CN116386187B - Access control method, intelligent access control system, server and storage medium - Google Patents
Access control method, intelligent access control system, server and storage medium Download PDFInfo
- Publication number
- CN116386187B CN116386187B CN202310647456.6A CN202310647456A CN116386187B CN 116386187 B CN116386187 B CN 116386187B CN 202310647456 A CN202310647456 A CN 202310647456A CN 116386187 B CN116386187 B CN 116386187B
- Authority
- CN
- China
- Prior art keywords
- information
- detected
- access control
- fingerprint
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 67
- 230000002159 abnormal effect Effects 0.000 claims description 31
- 238000004891 communication Methods 0.000 claims description 13
- 230000006698 induction Effects 0.000 claims description 12
- 238000004590 computer program Methods 0.000 claims description 5
- 238000010586 diagram Methods 0.000 description 4
- 238000012795 verification Methods 0.000 description 3
- 241000894006 Bacteria Species 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000005764 inhibitory process Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 206010011409 Cross infection Diseases 0.000 description 1
- 206010029803 Nosocomial infection Diseases 0.000 description 1
- 241000700605 Viruses Species 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 230000007723 transport mechanism Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B3/00—Audible signalling systems; Audible personal calling systems
- G08B3/10—Audible signalling systems; Audible personal calling systems using electric transmission; using electromagnetic transmission
Landscapes
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Electromagnetism (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Alarm Systems (AREA)
- Lock And Its Accessories (AREA)
Abstract
The application discloses an access control method, an intelligent access control system, a server and a storage medium, wherein the method comprises the following steps: when the authentication request comprises card swiping information to be detected and fingerprint information to be detected, the card swiping information to be detected comprises user identification information, when the fingerprint information to be detected is not matched with the historical fingerprint information, or the user identification information is not matched with the registered user information, first alarm prompt information is sent to an entrance guard controller, or when the fingerprint information to be detected is matched with the historical fingerprint information and the user identification information is matched with the registered user information, a first door opening control signal is sent to the entrance guard controller; and when the authentication request comprises card swiping information to be detected or fingerprint information to be detected, sending second alarm prompt information to the access controller. According to the application, the fingerprint identification smart card is used for acquiring the card swiping information and the fingerprint information to realize double-authority authentication, so that the pollution of the device caused by sharing the fingerprint identification device by multiple persons is avoided, and the reliability of an access control system is improved.
Description
Technical Field
The application relates to the technical field of intelligent access control, but is not limited to, and in particular relates to an access control method, an intelligent access control system, a server and a storage medium.
Background
The existing intelligent access control system generally utilizes a fingerprint identification device arranged on a door body to perform access control, when unlocking, a user is required to place a finger on a fingerprint acquisition window of the fingerprint identification device to perform unlocking tasks, but bacteria on the hand of the user can remain on the fingerprint identification device, so that the fingerprint identification device is very easy to pollute, and moreover, the fingerprint identification device shared by multiple people is completely likely to cause virus cross infection, and the fingerprint identification device on the door body is continuously increased in frequent use times under the condition of sharing by multiple people, the fingerprint identification result is influenced, and the fingerprint identification device is also troublesome to replace, so that the reliability of the intelligent access control system is reduced.
Disclosure of Invention
The embodiment of the application provides an access control method, an intelligent access control system, a server and a storage medium, which can effectively improve the reliability of the intelligent access control system.
In a first aspect, an embodiment of the present application provides an access control method, which is applied to a server of an intelligent access control system, where the intelligent access control system includes an access controller, the server is in communication connection with the access controller, the access controller is in communication connection with an induction module of a fingerprint identification smart card, the fingerprint identification smart card is further provided with a fingerprint identification module, and the fingerprint identification module is in communication connection with the induction module, and the method includes:
receiving an authentication request, wherein the authentication request is sent by the induction module through the access controller;
when the authentication request comprises card swiping information to be detected and fingerprint information to be detected, the card swiping information to be detected comprises user identification information, the fingerprint information to be detected and the historical fingerprint information in a historical fingerprint information base are compared, the user identification information and registered user information in the historical user information base are compared, and when the fingerprint information to be detected is not matched with the historical fingerprint information or the user identification information is not matched with the registered user information, first alarm prompt information is generated and sent to the access controller, wherein the card swiping information to be detected and the fingerprint information to be detected are sent by the sensing module through the access controller, and the fingerprint information to be detected is obtained by the sensing module through the fingerprint recognition module;
when the authentication request comprises the card swiping information to be detected and the fingerprint information to be detected, when the fingerprint information to be detected is matched with the historical fingerprint information and the user identification information is matched with the registered user information, a first door opening control signal is sent to the access controller;
and generating and sending second alarm prompt information to the access controller under the condition that the authentication request comprises the card swiping information to be detected or the authentication request comprises the fingerprint information to be detected.
