Network access identification system and method
Technical field
The present invention relates to safety-security area, particularly relate to personal identification method and the device of a kind of gate inhibition.
Background technology
Conventional door access control system is generally made up of identity recognizer, access controller, lockaid gun and management software, operation principle
It is visitor's identity (such as IC/ID card, fingerprint, face etc.) of showing oneself, the identity that it is shown by gate control system
Carrying out identification and authority confirms, after identification is passed through, gate control system opens corresponding gate inhibition.Along with the development of technology,
Derive: non-contact RF ID card (IC/ID card) gate control system, fingerprint identification entrance guard system, face recognition gate control system etc..
These systems have a common feature, i.e. identity recognition device to be all based on entity (such as rfid card, human body)
Feature identification, is required for being arranged on the outside of gate inhibition, in order to the in-plant operating of contacts of user, for some outdoor utility fields
Scape, this kind equipment generally will possess high temperature resistant, high humidity, the characteristic such as waterproof, and product cost is higher.
It addition, rfid card gate control system needs to provide substantial amounts of rfid card, the construction cost of system is higher;Fingerprint is known
Not, the bio-identification gate control system cost such as face recognition of a relatively high, when user uses, need to carry out closely with access control equipment
Operating of contacts, it is impossible to realize distance sensing opening gate, it has not been convenient to user use.
Summary of the invention
For the problems referred to above overcoming conventional door access control system to exist, the invention provides a kind of network access identification system
System and method.
The present invention the technical scheme is that network access identification system, by web portal
Prohibit identity recognition device and communication terminal composition, network access identity recognition device and communication terminal by LAN or internet
Communicate;
Network access identity recognition device, including:
First communication module 301, is used for connecting network, completes transmission and the reception of information;
First data memory module 302, for storing the log-on message of user, user gate inhibition's identity data;
First processing module 303, is used for processing user's registration, user gate inhibition's identity issues and legitimate verification, place
Reason is opened the door and is asked.
Access permission performs module 404, is used for performing the operation of corresponding access permission;
Communication terminal, including:
Second communication module 401, is used for connecting network, completes transmission and the reception of information;
Second data memory module 402, for storing the log-on message of user, user gate inhibition's identity data;
Interactive module 403, actively initiates registration request, initiation enabling request and the user during this mutual for user
Operation;
Second processing module 404, has been used for user registration course, execution enabling request and user gate inhibition's identity and has tested
Card.
Described communication terminal is PC, flat board or mobile phone.
Network access personal identification method, comprises the following steps:
Step S101, communication terminal initiates user's registration, after registering through, web portal to network access identity recognition device
Prohibit identity recognition device and can issue user gate inhibition's identity to communication terminal;
Step S102, communication terminal initiates, to network access identity recognition device, the request of opening the door;
Step S103, network access identity recognition device receives enabling request, and clamshell doors request carries out user gate inhibition's body
Part mark legitimate verification, user gate inhibition's identity is verified, and performs the operation of corresponding access permission.
In described step S101, user registration course is identity registration based on user's real information, user's real information
Include but not limited to one or more combinations in telephone number, job number, identification card number, dwelling units room number.
Described user gate inhibition's identity is specific access permission, this gate inhibition in correspond to network access identity recognition device
Authority can be on or close gate inhibition, play sound, open camera or open appointment light.
In described step S102, request of opening the door comprises user gate inhibition's identity.
In described step S103, if the enabling that described network access identity recognition device receives comprises user's door in asking
Prohibit identity and the most directly carry out the legitimate verification of user gate inhibition's identity;If described request of opening the door does not comprises user
Gate inhibition's identification information, then network access identity recognition device needs to initiate user gate inhibition's identity to described communication terminal
Checking request, described communication terminal must provide for user gate inhibition's identity checking information to network access identity recognition device,
Network access identity recognition device carries out legitimacy detection to the checking information received.
Inventive network door control identity recognition system is from the point of view of ease of use, and user need not swipe the card or by it
The means such as its biometric identity identification use gate control system, and especially when there being visitor, user can be in office, family or appoint
Where put by communication terminal opening gate, allow user use more convenient;From a cost perspective, because need not install hardware body
Part identifies device, saves great amount of cost;And because not operating at needs user's contact, may be mounted at appointing near door lock
The most square, greatly facilitate project plan.
Accompanying drawing explanation
Fig. 1 is the network access identity recognition device schematic diagram of inventive network door control identity recognition system.
