side of the device 11 are used to detect whether there are people inside the door lock device 11; the inner side of the door lock device 11 can be understood as, for example, the door lock device 11 is installed on the gate of a warehouse, and the inner side of the door lock device 11 refers to The internal space of the warehouse.
  • relevant departments may publish flood disaster information on certain network platforms, or network users may promptly notify other netizens on certain network platforms; the cloud server 12 can be preset to Information channels such as a network platform are monitored. When relevant information about a preset event is monitored, an early warning signal is sent to the main control device 10.
  • the door lock device 11 is installed on the gate of a warehouse, and various sensors are installed in a preset area around the warehouse to detect the surrounding environment.
  • Various sensors include, for example, temperature detectors, smoke detectors, etc.; When a fire occurs in the area, various sensors will send out abnormal signals; when the cloud server 12 detects these abnormal signals, it determines that a preset event has occurred, and sends an early warning signal to the main control device 10.
  • the cloud server can actively monitor the preset event, and notify the master control device when the preset event occurs, so that the master control device enters the preset control mode, which can meet the needs of more practical application scenarios.
  • the cloud server 12 includes a plurality of distributed sites; each distributed site is used to send an early warning signal to the main control device 10 when a preset event is detected.
  • the main control device 10 is configured to enter a preset control mode when receiving an early warning signal sent by each distributed station. That is, the cloud server 12 is a distributed structure, and the master control device 10 enters the preset control mode only when it receives early warning signals from multiple distributed sites at the same time, so as to avoid monitoring errors of individual distributed sites and causing misjudgments as much as possible , Higher reliability.
  • the third embodiment of the present application relates to an access control system.
  • the third embodiment is roughly the same as the first embodiment.
  • the smart terminal 13 may include an administrator terminal 13-1 and a common user terminal. 13-2.
  • the number of administrator terminals 13-1 and ordinary user terminals 13-2 in Fig. 3 is only an example, and is not limited thereto. If the ordinary user terminal 13-2 does not have the unlocking authority when an emergency event occurs, the ordinary user terminal 13-2 can send an emergency unlock request to the administrator terminal 13-1; the administrator terminal 13-1 is used to request the emergency unlock The authentication is performed and the authenticated emergency unlocking request is sent to the main control device 10; the main control device 10 controls the door lock device 11 to unlock after receiving the authenticated emergency unlocking request. Among them, FIG.
  • the unlocking request can also be sent to the main control device 10 through the cloud server 12 or based on the short-range wireless transmission technology.
  • the access control authority corresponding to the normal user terminal 13-2 and the administrator terminal 13-1 are different.
  • the administrator terminal 13-1 has a higher access control authority, that is, the master control device 10 can be set to allow unlocking as long as it receives an emergency unlock request authenticated by the administrator terminal 13-1.
  • the ordinary user terminal 13-2 does not have the unlocking authority of the door lock device, or the access authority of the ordinary user terminal 13-2 includes restricted types such as location restriction or time restriction, which causes the ordinary user terminal 13 -2 does not have unlock permission. Therefore, when an ordinary user terminal 13-2 finds that an emergency event occurs, it needs to request unlocking from the master device 10 through the administrator terminal 13-1.
  • the door lock device 11 is installed on the gate of a warehouse, the access control account used by the warehouse administrator corresponds to the administrator terminal 13-1, and the access control account used by the warehouse cargo handler corresponds to the ordinary user terminal 13-2;
  • the access control authority of personnel includes the type of time restriction, and the unlocking authority is only available during working hours (for example, the time period from 8 am to 4 pm).
  • the emergency event is for example someone calling for help in the warehouse.
  • the warehouse cargo handler can send an emergency unlock request to the normal user terminal 13-2.
  • the warehouse administrator’s administrator terminal 13-1 and the warehouse administrator’s administrator terminal 13-1 authenticate the emergency unlock request, it sends the certified emergency unlock request to the master control device 10, and the master device 10 receives it After the authenticated emergency unlock request, the door lock device 11 is controlled to unlock.
  • the administrator terminal 13-1 when the administrator terminal 13-1 receives the emergency unlock request, it can automatically authenticate and send the certified emergency unlock request to the main control device 10; or it can remind the warehouse administrator to perform manual authentication and send the certified emergency unlock request.
  • the unlock request is sent to the master control device 10.
  • the third embodiment may also be an improvement on the basis of the second embodiment.
  • the fourth embodiment of the present application relates to an access control system.
  • the fourth embodiment is substantially the same as the first embodiment.
  • the access control system further includes a smart terminal 13
  • the auxiliary positioning device 15; the smart terminal 13 is also used to obtain the positioning information of the smart terminal 13 through the auxiliary positioning device 15 when in the first mode, and the unlock request includes the positioning information.
  • the auxiliary positioning device 15 is, for example, but not limited to satellites, and the smart terminal 13 can, but is not limited to, perform GPS positioning to obtain positioning information; all types of auxiliary positioning devices 15 that enable the smart terminal 13 to obtain positioning information belong to the protection of this embodiment. range.
  • the smart terminal 13 When the smart terminal 13 is in the first mode, it sends an unlock request to the main control device 10 through the cloud server 12, which can realize remote unlocking; however, for some users, the access control authority is set and the location is restricted;
  • the positioning device 15 obtains the user's positioning information, and integrates the positioning information into the unlock request and sends it to the master control device; thus, the master control device 10 can make an unlock permission judgment for these location-restricted users based on the unlock request sent by the cloud server 12.
  • the fourth embodiment may also be an improvement on the basis of the third embodiment.
  • the fifth embodiment of the present application relates to an access control system.
  • the fifth embodiment is substantially the same as the fourth embodiment.
  • the access control system further includes The storage device 16 of 10; the master control device 10 is also used to generate an unlock record of the unlock request after judging whether unlocking is permitted according to the unlock request, and store the unlock record in the storage device 16; wherein the unlock record includes at least: master control device 10 The identity information of the user who sent the unlock request identified according to the unlock request, and whether the unlock was successful.
  • whether the unlocking is successful in the unlocking record may be: the result determined by the master control device 15 according to the access control authority, that is, whether unlocking is permitted or not allowed; wherein, when the master control device 10 determines that unlocking is permitted and controls the door After the lock device 11 is unlocked, the door lock device 11 may also send feedback information indicating successful unlocking to the main control device 10, and when the main control device 10 receives the feedback information indicating successful unlocking, it determines that the unlocking is successful.
  • the unlock record in this embodiment may also include the time when the master control device receives the unlock request, the time when the door lock device is controlled to unlock (if unlocking is allowed), etc., which can be set as required.
  • the permission type of the access permission can also include anonymous permission; the master control device 10 first identifies whether the user’s access permission includes anonymous permission, if the user’s access permission includes anonymous permission, then no unlock record will be generated; if the user’s If the access control authority does not include the anonymous authority, an unlock record is generated. That is, for some users with anonymous permissions, the master control device 10 will not record the process of their unlock request.
  • the types of user access control permissions are further enriched, which can meet the requirements of more practical application scenarios.
  • the sixth embodiment of the present application relates to an unlocking method of an access control system, which is applied to the main control device in the access control system.
  • the access control system also includes a cloud server, a door lock device and at least one smart terminal ;
  • the smart terminal is used to send an unlock request to the main control device through the cloud server when in the first mode.
  • FIG. 6 shows a flowchart of the unlocking method of the access control system in this embodiment, and the details are as follows.
  • Step 101 Judge whether an unlock request is received; if yes, go to step 102; if not, repeat step 101.
  • Step 102 Determine whether to allow unlocking according to the unlock request; if yes, go to step 103; if not, end.
  • Step 103 Control the door lock device to unlock.
  • step 102 specifically includes the following sub-steps:
  • Sub-step 1021 identifying characteristic information according to the unlock request; wherein the characteristic information includes at least the identity information of the user who sent the unlock request.
  • Sub-step 1022 Obtain the access control authority corresponding to the user.
  • sub-step 1023 it is judged whether unlocking is allowed at least according to the acquired access control authority.
  • the master control device determines whether unlocking is allowed. Therefore, the master control device stores the core data used for unlocking determination.
  • the cloud server stores these core data (in the prior art, the cloud server Determine whether to allow unlocking); since the master control device in this case is equivalent to the edge node in the complex network structure, compared to the cloud server as the central node of the network, the edge node is more difficult to be illegally invaded, that is, the core data
  • the security in the edge node is higher, so this embodiment can improve the security of the access control system; in addition, the main control device as the edge node has to process relatively few services, and its processing speed will be relatively faster.
  • this embodiment is a method example corresponding to the first embodiment, and this embodiment can be implemented in cooperation with the first embodiment.
  • the related technical details mentioned in the first embodiment are still valid in this embodiment, and in order to reduce repetition, they will not be repeated here.
  • the related technical details mentioned in this embodiment can also be applied in the first embodiment.
  • the seventh embodiment of the present application relates to an unlocking method of an access control system.
  • the seventh embodiment is roughly the same as the sixth embodiment, except that the master control device can receive the early warning signal sent by the cloud server when a preset event occurs. And take measures.
  • FIG. 8 is a flowchart of the unlocking method of the access control system according to the seventh embodiment of this application, including:
  • Step 201 determine whether an unlock request is received; if yes, go to step 202; if not, repeat step 201.
  • Step 202 judge whether to allow unlocking according to the unlock request; if yes, go to step 203; if not, go to 204.
  • Step 203 Control the door lock device to unlock.
  • step 204 it is determined whether an early warning signal sent by the cloud server when a preset event is detected is received; if yes, go to step 205; if not, step 204 is repeated.
  • Step 205 Enter a preset control mode.
  • step 201 to step 203 are substantially the same as step 101 to step 103 in the sixth embodiment, and will not be repeated here. The difference is that step 204 to step 205 are also included. It should be noted that steps 201 to step 203 are used to achieve access control unlocking, and steps 204 to step 205 are used to achieve access control when a preset event occurs. The order of execution of the two is not limited, that is, to achieve access control unlocking and to achieve preset event occurrence The access control at the time can be executed concurrently, which is only schematically illustrated in Figure 8.
  • the cloud server can actively monitor the preset event, and notify the master control device when the preset event occurs, so that the master control device enters the preset control mode; that is, the master control device can use when the preset event occurs
  • Pre-set access control can meet the needs of more practical application scenarios.
  • the cloud server includes multiple distributed sites, and each distributed site is used to send an early warning signal to the main control device when a preset event is detected.
  • the main control device enters the preset control mode when receiving the early warning signal sent by each distributed station; thus, it can avoid the misjudgment caused by the monitoring error of individual distributed stations as much as possible, and the reliability is higher.
  • This embodiment is a method example corresponding to the second embodiment, and this embodiment can be implemented in cooperation with the second embodiment.
  • the related technical details mentioned in the second embodiment are still valid in this embodiment, and in order to reduce repetition, they will not be repeated here.
  • the related technical details mentioned in this embodiment can also be applied in the second embodiment.
  • the eighth embodiment of the present application relates to an unlocking method of an access control system.
  • the eighth embodiment is roughly the same as the sixth embodiment, except that for users whose access control authority is set to restricted locations, the user's location information can be combined To determine whether to allow unlocking.
  • the unlocking method of the access control system in the eighth embodiment of the present application is different from that in the sixth embodiment in that the sub-steps included in step 102 are different. As shown in FIG. A detailed flow chart of one step.
  • Sub-step 3021 identifying characteristic information according to the unlock request; wherein the characteristic information includes at least the identity information of the user who sent the unlock request;
  • Sub-step 3022 obtain the access control authority corresponding to the user
  • Sub-step 3023 identify the receiving method of the unlock request; if the receiving method is through the cloud server, enter the sub-step 3024; if it is received based on the near field communication technology, enter the sub-step 3027;
  • the specific way of identifying the receiving way of the unlock request such as but not limited to the following way: the master control device has multiple receiving modules, such as the receiving module matching the communication protocol of the cloud server, and the communication protocol matching the WIFI For the receiving module, the receiving module matching the Bluetooth communication protocol, etc., the master control device can identify the receiving module from which the unlocking request is received, so as to determine the receiving path of the unlocking request. If it is received through a cloud server, it is determined whether the user can remotely unlock based on whether the access control authority includes location restriction, that is, sub-step 3024 is entered.
  • the master control device has multiple receiving modules, such as the receiving module matching the communication protocol of the cloud server, and the communication protocol matching the WIFI
  • the master control device can identify the receiving module from which the unlocking request is received, so as to determine the receiving path of the unlocking request. If it is received through a cloud server, it is determined whether the user can remotely unlock based on whether the access control authority includes location restriction, that is, sub-step 3024 is entered.
  • short-range wireless communication technology such as WIFI or Bluetooth
  • WIFI short-range wireless communication technology
  • Bluetooth because the short-range wireless communication technology itself requires the user to receive the unlock request within the range that the short-range wireless communication can cover, so if it is based on the short-range wireless communication If the technology is received, the user must be within the range covered by short-range wireless communication.
  • Sub-step 3024 judging whether the access control authority includes location restriction and whether the feature information includes the user's location information; if the access control authority includes location restriction, and the feature information includes the user's location information, proceed to sub-step 3025; if the access control authority includes location access If the access control authority does not include location restriction, then proceed to sub-step 3027.
  • Sub-step 3025 judging whether to allow unlocking according to the user's location information and preset location restriction conditions; wherein, the user's location information is obtained by the smart terminal through the auxiliary positioning device;
  • Sub-step 3026 unlocking is not allowed.
  • sub-step 3027 it is determined whether unlocking is allowed according to the access control authority.
  • steps 3021 to 3022 are substantially the same as steps 1021 to 1022 in the sixth embodiment, and will not be repeated here, and the difference lies in sub-step 3023 to sub-step 3027.
  • the access control authority includes location restriction, it means that the user cannot remotely unlock; if the unlock request does not include the user's location information, then unlocking is not allowed; if the unlock request contains the user's location information, then the location is determined Whether the information meets the location restriction condition, the location restriction condition is, for example, a preset area, and if the user is located in the preset area, it is determined that unlocking is allowed.
  • This embodiment is a method example corresponding to the fourth embodiment, and this embodiment can be implemented in cooperation with the fourth embodiment.
  • the related technical details mentioned in the fourth embodiment are still valid in this embodiment, and in order to reduce repetition, they will not be repeated here.
  • the related technical details mentioned in this embodiment can also be applied in the fourth embodiment.
  • this embodiment may also be an improvement on the basis of the seventh embodiment.
  • the ninth embodiment of the present application relates to an unlocking method of an access control system.
  • the ninth embodiment is substantially the same as the sixth embodiment.
  • the difference is that the master control device 10 can also generate an unlock record of an unlock request, and store the unlock record To storage device 16.
  • FIG. 10 is a flowchart of an example of an unlocking method of an access control system according to the ninth embodiment of the present application, which is specifically as follows.
  • Step 401 determine whether an unlock request is received; if yes, go to step 402; if not, repeat step 401.
  • Step 402 judge whether to allow unlocking according to the unlock request; if yes, go to step 403; if not, end.
  • Step 403 Control the door lock device to unlock.
  • Step 404 Determine whether the access control permissions corresponding to the user acquired by the master control device according to the unlock request include anonymous permissions; if not, proceed to step 405; if yes, end.
  • Step 405 Generate an unlock record of the unlock request, and store the unlock record in the storage device.
  • the unlock record includes at least the identity information of the user who sent the unlock request identified by the master control device according to the unlock request, and whether the unlock is successful.
  • step 401 to step 403 are substantially the same as step 101 to step 103 in the sixth embodiment, and will not be repeated here; the difference is that step 404 and step 405 are also included.
  • the type of access permission includes the option of anonymous permission. Therefore, it is necessary to determine whether the user’s access permission includes anonymous permission before determining whether to generate the unlock record of the user; in other examples, if the access permission is If the type does not include the option of anonymous permission, then there is no need to perform step 404, that is, a corresponding unlock record is generated for each unlock request received.
  • the execution order of step 403, step 404, and step 405 in this embodiment is not limited, and can be executed according to needs or actual conditions.
  • the ninth embodiment may also be an improvement on the basis of the seventh or eighth embodiment.
  • This embodiment is a method example corresponding to the fifth embodiment, and this embodiment can be implemented in cooperation with the fifth embodiment.
  • the related technical details mentioned in the fifth embodiment are still valid in this embodiment, and in order to reduce repetition, they will not be repeated here.
  • the related technical details mentioned in this embodiment can also be applied in the fifth embodiment.
  • the tenth embodiment of the present application relates to a processing chip.
  • the processing chip 110 is connected to at least one memory 111.
  • the memory 111 stores instructions that can be executed by the processing chip 110, and the instructions are executed by the processing chip 110 to make
  • the processing chip 110 can execute the above method embodiments.
  • the eleventh embodiment of the present application relates to a main control device including the above-mentioned processing chip.