In some embodiments, the entrance guard controller is provided with an audio alert module, and the audio alert module plays a first alert sound according to the first alert prompt message when the first alert prompt message is generated and sent to the entrance guard controller, and plays a second alert sound according to the second alert prompt message when the second alert prompt message is generated and sent to the entrance guard controller, where the entrance guard control method of the embodiment further includes:
and under the condition that the playing time length of the first alarm sound or the second alarm sound exceeds the first time length, when an authentication request carrying target fingerprint information and target card swiping information is received, controlling the sound alarm module to stop playing the first alarm sound or the second alarm sound, wherein the target fingerprint information is matched with the historical fingerprint information, and target user identification information corresponding to the target card swiping information is matched with the registered user information.
In some embodiments, the access controller is further provided with a camera module, and the access control method of the embodiment further includes:
under the condition that the sound alarming module plays the first alarming sound, acquiring a first image to be detected through the camera module, determining first shooting time information of the first image to be detected, generating first abnormal object information according to the first image to be detected, the first shooting time information and the first alarming prompt information, and sending the first abnormal object information to a target object;
and under the condition that the sound alarm module plays the second alarm sound, acquiring a second image to be detected through the camera module, determining second shooting time information of the second image to be detected, generating second abnormal object information according to the second image to be detected, the second shooting time information and the second alarm prompt information, and sending the second abnormal object information to the target object.
In some embodiments, the access control method further comprises:
after generating first abnormal object information according to the first image to be detected, first shooting time information and the first alarm prompt information, storing the first abnormal object information;
and after generating second abnormal object information according to the second image to be detected, second shooting time information and the second alarm prompt information, storing the second abnormal object information.
In some embodiments, the intelligent access control system at least includes a first access control controller module and a second access control controller module, the server is respectively in communication connection with the first access control controller module and the second access control controller module, the areas corresponding to the first access control controller module and the second access control controller module are different from each other, and the priority of the area corresponding to the first access control controller module is higher than the priority of the area corresponding to the second access control controller module, and the method further includes:
when the first access controller module receives the first door opening control signal, determining and storing first fingerprint information and first card swiping information, wherein the first fingerprint information and the first card swiping information belong to an authentication request corresponding to the first door opening control signal;
when the received new authentication request carries the first fingerprint information or the first card swiping information, the new authentication request is sent by the fingerprint identification smart card through the second access controller module, and a second door opening control signal is sent to the second access controller module.
In some embodiments, the access control method of the present embodiment further includes:
and when the number of authentication requests received in a preset time period exceeds a preset threshold, generating and sending third alarm prompt information to the access controller.
In some embodiments, the intelligent access control system further comprises an electrically controlled lock, the access control controller is in communication with the electrically controlled lock, and after the sending of the first door opening control signal to the access control controller, the method further comprises:
controlling the electric control lock to be in an unlocking state according to the first door opening control signal, and recording the unlocking time of the electric control lock;
and when the unlocking time length exceeds the second time length, generating and sending fourth alarm prompt information to the access controller.
In a second aspect, an embodiment of the present application provides a server, including: a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the access control method according to the first aspect when executing the computer program.
In a third aspect, an embodiment of the present application further provides an intelligent access control system, including the server of the embodiment of the second aspect.
In a fourth aspect, embodiments of the present application further provide a computer-readable storage medium storing computer-executable instructions for performing the access control method according to the first aspect.
The embodiment of the application provides an access control method, an intelligent access control system, a server and a storage medium, wherein the method comprises the following steps: receiving an authentication request, wherein the authentication request is sent by the fingerprint identification smart card through the access controller; when the authentication request comprises card swiping information to be detected and fingerprint information to be detected, the card swiping information to be detected comprises user identification information, the fingerprint information to be detected is compared with the historical fingerprint information in a historical fingerprint information base, the user identification information is compared with registered user information in the historical user information base, and when the fingerprint information to be detected is not matched with the historical fingerprint information or the user identification information is not matched with the registered user information, first alarm prompt information is generated and sent to the access controller; when the authentication request comprises card swiping information to be detected and fingerprint information to be detected, sending a door opening control signal to the access controller when the fingerprint information to be detected is matched with the historical fingerprint information and the user identification information is matched with the registered user information; and generating and sending second alarm prompt information to the access controller under the condition that the authentication request comprises card swiping information to be detected or the authentication request comprises fingerprint information to be detected. According to the embodiment of the application, the fingerprint identification intelligent card is used as a trigger source of access control, a fingerprint identification device is not required to be installed in an access control system, the pollution to the device caused by sharing the fingerprint identification device by multiple persons is avoided, and meanwhile, the access control of double-authority authentication can be realized by acquiring card swiping information and fingerprint information through the fingerprint identification intelligent card, so that the reliability of the intelligent access control system is improved.