Fig. 2 is the communication terminal schematic diagram of inventive network door control identity recognition system.
Fig. 3 is inventive network gate inhibition's personal identification method flow chart.
Detailed description of the invention
The network access identification system principle of the present invention as depicted in figs. 1 and 2, fills including network access identification
Putting and communication terminal, network access identity recognition device and communication terminal are communicated by LAN or internet.
Network access identity recognition device, for processing the registration of communication terminal and issuing user gate inhibition's identity to logical
Letter terminal;Process the enabling request of communication terminal, perform corresponding according to the result of user gate inhibition's identity legitimate verification
Access permission operates;
Communication terminal, is used for: completes user and registers operation, initiates to open the door according to user gate inhibition's identity of storage and asks
Ask.Same user can carry out opening door operation by multiple communication terminals, it is possible to logs in different use on same communication terminal
Family, carries out the opening door operation of different rights based on different user gate inhibition's identity.It is important to note that network access
Identity recognition device and communication terminal both can be communicated by LAN, it is possible to communicated by internet.
Network access identification system principle is as it is shown in figure 1, include:
First communication module 301, is used for connecting network, completes transmission and the reception of information;
First data memory module 302, for storing the log-on message of user, user gate inhibition's identity data;
First processing module 303, is used for processing user's registration, user gate inhibition's identity issues and legitimate verification, place
Reason is opened the door and is asked.
Access permission performs module 404, is used for performing the operation of corresponding access permission.
Communication terminal principle is as in figure 2 it is shown, include:
Second communication module 401, is used for connecting network, completes transmission and the reception of information;
Second data memory module 402, is used for: the storage log-on message of user, user gate inhibition's identity data;
Interactive module 403, actively initiates registration request, initiation enabling request and the user during this mutual for user
Operation;
Second processing module 404, has been used for user registration course, execution enabling request and user gate inhibition's identity and has tested
Card.
Communication terminal described in this example includes but not limited to possess the PC of networking, flat board, mobile phone etc..
The flow process of network access personal identification method is as it is shown on figure 3, comprise the following steps:
Step S101: communication terminal initiates user's registration, after registering through, web portal to network access identity recognition device
Prohibit identity recognition device and can issue user gate inhibition's identity to communication terminal;
After user registration course terminates, it is true that network access identity recognition device can know that user registers in the present system
Information;
Described user registration course is identity registration based on user's real information, and user's real information includes but not limited to
One or more combinations in telephone number, job number, identification card number, dwelling units room number etc.;Described user gate inhibition's identity
Being that one is logically present, have uniqueness, gate inhibition's identity of different user differs;Described user gate inhibition's identity is deposited
In being network access identity recognition device, unrelated with concrete communication terminal hardware, with the real information logic of user's registration
Relevant;Described user gate inhibition's identity is specific access permission in correspond to network access identity recognition device.This gate inhibition weighs
Limit can be on or close gate inhibition, play sound, opens camera, opens appointment light etc..Communication is only used for the first time
User gate inhibition's identity just be issued to described communication terminal during endpoint registration.
Step S102: communication terminal initiates, to network access identity recognition device, the request of opening the door;
The enabling request that communication terminal is initiated comprises user gate inhibition's identity, when in network access identity recognition device
There is multiple position (such as different units or gateway/passage) when being provided with gate inhibition, communication terminal can be sent out to the position specified
Act the request of enabling.
Step S103: network access identity recognition device receives enabling request, and clamshell doors request carries out user gate inhibition's body
Part mark legitimate verification, user gate inhibition's identity is verified, and performs the operation of corresponding access permission.
If the enabling request that described network access identity recognition device receives comprises user gate inhibition's identity, straight
Tap into the legitimate verification of row user gate inhibition's identity;If described request of opening the door does not comprises user gate inhibition's identity letter
Breath, then network access identity recognition device needs to initiate user gate inhibition's identity checking request to described communication terminal, described
Communication terminal must provide for user gate inhibition's identity checking information to be known to network access identity recognition device, network access identity
Other device carries out legitimacy detection to the checking information received.
The present invention is described by embodiment, and those skilled in the art know, in the spirit without departing from the present invention
In the case of scope, these features and embodiment can be carried out various change or equivalence is replaced.It addition, in the religion of the present invention
Lead down, these features and embodiment can be modified the essence adapting to particular situation and material without departing from the present invention
God and scope.Therefore, the present invention is not limited to the particular embodiment disclosed, fallen with claims hereof
In the range of embodiment broadly fall into protection scope of the present invention.