Abstract

A processing chip, a master control device, and an access control system and an unlocking method thereof. The access control system comprises: a master control device (10), a door lock device (11), a cloud server (12), and at least one smart terminal (13). The master control device (10) is connected to the cloud server (12) and the door lock device (11); the smart terminal (13) is connected to the cloud server (12); in a first mode, the smart terminal (13) is configured to send an unlock request to the master device (10) by means of the cloud server (12); the master control device (10) is configured to determine, upon receiving the unlocking request, whether unlocking is allowed according to the unlocking request, and upon determining that unlocking is allowed, control the door lock device (11) to unlock. The access control system can improve the security of the access control system.

Description

处理芯片、主控设备、门禁系统及其解锁方法Processing chip, main control equipment, access control system and unlocking method thereof 技术领域Technical field
本申请涉及门禁控制技术领域,特别涉及一种主控设备、门禁系统及其解锁方法。This application relates to the technical field of access control, in particular to a master control device, an access control system and an unlocking method thereof.
背景技术Background technique
随着人们生活进步,对家庭住宅、办公等场所进出的便捷性和安全性越来越高,很多需要经常进出的地方都安装了门禁系统。As people's lives progress, the convenience and safety of entering and exiting homes, offices, and other places are getting higher and higher, and access control systems are installed in many places that require frequent entry and exit.
门禁系统的解锁方式多种多样,如NFC(基于NFC的门禁卡)、指纹密码、数字密码等离线解锁,以及基于云服务器(远程解锁)、或基于近距离无线传输技术的在线解锁,大大丰富了解锁方式。其中,在基于云服务器的在线解锁中,云服务器接收智能终端的解锁请求,并根据解锁请求来确定是否允许解锁;即云服务器是远程解锁的一个重要环节,其内部存储着终端用户及门禁解锁的核心数据。There are many ways to unlock the access control system, such as offline unlocking based on NFC (NFC-based access card), fingerprint password, digital password, etc., as well as online unlocking based on cloud server (remote unlocking) or short-range wireless transmission technology, which is greatly enriched Know how to lock. Among them, in online unlocking based on the cloud server, the cloud server receives the unlock request from the smart terminal and determines whether to allow unlocking according to the unlock request; that is, the cloud server is an important part of remote unlocking, and it stores terminal users and access control unlocking Core data.
发明人发现现有技术至少存在以下问题:云服务器作为复杂网络的中心节点,要处理的业务种类繁多且需要与众多设备交互,较容易被不法分子入侵并盗取核心数据或篡改门禁权限。The inventor found that the prior art has at least the following problems: as the central node of a complex network, the cloud server has a wide variety of services to be processed and needs to interact with many devices, making it easier for criminals to invade and steal core data or tamper with access control permissions.
发明内容Summary of the invention
本申请部分实施例的目的在于提供一种处理芯片、主控设备、门禁系统及其解锁方法,可以提高门禁系统的安全性。The purpose of some embodiments of this application is to provide a processing chip, a main control device, an access control system and an unlocking method thereof, which can improve the security of the access control system.
本申请实施例提供了一种门禁系统,包括:主控设备、门锁装置、云服务器以及至少一智能终端;所述主控设备连接于所述云服务器和所述门锁装置,所述智能终端连接于所述云服务器;所述智能终端用于在处于第一模式时,通过所述云服务器发送解锁请求至所述主控设备;所述主控设备用于在接收到所述解锁请求时,根据所述解锁请求判断是否允许解锁,并在判定允许解锁时,控制所述门锁装置解锁。The embodiment of the present application provides an access control system, including: a master control device, a door lock device, a cloud server, and at least one smart terminal; the master control device is connected to the cloud server and the door lock device, and the smart The terminal is connected to the cloud server; the smart terminal is used to send an unlocking request to the master control device through the cloud server when in the first mode; the master control device is used to send an unlocking request to the master control device when the unlock request is received When determining whether to allow unlocking according to the unlocking request, and when it is determined that unlocking is permitted, control the door lock device to unlock.
本申请实施例还提供了一种门禁系统的解锁方法,应用于所述门禁系统中的主控设备,所述门禁系统还包括云服务器、门锁装置以及至少一智能终端;所述智能终端用于在处于第一模式时,通过所述云服务器发送解锁请求至所述主控设备;所述解锁方法包括:当接收到所述解锁请求时,根据所述解锁请求判断是否允许解锁;当判定允许解锁时,控制所述门锁装置解锁。The embodiment of the present application also provides an unlocking method of an access control system, which is applied to the master control device in the access control system. The access control system further includes a cloud server, a door lock device, and at least one smart terminal; When in the first mode, sending an unlocking request to the master control device through the cloud server; the unlocking method includes: when receiving the unlocking request, judging whether to allow unlocking according to the unlocking request; When unlocking is allowed, control the door lock device to unlock.
本申请实施例还提供了一种处理芯片,与至少一存储器连接,所述存储器存储有可被所述处理芯片执行的指令,所述指令被所述处理芯片执行,以使所述处理芯片能够执行上述门禁系统的解锁方法。The embodiment of the present application also provides a processing chip connected to at least one memory. The memory stores instructions executable by the processing chip. The instructions are executed by the processing chip so that the processing chip can Perform the unlocking method of the aforementioned access control system.
本申请实施例还提供了一种主控设备,包括上述处理芯片。An embodiment of the present application also provides a main control device including the above-mentioned processing chip.
本申请实施例相对于现有技术而言,由主控设备判断是否允许解锁,由于本案中的主控设备相当于复杂网络结构中的边缘节点,相较于作为网络中心的云服务器而言(现有技术中由云服务器判断是否允许解锁),被非法入侵的难度较大,因此可以提高门禁系统的安全性。Compared with the prior art, in the embodiment of the present application, the master control device determines whether to allow unlocking. Since the master control device in this case is equivalent to an edge node in a complex network structure, compared to the cloud server as the network center ( In the prior art, the cloud server determines whether to allow unlocking), which is more difficult to be illegally invaded, so the security of the access control system can be improved.
另外,所述云服务器还用于在监测到预设事件发生时,发送预警信号至所述主控设备;所述主控设备还用于在接收到所述预警信号时,进入预设的控制模式。本实施例中,云服务器可以主动监测预设事件,并在预设事件发生时告知主控设备,从而使得主控设备进入预设的控制模式;可以满足更多的实际应用场景的需要。In addition, the cloud server is also used to send an early warning signal to the main control device when a preset event is monitored; the main control device is also used to enter a preset control when the early warning signal is received mode. In this embodiment, the cloud server can actively monitor the preset event, and notify the master control device when the preset event occurs, so that the master control device enters the preset control mode, which can meet the needs of more practical application scenarios.
另外,所述云服务器包含多个分布式站点;各所述分布式站点用于在监测到所述预设事件发生时,分别发送所述预警信号至所述主控设备;所述主控设备用于在接收到各所述分布式站点发送的所述预警信号时,进入预设的控制模式。本实施例中,云服务器为分布式结构,主控设备同时接收到多个分布式站点的预警信号才进入预设的控制模式,可靠性更高。In addition, the cloud server includes a plurality of distributed sites; each of the distributed sites is used to send the early warning signal to the main control device when the preset event is monitored; the main control device It is used to enter a preset control mode when receiving the early warning signal sent by each of the distributed stations. In this embodiment, the cloud server has a distributed structure, and the main control device enters the preset control mode only after receiving early warning signals from multiple distributed sites at the same time, which is more reliable.
另外,所述智能终端包括管理员终端和普通用户终端;所述普通用户终端用于在预设的紧急事件发生时,向所述管理员终端发送紧急解锁请求;其中,其中,在所述紧急事件发生时,所述普通用户终端不具备解锁权限;所述管理员终端用于对所述紧急解锁请求进行认证,并将经过认证的所述紧急解锁请求发送至所述主控设备;所述主控设备在接收到经过认证的所述紧急解锁请求后,控制所述门锁装置解锁。本实施例中,在紧急情况发生时下,不具备解锁权限的普通用户终端可以通过向管理员终端发送紧急解锁请求来实现紧急解锁;可以满足更多的实际应用场景的需要。In addition, the smart terminal includes an administrator terminal and an ordinary user terminal; the ordinary user terminal is used to send an emergency unlock request to the administrator terminal when a preset emergency event occurs; wherein, in the emergency When an event occurs, the ordinary user terminal does not have the unlocking authority; the administrator terminal is used to authenticate the emergency unlock request, and send the authenticated emergency unlock request to the master control device; After receiving the authenticated emergency unlock request, the main control device controls the door lock device to unlock. In this embodiment, when an emergency occurs, an ordinary user terminal that does not have the unlocking authority can implement emergency unlocking by sending an emergency unlocking request to the administrator terminal; this can meet the needs of more practical application scenarios.
另外,所述门禁系统还包括连接于所述智能终端的辅助定位设备;所述智能终端还用于在处于所述第一模式时,通过所述辅助定位设备获取所述智能终端的定位信息,所述解锁请求包括所述定位信息。本实施例中,可以结合定位信息来判断是否允许解锁,可以满足更多的实际应用场景的需求。In addition, the access control system further includes an auxiliary positioning device connected to the smart terminal; the smart terminal is also used to obtain the positioning information of the smart terminal through the auxiliary positioning device when in the first mode, The unlock request includes the positioning information. In this embodiment, the positioning information can be combined to determine whether to allow unlocking, which can meet the requirements of more practical application scenarios.
另外,所述门禁系统还包括连接于所述主控设备的存储设备;所述主控设备还用于在根据所述解锁请求判断是否允许解锁后,生成所述解锁请求的解锁记录,并将所述解锁记录存储至所述存储设备;其中,所述解锁记录至少包括:所述主控设备根据所述解锁请求识别出的发送所述解锁请求的用户,以及是否解锁成功。本实施例中,可以对每次解锁请求的过程进行记录。In addition, the access control system further includes a storage device connected to the master control device; the master control device is further configured to generate an unlock record of the unlock request after determining whether unlocking is permitted according to the unlock request, and The unlocking record is stored in the storage device; wherein the unlocking record at least includes: the user who sent the unlocking request identified by the master control device according to the unlocking request, and whether the unlocking is successful. In this embodiment, the process of each unlock request can be recorded.
另外,所述门锁装置安装于可移动设备中。本实施例中,即使可移动设备被非法盗取,由于其与主控设备无法连接,从而盗窃者无法通过软件侵入方式进行解锁,在一定程度上提高了安全性。In addition, the door lock device is installed in a movable device. In this embodiment, even if the movable device is illegally stolen, because it cannot be connected to the main control device, the thief cannot unlock it through software intrusion, which improves the security to a certain extent.
另外,所述智能终端还用于在处于第二模式时,基于近距离无线传输技术发送所述解锁请求至所述主控设备。本实施例提供了智能终端将解锁请求发送至主控设备的另一种途径。In addition, the smart terminal is also configured to send the unlock request to the master control device based on the short-range wireless transmission technology when in the second mode. This embodiment provides another way for the smart terminal to send the unlock request to the master control device.
另外,在门禁系统的解锁方法中,在所述生成所述解锁请求的解锁记录,并将所述解锁记录上传至所述存储设备进行存储之前,还包括:判定所述主控设备根据所述解锁请求获取的所述用户对应的门禁权限中不包含匿名权限。本实施例中,不会对拥有匿名权限的用户的解锁请求进行记录;本实施例丰富了用户的门禁权限种类,可以满足更多的实际应用场景的需求。In addition, in the unlocking method of the access control system, before the generating the unlocking record of the unlocking request and uploading the unlocking record to the storage device for storage, it further includes: determining that the master control device is based on the The access control permission corresponding to the user obtained by the unlock request does not include the anonymous permission. In this embodiment, the unlocking request of a user with anonymous permission is not recorded; this embodiment enriches the types of access control permissions of the user, and can meet the requirements of more practical application scenarios.
附图说明Description of the drawings
一个或多个实施例通过与之对应的附图中的图片进行示例性说明,这些示例性说明并不构成对实施例的限定,附图中具有相同参考数字标号的元件表示为类似的元件,除非有特别申明,附图中的图不构成比例限制。One or more embodiments are exemplified by the pictures in the corresponding drawings. These exemplified descriptions do not constitute a limitation on the embodiments. Elements with the same reference numbers in the drawings are represented as similar elements. Unless otherwise stated, the figures in the attached drawings do not constitute a limitation of scale.