Drawings
The accompanying drawings are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate and do not limit the application.
FIG. 1 is a flow chart of steps of a door access control method according to one embodiment of the present application;
FIG. 2 is a flowchart showing steps for stopping playing the first alarm sound or the second alarm sound according to another embodiment of the present application;
FIG. 3 is a flowchart illustrating steps for generating and transmitting first or second anomaly object information provided by another embodiment of the present application;
FIG. 4 is a flowchart showing steps for storing first or second anomaly object information according to another embodiment of the present application;
FIG. 5 is a flowchart illustrating steps for sending a door open control signal to a second door disable controller module according to another embodiment of the present application;
FIG. 6 is a flowchart illustrating steps for generating and transmitting a third alert message according to another embodiment of the present application;
FIG. 7 is a flowchart illustrating steps for generating and transmitting a fourth alert message according to another embodiment of the present application;
fig. 8 is a schematic hardware diagram of a server according to another embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
It will be appreciated that although functional block diagrams are depicted in the device diagrams, logical sequences are shown in the flowchart, in some cases, the steps shown or described may be performed in a different order than the block diagrams in the device. The terms first, second and the like in the description, in the claims and in the above-described figures, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order.
In the description of the present application, it should be understood that references to orientation descriptions such as upper, lower, front, rear, left, right, etc. are based on the orientation or positional relationship shown in the drawings, are merely for convenience of description of the present application and to simplify the description, and do not indicate or imply that the apparatus or elements referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus should not be construed as limiting the present application.
In the description of the present application, unless explicitly defined otherwise, terms such as arrangement, installation, connection, etc. should be construed broadly and the specific meaning of the terms in the present application can be reasonably determined by a person skilled in the art in combination with the specific contents of the technical scheme.
The existing intelligent access control system generally utilizes a fingerprint identification device installed on a door body to perform access control, when unlocking, a user is required to place a finger on a fingerprint acquisition window of the fingerprint identification device to perform unlocking tasks, but bacteria on the hand of the user can remain on the fingerprint identification device, so that the fingerprint identification device is easy to pollute, the fingerprint identification result is influenced, and the fingerprint identification device is also troublesome to replace, so that the reliability of the intelligent access control system is reduced.
In order to solve the above-mentioned problems, the embodiment of the present application provides an access control method, an intelligent access control system, a server, and a storage medium, where the method includes: receiving an authentication request, wherein the authentication request is sent by the fingerprint identification smart card through the access controller; when the authentication request comprises card swiping information to be detected and fingerprint information to be detected, the card swiping information to be detected comprises user identification information, the fingerprint information to be detected is compared with the historical fingerprint information in a historical fingerprint information base, the user identification information is compared with registered user information in the historical user information base, and when the fingerprint information to be detected is not matched with the historical fingerprint information or the user identification information is not matched with the registered user information, first alarm prompt information is generated and sent to the access controller; when the authentication request comprises card swiping information to be detected and fingerprint information to be detected, when the fingerprint information to be detected is matched with the historical fingerprint information and the user identification information is matched with the registered user information, a first door opening control signal is sent to the access controller; and generating and sending second alarm prompt information to the access controller under the condition that the authentication request comprises card swiping information to be detected or the authentication request comprises fingerprint information to be detected. According to the embodiment of the application, the fingerprint identification intelligent card is used as a trigger source of access control, a fingerprint identification device is not required to be installed in an access control system, the pollution to the device caused by sharing the fingerprint identification device by multiple persons is avoided, and meanwhile, the access control of double-authority authentication can be realized by acquiring card swiping information and fingerprint information through the fingerprint identification intelligent card, so that the reliability of the intelligent access control system is improved.
Embodiments of the present application will be further described below with reference to the accompanying drawings.
