WO2020164104A1 - Puce de traitement, dispositif de commande maître, et système de contrôle d'accès et son procédé de déverrouillage - Google Patents

Puce de traitement, dispositif de commande maître, et système de contrôle d'accès et son procédé de déverrouillage Download PDF

Info

Publication number
WO2020164104A1
WO2020164104A1 PCT/CN2019/075210 CN2019075210W WO2020164104A1 WO 2020164104 A1 WO2020164104 A1 WO 2020164104A1 CN 2019075210 W CN2019075210 W CN 2019075210W WO 2020164104 A1 WO2020164104 A1 WO 2020164104A1
Authority
WO
WIPO (PCT)
Prior art keywords
unlocking
access control
control device
unlock
request
Prior art date
Application number
PCT/CN2019/075210
Other languages
English (en)
Chinese (zh)
Inventor
白海
Original Assignee
深圳市汇顶科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市汇顶科技股份有限公司 filed Critical 深圳市汇顶科技股份有限公司
Priority to PCT/CN2019/075210 priority Critical patent/WO2020164104A1/fr
Priority to CN201980000381.4A priority patent/CN109983514A/zh
Publication of WO2020164104A1 publication Critical patent/WO2020164104A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network

Definitions

  • This application relates to the technical field of access control, in particular to a master control device, an access control system and an unlocking method thereof.
  • the cloud server receives the unlock request from the smart terminal and determines whether to allow unlocking according to the unlock request; that is, the cloud server is an important part of remote unlocking, and it stores terminal users and access control unlocking Core data.
  • the purpose of some embodiments of this application is to provide a processing chip, a main control device, an access control system and an unlocking method thereof, which can improve the security of the access control system.
  • the embodiment of the present application provides an access control system, including: a master control device, a door lock device, a cloud server, and at least one smart terminal; the master control device is connected to the cloud server and the door lock device, and the smart The terminal is connected to the cloud server; the smart terminal is used to send an unlocking request to the master control device through the cloud server when in the first mode; the master control device is used to send an unlocking request to the master control device when the unlock request is received When determining whether to allow unlocking according to the unlocking request, and when it is determined that unlocking is permitted, control the door lock device to unlock.
  • the embodiment of the present application also provides an unlocking method of an access control system, which is applied to the master control device in the access control system.
  • the access control system further includes a cloud server, a door lock device, and at least one smart terminal;
  • the unlocking method includes: when receiving the unlocking request, judging whether to allow unlocking according to the unlocking request; When unlocking is allowed, control the door lock device to unlock.
  • the embodiment of the present application also provides a processing chip connected to at least one memory.
  • the memory stores instructions executable by the processing chip.
  • the instructions are executed by the processing chip so that the processing chip can Perform the unlocking method of the aforementioned access control system.
  • An embodiment of the present application also provides a main control device including the above-mentioned processing chip.
  • the master control device determines whether to allow unlocking. Since the master control device in this case is equivalent to an edge node in a complex network structure, compared to the cloud server as the network center ( In the prior art, the cloud server determines whether to allow unlocking), which is more difficult to be illegally invaded, so the security of the access control system can be improved.
  • the cloud server is also used to send an early warning signal to the main control device when a preset event is monitored; the main control device is also used to enter a preset control when the early warning signal is received mode.
  • the cloud server can actively monitor the preset event, and notify the master control device when the preset event occurs, so that the master control device enters the preset control mode, which can meet the needs of more practical application scenarios.
  • the cloud server includes a plurality of distributed sites; each of the distributed sites is used to send the early warning signal to the main control device when the preset event is monitored; the main control device It is used to enter a preset control mode when receiving the early warning signal sent by each of the distributed stations.
  • the cloud server has a distributed structure, and the main control device enters the preset control mode only after receiving early warning signals from multiple distributed sites at the same time, which is more reliable.
  • the smart terminal includes an administrator terminal and an ordinary user terminal; the ordinary user terminal is used to send an emergency unlock request to the administrator terminal when a preset emergency event occurs; wherein, in the emergency When an event occurs, the ordinary user terminal does not have the unlocking authority; the administrator terminal is used to authenticate the emergency unlock request, and send the authenticated emergency unlock request to the master control device; After receiving the authenticated emergency unlock request, the main control device controls the door lock device to unlock.
  • an ordinary user terminal that does not have the unlocking authority can implement emergency unlocking by sending an emergency unlocking request to the administrator terminal; this can meet the needs of more practical application scenarios.
  • the access control system further includes an auxiliary positioning device connected to the smart terminal; the smart terminal is also used to obtain the positioning information of the smart terminal through the auxiliary positioning device when in the first mode,
  • the unlock request includes the positioning information.
  • the positioning information can be combined to determine whether to allow unlocking, which can meet the requirements of more practical application scenarios.
  • the access control system further includes a storage device connected to the master control device; the master control device is further configured to generate an unlock record of the unlock request after determining whether unlocking is permitted according to the unlock request, and The unlocking record is stored in the storage device; wherein the unlocking record at least includes: the user who sent the unlocking request identified by the master control device according to the unlocking request, and whether the unlocking is successful.
  • the process of each unlock request can be recorded.
  • the door lock device is installed in a movable device.
  • the movable device is illegally stolen, because it cannot be connected to the main control device, the thief cannot unlock it through software intrusion, which improves the security to a certain extent.
  • the smart terminal is also configured to send the unlock request to the master control device based on the short-range wireless transmission technology when in the second mode.