图1是根据本申请第一实施例的门禁系统的一个示意图;Figure 1 is a schematic diagram of an access control system according to a first embodiment of the present application;
图2是根据本申请第一实施例的门禁系统的另一个示意图;Fig. 2 is another schematic diagram of the access control system according to the first embodiment of the present application;
图3是根据本申请第三实施例的门禁系统的示意图;Figure 3 is a schematic diagram of an access control system according to a third embodiment of the present application;
图4是根据本申请第四实施例的门禁系统的示意图;Figure 4 is a schematic diagram of an access control system according to a fourth embodiment of the present application;
图5是根据本申请第五实施例的门禁系统的示意图;Fig. 5 is a schematic diagram of an access control system according to a fifth embodiment of the present application;
图6是根据本申请第六实施例的门禁系统的解锁方法的流程图;Fig. 6 is a flowchart of an unlocking method of an access control system according to a sixth embodiment of the present application;
图7是根据本申请第六实施例中根据解锁请求判断是否允许解锁这一步骤的具体流程图;FIG. 7 is a specific flowchart of the step of judging whether to allow unlocking according to the unlocking request in the sixth embodiment of the present application;
图8是根据本申请第七实施例的门禁系统的解锁方法的流程图;FIG. 8 is a flowchart of an unlocking method of an access control system according to a seventh embodiment of the present application;
图9是根据本申请第八实施例中根据解锁请求判断是否允许解锁这一步骤的具体流程图;FIG. 9 is a specific flowchart of the step of determining whether to allow unlocking according to the unlocking request in the eighth embodiment of the present application;
图10是根据本申请第九实施例的门禁系统的解锁方法的流程图;FIG. 10 is a flowchart of an unlocking method of an access control system according to a ninth embodiment of the present application;
图11是根据本申请第十实施例的处理芯片与存储器连接的示意图。FIG. 11 is a schematic diagram of the connection between the processing chip and the memory according to the tenth embodiment of the present application.
具体实施方式detailed description
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请部分实施例进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。In order to make the objectives, technical solutions, and advantages of the present application clearer, some embodiments of the present application will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the application, and are not used to limit the application.
本申请第一实施例涉及一种门禁系统,如图1所述,门禁系统包括:主控设备10、门锁装置11、云服务器12以及至少一智能终端13;主控设备10连接于云服务器12和门锁装置11,智能终端13连接于云服务器12;智能终端13用于在处于第一模式时,通过云服务器12发送解锁请求至主控设备10;主控设备10用于在接收到解锁请求时,根据解锁请求判断是否允许解锁,并在判 定允许解锁时,控制门锁装置11解锁。其中,图1中仅示意出了一个智能终端13,然并不以此为限。The first embodiment of the present application relates to an access control system. As shown in FIG. 1, the access control system includes: a main control device 10, a door lock device 11, a cloud server 12, and at least one smart terminal 13; the main control device 10 is connected to the cloud server 12 and the door lock device 11, the smart terminal 13 is connected to the cloud server 12; the smart terminal 13 is used to send an unlock request to the main control device 10 through the cloud server 12 when in the first mode; the main control device 10 is used to When unlocking is requested, it is determined whether unlocking is permitted according to the unlocking request, and when it is determined that unlocking is permitted, the door lock device 11 is controlled to unlock. Among them, only one smart terminal 13 is shown in FIG. 1, but it is not limited thereto.
下面对本实施方式的门禁系统的实现细节进行具体的说明,以下内容仅为方便理解提供的实现细节,并非实施本方案的必须。The implementation details of the access control system of this embodiment will be described in detail below. The following content is only provided for ease of understanding and is not necessary for implementing this solution.
本实施例中的主控设备10可以是一个小型工作站,或者可以是个人电脑等智能设备。门锁装置11可以包括一个微控制器、机械锁以及驱动机构;主控设备10控制门锁装置11解锁,具体可以为,主控设备10发送解锁命令至门锁装置11的微控制器,微控制器接收到解锁命令时通过驱动机构驱动机械锁打开以实现解锁。The main control device 10 in this embodiment may be a small workstation, or may be an intelligent device such as a personal computer. The door lock device 11 may include a microcontroller, a mechanical lock, and a driving mechanism; the main control device 10 controls the door lock device 11 to unlock, specifically, the main control device 10 sends an unlock command to the microcontroller of the door lock device 11. When the controller receives the unlocking command, the mechanical lock is driven to open by the driving mechanism to realize the unlocking.
在一个例子中,如图2所示,云服务器12与主控设备10之间的通讯方式可以有多种,例如但不限于以下两种:广域网WAN、窄带物联网NB-IOT。智能终端13与主控设备之间的通讯方式,也可以由多种,除了基于云服务器13通讯,还可以基于近距离无线传输技术通讯;图2中示意出了两种近距离无线传输方式,蓝牙和无线局域网WIFI;然并不以此为限,其他类型的近距离无线传输技术如红外线技术、微波技术等均可应用于本实施例中。In an example, as shown in FIG. 2, there may be multiple communication modes between the cloud server 12 and the main control device 10, such as but not limited to the following two: wide area network WAN and narrowband Internet of Things NB-IOT. The communication method between the smart terminal 13 and the main control device can also be multiple. In addition to communicating based on the cloud server 13, it can also be based on short-range wireless transmission technology. Two short-range wireless transmission methods are shown in Figure 2. Bluetooth and wireless local area network WIFI; however, it is not limited to this, and other types of short-distance wireless transmission technologies such as infrared technology, microwave technology, etc. can be applied in this embodiment.
智能终端13可以有多种不同模式,在不同模式中,选择不同的通讯路径发送解锁请求至主控设备,本实施例中智能终端13可以处于第一模式或第二模式。The smart terminal 13 may have a variety of different modes. In different modes, different communication paths are selected to send the unlock request to the main control device. In this embodiment, the smart terminal 13 may be in the first mode or the second mode.
智能终端13在处于第一模式时,将解锁请求发送给云服务器12,以通过云服务器12将解锁请求发送至主控设备10。云服务器12接收到解锁请求时,可以选择WAN或NB-IOT的任意一条路径将解锁请求发送至门锁装置11,这样可以在其中一条路径发生拥堵或者无法接通时,选择另一条路径发送解锁请 求;从而避免其中一条传输路径发生堵塞或中断时影响正常解锁。When the smart terminal 13 is in the first mode, it sends an unlocking request to the cloud server 12 to send the unlocking request to the main control device 10 through the cloud server 12. When the cloud server 12 receives the unlocking request, it can choose any path of WAN or NB-IOT to send the unlocking request to the door lock device 11. In this way, when one of the paths is congested or cannot be connected, the other path can be selected to send the unlocking Request; so as to avoid affecting normal unlocking when one of the transmission paths is blocked or interrupted.
智能终端13在处于第二模式时,可以基于近距离无线传输技术发送解锁请求至主控设备10;图2中所示的WIFI路径中设置一个独立的WIFI设备14(如路由器)作为中转,用于拓宽WIFI的覆盖范围;然并不以此为限。When the smart terminal 13 is in the second mode, it can send an unlock request to the main control device 10 based on the short-range wireless transmission technology; an independent WIFI device 14 (such as a router) is set in the WIFI path shown in FIG. To broaden the coverage of WIFI; however, it is not limited to this.
本实施例中的门锁装置11可以应用于各种场景,如,门锁装置11可以安装在电影院、工厂仓库、地铁等公共场所的闸机位置;或者,也可以安装在保险箱等个人物品上。其中,当门锁装置11安装在保险箱等这类可移动设备上时,即使可移动设备被不法分子盗取,由于要基于主控设备进行解锁,而可移动设备被盗取后因为远离主控设备而无法与主控设备信号连接,因此不法分子无法通过对可移动设备采用软件侵入的方式非法解锁,在一定程度上提高了安全性(现有技术中,当采用近距离无线通讯技术向可移动设备发送解锁请求时,由门锁装置内的微控制器判断是否允许解锁,因此不发分子盗取可移动设备后,可以对门锁装置内的微控制器采用软件侵入的方式进行非法解锁)。The door lock device 11 in this embodiment can be applied to various scenarios. For example, the door lock device 11 can be installed at the gates of public places such as movie theaters, factory warehouses, subways, etc.; or, it can also be installed on personal items such as safes. . Among them, when the door lock device 11 is installed on a movable device such as a safe, even if the movable device is stolen by criminals, it must be unlocked based on the master control device, and the movable device is stolen because it is far away from the master control device. The device cannot be connected with the main control device signal, so criminals cannot illegally unlock the mobile device by using software intrusion, which improves the security to a certain extent (in the prior art, when the short-range wireless communication technology is used to When the mobile device sends an unlock request, the microcontroller in the door lock device determines whether unlocking is allowed. Therefore, after the mobile device is not stolen, the microcontroller in the door lock device can be illegally unlocked by software intrusion) .
本实施例中,主控设备10用于在接收到解锁请求时,根据解锁请求判断是否允许解锁,并在判定允许解锁时,控制门锁装置11解锁。在一个例子中,主控设备10可以根据解锁请求识别特征信息,特征信息可以包括发送解锁请求的用户的身份信息;主控设备10获取用户对应的门禁权限并至少根据获取的门禁权限判断是否允许解锁。具体的,主控设备10内可以储存有用户和门禁权限的对应关系,主控设备10根据该用户和门禁权限的对应关系获取发送解锁请求的用户对应的门禁权限。其中,用户的身份信息例如可以为用户的账号信息,以作为该用户身份的唯一标志;门禁权限可以为有解锁权限或无解锁权限,当用户对应的门禁权限为有解锁权限时,主控设备判定允许解锁并控制门锁装置 解锁;当用户对应的门禁权限为无解锁权限时,主控设备判定不允许解锁。In this embodiment, the main control device 10 is configured to determine whether unlocking is permitted according to the unlocking request when receiving the unlocking request, and when it is determined that the unlocking is permitted, control the door lock device 11 to unlock. In an example, the master control device 10 may identify characteristic information according to the unlock request, and the characteristic information may include the identity information of the user who sent the unlock request; the master control device 10 obtains the access control authority corresponding to the user and at least determines whether it is allowed or not according to the obtained access control authority Unlock. Specifically, the master control device 10 may store the corresponding relationship between the user and the access control authority, and the master control device 10 obtains the corresponding access control authority of the user who sent the unlock request according to the corresponding relationship between the user and the access control authority. Among them, the user’s identity information can be, for example, the user’s account information as the only indicator of the user’s identity; the access control authority can be unlocking authority or no unlocking authority. When the user’s corresponding access control authority is unlocking authority, the master device It is determined that unlocking is allowed and the door lock device is controlled to unlock; when the user's corresponding access control authority is no unlocking authority, the master control device determines that unlocking is not allowed.
在另一个例子中,特征信息可以包括解锁密码,主控设备10从解锁请求中识别出该解锁密码,并判断该解锁密码与预设的标准密码是否一致,若一致,则判定允许解锁。In another example, the characteristic information may include an unlocking password. The master control device 10 recognizes the unlocking password from the unlocking request, and determines whether the unlocking password is consistent with a preset standard password, and if it is consistent, it determines that unlocking is allowed.
在又一个例子中,特征信息可以包含用户的身份信息和解锁密码,主控设备在判定用户对应的门禁权限为有解锁权限的情况下,再判断解锁密码与预设的标准密码是否一致;如果一致则允许解锁;否则不允许解锁。In another example, the characteristic information may include the user's identity information and the unlocking password, and the master control device determines whether the unlocking password is consistent with the preset standard password when determining that the user's corresponding access control authority has unlocking authority; if If they are consistent, unlocking is allowed; otherwise, unlocking is not allowed.
需要说明的是,本实施例对主控设备10根据解锁请求判断是否允许解锁的具体方式不作任何限制,以上仅为举例说明。It should be noted that this embodiment does not impose any restriction on the specific manner in which the master control device 10 determines whether to allow unlocking according to the unlocking request, and the above is only an example for description.