As shown in fig. 1, fig. 1 is a flowchart illustrating steps of an access control method according to an embodiment of the present application, and the embodiment of the present application provides an access control method, where the method is applied to a server of an intelligent access control system, the intelligent access control system includes an access controller, the server is communicatively connected to the access controller, the access controller is communicatively connected to an induction module of a fingerprint identification smart card, the fingerprint identification smart card is further provided with a fingerprint identification module, and the fingerprint identification module is communicatively connected to the induction module, and the method includes, but is not limited to, the following steps:
step S110, receiving an authentication request, wherein the authentication request is sent by the induction module through the access controller;
step S120, when the authentication request comprises card swiping information to be detected and fingerprint information to be detected, the card swiping information to be detected comprises user identification information, the fingerprint information to be detected and the historical fingerprint information in the historical fingerprint information base are compared, the user identification information and the registered user information in the historical user information base are compared, and when the fingerprint information to be detected is not matched with the historical fingerprint information or the user identification information is not matched with the registered user information, first alarm prompt information is generated and sent to an access controller, wherein the card swiping information to be detected and the fingerprint information to be detected are sent by an induction module through the access controller, and the fingerprint information to be detected is obtained by the induction module through a fingerprint identification module;
step S130, when the authentication request comprises card swiping information to be detected and fingerprint information to be detected, and the fingerprint information to be detected is matched with the historical fingerprint information and the user identification information is matched with the registered user information, a first door opening control signal is sent to an access controller;
step S140, when the authentication request includes the card swiping information to be detected or the authentication request includes the fingerprint information to be detected, generating and sending a second alarm prompt message to the access controller.
It may be understood that, the application scenario of the embodiment of the present application is an intelligent access control system including an access controller, where the access control method is executed by a server of the intelligent access control system, and because the access controller is communicatively connected with an induction module of a fingerprint identification smart card, and the fingerprint identification smart card is further provided with the fingerprint identification module communicatively connected with the induction module, that is, when the fingerprint identification module of the fingerprint identification smart card collects fingerprint information to be detected of a user and the fingerprint identification smart card contacts with the access controller, the fingerprint identification smart card can generate an authentication request according to the fingerprint information to be detected and the card swiping information to be detected which is built in the fingerprint identification smart card, and the induction module sends the authentication request carrying the card swiping information to be detected and the fingerprint information to be detected to the server through the access controller, and after receiving the authentication request, the server analyzes and processes the authentication request according to a preset rule, thereby controlling opening and closing of an area door corresponding to the access controller. The method comprises the following specific steps: under the condition that the authentication request comprises card swiping information to be detected and fingerprint information to be detected, the card swiping information to be detected comprises user identification information, the fingerprint information to be detected and the user identification information are respectively identified and verified, the fingerprint information to be detected and the historical fingerprint information in the historical fingerprint information base are compared, the user identification information and the registered user information in the historical user information base are compared, when the fingerprint information to be detected and the historical fingerprint information are not matched, or the user identification information and the registered user information are not matched, namely when one of the fingerprint information to be detected and the user identification information fails to be verified, first alarm prompt information is generated and sent to an access controller, and an area door corresponding to the access controller is closed; when the authentication request comprises card swiping information to be detected and fingerprint information to be detected, when the fingerprint information to be detected is matched with the historical fingerprint information and the user identification information is matched with the registered user information, a first door opening control signal is sent to the access controller, namely when the fingerprint information to be detected and the user identification information are successfully verified, a regional door corresponding to the access controller is opened by sending the first door opening control signal to the access controller; and generating and sending second alarm prompt information to the access controller under the condition that the authentication request comprises the to-be-detected card swiping information or the authentication request comprises the to-be-detected fingerprint information, namely when the authentication request does not meet the double verification condition, namely one of the to-be-detected fingerprint information and the to-be-detected card swiping information is absent, the verification fails and a warning prompt is sent. According to the embodiment, the fingerprint identification smart card is used as a trigger source of access control, the fingerprint identification device is not required to be installed in the access control system, the situation that a plurality of persons share the fingerprint identification device to cause pollution to the device is avoided, and meanwhile, access control with double-authority authentication can be achieved by acquiring card swiping information and fingerprint information through the fingerprint identification smart card, although the fingerprint identification smart card is lost, the fingerprint identification smart card cannot be copied and used, intelligent management of the access control system is facilitated, and accordingly reliability of the intelligent access control system is improved.