  • This embodiment provides another way for the smart terminal to send the unlock request to the master control device.
  • the unlocking method of the access control system before the generating the unlocking record of the unlocking request and uploading the unlocking record to the storage device for storage, it further includes: determining that the master control device is based on the The access control permission corresponding to the user obtained by the unlock request does not include the anonymous permission.
  • the unlocking request of a user with anonymous permission is not recorded; this embodiment enriches the types of access control permissions of the user, and can meet the requirements of more practical application scenarios.
  • Figure 1 is a schematic diagram of an access control system according to a first embodiment of the present application
  • Fig. 2 is another schematic diagram of the access control system according to the first embodiment of the present application.
  • Figure 3 is a schematic diagram of an access control system according to a third embodiment of the present application.
  • Figure 4 is a schematic diagram of an access control system according to a fourth embodiment of the present application.
  • Fig. 5 is a schematic diagram of an access control system according to a fifth embodiment of the present application.
  • Fig. 6 is a flowchart of an unlocking method of an access control system according to a sixth embodiment of the present application.
  • FIG. 7 is a specific flowchart of the step of judging whether to allow unlocking according to the unlocking request in the sixth embodiment of the present application.
  • FIG. 8 is a flowchart of an unlocking method of an access control system according to a seventh embodiment of the present application.
  • FIG. 9 is a specific flowchart of the step of determining whether to allow unlocking according to the unlocking request in the eighth embodiment of the present application.
  • FIG. 10 is a flowchart of an unlocking method of an access control system according to a ninth embodiment of the present application.
  • FIG. 11 is a schematic diagram of the connection between the processing chip and the memory according to the tenth embodiment of the present application.
  • the first embodiment of the present application relates to an access control system.
  • the access control system includes: a main control device 10, a door lock device 11, a cloud server 12, and at least one smart terminal 13; the main control device 10 is connected to the cloud server 12 and the door lock device 11, the smart terminal 13 is connected to the cloud server 12; the smart terminal 13 is used to send an unlock request to the main control device 10 through the cloud server 12 when in the first mode; the main control device 10 is used to When unlocking is requested, it is determined whether unlocking is permitted according to the unlocking request, and when it is determined that unlocking is permitted, the door lock device 11 is controlled to unlock.
  • only one smart terminal 13 is shown in FIG. 1, but it is not limited thereto.
  • the main control device 10 in this embodiment may be a small workstation, or may be an intelligent device such as a personal computer.
  • the door lock device 11 may include a microcontroller, a mechanical lock, and a driving mechanism; the main control device 10 controls the door lock device 11 to unlock, specifically, the main control device 10 sends an unlock command to the microcontroller of the door lock device 11.
  • the controller receives the unlocking command, the mechanical lock is driven to open by the driving mechanism to realize the unlocking.
  • the cloud server 12 there may be multiple communication modes between the cloud server 12 and the main control device 10, such as but not limited to the following two: wide area network WAN and narrowband Internet of Things NB-IOT.
  • the communication method between the smart terminal 13 and the main control device can also be multiple.
  • it can also be based on short-range wireless transmission technology.
  • Two short-range wireless transmission methods are shown in Figure 2. Bluetooth and wireless local area network WIFI; however, it is not limited to this, and other types of short-distance wireless transmission technologies such as infrared technology, microwave technology, etc. can be applied in this embodiment.
  • the smart terminal 13 may have a variety of different modes. In different modes, different communication paths are selected to send the unlock request to the main control device. In this embodiment, the smart terminal 13 may be in the first mode or the second mode.
  • the smart terminal 13 When the smart terminal 13 is in the first mode, it sends an unlocking request to the cloud server 12 to send the unlocking request to the main control device 10 through the cloud server 12.
  • the cloud server 12 receives the unlocking request, it can choose any path of WAN or NB-IOT to send the unlocking request to the door lock device 11. In this way, when one of the paths is congested or cannot be connected, the other path can be selected to send the unlocking Request; so as to avoid affecting normal unlocking when one of the transmission paths is blocked or interrupted.
  • the smart terminal 13 When the smart terminal 13 is in the second mode, it can send an unlock request to the main control device 10 based on the short-range wireless transmission technology; an independent WIFI device 14 (such as a router) is set in the WIFI path shown in FIG. To broaden the coverage of WIFI; however, it is not limited to this.
  • an independent WIFI device 14 such as a router
  • the door lock device 11 in this embodiment can be applied to various scenarios.
  • the door lock device 11 can be installed at the gates of public places such as movie theaters, factory warehouses, subways, etc.; or, it can also be installed on personal items such as safes. .
  • a movable device such as a safe
  • the door lock device 11 is installed on a movable device such as a safe
  • the movable device is stolen by criminals, it must be unlocked based on the master control device, and the movable device is stolen because it is far away from the master control device.
  • the device cannot be connected with the main control device signal, so criminals cannot illegally unlock the mobile device by using software intrusion, which improves the security to a certain extent (in the prior art, when the short-range wireless communication technology is used to When the mobile device sends an unlock request, the microcontroller in the door lock device determines whether unlocking is allowed. Therefore, after the mobile device is not stolen, the microcontroller in the door lock device can be illegally unlocked by software intrusion) .
  • the main control device 10 is configured to determine whether unlocking is permitted according to the unlocking request when receiving the unlocking request, and when it is determined that the unlocking is permitted, control the door lock device 11 to unlock.
  • the master control device 10 may identify characteristic information according to the unlock request, and the characteristic information may include the identity information of the user who sent the unlock request; the master control device 10 obtains the access control authority corresponding to the user and at least determines whether it is allowed or not according to the obtained access control authority Unlock.