本实施例中,由主控设备判断是否允许解锁,即主控设备10中储存了用于进行解锁判断的核心数据,核心数据如上面例子中用户和门禁权限的对应关系、标准密码以及具体的解锁判断方式等;而现有技术中由云服务器储存这些核心数据。由于本案中的主控设备相当于复杂网络结构中的边缘节点,相较于作为网络的中心节点的云服务器而言,边缘节点被非法入侵的难度较大,即核心数据在边缘节点中的安全性更高,因此本实施例可以提高门禁系统的安全性;并且,作为边缘节点的主控设备所要处理的业务相对较少,其处理速度也会相对较快。In this embodiment, the master control device determines whether unlocking is allowed, that is, the master control device 10 stores the core data for unlocking determination. The core data is the corresponding relationship between the user and the access control authority in the above example, the standard password, and the specific Unlocking judgment methods, etc.; in the prior art, cloud servers store these core data. Since the main control device in this case is equivalent to the edge node in the complex network structure, compared to the cloud server as the central node of the network, the edge node is more difficult to be illegally invaded, that is, the core data is safe in the edge node. The performance is higher, so this embodiment can improve the security of the access control system; in addition, the main control device as the edge node has to process relatively few services, and its processing speed will be relatively faster.
在一个例子中,门禁权限的权限类型可以包括但不限于以下类型的其中之一或任意组合:位置受限、时间受限、通行方向受限等。其中,位置受限是指只有在预设区域内才具有解锁权限;例如,可以将主控设备10设置成只允许基于近距离无线技术接收智能终端13的解锁请求,即智能终端13只有在近距离内(近距离无线技术的覆盖范围)才能发送解锁请求。时间受限是指只有在 预设时间段内才具有解锁权限;例如,可以将主控设备10内设置预设时间段,主控设备10记录解锁请求的接收时刻、或者解锁请求的特征信息中包含智能终端13记录的解锁请求的发送时刻,如果接收时刻或者发送时刻在预设时间段内,则允许解锁。通行方向受限是指只允许用户进入或离开,即对于可以双向通行的门禁系统,如有两个闸机通道,分别对应两个通行方向;该用户发送解锁请求后,主控设备只会解锁允许该用户通行的方向上的闸机。In an example, the permission type of the access control permission may include, but is not limited to, one or any combination of the following types: restricted location, restricted time, restricted access direction, and so on. Wherein, restricted location means that it has the unlocking authority only in a preset area; for example, the master control device 10 can be set to only allow the unlocking request of the smart terminal 13 to be received based on the short-range wireless technology, that is, the smart terminal 13 can only be unlocked in the vicinity The unlock request can only be sent within the distance (the coverage of short-range wireless technology). Time restriction means that the unlocking authority is only available within a preset time period; for example, the master control device 10 can be set to the preset time period, and the master control device 10 records the receiving time of the unlock request or the characteristic information of the unlock request Contains the sending time of the unlocking request recorded by the smart terminal 13. If the receiving time or the sending time is within a preset time period, unlocking is allowed. Restricted direction of passage means that only users are allowed to enter or leave. For an access control system that can pass in both directions, if there are two gate channels, corresponding to two directions of passage; after the user sends an unlock request, the master device will only unlock The gate in the direction that allows the user to pass.
需要说明的是,本实施例的门禁系统除了支持在线解锁,也支持如NFC、或指纹密码、或数字密码等离线解锁,即门锁装置上可以根据需要安装NFC模块、指纹识别模块、输入模块等,从而实现离线解锁。It should be noted that, in addition to online unlocking, the access control system of this embodiment also supports offline unlocking such as NFC, fingerprint password, or digital password. That is, the door lock device can be equipped with NFC module, fingerprint recognition module, and input module as needed. And so on, so as to achieve offline unlocking.
本申请第二实施例涉及一种门禁系统,第二实施例与第一实施例大致相同,区别之处在于,第二实施例中,请参考图1或图2,云服务器12可以主动监控预设事件,以在预设事件发生时通知主控设备采取措施。The second embodiment of the present application relates to an access control system. The second embodiment is roughly the same as the first embodiment. The difference is that, in the second embodiment, please refer to FIG. 1 or FIG. Set up an event to notify the master control device to take action when a preset event occurs.
具体的,云服务器12可以在监测到预设事件发生时,发送预警信号至主控设备10,主控设备10还用于在接收到预警信号时,进入预设的控制模式。其中,云服务器12可以通过网络监测预设事件,预设事件可以是一些高危事件,例如洪水、地震、天体撞击、火灾等重大灾害;预设的控制模式可以但不限于如下方式:直接控制门锁装置解锁,或者无条件解锁;其中,无条件解锁是指只要接收到智能终端13发送的解锁请求,就控制门锁装置11解锁。或者,在预设的控制模式中,主控设备10还可以检测门锁装置11的内侧是否有人,如果有人的话,控制门锁装置11解锁,其中,主控设备10可以通过预先安装在门锁装置11的内侧的多个传感器来检测门锁装置11的内侧是否有人;门锁装置11的内侧可以理解为,例如门锁装置11安装在仓库的大门上,则门锁装置 11的内侧是指仓库内部空间。Specifically, the cloud server 12 may send an early warning signal to the main control device 10 when it detects that a preset event occurs, and the main control device 10 is also configured to enter the preset control mode when receiving the early warning signal. Among them, the cloud server 12 can monitor preset events through the network. The preset events can be some high-risk events, such as floods, earthquakes, celestial body impacts, fires and other major disasters; the preset control mode can be but not limited to the following methods: directly control the door The lock device is unlocked, or unconditionally unlocked; among them, unconditional unlock means that as long as the unlock request sent by the smart terminal 13 is received, the door lock device 11 is controlled to unlock. Or, in the preset control mode, the main control device 10 can also detect whether there is someone inside the door lock device 11, and if there is someone, control the door lock device 11 to unlock, wherein the main control device 10 can be pre-installed on the door lock Multiple sensors on the inner side of the device 11 are used to detect whether there are people inside the door lock device 11; the inner side of the door lock device 11 can be understood as, for example, the door lock device 11 is installed on the gate of a warehouse, and the inner side of the door lock device 11 refers to The internal space of the warehouse.
例如,当发生洪水灾害时,相关部门可能会在某些网络平台上发表洪水灾害信息,或者,网络用户也可能在某些网络平台上及时告知其他网友;云服务器12可以被预设为对一些网络平台等信息渠道进行监控,当监控到关于预设事件的相关信息时,就会发出预警信号至主控设备10。For example, when a flood disaster occurs, relevant departments may publish flood disaster information on certain network platforms, or network users may promptly notify other netizens on certain network platforms; the cloud server 12 can be preset to Information channels such as a network platform are monitored. When relevant information about a preset event is monitored, an early warning signal is sent to the main control device 10.
又例如,门锁装置11设置在一个仓库的大门上,仓库周围预设区域内安装有各类传感器以检测周边环境,各类传感器例如包括温度检测器、烟雾检测器等;当仓库周围预设区域内发生火灾时,各类传感器会发出异常信号;云服务器12监测到该些异常信号时,判定预设事件发生,并发出预警信号至主控设备10。For another example, the door lock device 11 is installed on the gate of a warehouse, and various sensors are installed in a preset area around the warehouse to detect the surrounding environment. Various sensors include, for example, temperature detectors, smoke detectors, etc.; When a fire occurs in the area, various sensors will send out abnormal signals; when the cloud server 12 detects these abnormal signals, it determines that a preset event has occurred, and sends an early warning signal to the main control device 10.
以上仅为举例,本实施例对预设事件的具体类型及其对应的预设的控制模式不作任何限制,可以根据需要设定。本实施例中,云服务器可以主动监测预设事件,并在预设事件发生时告知主控设备,从而使得主控设备进入预设的控制模式;可以满足更多的实际应用场景的需要。The foregoing is only an example. This embodiment does not impose any restrictions on the specific types of preset events and their corresponding preset control modes, which can be set as required. In this embodiment, the cloud server can actively monitor the preset event, and notify the master control device when the preset event occurs, so that the master control device enters the preset control mode, which can meet the needs of more practical application scenarios.
在一个例子中,云服务器12包含多个分布式站点;各分布式站点用于在监测到预设事件发生时,分别发送预警信号至主控设备10。主控设备10用于在接收到各分布式站点发送的预警信号时,进入预设的控制模式。即,云服务器12为分布式结构,主控设备10需要同时接收到多个分布式站点的预警信号时才进入预设的控制模式,从而可以尽可能避免个别分布式站点监测错误而导致误判,可靠性更高。In an example, the cloud server 12 includes a plurality of distributed sites; each distributed site is used to send an early warning signal to the main control device 10 when a preset event is detected. The main control device 10 is configured to enter a preset control mode when receiving an early warning signal sent by each distributed station. That is, the cloud server 12 is a distributed structure, and the master control device 10 enters the preset control mode only when it receives early warning signals from multiple distributed sites at the same time, so as to avoid monitoring errors of individual distributed sites and causing misjudgments as much as possible , Higher reliability.
本申请第三实施例涉及一种门禁系统,第三实施例与第一实施例大致相同,区别之处在于,如图3所示,智能终端13可以包括管理员终端13-1和普 通用户终端13-2,图3中对管理员终端13-1和普通用户终端13-2的数量仅是示例说明,不作以此为限。如果在紧急事件发生时,普通用户终端13-2不具备解锁权限,那么普通用户终端13-2可以向管理员终端13-1发送紧急解锁请求;管理员终端13-1用于对紧急解锁请求进行认证,并将经过认证的紧急解锁请求发送至主控设备10;主控设备10在接收到经过认证的紧急解锁请求后,控制门锁装置11解锁。其中,图3中仅示意出了在遇到紧急事件,普通用户终端13-2通过管理员终端13-1发送紧急解锁请求的传输路径,但并不以此为限,普通用户终端13-2也可以通过云服务器12或基于近距离无线传输技术发送解锁请求至主控设备10。The third embodiment of the present application relates to an access control system. The third embodiment is roughly the same as the first embodiment. The difference is that, as shown in FIG. 3, the smart terminal 13 may include an administrator terminal 13-1 and a common user terminal. 13-2. The number of administrator terminals 13-1 and ordinary user terminals 13-2 in Fig. 3 is only an example, and is not limited thereto. If the ordinary user terminal 13-2 does not have the unlocking authority when an emergency event occurs, the ordinary user terminal 13-2 can send an emergency unlock request to the administrator terminal 13-1; the administrator terminal 13-1 is used to request the emergency unlock The authentication is performed and the authenticated emergency unlocking request is sent to the main control device 10; the main control device 10 controls the door lock device 11 to unlock after receiving the authenticated emergency unlocking request. Among them, FIG. 3 only illustrates the transmission path for the ordinary user terminal 13-2 to send the emergency unlock request through the administrator terminal 13-1 in the event of an emergency, but it is not limited to this. The ordinary user terminal 13-2 The unlocking request can also be sent to the main control device 10 through the cloud server 12 or based on the short-range wireless transmission technology.
本实施例中,普通用户终端13-2和管理员终端13-1对应的门禁权限不同。管理员终端13-1具备较高的门禁权限,即,主控设备10可以被设定为,只要是接收到经过管理员终端13-1认证过的紧急解锁请求,均会允许解锁。普通用户终端13-2不具有该门锁设备的解锁权限,或者,普通用户终端13-2的门禁权限包括位置受限或时间受限等限制类型,导致在紧急事件发生时,普通用户终端13-2不具备解锁权限。所以,当普通用户终端13-2发现紧急事件发生时,需要通过管理员终端13-1来向主控设备10请求解锁。In this embodiment, the access control authority corresponding to the normal user terminal 13-2 and the administrator terminal 13-1 are different. The administrator terminal 13-1 has a higher access control authority, that is, the master control device 10 can be set to allow unlocking as long as it receives an emergency unlock request authenticated by the administrator terminal 13-1. The ordinary user terminal 13-2 does not have the unlocking authority of the door lock device, or the access authority of the ordinary user terminal 13-2 includes restricted types such as location restriction or time restriction, which causes the ordinary user terminal 13 -2 does not have unlock permission. Therefore, when an ordinary user terminal 13-2 finds that an emergency event occurs, it needs to request unlocking from the master device 10 through the administrator terminal 13-1.
例如,门锁装置11设置在一个仓库的大门上,仓库管理员使用的门禁账号对应于管理员终端13-1,仓库货物搬运人员使用的门禁账号对应于普通用户终端13-2;仓库货物搬运人员的门禁权限包括时间受限这一类型,只有在上班时间段(例如上午八点到下午四点这一时间段内)才有解锁权限。当仓库货物搬运人员在非上班时间段发现紧急事件发生而此时仓库管理员不在现场时,紧急事件例如为仓库内有人呼救,仓库货物搬运人员可以通过普通用户终端13-2 发送紧急解锁请求至仓库管理员的管理员终端13-1,仓库管理员的管理员终端13-1对紧急解锁请求进行认证后,发送经过认证的紧急解锁请求发送至主控设备10,主控设备10在接收到经过认证的紧急解锁请求后,控制门锁装置11解锁。其中,管理员终端13-1在接收到紧急解锁请求时,可以自动进行认证并发送经过认证的紧急解锁请求发送至主控设备10;或者可以提醒仓库管理员进行手动认证并发送经过认证的紧急解锁请求发送至主控设备10。For example, the door lock device 11 is installed on the gate of a warehouse, the access control account used by the warehouse administrator corresponds to the administrator terminal 13-1, and the access control account used by the warehouse cargo handler corresponds to the ordinary user terminal 13-2; The access control authority of personnel includes the type of time restriction, and the unlocking authority is only available during working hours (for example, the time period from 8 am to 4 pm). When warehouse cargo handlers find that an emergency event occurs during non-working hours and the warehouse manager is not on site, the emergency event is for example someone calling for help in the warehouse. The warehouse cargo handler can send an emergency unlock request to the normal user terminal 13-2. After the warehouse administrator’s administrator terminal 13-1 and the warehouse administrator’s administrator terminal 13-1 authenticate the emergency unlock request, it sends the certified emergency unlock request to the master control device 10, and the master device 10 receives it After the authenticated emergency unlock request, the door lock device 11 is controlled to unlock. Among them, when the administrator terminal 13-1 receives the emergency unlock request, it can automatically authenticate and send the certified emergency unlock request to the main control device 10; or it can remind the warehouse administrator to perform manual authentication and send the certified emergency unlock request. The unlock request is sent to the master control device 10.
需要说明的是,第三实施例也可以是在第二实施例基础上的改进。It should be noted that the third embodiment may also be an improvement on the basis of the second embodiment.
本申请第四实施例涉及一种门禁系统,第四实施例与第一实施例大致相同,区别之处在于,在第四实施例,如图4所示,门禁系统还包括连接于智能终端13的辅助定位设备15;智能终端13还用于在处于第一模式时,通过辅助定位设备15获取智能终端13的定位信息,解锁请求包括定位信息。The fourth embodiment of the present application relates to an access control system. The fourth embodiment is substantially the same as the first embodiment. The difference is that in the fourth embodiment, as shown in FIG. 4, the access control system further includes a smart terminal 13 The auxiliary positioning device 15; the smart terminal 13 is also used to obtain the positioning information of the smart terminal 13 through the auxiliary positioning device 15 when in the first mode, and the unlock request includes the positioning information.
其中,辅助定位设备15例如但不限于卫星,智能终端13可以但不限于进行GPS定位以得到定位信息;凡是能够使得智能终端13获取定位信息的辅助定位设备15的类型均属于本实施例的保护范围。Among them, the auxiliary positioning device 15 is, for example, but not limited to satellites, and the smart terminal 13 can, but is not limited to, perform GPS positioning to obtain positioning information; all types of auxiliary positioning devices 15 that enable the smart terminal 13 to obtain positioning information belong to the protection of this embodiment. range.
智能终端13在处于第一模式时,是通过云服务器12发送解锁请求至主控设备10的,即可以实现远程解锁;但对于有些用户,门禁权限被设置了位置受限;此时可以通过辅助定位设备15获取用户的定位信息,并将定位信息整合在解锁请求中一起发送至主控设备;从而主控设备10可以对这些基于云服务器12发送解锁请求的位置受限用户进行解锁允许判断。When the smart terminal 13 is in the first mode, it sends an unlock request to the main control device 10 through the cloud server 12, which can realize remote unlocking; however, for some users, the access control authority is set and the location is restricted; The positioning device 15 obtains the user's positioning information, and integrates the positioning information into the unlock request and sends it to the master control device; thus, the master control device 10 can make an unlock permission judgment for these location-restricted users based on the unlock request sent by the cloud server 12.
需要说明的是,第四实施例也可以是在第三实施例基础上的改进。It should be noted that the fourth embodiment may also be an improvement on the basis of the third embodiment.
本申请第五实施例涉及一种门禁系统,第五实施例与第四实施例大致相同,区别之处在于,在第五实施例,如图5所示,门禁系统还包括连接于主控 设备10的存储设备16;主控设备10还用于在根据解锁请求判断是否允许解锁后,生成解锁请求的解锁记录,并将解锁记录存储至存储设备16;其中,解锁记录至少包括:主控设备10根据解锁请求识别出的发送解锁请求的用户的身份信息,以及是否解锁成功。The fifth embodiment of the present application relates to an access control system. The fifth embodiment is substantially the same as the fourth embodiment. The difference is that in the fifth embodiment, as shown in FIG. 5, the access control system further includes The storage device 16 of 10; the master control device 10 is also used to generate an unlock record of the unlock request after judging whether unlocking is permitted according to the unlock request, and store the unlock record in the storage device 16; wherein the unlock record includes at least: master control device 10 The identity information of the user who sent the unlock request identified according to the unlock request, and whether the unlock was successful.
本实施例中,解锁记录中的是否解锁成功,可以是:主控设备15根据门禁权限判断出的结果,即允许解锁或不允许解锁;其中,当主控设备10判断出允许解锁并控制门锁装置11解锁后,门锁装置11还可以将表征解锁成功的反馈信息发送至主控设备10,当主控设备10接收到表征解锁成功的反馈信息时,确定解锁成功。本实施例中的解锁记录还可以包括主控设备接收解锁请求的时间、控制门锁装置解锁的时间(如果允许解锁的话)等,可以根据需要设定。In this embodiment, whether the unlocking is successful in the unlocking record may be: the result determined by the master control device 15 according to the access control authority, that is, whether unlocking is permitted or not allowed; wherein, when the master control device 10 determines that unlocking is permitted and controls the door After the lock device 11 is unlocked, the door lock device 11 may also send feedback information indicating successful unlocking to the main control device 10, and when the main control device 10 receives the feedback information indicating successful unlocking, it determines that the unlocking is successful. The unlock record in this embodiment may also include the time when the master control device receives the unlock request, the time when the door lock device is controlled to unlock (if unlocking is allowed), etc., which can be set as required.
在一个例子中,门禁权限的权限类型还可以包含匿名权限;主控设备10先识别用户的门禁权限是否包含匿名权限,如果用户的门禁权限包含匿名权限,那么不会生成解锁记录;如果用户的门禁权限没有包含匿名权限,那么生成解锁记录。即,对于一些具有匿名权限的用户,主控设备10不会对其解锁请求的过程进行记录。本实施例中进一步丰富了用户的门禁权限种类,可以满足更多的实际应用场景的需求。In an example, the permission type of the access permission can also include anonymous permission; the master control device 10 first identifies whether the user’s access permission includes anonymous permission, if the user’s access permission includes anonymous permission, then no unlock record will be generated; if the user’s If the access control authority does not include the anonymous authority, an unlock record is generated. That is, for some users with anonymous permissions, the master control device 10 will not record the process of their unlock request. In this embodiment, the types of user access control permissions are further enriched, which can meet the requirements of more practical application scenarios.
本申请第六实施例涉及一种门禁系统的解锁方法,应用于门禁系统中的主控设备,门禁系统请参考图1或图2,门禁系统还包括云服务器、门锁装置以及至少一智能终端;智能终端用于在处于第一模式时,通过云服务器发送解锁请求至主控设备。The sixth embodiment of the present application relates to an unlocking method of an access control system, which is applied to the main control device in the access control system. For the access control system, please refer to Figure 1 or Figure 2. The access control system also includes a cloud server, a door lock device and at least one smart terminal ; The smart terminal is used to send an unlock request to the main control device through the cloud server when in the first mode.
如图6所示为本实施例中的门禁系统的解锁方法的流程图,具体如下。FIG. 6 shows a flowchart of the unlocking method of the access control system in this embodiment, and the details are as follows.
步骤101,判断是否接收到解锁请求;若是,进入步骤102;若否,重复 步骤101。Step 101: Judge whether an unlock request is received; if yes, go to step 102; if not, repeat step 101.
步骤102,根据解锁请求判断是否允许解锁;若是,进入步骤103;若否,结束。Step 102: Determine whether to allow unlocking according to the unlock request; if yes, go to step 103; if not, end.
步骤103,控制门锁装置解锁。Step 103: Control the door lock device to unlock.
如图7所示的一个例子中,步骤102,具体包含如下子步骤:In an example shown in Fig. 7, step 102 specifically includes the following sub-steps:
子步骤1021,根据解锁请求识别特征信息;其中,特征信息至少包括发送解锁请求的用户的身份信息。Sub-step 1021, identifying characteristic information according to the unlock request; wherein the characteristic information includes at least the identity information of the user who sent the unlock request.
子步骤1022,获取用户对应的门禁权限。Sub-step 1022: Obtain the access control authority corresponding to the user.
子步骤1023,至少根据获取的门禁权限判断是否允许解锁。In sub-step 1023, it is judged whether unlocking is allowed at least according to the acquired access control authority.
本实施例中,由主控设备判断是否允许解锁,因此主控设备中储存了用于进行解锁判断的核心数据,而现有技术中由云服务器储存这些核心数据(现有技术中由云服务器判断是否允许解锁);由于本案中的主控设备相当于复杂网络结构中的边缘节点,相较于作为网络的中心节点的云服务器而言,边缘节点被非法入侵的难度较大,即核心数据在边缘节点中的安全性更高,因此本实施例可以提高门禁系统的安全性;并且,作为边缘节点的主控设备所要处理的业务相对较少,其处理速度也会相对较快。In this embodiment, the master control device determines whether unlocking is allowed. Therefore, the master control device stores the core data used for unlocking determination. In the prior art, the cloud server stores these core data (in the prior art, the cloud server Determine whether to allow unlocking); since the master control device in this case is equivalent to the edge node in the complex network structure, compared to the cloud server as the central node of the network, the edge node is more difficult to be illegally invaded, that is, the core data The security in the edge node is higher, so this embodiment can improve the security of the access control system; in addition, the main control device as the edge node has to process relatively few services, and its processing speed will be relatively faster.
不难发现,本实施方式为与第一实施方式相对应的方法实施例,本实施方式可与第一实施方式互相配合实施。第一实施方式中提到的相关技术细节在本实施方式中依然有效,为了减少重复,这里不再赘述。相应地,本实施方式中提到的相关技术细节也可应用在第一实施方式中。It is not difficult to find that this embodiment is a method example corresponding to the first embodiment, and this embodiment can be implemented in cooperation with the first embodiment. The related technical details mentioned in the first embodiment are still valid in this embodiment, and in order to reduce repetition, they will not be repeated here. Correspondingly, the related technical details mentioned in this embodiment can also be applied in the first embodiment.
本申请第七实施例涉及一种门禁系统的解锁方法,第七实施例与第六实施例大致相同,区别之处在于,主控设备可以接收云服务器监测到预设事件发 生时发送的预警信号,并采取措施。The seventh embodiment of the present application relates to an unlocking method of an access control system. The seventh embodiment is roughly the same as the sixth embodiment, except that the master control device can receive the early warning signal sent by the cloud server when a preset event occurs. And take measures.
如图8所示为本申请第七实施例的门禁系统的解锁方法的流程图,包括:FIG. 8 is a flowchart of the unlocking method of the access control system according to the seventh embodiment of this application, including:
步骤201,判断是否接收到解锁请求;若是,进入步骤202;若否,重复步骤201。 Step 201, determine whether an unlock request is received; if yes, go to step 202; if not, repeat step 201.
步骤202,根据解锁请求判断是否允许解锁;若是,进入步骤203;若否,进入204。 Step 202, judge whether to allow unlocking according to the unlock request; if yes, go to step 203; if not, go to 204.
步骤203,控制门锁装置解锁。Step 203: Control the door lock device to unlock.
步骤204,判断是否接收到云服务器在监测到预设事件发生时发送的预警信号;若是,进入步骤205;若否,重复步骤204。In step 204, it is determined whether an early warning signal sent by the cloud server when a preset event is detected is received; if yes, go to step 205; if not, step 204 is repeated.
步骤205,进入预设的控制模式。Step 205: Enter a preset control mode.
其中,步骤201~步骤203与第六实施例中的步骤101~步骤103大致相同,此处不再赘述,不同之处在于还包含步骤204~步骤205。需要说明的是,步骤201~步骤203用于实现门禁解锁,步骤204~步骤205为实现预设事件发生时的门禁控制,两者执行顺序不限,即,实现门禁解锁和实现预设事件发生时的门禁控制可以并发执行,图8中只是示意性说明。Among them, step 201 to step 203 are substantially the same as step 101 to step 103 in the sixth embodiment, and will not be repeated here. The difference is that step 204 to step 205 are also included. It should be noted that steps 201 to step 203 are used to achieve access control unlocking, and steps 204 to step 205 are used to achieve access control when a preset event occurs. The order of execution of the two is not limited, that is, to achieve access control unlocking and to achieve preset event occurrence The access control at the time can be executed concurrently, which is only schematically illustrated in Figure 8.
本实施例中,云服务器可以主动监测预设事件,并在预设事件发生时告知主控设备,从而使得主控设备进入预设的控制模式;即主控设备可以在预设事件发生时采用预先设定好的门禁控制,可以满足更多的实际应用场景的需要。In this embodiment, the cloud server can actively monitor the preset event, and notify the master control device when the preset event occurs, so that the master control device enters the preset control mode; that is, the master control device can use when the preset event occurs Pre-set access control can meet the needs of more practical application scenarios.
在一个例子中,云服务器包含多个分布式站点,各分布式站点用于在监测到预设事件发生时,分别发送预警信号至主控设备。主控设备在接收到各分布式站点发送的预警信号时,进入预设的控制模式;从而可以尽可能避免个别分布式站点监测错误而导致误判,可靠性更高。In one example, the cloud server includes multiple distributed sites, and each distributed site is used to send an early warning signal to the main control device when a preset event is detected. The main control device enters the preset control mode when receiving the early warning signal sent by each distributed station; thus, it can avoid the misjudgment caused by the monitoring error of individual distributed stations as much as possible, and the reliability is higher.
本实施方式为与第二实施方式相对应的方法实施例,本实施方式可与第二实施方式互相配合实施。第二实施方式中提到的相关技术细节在本实施方式中依然有效,为了减少重复,这里不再赘述。相应地,本实施方式中提到的相关技术细节也可应用在第二实施方式中。This embodiment is a method example corresponding to the second embodiment, and this embodiment can be implemented in cooperation with the second embodiment. The related technical details mentioned in the second embodiment are still valid in this embodiment, and in order to reduce repetition, they will not be repeated here. Correspondingly, the related technical details mentioned in this embodiment can also be applied in the second embodiment.
本申请第八实施例涉及一种门禁系统的解锁方法,第八实施例与第六实施例大致相同,区别之处在于,对于门禁权限被设置为位置受限的用户,可以结合用户的定位信息来判断是否允许解锁。The eighth embodiment of the present application relates to an unlocking method of an access control system. The eighth embodiment is roughly the same as the sixth embodiment, except that for users whose access control authority is set to restricted locations, the user's location information can be combined To determine whether to allow unlocking.
本申请第八实施例的门禁系统的解锁方法与第六实施例中相比,步骤102包含的子步骤不同,如图9所示为本申请第八实施例中根据解锁请求判断是否允许解锁这一步骤的具体流程图。The unlocking method of the access control system in the eighth embodiment of the present application is different from that in the sixth embodiment in that the sub-steps included in step 102 are different. As shown in FIG. A detailed flow chart of one step.
子步骤3021,根据解锁请求识别特征信息;其中,特征信息至少包括发送解锁请求的用户的身份信息;Sub-step 3021, identifying characteristic information according to the unlock request; wherein the characteristic information includes at least the identity information of the user who sent the unlock request;
子步骤3022,获取用户对应的门禁权限;Sub-step 3022, obtain the access control authority corresponding to the user;
子步骤3023,识别解锁请求的接收途径;若接收途径为通过云服务器接收,进入子步骤3024;若基于近距离无线通讯技术接收,进入子步骤3027;Sub-step 3023, identify the receiving method of the unlock request; if the receiving method is through the cloud server, enter the sub-step 3024; if it is received based on the near field communication technology, enter the sub-step 3027;
子步骤3023中,识别解锁请求的接收途径的具体方式,例如但不限于以下方式:主控设备具有多个接收模块,如与云服务器的通讯协议匹配的接收模块、与WIFI的通讯协议匹配的接收模块、与蓝牙通讯协议匹配的接收模块等,主控设备可以识别解锁请求从哪个接收模块接收,从而确定解锁请求的接收路径。如果是通过云服务器接收,那么要基于门禁权限是否包含位置受限来确定该用户是否可以远程解锁,即进入子步骤3024。如果是基于WIFI或蓝牙这类近距离无线通讯技术接收,由于近距离无线通讯技术本身就要求用户在近距离 无线通讯所能覆盖的范围内才能接收到解锁请求,所以如果是基于近距离无线通讯技术接收的,用户必定在近距离无线通讯所能覆盖的范围内。In sub-step 3023, the specific way of identifying the receiving way of the unlock request, such as but not limited to the following way: the master control device has multiple receiving modules, such as the receiving module matching the communication protocol of the cloud server, and the communication protocol matching the WIFI For the receiving module, the receiving module matching the Bluetooth communication protocol, etc., the master control device can identify the receiving module from which the unlocking request is received, so as to determine the receiving path of the unlocking request. If it is received through a cloud server, it is determined whether the user can remotely unlock based on whether the access control authority includes location restriction, that is, sub-step 3024 is entered. If it is received based on short-range wireless communication technology such as WIFI or Bluetooth, because the short-range wireless communication technology itself requires the user to receive the unlock request within the range that the short-range wireless communication can cover, so if it is based on the short-range wireless communication If the technology is received, the user must be within the range covered by short-range wireless communication.
子步骤3024,判断门禁权限是否包含位置受限、特征信息是否包含用户的定位信息;若门禁权限包括位置受限,且特征信息包括用户的定位信息,进入子步骤3025;若门禁权限包括位置受限,且特征信息未包括用户的定位信息,进入子步骤3026;若门禁权限不包含位置受限,则进入子步骤3027。Sub-step 3024, judging whether the access control authority includes location restriction and whether the feature information includes the user's location information; if the access control authority includes location restriction, and the feature information includes the user's location information, proceed to sub-step 3025; if the access control authority includes location access If the access control authority does not include location restriction, then proceed to sub-step 3027.
子步骤3025,根据用户的定位信息和预设的位置限制条件判断是否允许解锁;其中,用户的定位信息由智能终端通过辅助定位设备获取;Sub-step 3025, judging whether to allow unlocking according to the user's location information and preset location restriction conditions; wherein, the user's location information is obtained by the smart terminal through the auxiliary positioning device;
子步骤3026,不允许解锁。Sub-step 3026, unlocking is not allowed.
子步骤3027,根据门禁权限判断是否允许解锁。In sub-step 3027, it is determined whether unlocking is allowed according to the access control authority.
其中,步骤3021~步骤3022与第六实施例中的步骤1021~步骤1022大致相同,此处不再赘述,不同之处在于子步骤3023~子步骤3027。Among them, steps 3021 to 3022 are substantially the same as steps 1021 to 1022 in the sixth embodiment, and will not be repeated here, and the difference lies in sub-step 3023 to sub-step 3027.
即,当门禁权限中包含位置受限时,表示该用户不能进行远程解锁;如果解锁请求中没有包含用户的定位信息,那么不允许解锁;如果解锁请求中包含用户的定位信息,那么判断该定位信息是否满足位置限制条件,该位置限制条件例如为一个预设的区域,用户位于该预设的区域内,则判定允许解锁。That is, when the access control authority includes location restriction, it means that the user cannot remotely unlock; if the unlock request does not include the user's location information, then unlocking is not allowed; if the unlock request contains the user's location information, then the location is determined Whether the information meets the location restriction condition, the location restriction condition is, for example, a preset area, and if the user is located in the preset area, it is determined that unlocking is allowed.
本实施方式为与第四实施方式相对应的方法实施例,本实施方式可与第四实施方式互相配合实施。第四实施方式中提到的相关技术细节在本实施方式中依然有效,为了减少重复,这里不再赘述。相应地,本实施方式中提到的相关技术细节也可应用在第四实施方式中。This embodiment is a method example corresponding to the fourth embodiment, and this embodiment can be implemented in cooperation with the fourth embodiment. The related technical details mentioned in the fourth embodiment are still valid in this embodiment, and in order to reduce repetition, they will not be repeated here. Correspondingly, the related technical details mentioned in this embodiment can also be applied in the fourth embodiment.
需要说明的是,本实施例也可以是在第七实施例基础上的改进。It should be noted that this embodiment may also be an improvement on the basis of the seventh embodiment.
本申请第九实施例涉及一种门禁系统的解锁方法,第九实施例与第六 实施例大致相同,区别之处在于,主控设备10还可以生成解锁请求的解锁记录,并将解锁记录存储至存储设备16。The ninth embodiment of the present application relates to an unlocking method of an access control system. The ninth embodiment is substantially the same as the sixth embodiment. The difference is that the master control device 10 can also generate an unlock record of an unlock request, and store the unlock record To storage device 16.
如图10是根据本申请第九实施例的门禁系统的解锁方法的一个例子的流程图,具体如下。FIG. 10 is a flowchart of an example of an unlocking method of an access control system according to the ninth embodiment of the present application, which is specifically as follows.
步骤401,判断是否接收到解锁请求;若是,进入步骤402;若否,重复步骤401。 Step 401, determine whether an unlock request is received; if yes, go to step 402; if not, repeat step 401.
步骤402,根据解锁请求判断是否允许解锁;若是,进入步骤403;若否,结束。 Step 402, judge whether to allow unlocking according to the unlock request; if yes, go to step 403; if not, end.
步骤403,控制门锁装置解锁。Step 403: Control the door lock device to unlock.
步骤404,判断主控设备根据解锁请求获取的用户对应的门禁权限中是否包含匿名权限;若否,进入步骤405;若是,结束。Step 404: Determine whether the access control permissions corresponding to the user acquired by the master control device according to the unlock request include anonymous permissions; if not, proceed to step 405; if yes, end.
步骤405,生成解锁请求的解锁记录,并将解锁记录存储至存储设备;其中,解锁记录至少包括:主控设备根据解锁请求识别出的发送解锁请求的用户的身份信息,以及是否解锁成功。Step 405: Generate an unlock record of the unlock request, and store the unlock record in the storage device. The unlock record includes at least the identity information of the user who sent the unlock request identified by the master control device according to the unlock request, and whether the unlock is successful.
其中,步骤401~步骤403与第六实施例中的步骤101~步骤103大致相同,此处不作赘述;不同之处在于还包括步骤404、步骤405。Among them, step 401 to step 403 are substantially the same as step 101 to step 103 in the sixth embodiment, and will not be repeated here; the difference is that step 404 and step 405 are also included.
本实施例中,门禁权限的类型中包含匿名权限这一选项,因此要判断用户的门禁权限中是否包含匿名权限,才确定是否要生成该用户的解锁记录;在其他例子中,如果门禁权限的类型中没有包含匿名权限这一选项,那么无需执行步骤404,即对接收到的每条解锁请求都生成对应的解锁记录。另外,本实施例中对步骤403、步骤404、步骤405的执行顺序不限,可以根据需要或实际情况执行。In this embodiment, the type of access permission includes the option of anonymous permission. Therefore, it is necessary to determine whether the user’s access permission includes anonymous permission before determining whether to generate the unlock record of the user; in other examples, if the access permission is If the type does not include the option of anonymous permission, then there is no need to perform step 404, that is, a corresponding unlock record is generated for each unlock request received. In addition, the execution order of step 403, step 404, and step 405 in this embodiment is not limited, and can be executed according to needs or actual conditions.
需要说明的是,第九实施例也可以是在第七或第八实施例基础上的改进。It should be noted that the ninth embodiment may also be an improvement on the basis of the seventh or eighth embodiment.
本实施方式为与第五实施方式相对应的方法实施例,本实施方式可与第五实施方式互相配合实施。第五实施方式中提到的相关技术细节在本实施方式中依然有效,为了减少重复,这里不再赘述。相应地,本实施方式中提到的相关技术细节也可应用在第五实施方式中。This embodiment is a method example corresponding to the fifth embodiment, and this embodiment can be implemented in cooperation with the fifth embodiment. The related technical details mentioned in the fifth embodiment are still valid in this embodiment, and in order to reduce repetition, they will not be repeated here. Correspondingly, the related technical details mentioned in this embodiment can also be applied in the fifth embodiment.
本申请第十实施例涉及一种处理芯片,如图11所示,处理芯片110与至少一存储器111连接,存储器111存储有可被处理芯片110执行的指令,指令被处理芯片110执行,以使处理芯片110能够执行上述方法实施例。The tenth embodiment of the present application relates to a processing chip. As shown in FIG. 11, the processing chip 110 is connected to at least one memory 111. The memory 111 stores instructions that can be executed by the processing chip 110, and the instructions are executed by the processing chip 110 to make The processing chip 110 can execute the above method embodiments.
本申请第十一实施例涉及一种主控设备,包括上述处理芯片。The eleventh embodiment of the present application relates to a main control device including the above-mentioned processing chip.
本领域的普通技术人员可以理解,上述各实施例是实现本申请的具体实施例,而在实际应用中,可以在形式上和细节上对其作各种改变,而不偏离本申请的精神和范围。A person of ordinary skill in the art can understand that the above-mentioned embodiments are specific embodiments for realizing the present application, and in practical applications, various changes can be made to them in form and details without departing from the spirit and spirit of the present application. range.

Claims (18)

  1. 一种门禁系统,其特征在于,包括:主控设备、门锁装置、云服务器以及至少一智能终端;所述主控设备连接于所述云服务器和所述门锁装置,所述智能终端连接于所述云服务器;An access control system, characterized by comprising: a main control device, a door lock device, a cloud server, and at least one smart terminal; the main control device is connected to the cloud server and the door lock device, and the smart terminal is connected On the cloud server;
    所述智能终端用于在处于第一模式时,通过所述云服务器发送解锁请求至所述主控设备;The smart terminal is configured to send an unlock request to the master control device through the cloud server when in the first mode;
    所述主控设备用于在接收到所述解锁请求时,根据所述解锁请求判断是否允许解锁,并在判定允许解锁时,控制所述门锁装置解锁。The master control device is configured to determine whether unlocking is permitted according to the unlocking request when receiving the unlocking request, and to control the door lock device to unlock when it is determined that the unlocking is permitted.
  2. 如权利要求1所述的门禁系统,其特征在于,所述云服务器还用于在监测到预设事件发生时,发送预警信号至所述主控设备;所述主控设备还用于在接收到所述预警信号时,进入预设的控制模式。The access control system of claim 1, wherein the cloud server is further configured to send an early warning signal to the master control device when a preset event is detected; the master control device is also used to receive When the warning signal is reached, the preset control mode is entered.
  3. 如权利要求2所述的门禁系统,其特征在于,所述云服务器包含多个分布式站点;The access control system of claim 2, wherein the cloud server includes multiple distributed sites;
    各所述分布式站点用于在监测到所述预设事件发生时,分别发送所述预警信号至所述主控设备;Each of the distributed sites is configured to send the early warning signal to the main control device when the occurrence of the preset event is monitored;
    所述主控设备用于在接收到各所述分布式站点发送的所述预警信号时,进入预设的控制模式。The main control device is configured to enter a preset control mode when receiving the early warning signal sent by each of the distributed sites.
  4. 如权利要求1所述的门禁系统,其特征在于,所述智能终端包括管理员终端和普通用户终端;The access control system according to claim 1, wherein the smart terminal includes an administrator terminal and a common user terminal;
    所述普通用户终端用于在预设的紧急事件发生时,向所述管理员终端发送紧急解锁请求;其中,在所述紧急事件发生时,所述普通用户终端不具备解锁权限;The ordinary user terminal is configured to send an emergency unlock request to the administrator terminal when a preset emergency event occurs; wherein, when the emergency event occurs, the ordinary user terminal does not have the unlocking authority;
    所述管理员终端用于对所述紧急解锁请求进行认证,并将经过认证的所述紧急解锁请求发送至所述主控设备;The administrator terminal is used to authenticate the emergency unlock request, and send the authenticated emergency unlock request to the master control device;
    所述主控设备在接收到经过认证的所述紧急解锁请求后,控制所述门锁装置解锁。The main control device controls the door lock device to unlock after receiving the authenticated emergency unlock request.
  5. 如权利要求1所述的门禁系统,其特征在于,所述门禁系统还包括连接于所述智能终端的辅助定位设备;The access control system according to claim 1, wherein the access control system further comprises an auxiliary positioning device connected to the smart terminal;
    所述智能终端还用于在处于所述第一模式时,通过所述辅助定位设备获取所述智能终端的定位信息,所述解锁请求包括所述定位信息。The smart terminal is further configured to obtain positioning information of the smart terminal through the auxiliary positioning device when in the first mode, and the unlock request includes the positioning information.
  6. 如权利要求1所述的门禁系统,其特征在于,所述门禁系统还包括连接于所述主控设备的存储设备;The access control system according to claim 1, wherein the access control system further comprises a storage device connected to the master control device;
    所述主控设备还用于在根据所述解锁请求判断是否允许解锁后,生成所述解锁请求的解锁记录,并将所述解锁记录存储至所述存储设备;The master control device is further configured to generate an unlock record of the unlock request after determining whether unlocking is allowed according to the unlock request, and store the unlock record in the storage device;
    其中,所述解锁记录至少包括:所述主控设备根据所述解锁请求识别出的发送所述解锁请求的用户的身份信息,以及是否解锁成功。The unlocking record includes at least: the identity information of the user who sent the unlocking request identified by the master control device according to the unlocking request, and whether the unlocking is successful.
  7. 如权利要求1所述的门禁系统,其特征在于,所述门锁装置安装于可移动设备中。The access control system according to claim 1, wherein the door lock device is installed in a movable device.
  8. 如权利要求1所述的门禁系统,其特征在于,所述智能终端还用于在处于第二模式时,基于近距离无线传输技术发送所述解锁请求至所述主控设备。The access control system according to claim 1, wherein the smart terminal is further configured to send the unlock request to the master control device based on a short-range wireless transmission technology when in the second mode.
  9. 一种门禁系统的解锁方法,其特征在于,应用于所述门禁系统中的主控设备,所述门禁系统还包括云服务器、门锁装置以及至少一智能终端;所述智能终端用于在处于第一模式时,通过所述云服务器发送解锁请求至所述主控设备;所述解锁方法包括:An unlocking method of an access control system, characterized in that it is applied to a master control device in the access control system, the access control system further includes a cloud server, a door lock device, and at least one smart terminal; the smart terminal is used to In the first mode, sending an unlock request to the master control device through the cloud server; the unlocking method includes:
    当接收到所述解锁请求时,根据所述解锁请求判断是否允许解锁;When receiving the unlocking request, determine whether to allow unlocking according to the unlocking request;
    当判定允许解锁时,控制所述门锁装置解锁。When it is determined that unlocking is allowed, the door lock device is controlled to unlock.
  10. 如权利要求9所述的门禁系统的解锁方法,其特征在于,还包括:8. The unlocking method of the access control system according to claim 9, further comprising:
    当接收到所述云服务器在监测到预设事件发生时发送的预警信号时,进入预设的控制模式。When receiving an early warning signal sent by the cloud server when a preset event is detected, it enters a preset control mode.
  11. 如权利要求10所述的门禁系统的解锁方法,其特征在于,所述云服务器包括多个分布式站点;The unlocking method of the access control system according to claim 10, wherein the cloud server includes a plurality of distributed sites;
    所述接收到所述云服务器在监测到预设事件发生时发送的预警信号,具体为,接收到各所述分布式站点在监测到预设事件发生时分别发送的所述预警信号。The receiving of the early warning signal sent by the cloud server when the occurrence of the preset event is monitored is specifically receiving the early warning signal sent by each of the distributed sites when the occurrence of the preset event is monitored.
  12. 如权利要求9所述的门禁系统的解锁方法,其特征在于,所述根据所述解锁请求判断是否允许解锁,包括:The unlocking method of the access control system according to claim 9, wherein the determining whether to allow unlocking according to the unlocking request includes:
    根据所述解锁请求识别特征信息;其中,所述特征信息至少包括发送所述解锁请求的用户的身份信息;Identifying characteristic information according to the unlock request; wherein the characteristic information includes at least the identity information of the user who sent the unlock request;
    获取所述用户对应的门禁权限;Obtaining the access control authority corresponding to the user;
    至少根据获取的所述门禁权限判断是否允许解锁。Determine whether to allow unlocking at least according to the acquired access control authority.
  13. 如权利要求12所述的门禁系统的解锁方法,其特征在于,所述智能终端还用于在处于第二模式时,基于近距离无线传输技术发送所述解锁请求至所述主控设备;The unlocking method of the access control system according to claim 12, wherein the smart terminal is further configured to send the unlocking request to the master control device based on the short-range wireless transmission technology when in the second mode;
    在所述至少根据获取的所述门禁权限判断是否允许解锁之前,还包括:识别所述解锁请求的接收途径;Before the determining whether unlocking is permitted at least according to the acquired access control authority, the method further includes: identifying a receiving channel of the unlocking request;
    若所述接收途径为通过所述云服务器接收,则所述至少根据获取的所述门禁权限判断是否允许解锁,包括:If the receiving method is to receive through the cloud server, determining whether to allow unlocking at least according to the acquired access control authority includes:
    若所述门禁权限包括位置受限,且所述特征信息包括所述用户的定位信息,则根据所述用户的定位信息和预设的位置限制条件判断是否允许解锁;其中,所述用户的定位信息由所述智能终端通过辅助定位设备获取;If the access control authority includes location restriction, and the characteristic information includes location information of the user, it is determined whether to allow unlocking according to the location information of the user and preset location restriction conditions; wherein, the location of the user Information is obtained by the smart terminal through auxiliary positioning equipment;
    若所述门禁权限包括位置受限,且所述特征信息未包括所述用户的定位信息,判定为不允许解锁。If the access control authority includes location restriction, and the characteristic information does not include the positioning information of the user, it is determined that unlocking is not allowed.
  14. 如权利要求9所述的门禁系统的解锁方法,其特征在于,所述门禁系统还包括存储设备;10. The unlocking method of the access control system according to claim 9, wherein the access control system further comprises a storage device;
    在所述根据所述解锁请求判断是否允许解锁之后,还包括:After determining whether to allow unlocking according to the unlocking request, the method further includes:
    生成所述解锁请求的解锁记录,并将所述解锁记录存储至所述存储设备;其中,所述解锁记录至少包括:所述主控设备根据所述解锁请求识别出的发送所述解锁请求的用户的身份信息,以及是否解锁成功。Generate an unlock record of the unlock request, and store the unlock record in the storage device; wherein, the unlock record includes at least: the master control device identified according to the unlock request to send the unlock request The user's identity information, and whether the unlock is successful.
  15. 如权利要求14所述的门禁系统的解锁方法,其特征在于,在所述生成所述解锁请求的解锁记录,并将所述解锁记录存储至所述存储设备之前,还包括:The unlocking method of the access control system according to claim 14, wherein before said generating the unlocking record of the unlocking request and storing the unlocking record in the storage device, the method further comprises:
    判定所述主控设备根据所述解锁请求获取的所述用户对应的门禁权限中不包含匿名权限。It is determined that the access control permissions corresponding to the user acquired by the master control device according to the unlocking request do not include anonymous permissions.
  16. 如权利要求12所述的门禁系统的解锁方法,其特征在于,所述门禁权限的权限类型包括以下类型的其中之一或任意组合:位置受限、时间受限、匿名权限、通行方向受限。The unlocking method of the access control system according to claim 12, wherein the permission type of the access control authority includes one or any combination of the following types: restricted location, restricted time, anonymous authority, restricted access direction .
  17. 一种处理芯片,其特征在于,与至少一存储器连接,所述存储器存储有可被所述处理芯片执行的指令,所述指令被所述处理芯片执行,以使所述处理芯片能够执行如权利要求9至16中任一项所述的门禁系统的解锁方法。A processing chip, characterized in that it is connected to at least one memory, and the memory stores instructions that can be executed by the processing chip, and the instructions are executed by the processing chip so that the processing chip can execute The unlocking method of the access control system described in any one of 9 to 16 is required.
  18. 一种主控设备,其特征在于,包括权利要求17所述的处理芯片。A main control device, characterized by comprising the processing chip according to claim 17.
PCT/CN2019/075210 2019-02-15 2019-02-15 Processing chip, master control device, and access control system and unlocking method thereof WO2020164104A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201980000381.4A CN109983514A (en) 2019-02-15 2019-02-15 Handle chip, main control device, access control system and its unlocking method
PCT/CN2019/075210 WO2020164104A1 (en) 2019-02-15 2019-02-15 Processing chip, master control device, and access control system and unlocking method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/075210 WO2020164104A1 (en) 2019-02-15 2019-02-15 Processing chip, master control device, and access control system and unlocking method thereof