As shown in fig. 2, in some embodiments, the access controller is provided with an audio alert module, and the audio alert module plays a first alert sound according to the first alert prompt when the first alert prompt is generated and sent to the access controller, and plays a second alert sound according to the second alert prompt when the second alert prompt is generated and sent to the access controller, and the access control method according to the embodiment of the present application further includes, but is not limited to, the following steps:
in step S210, when the playing duration of the first alarm sound or the second alarm sound exceeds the first time duration, and an authentication request carrying the target fingerprint information and the target card swiping information is received, the sound alarm module is controlled to stop playing the first alarm sound or the second alarm sound, wherein the target fingerprint information is matched with the history fingerprint information, and the target user identification information corresponding to the target card swiping information is matched with the registered user information.
It can be understood that the anti-theft alarm module of the existing intelligent access control system can only remotely close the alarm sound through the access control management background or stop playing the alarm sound after waiting for the alarm processing operation to finish, and the alarm sound is usually loud and long, so that noise can be formed when the alarm is touched by mistake, and the use effect is poor. Based on this, the embodiment of the application provides the following solutions: when the playing duration of the first alarm sound or the second alarm sound exceeds the first time duration, the embodiment of the application does not limit the acquiring duration of the authentication request carrying the target fingerprint information, and the acquiring duration of the embodiment is at least 1 second, wherein the target fingerprint information is matched with the historical fingerprint information, the sound alarm module is controlled to stop playing the first alarm sound or the second alarm sound, that is, the authenticated cardholder inputs the fingerprint information on the fingerprint identification smart card and swipes the card at the same time to control the closed triggering alarm sound, and the application can not only control the alarm sound to be closed or wait for the end of the alarm processing operation only by the manager in the access control background, thereby effectively stopping the loud and long-term alarm sound to avoid forming noise, reducing the workload of the manager and playing a role of guaranteeing safety.
In some embodiments, referring to fig. 3, the access controller is further provided with a camera module, and the access control method according to the embodiment of the present application further includes, but is not limited to, the following steps:
step S310, under the condition that the sound alarm module plays the first alarm sound, acquiring a first image to be detected through the camera module, determining first shooting time information of the first image to be detected, generating first abnormal object information according to the first image to be detected, the first shooting time information and the first alarm prompt information, and sending the first abnormal object information to a target object;
step S320, under the condition that the sound alarm module plays the second alarm sound, the second image to be detected is obtained through the camera module, the second shooting time information of the second image to be detected is determined, the second abnormal object information is generated according to the second image to be detected, the second shooting time information and the second alarm prompt information, and the second abnormal object information is sent to the target object.
In some embodiments, referring to fig. 4, the access control method according to the embodiment of the present application further includes, but is not limited to, the following steps:
step S410, after generating first abnormal object information according to the first image to be detected, the first shooting time information and the first alarm prompt information, storing the first abnormal object information;
step S420, after generating the second abnormal object information according to the second image to be detected, the second capturing time information and the second warning prompt information, the second abnormal object information is saved.
It can be understood that, under the condition that the sound alarm module plays the alarm sound, the image to be detected of the cardholder corresponding to the authentication information triggering the alarm sound is obtained through the camera module, the shooting time information of the image to be detected is determined, the abnormal object information is generated according to the image to be detected, the corresponding shooting time information and the alarm prompt information, the abnormal object information is stored to form a log, and the image to be detected can be a picture or a video, and is not limited herein; the abnormal object information is sent to a target object, and the target object can be a system administrator or a checking module of the intelligent access control system so as to check the input fingerprint information and the operator of the card swiping information which are failed to be verified with registered user information such as a human face in a historical user information base again, the checking result can be displayed through a display module of a background of the intelligent access control system so as to be approved by the administrator, when the abnormal object information is failed to be verified again, corresponding protective measures can be taken based on the abnormal object information, for example, action tracks of the abnormal object are determined according to the abnormal object information, and the like.
In some embodiments, referring to fig. 5, the intelligent access control system at least includes a first access control controller module and a second access control controller module, the server is respectively in communication connection with the first access control controller module and the second access control controller module, the areas corresponding to the first access control controller module and the second access control controller module are different, the priority of the area corresponding to the first access control controller module is higher than the priority of the area corresponding to the second access control controller module, and the access control method of the embodiment of the application further includes, but is not limited to, the following steps:
step S510, when the first door controller module receives a first door opening control signal, determining and storing first fingerprint information and first card swiping information, wherein the first fingerprint information and the first card swiping information belong to an authentication request corresponding to the first door opening control signal;
in step S520, when the received new authentication request carries the first fingerprint information or the first card swiping information, the new authentication request is sent by the fingerprint identification smart card through the second access controller module, and a second door opening control signal is sent to the second access controller module.