  • the master control device 10 may store the corresponding relationship between the user and the access control authority, and the master control device 10 obtains the corresponding access control authority of the user who sent the unlock request according to the corresponding relationship between the user and the access control authority.
  • the user’s identity information can be, for example, the user’s account information as the only indicator of the user’s identity; the access control authority can be unlocking authority or no unlocking authority.
  • the master device It is determined that unlocking is allowed and the door lock device is controlled to unlock; when the user's corresponding access control authority is no unlocking authority, the master control device determines that unlocking is not allowed.
  • the characteristic information may include an unlocking password.
  • the master control device 10 recognizes the unlocking password from the unlocking request, and determines whether the unlocking password is consistent with a preset standard password, and if it is consistent, it determines that unlocking is allowed.
  • the characteristic information may include the user's identity information and the unlocking password
  • the master control device determines whether the unlocking password is consistent with the preset standard password when determining that the user's corresponding access control authority has unlocking authority; if If they are consistent, unlocking is allowed; otherwise, unlocking is not allowed.
  • this embodiment does not impose any restriction on the specific manner in which the master control device 10 determines whether to allow unlocking according to the unlocking request, and the above is only an example for description.
  • the master control device determines whether unlocking is allowed, that is, the master control device 10 stores the core data for unlocking determination.
  • the core data is the corresponding relationship between the user and the access control authority in the above example, the standard password, and the specific Unlocking judgment methods, etc.; in the prior art, cloud servers store these core data. Since the main control device in this case is equivalent to the edge node in the complex network structure, compared to the cloud server as the central node of the network, the edge node is more difficult to be illegally invaded, that is, the core data is safe in the edge node. The performance is higher, so this embodiment can improve the security of the access control system; in addition, the main control device as the edge node has to process relatively few services, and its processing speed will be relatively faster.
  • the permission type of the access control permission may include, but is not limited to, one or any combination of the following types: restricted location, restricted time, restricted access direction, and so on.
  • restricted location means that it has the unlocking authority only in a preset area; for example, the master control device 10 can be set to only allow the unlocking request of the smart terminal 13 to be received based on the short-range wireless technology, that is, the smart terminal 13 can only be unlocked in the vicinity The unlock request can only be sent within the distance (the coverage of short-range wireless technology).
  • Time restriction means that the unlocking authority is only available within a preset time period; for example, the master control device 10 can be set to the preset time period, and the master control device 10 records the receiving time of the unlock request or the characteristic information of the unlock request Contains the sending time of the unlocking request recorded by the smart terminal 13. If the receiving time or the sending time is within a preset time period, unlocking is allowed.
  • Restricted direction of passage means that only users are allowed to enter or leave. For an access control system that can pass in both directions, if there are two gate channels, corresponding to two directions of passage; after the user sends an unlock request, the master device will only unlock The gate in the direction that allows the user to pass.
  • the access control system of this embodiment also supports offline unlocking such as NFC, fingerprint password, or digital password. That is, the door lock device can be equipped with NFC module, fingerprint recognition module, and input module as needed. And so on, so as to achieve offline unlocking.
  • the second embodiment of the present application relates to an access control system.
  • the second embodiment is roughly the same as the first embodiment. The difference is that, in the second embodiment, please refer to FIG. 1 or FIG. Set up an event to notify the master control device to take action when a preset event occurs.
  • the cloud server 12 may send an early warning signal to the main control device 10 when it detects that a preset event occurs, and the main control device 10 is also configured to enter the preset control mode when receiving the early warning signal.
  • the cloud server 12 can monitor preset events through the network.
  • the preset events can be some high-risk events, such as floods, earthquakes, celestial body impacts, fires and other major disasters;
  • the preset control mode can be but not limited to the following methods: directly control the door
  • the lock device is unlocked, or unconditionally unlocked; among them, unconditional unlock means that as long as the unlock request sent by the smart terminal 13 is received, the door lock device 11 is controlled to unlock.
  • the main control device 10 can also detect whether there is someone inside the door lock device 11, and if there is someone, control the door lock device 11 to unlock, wherein the main control device 10 can be pre-installed on the door lock
  • Multiple sensors on the inner side of the device 11 are used to detect whether there are people inside the door lock device 11; the inner side of the door lock device 11 can be understood as, for example, the door lock device 11 is installed on the gate of a warehouse, and the inner side of the door lock device 11 refers to The internal space of the warehouse.
  • relevant departments may publish flood disaster information on certain network platforms, or network users may promptly notify other netizens on certain network platforms; the cloud server 12 can be preset to Information channels such as a network platform are monitored. When relevant information about a preset event is monitored, an early warning signal is sent to the main control device 10.
  • the door lock device 11 is installed on the gate of a warehouse, and various sensors are installed in a preset area around the warehouse to detect the surrounding environment.
  • Various sensors include, for example, temperature detectors, smoke detectors, etc.; When a fire occurs in the area, various sensors will send out abnormal signals; when the cloud server 12 detects these abnormal signals, it determines that a preset event has occurred, and sends an early warning signal to the main control device 10.