Publications (1)

Publication Number Publication Date
WO2020164104A1 true WO2020164104A1 (en) 2020-08-20

Family

ID=67073977

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/075210 WO2020164104A1 (en) 2019-02-15 2019-02-15 Processing chip, master control device, and access control system and unlocking method thereof

Country Status (2)

Country Link
CN (1) CN109983514A (en)
WO (1) WO2020164104A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112991602B (en) * 2019-12-18 2023-05-26 杭州海康威视数字技术股份有限公司 Bidirectional access control system and control method thereof
CN114482720B (en) * 2021-12-16 2023-04-28 德施曼机电(中国)有限公司 Door lock control method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106327648A (en) * 2016-08-31 2017-01-11 北京厚文知识产权顾问有限公司 Community access control lock system with remote control function
CN106447850A (en) * 2016-08-31 2017-02-22 长城汽车股份有限公司 Control method, mobile terminal, server and control system
CN107492173A (en) * 2017-08-15 2017-12-19 青岛易方德物联科技有限公司 A kind of cloud password access control system and method
US20180108192A1 (en) * 2014-12-23 2018-04-19 Gate Labs Inc. Access management system
CN108547514A (en) * 2018-04-13 2018-09-18 珠海格力电器股份有限公司 A kind of open method and device of intelligent door lock

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104346845A (en) * 2013-07-23 2015-02-11 青岛驿路同行国际旅行社有限公司 Access control system, method and device
CN103871135B (en) * 2014-03-07 2017-01-18 深圳市同创新佳科技有限公司 Wireless control method and system of electronic lock
CN104050398B (en) * 2014-06-17 2017-01-18 飞天诚信科技股份有限公司 Multifunctional encryption lock and operating method thereof
FR3039687A1 (en) * 2015-07-29 2017-02-03 Docapost Iot METHOD FOR OPENING CONTROL OF A SINGLE-USE CODE LOCK
CN105261104B (en) * 2015-11-24 2017-10-10 重庆理工大学 Bluetooth door lock system and its control method based on intelligent terminal
CN205388488U (en) * 2016-03-07 2016-07-20 大唐淮南洛河发电厂 Rotating machinery of thermal power plant state monitoring system based on embedded pair of server
CN207110723U (en) * 2017-06-21 2018-03-16 广东德瑞智能科技有限公司 It is a kind of can telecommunication mobile terminal lockset
CN107945328B (en) * 2017-11-20 2020-08-04 深圳市创维群欣安防科技股份有限公司 Office intelligent lock control system and method
CN109255868A (en) * 2018-08-27 2019-01-22 青岛海信智慧家居系统股份有限公司 remote unlocking method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180108192A1 (en) * 2014-12-23 2018-04-19 Gate Labs Inc. Access management system
CN106327648A (en) * 2016-08-31 2017-01-11 北京厚文知识产权顾问有限公司 Community access control lock system with remote control function
CN106447850A (en) * 2016-08-31 2017-02-22 长城汽车股份有限公司 Control method, mobile terminal, server and control system
CN107492173A (en) * 2017-08-15 2017-12-19 青岛易方德物联科技有限公司 A kind of cloud password access control system and method
CN108547514A (en) * 2018-04-13 2018-09-18 珠海格力电器股份有限公司 A kind of open method and device of intelligent door lock

Also Published As

Publication number Publication date
CN109983514A (en) 2019-07-05

Similar Documents

Publication Publication Date Title
US7400891B2 (en) Methods, systems and computer program products for remotely controlling wireless terminals
US20170109950A1 (en) Methods and systems configured to detect and guarantee identity for the purpose of data protection and access control
US9280890B2 (en) Security system access detection
US8305211B1 (en) Method and apparatus for surveillance system peering
US20120188054A1 (en) Remote security entrance application
US11155239B2 (en) Method and system for managing access of vehicle compartment
JP5234760B2 (en) Entrance / exit management system, disaster evacuation support method, disaster evacuation support program, and program recording medium
KR20150126423A (en) Self-provisioning access control
EP2933783B1 (en) System and method to access a security system for temporary users using a mobile application
JP2020521227A (en) Scalable system and method for surveillance and concierge services
US9437061B2 (en) Arrangement for the authorised access of at least one structural element located in a building
US11689929B2 (en) Controlling access to enterprise centers using a dynamic enterprise control system
US20190325677A1 (en) Home security system with automatic authorization functionality
KR20180060901A (en) Meothod for controlling locking device
KR20180045761A (en) System for opening and closing of roof door, and operating method thereof
KR101765080B1 (en) smart door lock system based on iot and the method thereof
WO2020164104A1 (en) Processing chip, master control device, and access control system and unlocking method thereof
KR101431627B1 (en) Home security method using smart devices
US20220014388A1 (en) Virtual security guard
KR101595897B1 (en) Digital doorlock and control method thereof
KR101742155B1 (en) Meothod for controlling locking device
KR101063751B1 (en) Biometrics-based Passenger Identification and Information Transmission System
JP5258251B2 (en) Security equipment
KR100863181B1 (en) Method for providing security service using internet
JP2019028580A (en) Monitoring system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19914760

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19914760

Country of ref document: EP

Kind code of ref document: A1