It can be understood that, because the priority of the area corresponding to the first entrance guard controller module is higher than the priority of the area corresponding to the second entrance guard controller module, when the first entrance guard controller module receives the first entrance guard control signal, that is, the cardholder of the fingerprint identification smart card verifies successfully in the first entrance guard controller module, the cardholder has higher authority, determines and stores the first fingerprint information and the first card swiping information, the first fingerprint information and the first card swiping information belong to the authentication request corresponding to the first entrance guard control signal, when the received new authentication request carries the first fingerprint information or the first card swiping information, the new authentication request is sent by the fingerprint identification smart card through the second entrance guard controller module, and the second entrance guard controller module is sent with the second entrance guard control signal, that is, when the cardholder verifies successfully in the entrance guard controller module with higher priority, the verification mode of the cardholder in the entrance guard controller module with lower priority is reduced, and thus the user experience of the intelligent entrance guard system is improved.
In some embodiments, referring to fig. 6, the access control method provided by the embodiment of the present application further includes, but is not limited to, the following steps:
in step S610, when the number of authentication requests received in the preset time period exceeds the preset threshold, a third alarm prompt message is generated and sent to the access controller.
In some embodiments, the intelligent access control system further includes an electric control lock, and the access control controller is in communication connection with the electric control lock, referring to fig. 7, after executing step S130, the access control method according to the embodiment of the present application further includes, but is not limited to, the following steps:
step S710, controlling the electric control lock to be in an unlocking state according to a first door opening control signal, and recording the unlocking time of the electric control lock;
step S720, when the unlocking time length exceeds the second time length, generating and sending fourth alarm prompt information to the access controller.
It can be appreciated that the embodiment of the present application is not limited to specific conditions for triggering an alarm, and may include: the number of authentication requests received in a preset time period exceeds a preset threshold, or the unlocking time of the electric control lock corresponding to the access controller exceeds a second time length, and the electric control lock is configured by a person skilled in the art according to actual requirements. The safety and reliability of the intelligent access control system can be effectively improved by setting various triggering alarm conditions.
In addition, referring to fig. 8, fig. 8 is a hardware schematic of a server according to another embodiment of the present application, and one embodiment of the present application further provides a server 800, where the server 800 includes: memory 810, processor 820, and a computer program stored on memory 810 and executable on processor 820.
Processor 820 and memory 810 may be connected by a bus or other means.
The non-transitory software programs and instructions required to implement the gate inhibition control method of the above embodiments are stored in the memory 810, and when executed by the processor 820, the gate inhibition control method of the above embodiments is performed, for example, the method steps S110 to S140 in fig. 1, the method step S210 in fig. 2, the method steps S310 to S320 in fig. 3, the method steps S410 to S420 in fig. 4, the method steps S510 to S520 in fig. 5, the method step S610 in fig. 6, and the method steps S710 to S720 in fig. 7 described above are performed.
The above described apparatus embodiments are merely illustrative, wherein the units illustrated as separate components may or may not be physically separate, i.e. may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, an embodiment of the present application further provides an intelligent access control system, which includes the server 800 of the above embodiment.