  • the cloud server can actively monitor the preset event, and notify the master control device when the preset event occurs, so that the master control device enters the preset control mode, which can meet the needs of more practical application scenarios.
  • the cloud server 12 includes a plurality of distributed sites; each distributed site is used to send an early warning signal to the main control device 10 when a preset event is detected.
  • the main control device 10 is configured to enter a preset control mode when receiving an early warning signal sent by each distributed station. That is, the cloud server 12 is a distributed structure, and the master control device 10 enters the preset control mode only when it receives early warning signals from multiple distributed sites at the same time, so as to avoid monitoring errors of individual distributed sites and causing misjudgments as much as possible , Higher reliability.
  • the third embodiment of the present application relates to an access control system.
  • the third embodiment is roughly the same as the first embodiment.
  • the smart terminal 13 may include an administrator terminal 13-1 and a common user terminal. 13-2.
  • the number of administrator terminals 13-1 and ordinary user terminals 13-2 in Fig. 3 is only an example, and is not limited thereto. If the ordinary user terminal 13-2 does not have the unlocking authority when an emergency event occurs, the ordinary user terminal 13-2 can send an emergency unlock request to the administrator terminal 13-1; the administrator terminal 13-1 is used to request the emergency unlock The authentication is performed and the authenticated emergency unlocking request is sent to the main control device 10; the main control device 10 controls the door lock device 11 to unlock after receiving the authenticated emergency unlocking request. Among them, FIG.
  • the unlocking request can also be sent to the main control device 10 through the cloud server 12 or based on the short-range wireless transmission technology.
  • the access control authority corresponding to the normal user terminal 13-2 and the administrator terminal 13-1 are different.
  • the administrator terminal 13-1 has a higher access control authority, that is, the master control device 10 can be set to allow unlocking as long as it receives an emergency unlock request authenticated by the administrator terminal 13-1.
  • the ordinary user terminal 13-2 does not have the unlocking authority of the door lock device, or the access authority of the ordinary user terminal 13-2 includes restricted types such as location restriction or time restriction, which causes the ordinary user terminal 13 -2 does not have unlock permission. Therefore, when an ordinary user terminal 13-2 finds that an emergency event occurs, it needs to request unlocking from the master device 10 through the administrator terminal 13-1.
  • the door lock device 11 is installed on the gate of a warehouse, the access control account used by the warehouse administrator corresponds to the administrator terminal 13-1, and the access control account used by the warehouse cargo handler corresponds to the ordinary user terminal 13-2;
  • the access control authority of personnel includes the type of time restriction, and the unlocking authority is only available during working hours (for example, the time period from 8 am to 4 pm).
  • the emergency event is for example someone calling for help in the warehouse.
  • the warehouse cargo handler can send an emergency unlock request to the normal user terminal 13-2.
  • the warehouse administrator’s administrator terminal 13-1 and the warehouse administrator’s administrator terminal 13-1 authenticate the emergency unlock request, it sends the certified emergency unlock request to the master control device 10, and the master device 10 receives it After the authenticated emergency unlock request, the door lock device 11 is controlled to unlock.
  • the administrator terminal 13-1 when the administrator terminal 13-1 receives the emergency unlock request, it can automatically authenticate and send the certified emergency unlock request to the main control device 10; or it can remind the warehouse administrator to perform manual authentication and send the certified emergency unlock request.
  • the unlock request is sent to the master control device 10.
  • the third embodiment may also be an improvement on the basis of the second embodiment.
  • the fourth embodiment of the present application relates to an access control system.
  • the fourth embodiment is substantially the same as the first embodiment.
  • the access control system further includes a smart terminal 13
  • the auxiliary positioning device 15; the smart terminal 13 is also used to obtain the positioning information of the smart terminal 13 through the auxiliary positioning device 15 when in the first mode, and the unlock request includes the positioning information.
  • the auxiliary positioning device 15 is, for example, but not limited to satellites, and the smart terminal 13 can, but is not limited to, perform GPS positioning to obtain positioning information; all types of auxiliary positioning devices 15 that enable the smart terminal 13 to obtain positioning information belong to the protection of this embodiment. range.
  • the smart terminal 13 When the smart terminal 13 is in the first mode, it sends an unlock request to the main control device 10 through the cloud server 12, which can realize remote unlocking; however, for some users, the access control authority is set and the location is restricted;
  • the positioning device 15 obtains the user's positioning information, and integrates the positioning information into the unlock request and sends it to the master control device; thus, the master control device 10 can make an unlock permission judgment for these location-restricted users based on the unlock request sent by the cloud server 12.
  • the fourth embodiment may also be an improvement on the basis of the third embodiment.
  • the fifth embodiment of the present application relates to an access control system.
  • the fifth embodiment is substantially the same as the fourth embodiment.
  • the access control system further includes The storage device 16 of 10; the master control device 10 is also used to generate an unlock record of the unlock request after judging whether unlocking is permitted according to the unlock request, and store the unlock record in the storage device 16; wherein the unlock record includes at least: master control device 10 The identity information of the user who sent the unlock request identified according to the unlock request, and whether the unlock was successful.
  • whether the unlocking is successful in the unlocking record may be: the result determined by the master control device 15 according to the access control authority, that is, whether unlocking is permitted or not allowed; wherein, when the master control device 10 determines that unlocking is permitted and controls the door After the lock device 11 is unlocked, the door lock device 11 may also send feedback information indicating successful unlocking to the main control device 10, and when the main control device 10 receives the feedback information indicating successful unlocking, it determines that the unlocking is successful.
  • the unlock record in this embodiment may also include the time when the master control device receives the unlock request, the time when the door lock device is controlled to unlock (if unlocking is allowed), etc., which can be set as required.
  • the permission type of the access permission can also include anonymous permission; the master control device 10 first identifies whether the user’s access permission includes anonymous permission, if the user’s access permission includes anonymous permission, then no unlock record will be generated; if the user’s If the access control authority does not include the anonymous authority, an unlock record is generated. That is, for some users with anonymous permissions, the master control device 10 will not record the process of their unlock request.
  • the types of user access control permissions are further enriched, which can meet the requirements of more practical application scenarios.
  • the sixth embodiment of the present application relates to an unlocking method of an access control system, which is applied to the main control device in the access control system.
  • the access control system also includes a cloud server, a door lock device and at least one smart terminal ;
  • the smart terminal is used to send an unlock request to the main control device through the cloud server when in the first mode.
  • FIG. 6 shows a flowchart of the unlocking method of the access control system in this embodiment, and the details are as follows.
  • Step 101 Judge whether an unlock request is received; if yes, go to step 102; if not, repeat step 101.
  • Step 102 Determine whether to allow unlocking according to the unlock request; if yes, go to step 103; if not, end.
  • Step 103 Control the door lock device to unlock.
  • step 102 specifically includes the following sub-steps:
  • Sub-step 1021 identifying characteristic information according to the unlock request; wherein the characteristic information includes at least the identity information of the user who sent the unlock request.
  • Sub-step 1022 Obtain the access control authority corresponding to the user.
  • sub-step 1023 it is judged whether unlocking is allowed at least according to the acquired access control authority.
  • the master control device determines whether unlocking is allowed. Therefore, the master control device stores the core data used for unlocking determination.
  • the cloud server stores these core data (in the prior art, the cloud server Determine whether to allow unlocking); since the master control device in this case is equivalent to the edge node in the complex network structure, compared to the cloud server as the central node of the network, the edge node is more difficult to be illegally invaded, that is, the core data
  • the security in the edge node is higher, so this embodiment can improve the security of the access control system; in addition, the main control device as the edge node has to process relatively few services, and its processing speed will be relatively faster.
  • this embodiment is a method example corresponding to the first embodiment, and this embodiment can be implemented in cooperation with the first embodiment.
  • the related technical details mentioned in the first embodiment are still valid in this embodiment, and in order to reduce repetition, they will not be repeated here.
  • the related technical details mentioned in this embodiment can also be applied in the first embodiment.
  • the seventh embodiment of the present application relates to an unlocking method of an access control system.
  • the seventh embodiment is roughly the same as the sixth embodiment, except that the master control device can receive the early warning signal sent by the cloud server when a preset event occurs. And take measures.
  • FIG. 8 is a flowchart of the unlocking method of the access control system according to the seventh embodiment of this application, including:
  • Step 201 determine whether an unlock request is received; if yes, go to step 202; if not, repeat step 201.
  • Step 202 judge whether to allow unlocking according to the unlock request; if yes, go to step 203; if not, go to 204.
  • Step 203 Control the door lock device to unlock.
  • step 204 it is determined whether an early warning signal sent by the cloud server when a preset event is detected is received; if yes, go to step 205; if not, step 204 is repeated.
  • Step 205 Enter a preset control mode.
  • step 201 to step 203 are substantially the same as step 101 to step 103 in the sixth embodiment, and will not be repeated here. The difference is that step 204 to step 205 are also included. It should be noted that steps 201 to step 203 are used to achieve access control unlocking, and steps 204 to step 205 are used to achieve access control when a preset event occurs. The order of execution of the two is not limited, that is, to achieve access control unlocking and to achieve preset event occurrence The access control at the time can be executed concurrently, which is only schematically illustrated in Figure 8.
  • the cloud server can actively monitor the preset event, and notify the master control device when the preset event occurs, so that the master control device enters the preset control mode; that is, the master control device can use when the preset event occurs
  • Pre-set access control can meet the needs of more practical application scenarios.
  • the cloud server includes multiple distributed sites, and each distributed site is used to send an early warning signal to the main control device when a preset event is detected.
  • the main control device enters the preset control mode when receiving the early warning signal sent by each distributed station; thus, it can avoid the misjudgment caused by the monitoring error of individual distributed stations as much as possible, and the reliability is higher.
  • This embodiment is a method example corresponding to the second embodiment, and this embodiment can be implemented in cooperation with the second embodiment.
  • the related technical details mentioned in the second embodiment are still valid in this embodiment, and in order to reduce repetition, they will not be repeated here.
  • the related technical details mentioned in this embodiment can also be applied in the second embodiment.
  • the eighth embodiment of the present application relates to an unlocking method of an access control system.
  • the eighth embodiment is roughly the same as the sixth embodiment, except that for users whose access control authority is set to restricted locations, the user's location information can be combined To determine whether to allow unlocking.
  • the unlocking method of the access control system in the eighth embodiment of the present application is different from that in the sixth embodiment in that the sub-steps included in step 102 are different. As shown in FIG. A detailed flow chart of one step.
  • Sub-step 3021 identifying characteristic information according to the unlock request; wherein the characteristic information includes at least the identity information of the user who sent the unlock request;
  • Sub-step 3022 obtain the access control authority corresponding to the user
  • Sub-step 3023 identify the receiving method of the unlock request; if the receiving method is through the cloud server, enter the sub-step 3024; if it is received based on the near field communication technology, enter the sub-step 3027;
  • the specific way of identifying the receiving way of the unlock request such as but not limited to the following way: the master control device has multiple receiving modules, such as the receiving module matching the communication protocol of the cloud server, and the communication protocol matching the WIFI For the receiving module, the receiving module matching the Bluetooth communication protocol, etc., the master control device can identify the receiving module from which the unlocking request is received, so as to determine the receiving path of the unlocking request. If it is received through a cloud server, it is determined whether the user can remotely unlock based on whether the access control authority includes location restriction, that is, sub-step 3024 is entered.
  • the master control device has multiple receiving modules, such as the receiving module matching the communication protocol of the cloud server, and the communication protocol matching the WIFI
  • the master control device can identify the receiving module from which the unlocking request is received, so as to determine the receiving path of the unlocking request. If it is received through a cloud server, it is determined whether the user can remotely unlock based on whether the access control authority includes location restriction, that is, sub-step 3024 is entered.
  • short-range wireless communication technology such as WIFI or Bluetooth
  • WIFI short-range wireless communication technology
  • Bluetooth because the short-range wireless communication technology itself requires the user to receive the unlock request within the range that the short-range wireless communication can cover, so if it is based on the short-range wireless communication If the technology is received, the user must be within the range covered by short-range wireless communication.
  • Sub-step 3024 judging whether the access control authority includes location restriction and whether the feature information includes the user's location information; if the access control authority includes location restriction, and the feature information includes the user's location information, proceed to sub-step 3025; if the access control authority includes location access If the access control authority does not include location restriction, then proceed to sub-step 3027.
  • Sub-step 3025 judging whether to allow unlocking according to the user's location information and preset location restriction conditions; wherein, the user's location information is obtained by the smart terminal through the auxiliary positioning device;
  • Sub-step 3026 unlocking is not allowed.
  • sub-step 3027 it is determined whether unlocking is allowed according to the access control authority.
  • steps 3021 to 3022 are substantially the same as steps 1021 to 1022 in the sixth embodiment, and will not be repeated here, and the difference lies in sub-step 3023 to sub-step 3027.
  • the access control authority includes location restriction, it means that the user cannot remotely unlock; if the unlock request does not include the user's location information, then unlocking is not allowed; if the unlock request contains the user's location information, then the location is determined Whether the information meets the location restriction condition, the location restriction condition is, for example, a preset area, and if the user is located in the preset area, it is determined that unlocking is allowed.
  • This embodiment is a method example corresponding to the fourth embodiment, and this embodiment can be implemented in cooperation with the fourth embodiment.
  • the related technical details mentioned in the fourth embodiment are still valid in this embodiment, and in order to reduce repetition, they will not be repeated here.
  • the related technical details mentioned in this embodiment can also be applied in the fourth embodiment.
  • this embodiment may also be an improvement on the basis of the seventh embodiment.
  • the ninth embodiment of the present application relates to an unlocking method of an access control system.
  • the ninth embodiment is substantially the same as the sixth embodiment.
  • the difference is that the master control device 10 can also generate an unlock record of an unlock request, and store the unlock record To storage device 16.
  • FIG. 10 is a flowchart of an example of an unlocking method of an access control system according to the ninth embodiment of the present application, which is specifically as follows.
  • Step 401 determine whether an unlock request is received; if yes, go to step 402; if not, repeat step 401.
  • Step 402 judge whether to allow unlocking according to the unlock request; if yes, go to step 403; if not, end.
  • Step 403 Control the door lock device to unlock.
  • Step 404 Determine whether the access control permissions corresponding to the user acquired by the master control device according to the unlock request include anonymous permissions; if not, proceed to step 405; if yes, end.
  • Step 405 Generate an unlock record of the unlock request, and store the unlock record in the storage device.
  • the unlock record includes at least the identity information of the user who sent the unlock request identified by the master control device according to the unlock request, and whether the unlock is successful.
  • step 401 to step 403 are substantially the same as step 101 to step 103 in the sixth embodiment, and will not be repeated here; the difference is that step 404 and step 405 are also included.
  • the type of access permission includes the option of anonymous permission. Therefore, it is necessary to determine whether the user’s access permission includes anonymous permission before determining whether to generate the unlock record of the user; in other examples, if the access permission is If the type does not include the option of anonymous permission, then there is no need to perform step 404, that is, a corresponding unlock record is generated for each unlock request received.
  • the execution order of step 403, step 404, and step 405 in this embodiment is not limited, and can be executed according to needs or actual conditions.
  • the ninth embodiment may also be an improvement on the basis of the seventh or eighth embodiment.
  • This embodiment is a method example corresponding to the fifth embodiment, and this embodiment can be implemented in cooperation with the fifth embodiment.
  • the related technical details mentioned in the fifth embodiment are still valid in this embodiment, and in order to reduce repetition, they will not be repeated here.
  • the related technical details mentioned in this embodiment can also be applied in the fifth embodiment.
  • the tenth embodiment of the present application relates to a processing chip.
  • the processing chip 110 is connected to at least one memory 111.
  • the memory 111 stores instructions that can be executed by the processing chip 110, and the instructions are executed by the processing chip 110 to make
  • the processing chip 110 can execute the above method embodiments.
  • the eleventh embodiment of the present application relates to a main control device including the above-mentioned processing chip.

Abstract

L'invention concerne une puce de traitement, un dispositif de commande maître, ainsi qu'un système de contrôle d'accès et son procédé de déverrouillage. Le système de contrôle d'accès comprend : un dispositif de commande maître (10), un dispositif de verrouillage de porte (11), un serveur en nuage (12), et au moins un terminal intelligent (13). Le dispositif de commande maître (10) est connecté au serveur en nuage (12) et au dispositif de verrouillage de porte (11) ; le terminal intelligent (13) est connecté au serveur en nuage (12) ; dans un premier mode, le terminal intelligent (13) est configuré pour envoyer une demande de déverrouillage au dispositif maître (10) au moyen du serveur en nuage (12) ; le dispositif de commande maître (10) est configuré pour déterminer, lors de la réception de la demande de déverrouillage, si le déverrouillage est autorisé en fonction de la demande de déverrouillage, et s'il est déterminé que le déverrouillage est autorisé, pour commander le déverrouillage du dispositif de verrouillage de porte (11). Le système de contrôle d'accès peut améliorer la sécurité du système de contrôle d'accès.
PCT/CN2019/075210 2019-02-15 2019-02-15 Puce de traitement, dispositif de commande maître, et système de contrôle d'accès et son procédé de déverrouillage WO2020164104A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2019/075210 WO2020164104A1 (fr) 2019-02-15 2019-02-15 Puce de traitement, dispositif de commande maître, et système de contrôle d'accès et son procédé de déverrouillage
CN201980000381.4A CN109983514A (zh) 2019-02-15 2019-02-15 处理芯片、主控设备、门禁系统及其解锁方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/075210 WO2020164104A1 (fr) 2019-02-15 2019-02-15 Puce de traitement, dispositif de commande maître, et système de contrôle d'accès et son procédé de déverrouillage

Publications (1)

Publication Number Publication Date
WO2020164104A1 true WO2020164104A1 (fr) 2020-08-20

Family

ID=67073977

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/075210 WO2020164104A1 (fr) 2019-02-15 2019-02-15 Puce de traitement, dispositif de commande maître, et système de contrôle d'accès et son procédé de déverrouillage

Country Status (2)

Country Link
CN (1) CN109983514A (fr)
WO (1) WO2020164104A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112991602B (zh) * 2019-12-18 2023-05-26 杭州海康威视数字技术股份有限公司 一种双向门禁控制系统及其控制方法
CN114482720B (zh) * 2021-12-16 2023-04-28 德施曼机电(中国)有限公司 一种门锁控制方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106327648A (zh) * 2016-08-31 2017-01-11 北京厚文知识产权顾问有限公司 具有远程控制功能的社区门禁锁具系统
CN106447850A (zh) * 2016-08-31 2017-02-22 长城汽车股份有限公司 控制方法、移动终端、服务器及控制系统
CN107492173A (zh) * 2017-08-15 2017-12-19 青岛易方德物联科技有限公司 一种云密码门禁控制系统及方法
US20180108192A1 (en) * 2014-12-23 2018-04-19 Gate Labs Inc. Access management system
CN108547514A (zh) * 2018-04-13 2018-09-18 珠海格力电器股份有限公司 一种智能门锁的开启方法及装置

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104346845A (zh) * 2013-07-23 2015-02-11 青岛驿路同行国际旅行社有限公司 门禁控制系统、方法及装置
CN103871135B (zh) * 2014-03-07 2017-01-18 深圳市同创新佳科技有限公司 一种电子门锁的无线控制方法和系统
CN104050398B (zh) * 2014-06-17 2017-01-18 飞天诚信科技股份有限公司 一种多功能加密锁及其工作方法
FR3039687A1 (fr) * 2015-07-29 2017-02-03 Docapost Iot Procede de commande d’ouverture d’une serrure par code a usage unique
CN105261104B (zh) * 2015-11-24 2017-10-10 重庆理工大学 基于智能终端的蓝牙门锁系统及其控制方法
CN205388488U (zh) * 2016-03-07 2016-07-20 大唐淮南洛河发电厂 基于嵌入式双服务器的火电厂旋转机械状态监测系统
CN207110723U (zh) * 2017-06-21 2018-03-16 广东德瑞智能科技有限公司 一种可远程通信移动终端的锁具
CN107945328B (zh) * 2017-11-20 2020-08-04 深圳市创维群欣安防科技股份有限公司 一种办公智能锁控制系统及方法
CN109255868A (zh) * 2018-08-27 2019-01-22 青岛海信智慧家居系统股份有限公司 远程开锁方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180108192A1 (en) * 2014-12-23 2018-04-19 Gate Labs Inc. Access management system
CN106327648A (zh) * 2016-08-31 2017-01-11 北京厚文知识产权顾问有限公司 具有远程控制功能的社区门禁锁具系统
CN106447850A (zh) * 2016-08-31 2017-02-22 长城汽车股份有限公司 控制方法、移动终端、服务器及控制系统
CN107492173A (zh) * 2017-08-15 2017-12-19 青岛易方德物联科技有限公司 一种云密码门禁控制系统及方法
CN108547514A (zh) * 2018-04-13 2018-09-18 珠海格力电器股份有限公司 一种智能门锁的开启方法及装置

Also Published As

Publication number Publication date
CN109983514A (zh) 2019-07-05

Similar Documents

Publication Publication Date Title
US7400891B2 (en) Methods, systems and computer program products for remotely controlling wireless terminals
US20170109950A1 (en) Methods and systems configured to detect and guarantee identity for the purpose of data protection and access control
US9280890B2 (en) Security system access detection
US8305211B1 (en) Method and apparatus for surveillance system peering
US20120188054A1 (en) Remote security entrance application
US11155239B2 (en) Method and system for managing access of vehicle compartment
EP2933783B1 (fr) Système et procédé pour accéder l'accès à un système de sécurité pour des utilisateurs temporaires à l'aide d'une application mobile
JP5234760B2 (ja) 入退室管理システム、災害発生時避難支援方法、災害発生時避難支援プログラムおよびプロブラム記録媒体
KR20150126423A (ko) 자가-프로비저닝 접근 제어
JP2020521227A (ja) 監視及びコンシェルジェサービスのためのスケーラブルなシステム及び方法
US9437061B2 (en) Arrangement for the authorised access of at least one structural element located in a building
US11689929B2 (en) Controlling access to enterprise centers using a dynamic enterprise control system
US20190325677A1 (en) Home security system with automatic authorization functionality
KR20180060901A (ko) 잠금 장치 제어 방법
KR20180045761A (ko) 옥상문 개폐 시스템 및 그 운용 방법
KR101765080B1 (ko) IoT 기반의 스마트 도어락 시스템 및 그 방법
WO2020164104A1 (fr) Puce de traitement, dispositif de commande maître, et système de contrôle d'accès et son procédé de déverrouillage
KR101431627B1 (ko) 스마트 기기를 이용한 가정보안방법
US20220014388A1 (en) Virtual security guard
KR101595897B1 (ko) 디지털 도어록 및 그 제어방법, 이를 수행하기 위한 기록매체
KR101742155B1 (ko) 잠금 장치 제어 방법
KR101063751B1 (ko) 생체인식 기반 출입자 확인, 정보 전송 시스템
JP5258251B2 (ja) 警備装置
KR100863181B1 (ko) 인터넷을 이용한 보안 서비스 제공 방법
JP2019028580A (ja) 監視システム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19914760

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19914760

Country of ref document: EP

Kind code of ref document: A1