Furthermore, an embodiment of the present application provides a computer-readable storage medium storing computer-executable instructions that are executed by a processor or controller, for example, by one of the processors in the embodiment of the server 800, and that may cause the processor to perform the entrance guard control method in the embodiment described above, for example, the method steps S110 to S140 in fig. 1, the method steps S210 in fig. 2, the method steps S310 to S320 in fig. 3, the method steps S410 to S420 in fig. 4, the method steps S510 to S520 in fig. 5, the method steps S610 in fig. 6, and the method steps S710 to S720 in fig. 7, which are described above. Those of ordinary skill in the art will appreciate that all or some of the steps, systems, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as known to those skilled in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. Furthermore, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
Claims (9)
1. The utility model provides an entrance guard control method, is applied to intelligent access control system's server, its characterized in that, intelligent access control system includes access control ware, the server with access control ware communication connection, access control ware and fingerprint identification smart card's sensing module communication connection, fingerprint identification smart card still is provided with fingerprint identification module, fingerprint identification module with sensing module communication connection, the method includes:
receiving an authentication request, wherein the authentication request is sent by the induction module through the access controller;
when the authentication request comprises card swiping information to be detected and fingerprint information to be detected, the card swiping information to be detected comprises user identification information, the fingerprint information to be detected and the historical fingerprint information in a historical fingerprint information base are compared, the user identification information and registered user information in the historical user information base are compared, and when the fingerprint information to be detected is not matched with the historical fingerprint information or the user identification information is not matched with the registered user information, first alarm prompt information is generated and sent to the access controller, wherein the card swiping information to be detected and the fingerprint information to be detected are sent by the sensing module through the access controller, and the fingerprint information to be detected is obtained by the sensing module through the fingerprint recognition module;
when the authentication request comprises the card swiping information to be detected and the fingerprint information to be detected, when the fingerprint information to be detected is matched with the historical fingerprint information and the user identification information is matched with the registered user information, a first door opening control signal is sent to the access controller;
generating and sending second alarm prompt information to the access controller under the condition that the authentication request comprises the card swiping information to be detected or the authentication request comprises the fingerprint information to be detected;
the intelligent access control system at least comprises a first access control controller module and a second access control controller module, the server is respectively in communication connection with the first access control controller module and the second access control controller module, the areas corresponding to the first access control controller module and the second access control controller module are different from each other, the priority of the area corresponding to the first access control controller module is higher than that of the area corresponding to the second access control controller module, and the method further comprises:
when the first access controller module receives the first door opening control signal, determining and storing first fingerprint information and first card swiping information, wherein the first fingerprint information and the first card swiping information belong to an authentication request corresponding to the first door opening control signal;
when the received new authentication request carries the first fingerprint information or the first card swiping information, the new authentication request is sent by the fingerprint identification smart card through the second access controller module, and a second door opening control signal is sent to the second access controller module.
2. The entrance guard control method according to claim 1, wherein the entrance guard controller is provided with an audio alert module that plays a first alert sound according to the first alert prompt message in the case of generating and transmitting the first alert prompt message to the entrance guard controller, and plays a second alert sound according to the second alert prompt message in the case of generating and transmitting the second alert prompt message to the entrance guard controller, the method further comprising:
and under the condition that the playing time length of the first alarm sound or the second alarm sound exceeds the first time length, when an authentication request carrying target fingerprint information and target card swiping information is received, controlling the sound alarm module to stop playing the first alarm sound or the second alarm sound, wherein the target fingerprint information is matched with the historical fingerprint information, and target user identification information corresponding to the target card swiping information is matched with the registered user information.
3. The entrance guard control method according to claim 2, wherein the entrance guard controller is further provided with a camera module, the method further comprising:
under the condition that the sound alarming module plays the first alarming sound, acquiring a first image to be detected through the camera module, determining shooting time information of the first image to be detected, generating first abnormal object information according to the first image to be detected, the first shooting time information and the first alarming prompt information, and sending the first abnormal object information to a target object;
under the condition that the sound alarming module plays the second alarming sound, a second image to be detected is obtained through the camera module, shooting time information of the second image to be detected is determined, second abnormal object information is generated according to the second image to be detected, the second shooting time information and the second alarming prompt information, and the second abnormal object information is sent to the target object.
4. The access control method of claim 3, further comprising:
after generating first abnormal object information according to the first image to be detected, the first shooting time information and the first alarm prompt information, storing the first abnormal object information;
and after generating second abnormal object information according to the second image to be detected, the second shooting time information and the second alarm prompt information, storing the second abnormal object information.
5. The access control method according to claim 1, characterized in that the method further comprises:
and when the number of authentication requests received in a preset time period exceeds a preset threshold, generating and sending third alarm prompt information to the access controller.
6. The access control method of claim 1, wherein the intelligent access control system further comprises an electrically controlled lock, the access controller is communicatively coupled to the electrically controlled lock, and after the sending of the first door opening control signal to the access controller, the method further comprises:
controlling the electric control lock to be in an unlocking state according to the first door opening control signal, and recording the unlocking time of the electric control lock;
and when the unlocking time length exceeds the second time length, generating and sending fourth alarm prompt information to the access controller.
7. A server, comprising: a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the access control method as claimed in any one of claims 1 to 6 when the computer program is executed.
8. An intelligent access control system, characterized by comprising: the server of claim 7.
9. A computer-readable storage medium storing computer-executable instructions for performing the entrance guard control method recited in any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310647456.6A CN116386187B (en) | 2023-06-02 | 2023-06-02 | Access control method, intelligent access control system, server and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310647456.6A CN116386187B (en) | 2023-06-02 | 2023-06-02 | Access control method, intelligent access control system, server and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116386187A CN116386187A (en) | 2023-07-04 |
CN116386187B true CN116386187B (en) | 2023-08-29 |
Family
ID=86971475
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310647456.6A Active CN116386187B (en) | 2023-06-02 | 2023-06-02 | Access control method, intelligent access control system, server and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116386187B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101059880A (en) * | 2007-05-29 | 2007-10-24 | 北京飞天诚信科技有限公司 | Method and device for starting intelligent card fingerprint identification through condition judge |
CN202306601U (en) * | 2011-05-20 | 2012-07-04 | 陶礼安 | Smart card and smart card reader-writer |
CN205644610U (en) * | 2016-03-08 | 2016-10-12 | 徐步陆 | Fingerprint identification smart card |
CN108171294A (en) * | 2017-12-29 | 2018-06-15 | 深圳中兴网信科技有限公司 | Electronic device and its control method based on RFID technique |
JP2021117838A (en) * | 2020-01-28 | 2021-08-10 | 株式会社ジャパンディスプレイ | Authentication system and reading device |
WO2021164389A1 (en) * | 2020-02-21 | 2021-08-26 | 深圳市云伽智能技术有限公司 | Intelligent lock access control system, control method and apparatus, device, and storage medium |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010045458A1 (en) * | 1998-07-27 | 2001-11-29 | Stephen T. Polansky | Biometeric system for verifying the user of a credit/identification card by a miniature autonomous fingerprint capture and verification system |
EP1861807B1 (en) * | 2005-03-24 | 2012-11-07 | Privaris, Inc. | Biometric identification device with smartcard capabilities |
-
2023
- 2023-06-02 CN CN202310647456.6A patent/CN116386187B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101059880A (en) * | 2007-05-29 | 2007-10-24 | 北京飞天诚信科技有限公司 | Method and device for starting intelligent card fingerprint identification through condition judge |
CN202306601U (en) * | 2011-05-20 | 2012-07-04 | 陶礼安 | Smart card and smart card reader-writer |
CN205644610U (en) * | 2016-03-08 | 2016-10-12 | 徐步陆 | Fingerprint identification smart card |
CN108171294A (en) * | 2017-12-29 | 2018-06-15 | 深圳中兴网信科技有限公司 | Electronic device and its control method based on RFID technique |
JP2021117838A (en) * | 2020-01-28 | 2021-08-10 | 株式会社ジャパンディスプレイ | Authentication system and reading device |
WO2021164389A1 (en) * | 2020-02-21 | 2021-08-26 | 深圳市云伽智能技术有限公司 | Intelligent lock access control system, control method and apparatus, device, and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN116386187A (en) | 2023-07-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111691764B (en) | Household intelligent door lock and control method thereof | |
US11145151B2 (en) | Frictionless access control system for a building | |
WO2018102985A1 (en) | Method, device, and server for security verification | |
EP2779133A2 (en) | System and method of anomaly detection | |
CN109410407A (en) | A kind of face and fingerprint recognition access control system | |
CN110910551A (en) | 3D face recognition access control system and 3D face recognition-based access control method | |
CN110675582A (en) | Automatic alarm method and device | |
CN110009786A (en) | Invite the method and device and system and storage medium of visitor and visitor's arriving reminding | |
US20210264137A1 (en) | Combined person detection and face recognition for physical access control | |
CN110768942B (en) | Identity authentication system | |
CN115050126B (en) | Smart dormitory safety management method, smart dormitory safety management device and storage medium | |
WO2020134525A1 (en) | Access control management method, apparatus and system | |
CN209912036U (en) | Face identification security entrance guard all-in-one | |
CN116386187B (en) | Access control method, intelligent access control system, server and storage medium | |
JP6017163B2 (en) | Security device and security method | |
CN211015753U (en) | Face recognition security system based on Internet of things | |
CN116311714A (en) | Method and system for preventing false alarm of intelligent door lock | |
KR101421962B1 (en) | Entrance-Exit Control Device Using Image of Entry and Method for Managing the Entry | |
CN109712355A (en) | Building safety monitoring method, smart machine and door lock | |
CN109544756A (en) | A kind of safety monitoring system based on Mean Shift | |
TWI591246B (en) | Access control system with automatic unlocking function and its unlocking method | |
US20210209930A1 (en) | Smart home security system and method of disarming a security setting | |
KR101311508B1 (en) | Apparatus and method for controlling illegal entry and recording medium thereof | |
CN112215994A (en) | Control method and system for remote visual intercom intelligent anti-theft door lock and storage medium | |
CN218299070U (en) | Security defense device, electronic equipment and intelligent door lock |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |