[go: up one dir, main page]

CN110503750A - Access control method, apparatus and system - Google Patents

Access control method, apparatus and system Download PDF

Info

Publication number
CN110503750A
CN110503750A CN201810483406.8A CN201810483406A CN110503750A CN 110503750 A CN110503750 A CN 110503750A CN 201810483406 A CN201810483406 A CN 201810483406A CN 110503750 A CN110503750 A CN 110503750A
Authority
CN
China
Prior art keywords
access control
entrance guard
mobile terminal
time
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810483406.8A
Other languages
Chinese (zh)
Inventor
应鹏魁
胡坤龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision Digital Technology Co Ltd
Original Assignee
Hangzhou Hikvision Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision Digital Technology Co Ltd filed Critical Hangzhou Hikvision Digital Technology Co Ltd
Priority to CN201810483406.8A priority Critical patent/CN110503750A/en
Publication of CN110503750A publication Critical patent/CN110503750A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

This application provides access control methods, apparatus and system.In the application, mobile terminal is when perceiving gate inhibition's release operation that this mobile terminal is performed, current time can be released the time as gate inhibition and the gate inhibition authenticates and identifies, gate inhibition's release operation parameter sends jointly to access control equipment and verifies, so, when the gate inhibition that access control equipment receives mobile terminal transmission releases the time, gate inhibition authenticates mark, when gate inhibition's release operation parameter, dependent on the mobile terminal corresponding access permission is released to the gate inhibition received the time, gate inhibition authenticates mark, gate inhibition's release operation parameter verifies, this realizes access control equipment and the gate inhibition of mobile terminal is authenticated mark, gate inhibition participates in gate inhibition's verifying the releasing time, all mobile terminals are fixed in the identical scheme of access permission of institute's having time compared to access control equipment, the application can increase substantially the safety of access control equipment, it effectively prevent third party non- The Network Intrusion of method user.

Description

Access control method, device and system
Technical Field
The application relates to a security control technology, in particular to a method, a device and a system for controlling entrance guard.
Background
The entrance guard safety management system is a novel modern safety management system, integrates a microcomputer automatic identification technology and modern safety management measures, relates to a plurality of new technologies such as electronics, machinery, optics, computers, communication, biology and the like, and is suitable for various scenes such as banks, hotels, machine rooms, military and mechanical warehouses, key rooms, offices, factories and the like.
At present, the access control equipment has access control authority which is not distinguished in different time periods, and mobile terminals are not distinguished, and access control removing operation triggered by all the mobile terminals in any time period is verified according to the same access control verification rule. Taking the swing-to-release access control as an example for description: the entrance guard that entrance guard equipment has verifies the rule and does: the shaking direction and times of the mobile terminal; when the entrance guard is relieved to the entrance guard equipment that needs, the user can wave mobile terminal, and mobile terminal sends this terminal of perception by the direction, the number of times of shaking for entrance guard equipment verification, and whether the direction of shaking, the number of times of entrance guard equipment check-up receipt match entrance guard verification rule, if, relieve the entrance guard of this entrance guard equipment control.
However, the access control device verifies the access control releasing operation triggered by all the mobile terminals in any time period by the same access control verification rule, so that the security of access control is influenced, and an opportunity is brought for illegal intrusion of the access control device by a third party.
Disclosure of Invention
The application provides an access control method, an access control device and an access control system, which are used for improving the security of access control.
The technical scheme provided by the application comprises the following steps:
an access control method is applied to access equipment and comprises the following steps:
establishing connection with a mobile terminal;
when detecting that the mobile terminal triggers the entrance guard verification, verifying whether the following conditions are met: whether the current time is within an effective entrance guard release time preset for the mobile terminal, whether the time length of entrance guard release operation executed by the mobile terminal is in accordance with the entrance guard release operation time length preset for the mobile terminal within the effective entrance guard release time, the posture of entrance guard release operation executed by the mobile terminal, and the number of times are in accordance with the entrance guard release operation posture and number of times preset for the mobile terminal within the effective entrance guard release time;
if so, the entrance guard controlled by the entrance guard equipment is released, otherwise, the entrance guard controlled by the entrance guard equipment is maintained.
An access control method is applied to a server and comprises the following steps:
the access control verification rule registered by the mobile terminal connected with the server is stored and managed, and comprises the following steps: the method comprises the steps of setting effective entrance guard removing time for the mobile terminal, setting the duration of entrance guard removing operation for the mobile terminal within the effective entrance guard removing time, and setting the posture and the times of entrance guard removing operation;
will entrance guard's rule of verifying is sent for the entrance guard's equipment that this server is connected, with by entrance guard's equipment is detecting when mobile terminal triggers entrance guard's verification, the basis entrance guard verifies that the following condition is satisfied with the rule of verifying: whether the current time is aiming at in the time is relieved to the valid entrance guard that mobile terminal predetermines, whether the length of time of the entrance guard removal operation that mobile terminal executed accords with in the time is relieved to the valid entrance guard right in the time is relieved to the entrance guard that mobile terminal predetermines and the length of time is relieved the entrance guard that mobile terminal executed removes the posture of operation, the number of times accords with in the time is relieved to the valid entrance guard aim at entrance guard that mobile terminal predetermines removes operation posture, number of times.
An access control method is applied to a server and comprises the following steps:
the access control verification rule registered by the mobile terminal connected with the server is stored and managed, and comprises the following steps: the method comprises the steps of setting effective entrance guard removing time for the mobile terminal, setting the duration of entrance guard removing operation for the mobile terminal within the effective entrance guard removing time, and setting the posture and the times of entrance guard removing operation;
when detecting that the mobile terminal triggers the entrance guard verification, verifying whether the following conditions are met according to the entrance guard verification rule: whether the current time is within an effective entrance guard release time preset for the mobile terminal, whether the time length of entrance guard release operation executed by the mobile terminal is in accordance with the entrance guard release operation time length preset for the mobile terminal within the effective entrance guard release time, the posture of entrance guard release operation executed by the mobile terminal, and the number of times are in accordance with the entrance guard release operation posture and number of times preset for the mobile terminal within the effective entrance guard release time;
and sending the verification result to the access control equipment connected with the mobile terminal, so that the access control equipment removes the access control controlled by the access control equipment when the verification result is yes, and otherwise, maintains the access control controlled by the access control equipment.
An access control device, characterized in that the device is applied to access control equipment, includes:
the communication unit is used for establishing connection with the mobile terminal;
the processor is used for verifying whether the following conditions are met or not when the mobile terminal is detected to trigger the entrance guard verification: whether the current time is within an effective entrance guard release time preset for the mobile terminal, whether the time length of entrance guard release operation executed by the mobile terminal is in accordance with the entrance guard release operation time length preset for the mobile terminal within the effective entrance guard release time, the posture of entrance guard release operation executed by the mobile terminal, and the number of times are in accordance with the entrance guard release operation posture and number of times preset for the mobile terminal within the effective entrance guard release time;
if so, the entrance guard controlled by the entrance guard equipment is released, otherwise, the entrance guard controlled by the entrance guard equipment is maintained.
An access control device, applied to a server, comprising:
the memorizer is used for storing and managing the access control verification rule registered by the mobile terminal connected with the server, and the access control verification rule comprises the following steps: the method comprises the steps of setting effective entrance guard removing time for the mobile terminal, setting the duration of entrance guard removing operation for the mobile terminal within the effective entrance guard removing time, and setting the posture and the times of entrance guard removing operation;
the communication unit is used for sending the access control verification rule to the access control equipment connected with the server, so that the access control equipment detects that the mobile terminal triggers access control verification, and the access control verification rule verifies whether the following conditions are met: whether the current time is aiming at in the time is relieved to the valid entrance guard that mobile terminal predetermines, whether the length of time of the entrance guard removal operation that mobile terminal executed accords with in the time is relieved to the valid entrance guard right in the time is relieved to the entrance guard that mobile terminal predetermines and the length of time is relieved the entrance guard that mobile terminal executed removes the posture of operation, the number of times accords with in the time is relieved to the valid entrance guard aim at entrance guard that mobile terminal predetermines removes operation posture, number of times.
An access control device, which is applied to a server, comprises:
the memorizer is used for storing and managing the access control verification rule registered by the mobile terminal connected with the server, and the access control verification rule comprises the following steps: the method comprises the steps of setting effective entrance guard removing time for the mobile terminal, setting the duration of entrance guard removing operation for the mobile terminal within the effective entrance guard removing time, and setting the posture and the times of entrance guard removing operation;
the processor is used for verifying whether the following conditions are met or not according to the access control verification rule when the mobile terminal is detected to trigger the access control verification: whether the current time is within an effective entrance guard release time preset for the mobile terminal, whether the time length of entrance guard release operation executed by the mobile terminal is in accordance with the entrance guard release operation time length preset for the mobile terminal within the effective entrance guard release time, the posture of entrance guard release operation executed by the mobile terminal, and the number of times are in accordance with the entrance guard release operation posture and number of times preset for the mobile terminal within the effective entrance guard release time;
and the communication unit is used for sending the verification result to the access control equipment connected with the mobile terminal, so that the access control equipment is used for releasing the access control controlled by the access control equipment when the verification result is yes, and maintaining the access control controlled by the access control equipment when the verification result is no.
An access control system, the system comprising: the system comprises a server, a mobile terminal and an access control device;
the server is used for storing and managing the access control verification rule of the server to which the mobile terminal connected with the server is registered, and sending the access control verification rule to the access control equipment connected with the server;
the mobile terminal is used for registering to the server;
the access control equipment is connected with the mobile terminal and the server and used for receiving the access control verification rule, when the access control verification rule is detected, the mobile terminal triggers the access control verification, and the access control verification rule verifies whether the following conditions are met: whether current time is in aim at in the time is relieved to the effective entrance guard that mobile terminal predetermine the time whether the length of time of the entrance guard removal operation that mobile terminal executed accords with in the time is relieved to effective entrance guard right in the time is relieved to the entrance guard that mobile terminal predetermine the length of time the posture, the number of times of the entrance guard removal operation that mobile terminal executed accord with in the time is relieved to effective entrance guard right in the time the operation posture, the number of times are relieved to the entrance guard that mobile terminal predetermine, if, the entrance guard of this entrance guard equipment control is relieved, otherwise, the entrance guard of this entrance guard equipment control is maintained.
An access control system, the system comprising: the system comprises a server, a mobile terminal and an access control device;
the mobile terminal is used for registering to the server;
the server is used for storing and managing access control verification rules that the mobile terminal connected with the server is registered to the server, and when detecting that the mobile terminal triggers access control verification, whether the following conditions are met or not is verified according to the access control verification rules: whether the current time is within an effective entrance guard release time preset for the mobile terminal, whether the time length of entrance guard release operation executed by the mobile terminal is in accordance with the entrance guard release operation time length preset for the mobile terminal within the effective entrance guard release time, the posture of entrance guard release operation executed by the mobile terminal, and the number of times are in accordance with the entrance guard release operation posture and number of times preset for the mobile terminal within the effective entrance guard release time; sending a verification result to the access control equipment connected with the mobile terminal;
the access control equipment is connected with the mobile terminal and the server and used for receiving the verification result, removing the access control controlled by the access control equipment, and receiving the verification result, and maintaining the access control controlled by the access control equipment if the verification result is not.
As can be seen from the above technical solutions, in the present application, when detecting that the mobile terminal triggers the access control verification, by verifying whether the current time is within the valid access control removing time preset for the mobile terminal, whether the time length of the access control removing operation executed by the mobile terminal is in line with the valid access control removing time preset for the mobile terminal, and whether the posture and the number of times of the access control removing operation executed by the mobile terminal are in line with the posture and the number of times of the access control removing operation preset for the mobile terminal within the valid access control removing time, the time length, the posture and the number of times of the access control removing operation executed by the mobile terminal are involved in the access control verification, compared with the scheme that the access control verification rules of all mobile terminals at all times are the same for the access control equipment, the present application can greatly improve the security of the access control equipment, effectively preventing the intrusion attack of the illegal user of the third party.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a first flowchart of an access control method provided in the present application;
FIG. 2 is a flowchart of an implementation in step 102 provided herein;
FIG. 3 is a flowchart of an implementation of step 201 provided herein;
FIG. 4 is a flowchart of an implementation of step 202 provided herein;
fig. 5 is a second flowchart of the access control method provided in the present application;
fig. 6 is a third flowchart of the access control method provided in the present application;
FIG. 7 is a block diagram of the system provided herein;
FIG. 8 is a block diagram of a first apparatus provided herein;
FIG. 9 is a diagram of a second apparatus configuration provided in the present application;
fig. 10 is a diagram illustrating a third apparatus according to the present application.
Detailed Description
According to the access control method, the current time of the mobile terminal triggering access control verification and the time length, posture and frequency of access control releasing operation executed by the mobile terminal are participated in the access control verification, compared with the scheme that the existing fixed access control equipment has the same access control verification rule for all mobile terminals in all time periods, the access control method can greatly improve the safety of the access control equipment, and effectively prevent intrusion attack of third-party illegal users. In an example, the access control device may be an entrance machine, an entrance card reader, and the like, and the present application is not limited in particular.
In order to make the objects, technical solutions and advantages of the present invention clearer, the following detailed description of the present invention is provided with reference to the accompanying drawings and specific embodiments:
referring to fig. 1, fig. 1 is a first flowchart of an access control method provided by the present application. This flow is applied to entrance guard's equipment, as shown in fig. 1, this flow can include the following step:
step 101, establishing connection with a mobile terminal.
The mobile terminal may be a mobile phone, a tablet, or the like, and the application is not particularly limited.
In this application, as an embodiment, in step 101, the connection established with the mobile terminal may be a wireless connection established by a wireless method, where the wireless method includes but is not limited to: bluetooth, WI-FI, SUBIG, ZigBee.
102, when detecting that the mobile terminal triggers the entrance guard verification, verifying whether the following conditions are met: whether current time is in aim at in the time is relieved to the effective entrance guard that mobile terminal predetermine the time whether the length of time of the entrance guard removal operation that mobile terminal executed accords with in the time is relieved to effective entrance guard right in the time is relieved to the entrance guard that mobile terminal predetermine the length of time the posture, the number of times of the entrance guard removal operation that mobile terminal executed accord with in the time is relieved to effective entrance guard right in the time the operation posture, the number of times are relieved to the entrance guard that mobile terminal predetermine, if, the entrance guard of this entrance guard equipment control is relieved, otherwise, the entrance guard of this entrance guard equipment control is maintained.
The method is applied to different application scenes, and the access control releasing operation is different in realization. For example, in an application scenario where the access control is released by shaking, the access control release operation may be shaking.
In this application, as an embodiment, in this step 102, the duration of the access control releasing operation executed by the mobile terminal may be sensed by a sensor arranged in the access control device, which specifically refers to a duration from when the mobile terminal starts to execute the access control releasing operation to when the mobile terminal stops executing the access control releasing operation.
In the present application, as an embodiment, the gesture of the entrance guard release operation includes but is not limited to: upright, inverted, left horizontal, right horizontal, upward and downward.
Thus, the flow shown in fig. 1 is completed.
As can be seen from the flow shown in FIG. 1, in the present application, when the access control device detects that the mobile terminal triggers the access control verification, the access control device can greatly improve the security of the access control device by verifying whether the current time is within the effective access control removing time preset for the mobile terminal, whether the time length of the access control removing operation executed by the mobile terminal is in accordance with the time length of the access control removing operation preset for the mobile terminal, whether the posture and the number of times of the access control removing operation executed by the mobile terminal are in accordance with the posture and the number of times of the access control removing operation preset for the mobile terminal within the effective access control removing time, so as to realize that the time, the time length, the posture and the number of times of the access control removing operation executed by the mobile terminal participate in the access control verification, compared with the scheme that the access control device fixes all mobile terminals and the access control verification rules at all times are, effectively preventing the intrusion attack of the illegal user of the third party.
It should be noted that, in the present application, before the step 102 verifies whether the condition is satisfied, the access authentication identifier of the mobile terminal may be further obtained. In the application, different mobile terminals have different access control authentication marks, and the access control authentication marks of the mobile terminals uniquely represent the mobile terminals. In one example, the access authentication identifier may be characterized by a user name registered by the mobile terminal, where the user name may be a combination of characters and numbers.
Based on the obtained access authentication identifier of the mobile terminal, the step 102 of verifying whether the condition is satisfied may specifically include a flow shown in fig. 2.
Referring to fig. 2, fig. 2 is a flowchart for implementing the step 102 provided in the present application. As shown in fig. 2, the process may include the following steps:
step 201, determining an access control verification rule of the mobile terminal according to the obtained access control authentication identifier of the mobile terminal.
As an embodiment, the access control verification rule may be configured locally in the access control device in advance.
As another embodiment, the access validation rule is obtained by the access control device from a server.
During concrete implementation, the entrance guard verification rule of the mobile terminal at least comprises: the method comprises the steps of aiming at the preset effective entrance guard removing time of the mobile terminal, aiming at the preset entrance guard removing operation duration of the mobile terminal, aiming at the preset entrance guard removing operation posture and times of the mobile terminal.
In this application, there are many implementation manners in step 201 for determining the access control verification rule of the mobile terminal according to the obtained access control authentication identifier of the mobile terminal, and one of the implementation manners is described in the flow shown in fig. 3 below, which is not described herein again.
Step 202, verifying whether the following conditions are met according to the access control verification rule: whether the current time is in aim at in the time is relieved to the valid entrance guard that mobile terminal predetermines, whether the length of time of the entrance guard removal operation that mobile terminal carried out accords with aim at the length of time is relieved to the entrance guard that mobile terminal predetermines the length of time the posture, the number of times that the entrance guard removal operation that mobile terminal carried out accords with aim at the entrance guard that mobile terminal predetermines removes operation posture, number of times, if yes, removes the entrance guard of this entrance guard equipment control, otherwise, maintains the entrance guard of this entrance guard equipment control.
As an embodiment, this step 202 can be implemented by the following flow shown in fig. 4, which is not repeated here.
Thus, the flow shown in fig. 2 is completed.
The flow shown in fig. 3 is described below:
referring to fig. 3, fig. 3 is a flowchart for implementing step 201 provided by the present application. As shown in FIG. 3, the process may include
Step 301, using the obtained access control authentication identifier of the mobile terminal as a keyword to search access control verification rules containing the keyword from access control authorities corresponding to all local mobile terminals.
And step 302, determining the found access control verification rule as the access control verification rule of the mobile terminal.
The flow shown in fig. 3 is completed. Through the flow shown in fig. 3, how to determine the access control verification rule of the mobile terminal in step 201 can be implemented.
The flow shown in fig. 4 is described below:
referring to fig. 4, fig. 4 is a flowchart of step 202 implementation provided herein. As shown in fig. 4, the process may include:
step 401, using the current time as a keyword to search the access control verification rule of the mobile terminal for the access control verification rule (marked as a target access control verification rule) corresponding to the time period of the keyword.
In the present application, as an embodiment, the same mobile terminal does not have only one access validation rule, but may have a plurality of access validation rules at the same time, and the plurality of access validation rules are distinguished by time periods. Wherein, the entrance guard who corresponds at different time quantums verifies the rule can be different. The following examples describe:
the access control verification rule corresponding to the time period between 10 am and 10 pm is as follows:
effective access control release time: 10 to 10 and a half; the preset entrance guard removing operation time for the mobile terminal is 5 seconds, and the preset entrance guard removing operation posture and times for the mobile terminal are respectively positive and vertical shaking and 3 times;
for another example, the access control verification rule corresponding to the time period between 5 pm and 5 pm is as follows:
effective access control release time: 5 point to 5 point and half; the preset access control removing operation duration aiming at the mobile terminal is 3 seconds, and the preset access control removing operation posture and times aiming at the mobile terminal are inverted vertical shaking and 5 times respectively.
Based on the above description, the access control validation rules corresponding to the mobile terminal at different time periods may be different, and therefore, in this step 401, the access control validation rule (marked as the target access control validation rule) corresponding to the time period where the keyword is located needs to be searched in the access control validation rules of the mobile terminal by using the current time as the keyword.
Step 402, comparing whether the time length of the entrance guard removing operation executed by the mobile terminal is in accordance with the time length of the entrance guard removing operation preset by the mobile terminal, and whether the posture and the times of the entrance guard removing operation executed by the mobile terminal are in accordance with the posture and the times of the entrance guard removing operation preset by the mobile terminal in the target entrance guard verification rule, if so, removing the entrance guard controlled by the entrance guard equipment, otherwise, maintaining the entrance guard controlled by the entrance guard equipment.
The flow shown in fig. 4 is completed.
How the conditions are verified in step 202 above is achieved by the flow shown in fig. 4.
It should be noted that, as an embodiment in the present application, after verifying that the condition is satisfied in the step 102, and before releasing the access controlled by the access control device, the method may further include: acquiring current first access control authority information of the mobile terminal; comparing whether the first access control authority information is consistent with second access control authority information pre-bound with the mobile terminal; if the access control is consistent with the access control device, the access control of the access control device is continuously executed, and if the access control is inconsistent with the access control device, the access control device is triggered to execute and maintain the access control of the access control device. Here, the first access right information is only named for convenience of distinction and is not intended to be limiting. As an embodiment, the first access control authority information may be a current MAC address of the mobile terminal, a terminal ID, or a card number, a password, etc. of the terminal, and the second access control authority information is named only for convenience of distinguishing and is not limited. The second access permission information may be, for example, a MAC address previously registered by the mobile terminal, a terminal ID, or a card number, a password, etc. assigned by the server to the terminal.
It should be noted that, as an embodiment, after releasing the access control controlled by the access control device, the method may further include: uploading the information of releasing the access control of the access control equipment to a server, and counting and storing the load information of the access control equipment by the server; and the number of the first and second groups,
when confirming to maintain this entrance guard that entrance guard's equipment controlled, can further include: and uploading the message of trying to remove the access control by the mobile terminal with the illegal authority to a server so as to count and store the load information of the access control equipment by the server.
The server counts the load information of the access control devices, and aims to control other idle access control devices to assist the overweight access control devices in verification when the load of the access control devices is overweight, so that load balance among the access control devices is realized.
The method provided by the application is described above from the perspective of an access control device. The following describes the method provided by the present application from a server perspective.
Referring to fig. 5, fig. 5 is a second flowchart of the access control method provided by the present application. The method is applied to the server. The server may be a cloud platform server, or other virtual server or physical server, and the like, and the present application is not limited in particular.
As shown in fig. 5, the process may include:
step 501, storing and managing access control verification rules registered by the mobile terminal connected to the server, where the access control verification rules include: the method comprises the steps of aiming at the preset effective entrance guard removing time of the mobile terminal, aiming at the preset entrance guard removing operation duration and the entrance guard removing operation posture and times of the mobile terminal within the effective entrance guard removing time.
Step 502, the entrance guard verification rule is sent to the entrance guard equipment connected with the server, so that the entrance guard equipment detects that the mobile terminal triggers entrance guard verification, and the entrance guard verification rule verifies whether the following conditions are met: whether the current time is aiming at in the time is relieved to the valid entrance guard that mobile terminal predetermines, whether the length of time of the entrance guard removal operation that mobile terminal executed accords with in the time is relieved to the valid entrance guard right in the time is relieved to the entrance guard that mobile terminal predetermines and the length of time is relieved the entrance guard that mobile terminal executed removes the posture of operation, the number of times accords with in the time is relieved to the valid entrance guard aim at entrance guard that mobile terminal predetermines removes operation posture, number of times.
The flow shown in fig. 5 is completed.
The flow shown in fig. 5 is that the server issues the access validation rule of the mobile terminal to the access device, and the access device relies on the access validation rule of the mobile terminal to validate the access release operation triggered by the mobile terminal.
As an embodiment, in the application, the server may not issue the access control verification rule of the mobile terminal to the access control device, but automatically rely on the access control verification rule of the mobile terminal to verify the access control releasing operation triggered by the mobile terminal, and only send the verification result to the access control device connected to the mobile terminal, so that the access control device determines whether to release the access control controlled by the access control device according to the verification result, which is specifically referred to the flow shown in fig. 6.
Referring to fig. 6, fig. 6 is a third flowchart of the access control method provided by the present application. The method is applied to the server. As shown in fig. 6, the process may include:
step 601, storing and managing access control verification rules registered by the mobile terminal connected with the server, wherein the access control verification rules comprise: the method comprises the steps of aiming at the preset effective entrance guard removing time of the mobile terminal, aiming at the preset entrance guard removing operation duration of the mobile terminal, aiming at the preset entrance guard removing operation posture and times of the mobile terminal.
Step 602, when detecting that the mobile terminal triggers the access control verification, verifying whether the following conditions are met: whether the current time is in the effective entrance guard removing time preset by the mobile terminal, whether the entrance guard removing operation duration executed by the mobile terminal is in accordance with the entrance guard removing operation duration preset by the mobile terminal, whether the entrance guard removing operation posture and the entrance guard removing operation frequency executed by the mobile terminal are in accordance with the entrance guard removing operation posture and the entrance guard removing operation frequency preset by the mobile terminal.
Step 603, sending the verification result to the access control equipment connected with the mobile terminal, so that the access control equipment releases the access control controlled by the access control equipment when the verification result is yes, otherwise, the access control controlled by the access control equipment is maintained.
The flow shown in fig. 6 is completed.
The process shown in fig. 6 is that the server verifies the access control releasing operation triggered by the mobile terminal by relying on the access control verification rule of the mobile terminal, and the access control device determines whether to release the access control controlled by the access control device according to the verification result of the server.
The method provided by the present application is described above, and the system and the device provided by the present application are described below:
referring to fig. 7, fig. 7 is a system configuration diagram provided in the present application. As shown in fig. 7, the system includes: server, mobile terminal, entrance guard's equipment.
The server is connected with a plurality of access control devices at the same time;
the access control equipment is connected with the server and the mobile terminals at the same time.
As an embodiment, in fig. 7, the structural connection relationship between the server, the mobile terminal, and the access control device is as follows:
the server is used for storing and managing the access control verification rule of the server to which the mobile terminal connected with the server is registered, and sending the access control verification rule to the access control equipment connected with the server;
the mobile terminal is used for registering to the server;
entrance guard's equipment, with mobile terminal, server are connected, are used for receiving entrance guard's verification rule detects mobile terminal triggers when entrance guard verifies, the basis entrance guard verifies that the following condition is satisfied with the rule verification: whether current time is in aim at in the time is relieved to the effective entrance guard that mobile terminal predetermine the time whether the length of time of the entrance guard removal operation that mobile terminal executed accords with in the time is relieved to effective entrance guard right in the time is relieved to the entrance guard that mobile terminal predetermine the length of time the posture, the number of times of the entrance guard removal operation that mobile terminal executed accord with in the time is relieved to effective entrance guard right in the time the operation posture, the number of times are relieved to the entrance guard that mobile terminal predetermine, if, the entrance guard of this entrance guard equipment control is relieved, otherwise, the entrance guard of this entrance guard equipment control is maintained.
As another embodiment, in fig. 7, the structural connection relationship between the server, the mobile terminal, and the access control device may also be:
the server is used for storing and managing access control verification rules that the mobile terminal connected with the server is registered to the server, and when detecting that the mobile terminal triggers access control verification, whether the following conditions are met or not is verified according to the access control verification rules: whether the current time is within an effective entrance guard release time preset for the mobile terminal, whether the time length of entrance guard release operation executed by the mobile terminal is in accordance with the entrance guard release operation time length preset for the mobile terminal within the effective entrance guard release time, the posture of entrance guard release operation executed by the mobile terminal, and the number of times are in accordance with the entrance guard release operation posture and number of times preset for the mobile terminal within the effective entrance guard release time; sending a verification result to the access control equipment connected with the mobile terminal;
the mobile terminal is used for registering to the server;
the access control equipment is connected with the mobile terminal and the server and used for receiving the verification result, removing the access control controlled by the access control equipment when the verification result is yes, and receiving the verification result, and maintaining the access control controlled by the access control equipment when the verification result is no.
To this end, the system configuration diagram shown in fig. 7 is completed.
The following describes the apparatus provided in the present application:
referring to fig. 8, fig. 8 is a diagram illustrating a first apparatus according to the present disclosure. The device is applied to access control equipment and corresponds to the flow shown in figure 1. As shown in fig. 8, the apparatus may include:
a communication unit 801 for establishing connection with a mobile terminal;
the processor 802 is configured to, when it is detected that the access control verification is triggered by the mobile terminal, verify whether the following conditions are met: whether the current time is within an effective entrance guard release time preset for the mobile terminal, whether the time length of entrance guard release operation executed by the mobile terminal is in accordance with the entrance guard release operation time length preset for the mobile terminal within the effective entrance guard release time, the posture of entrance guard release operation executed by the mobile terminal, and the number of times are in accordance with the entrance guard release operation posture and number of times preset for the mobile terminal within the effective entrance guard release time;
if so, the entrance guard controlled by the entrance guard equipment is released, otherwise, the entrance guard controlled by the entrance guard equipment is maintained.
As an embodiment, the preset effective access control release time, the preset access control release operation duration, the preset access control release operation posture and the number of times are configured in the access control device in advance; or,
the preset effective entrance guard removing time, the preset entrance guard removing operation duration, the preset entrance guard removing operation posture and the number of times are acquired from the server by the entrance guard equipment.
As an embodiment, the processor 802 further includes, after verifying that the condition is satisfied and before releasing the access controlled by the access control device:
acquiring current first access control authority information of the mobile terminal;
comparing whether the first access control authority information is consistent with second access control authority information pre-bound with the mobile terminal;
if the access control is consistent with the access control device, the access control of the access control device is continuously executed, and if the access control is inconsistent with the access control device, the access control device is triggered to execute and maintain the access control of the access control device.
As an embodiment, after releasing the access control controlled by the access control device, the processor 802 further uploads a message of releasing the access control of the access control device to the server, so that the server counts and stores the load information of the access control device;
and when determining to maintain the access control controlled by the access control device, the processor 802 further uploads a message that the mobile terminal with illegal authority tries to release the access control to the server, so that the server counts and stores the load information of the access control device.
Thus, the description of the structure of the apparatus shown in fig. 8 is completed.
Referring to fig. 9, fig. 9 is a diagram illustrating a second apparatus according to the present application. The device is applied to a server and corresponds to the flow shown in fig. 5. As shown in fig. 9, the apparatus may include:
a memory 901, configured to store and manage access control verification rules registered by a mobile terminal connected to the server, where the access control verification rules include: the method comprises the steps of setting effective entrance guard removing time for the mobile terminal, setting the duration of entrance guard removing operation for the mobile terminal within the effective entrance guard removing time, and setting the posture and the times of entrance guard removing operation;
the communication unit 902 is used for sending the access control verification rule to the access control equipment connected with the server, so that the access control equipment detects that the mobile terminal triggers the access control verification, and the access control verification rule verifies whether the following conditions are met: whether the current time is aiming at in the time is relieved to the valid entrance guard that mobile terminal predetermines, whether the length of time of the entrance guard removal operation that mobile terminal executed accords with in the time is relieved to the valid entrance guard right in the time is relieved to the entrance guard that mobile terminal predetermines and the length of time is relieved the entrance guard that mobile terminal executed removes the posture of operation, the number of times accords with in the time is relieved to the valid entrance guard aim at entrance guard that mobile terminal predetermines removes operation posture, number of times.
As an embodiment, in this application, the communication unit 902 is further configured to receive a message that the access control device releases the access control after releasing the access control controlled by the access control device, and receive a message that the access control device attempts to release the access control at a mobile terminal that determines to maintain an illegal authority sent by the access control controlled by the access control device, so as to count load information of the access control device according to the received message.
Thus, the description of the structure of the device shown in fig. 9 is completed.
Referring to fig. 10, fig. 10 is a view illustrating a third apparatus according to the present invention. The device is applied to a server and corresponds to the flow shown in fig. 6. As shown in fig. 10, the apparatus may include:
a memory 1001 for storing and managing access control verification rules registered by the mobile terminal connected to the server, wherein the access control verification rules include: the method comprises the steps of setting effective entrance guard removing time for the mobile terminal, setting the duration of entrance guard removing operation for the mobile terminal within the effective entrance guard removing time, and setting the posture and the times of entrance guard removing operation;
the processor 1002 is configured to, when it is detected that the mobile terminal triggers the access control verification, verify whether the following conditions are satisfied according to the access control verification rule: whether the current time is within an effective entrance guard release time preset for the mobile terminal, whether the time length of entrance guard release operation executed by the mobile terminal is in accordance with the entrance guard release operation time length preset for the mobile terminal within the effective entrance guard release time, the posture of entrance guard release operation executed by the mobile terminal, and the number of times are in accordance with the entrance guard release operation posture and number of times preset for the mobile terminal within the effective entrance guard release time;
and the communication unit 1003 is configured to send the verification result to the access control device connected to the mobile terminal, so that the access control device releases the access control controlled by the access control device when the verification result is yes, and maintains the access control controlled by the access control device when the verification result is no.
As an embodiment, in this application, the communication unit 1003 is further configured to receive a message that the access control device releases the access after releasing the access controlled by the access control device, and receive a message that the access control device attempts to release the access at a mobile terminal that determines to maintain an illegal authority sent by the access controlled by the access control device, so as to count load information of the access control device according to the received message.
Thus, the description of the structure of the apparatus shown in fig. 10 is completed.
In the present application, the embodiments of the apparatus correspond to the embodiments of the method basically, so that the relevant points can be referred to the partial description of the embodiments of the method. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the application. One of ordinary skill in the art can understand and implement it without inventive effort.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.

Claims (14)

1. An access control method is applied to access control equipment and is characterized by comprising the following steps:
establishing connection with a mobile terminal;
when detecting that the mobile terminal triggers the entrance guard verification, verifying whether the following conditions are met: whether the current time is within an effective entrance guard release time preset for the mobile terminal, whether the time length of entrance guard release operation executed by the mobile terminal is in accordance with the entrance guard release operation time length preset for the mobile terminal within the effective entrance guard release time, the posture of entrance guard release operation executed by the mobile terminal, and the number of times are in accordance with the entrance guard release operation posture and number of times preset for the mobile terminal within the effective entrance guard release time;
if so, the entrance guard controlled by the entrance guard equipment is released, otherwise, the entrance guard controlled by the entrance guard equipment is maintained.
2. The method according to claim 1, wherein the preset effective entrance guard release time, the preset entrance guard release operation duration, the preset entrance guard release operation posture and the number of times are configured in the entrance guard device in advance; or,
the preset effective entrance guard removing time, the preset entrance guard removing operation duration, the preset entrance guard removing operation posture and the number of times are acquired from the server by the entrance guard equipment.
3. The method of claim 1, after verifying that the condition is satisfied and before releasing the access controlled by the access control device, further comprising:
acquiring current first access control authority information of the mobile terminal;
comparing whether the first access control authority information is consistent with second access control authority information pre-bound with the mobile terminal;
if the access control is consistent with the access control device, the access control of the access control device is continuously executed, and if the access control is inconsistent with the access control device, the access control device is triggered to execute and maintain the access control of the access control device.
4. The method of claim 1, wherein after releasing the access controlled by the access control device, the method further comprises: uploading the information of releasing the access control of the access control equipment to a server, and counting and storing the load information of the access control equipment by the server;
when the entrance guard for maintaining the control of the entrance guard equipment is determined, the method further comprises the following steps: and uploading the message of trying to remove the access control by the mobile terminal with the illegal authority to a server so as to count and store the load information of the access control equipment by the server.
5. The access control method is applied to a server and comprises the following steps:
the access control verification rule registered by the mobile terminal connected with the server is stored and managed, and comprises the following steps: the method comprises the steps of setting effective entrance guard removing time for the mobile terminal, setting the duration of entrance guard removing operation for the mobile terminal within the effective entrance guard removing time, and setting the posture and the times of entrance guard removing operation;
will entrance guard's rule of verifying is sent for the entrance guard's equipment that this server is connected, with by entrance guard's equipment is detecting when mobile terminal triggers entrance guard's verification, the basis entrance guard verifies that the following condition is satisfied with the rule of verifying: whether the current time is aiming at in the time is relieved to the valid entrance guard that mobile terminal predetermines, whether the length of time of the entrance guard removal operation that mobile terminal executed accords with in the time is relieved to the valid entrance guard right in the time is relieved to the entrance guard that mobile terminal predetermines and the length of time is relieved the entrance guard that mobile terminal executed removes the posture of operation, the number of times accords with in the time is relieved to the valid entrance guard aim at entrance guard that mobile terminal predetermines removes operation posture, number of times.
6. The access control method is applied to a server and comprises the following steps:
the access control verification rule registered by the mobile terminal connected with the server is stored and managed, and comprises the following steps: the method comprises the steps of setting effective entrance guard removing time for the mobile terminal, setting the duration of entrance guard removing operation for the mobile terminal within the effective entrance guard removing time, and setting the posture and the times of entrance guard removing operation;
when detecting that the mobile terminal triggers the entrance guard verification, verifying whether the following conditions are met according to the entrance guard verification rule: whether the current time is within an effective entrance guard release time preset for the mobile terminal, whether the time length of entrance guard release operation executed by the mobile terminal is in accordance with the entrance guard release operation time length preset for the mobile terminal within the effective entrance guard release time, the posture of entrance guard release operation executed by the mobile terminal, and the number of times are in accordance with the entrance guard release operation posture and number of times preset for the mobile terminal within the effective entrance guard release time;
and sending the verification result to the access control equipment connected with the mobile terminal, so that the access control equipment removes the access control controlled by the access control equipment when the verification result is yes, and otherwise, maintains the access control controlled by the access control equipment.
7. An access control device, characterized in that the device is applied to access control equipment, includes:
the communication unit is used for establishing connection with the mobile terminal;
the processor is used for verifying whether the following conditions are met or not when the mobile terminal is detected to trigger the entrance guard verification: whether the current time is within an effective entrance guard release time preset for the mobile terminal, whether the time length of entrance guard release operation executed by the mobile terminal is in accordance with the entrance guard release operation time length preset for the mobile terminal within the effective entrance guard release time, the posture of entrance guard release operation executed by the mobile terminal, and the number of times are in accordance with the entrance guard release operation posture and number of times preset for the mobile terminal within the effective entrance guard release time;
if so, the entrance guard controlled by the entrance guard equipment is released, otherwise, the entrance guard controlled by the entrance guard equipment is maintained.
8. The device of claim 7, wherein the preset effective entrance guard release time, the preset entrance guard release operation duration, the preset entrance guard release operation posture and the preset entrance guard release operation times are configured in the entrance guard equipment in advance; or,
the preset effective entrance guard removing time, the preset entrance guard removing operation duration, the preset entrance guard removing operation posture and the number of times are acquired from the server by the entrance guard equipment.
9. The apparatus of claim 7, wherein the processor, after verifying that the condition is satisfied and before releasing the access controlled by the access control device, further comprises:
acquiring current first access control authority information of the mobile terminal;
comparing whether the first access control authority information is consistent with second access control authority information pre-bound with the mobile terminal;
if the access control is consistent with the access control device, the access control of the access control device is continuously executed, and if the access control is inconsistent with the access control device, the access control device is triggered to execute and maintain the access control of the access control device.
10. The device of claim 7, wherein the processor further uploads a message of releasing the access control of the access control device to the server after releasing the access control controlled by the access control device, so that the server counts and stores the load information of the access control device;
when the processor determines to maintain the access control controlled by the access control equipment, the processor further uploads the message of trying to remove the access control by the mobile terminal with illegal authority to the server so as to count and store the load information of the access control equipment by the server.
11. An access control device, applied to a server, comprising:
the memorizer is used for storing and managing the access control verification rule registered by the mobile terminal connected with the server, and the access control verification rule comprises the following steps: the method comprises the steps of setting effective entrance guard removing time for the mobile terminal, setting the duration of entrance guard removing operation for the mobile terminal within the effective entrance guard removing time, and setting the posture and the times of entrance guard removing operation;
the communication unit is used for sending the access control verification rule to the access control equipment connected with the server, so that the access control equipment detects that the mobile terminal triggers access control verification, and the access control verification rule verifies whether the following conditions are met: whether the current time is aiming at in the time is relieved to the valid entrance guard that mobile terminal predetermines, whether the length of time of the entrance guard removal operation that mobile terminal executed accords with in the time is relieved to the valid entrance guard right in the time is relieved to the entrance guard that mobile terminal predetermines and the length of time is relieved the entrance guard that mobile terminal executed removes the posture of operation, the number of times accords with in the time is relieved to the valid entrance guard aim at entrance guard that mobile terminal predetermines removes operation posture, number of times.
12. An access control device, applied to a server, comprising:
the memorizer is used for storing and managing the access control verification rule registered by the mobile terminal connected with the server, and the access control verification rule comprises the following steps: the method comprises the steps of setting effective entrance guard removing time for the mobile terminal, setting the duration of entrance guard removing operation for the mobile terminal within the effective entrance guard removing time, and setting the posture and the times of entrance guard removing operation;
the processor is used for verifying whether the following conditions are met or not according to the access control verification rule when the mobile terminal is detected to trigger the access control verification: whether the current time is within an effective entrance guard release time preset for the mobile terminal, whether the time length of entrance guard release operation executed by the mobile terminal is in accordance with the entrance guard release operation time length preset for the mobile terminal within the effective entrance guard release time, the posture of entrance guard release operation executed by the mobile terminal, and the number of times are in accordance with the entrance guard release operation posture and number of times preset for the mobile terminal within the effective entrance guard release time;
and the communication unit is used for sending the verification result to the access control equipment connected with the mobile terminal, so that the access control equipment is used for releasing the access control controlled by the access control equipment when the verification result is yes, and maintaining the access control controlled by the access control equipment when the verification result is no.
13. An access control system, comprising: the system comprises a server, a mobile terminal and an access control device;
the server is used for storing and managing the access control verification rule of the server to which the mobile terminal connected with the server is registered, and sending the access control verification rule to the access control equipment connected with the server;
the mobile terminal is used for registering to the server;
the access control equipment is connected with the mobile terminal and the server and used for receiving the access control verification rule, when the access control verification rule is detected, the mobile terminal triggers the access control verification, and the access control verification rule verifies whether the following conditions are met: whether current time is in aim at in the time is relieved to the effective entrance guard that mobile terminal predetermine the time whether the length of time of the entrance guard removal operation that mobile terminal executed accords with in the time is relieved to effective entrance guard right in the time is relieved to the entrance guard that mobile terminal predetermine the length of time the posture, the number of times of the entrance guard removal operation that mobile terminal executed accord with in the time is relieved to effective entrance guard right in the time the operation posture, the number of times are relieved to the entrance guard that mobile terminal predetermine, if, the entrance guard of this entrance guard equipment control is relieved, otherwise, the entrance guard of this entrance guard equipment control is maintained.
14. An access control system, comprising: the system comprises a server, a mobile terminal and an access control device;
the mobile terminal is used for registering to the server;
the server is used for storing and managing access control verification rules that the mobile terminal connected with the server is registered to the server, and when detecting that the mobile terminal triggers access control verification, whether the following conditions are met or not is verified according to the access control verification rules: whether the current time is within an effective entrance guard release time preset for the mobile terminal, whether the time length of entrance guard release operation executed by the mobile terminal is in accordance with the entrance guard release operation time length preset for the mobile terminal within the effective entrance guard release time, the posture of entrance guard release operation executed by the mobile terminal, and the number of times are in accordance with the entrance guard release operation posture and number of times preset for the mobile terminal within the effective entrance guard release time; sending a verification result to the access control equipment connected with the mobile terminal;
the access control equipment is connected with the mobile terminal and the server and used for receiving the verification result, removing the access control controlled by the access control equipment, and receiving the verification result, and maintaining the access control controlled by the access control equipment if the verification result is not.
CN201810483406.8A 2018-05-18 2018-05-18 Access control method, apparatus and system Pending CN110503750A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810483406.8A CN110503750A (en) 2018-05-18 2018-05-18 Access control method, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810483406.8A CN110503750A (en) 2018-05-18 2018-05-18 Access control method, apparatus and system

Publications (1)

Publication Number Publication Date
CN110503750A true CN110503750A (en) 2019-11-26

Family

ID=68584093

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810483406.8A Pending CN110503750A (en) 2018-05-18 2018-05-18 Access control method, apparatus and system

Country Status (1)

Country Link
CN (1) CN110503750A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930617A (en) * 2012-10-10 2013-02-13 李凯 Mobile equipment unlocking system and method
CN103177495A (en) * 2013-04-02 2013-06-26 李凯 Door lock system applied to hotels
CN103236094A (en) * 2013-03-29 2013-08-07 东莞宇龙通信科技有限公司 Door control system and method of unlocking door control equipment by mobile terminal
CN105847451A (en) * 2016-06-12 2016-08-10 深圳益强信息科技有限公司 Method and system for controlling intelligent access control unit by using mobile terminal
CN106447855A (en) * 2016-09-19 2017-02-22 深圳博科智能科技有限公司 Shake-based unlocking method and terminal equipment
CN107492167A (en) * 2017-07-14 2017-12-19 咪咕音乐有限公司 A kind of method, apparatus and computer-readable recording medium for releasing door-control lock
US20180108192A1 (en) * 2014-12-23 2018-04-19 Gate Labs Inc. Access management system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930617A (en) * 2012-10-10 2013-02-13 李凯 Mobile equipment unlocking system and method
CN103236094A (en) * 2013-03-29 2013-08-07 东莞宇龙通信科技有限公司 Door control system and method of unlocking door control equipment by mobile terminal
CN103177495A (en) * 2013-04-02 2013-06-26 李凯 Door lock system applied to hotels
US20180108192A1 (en) * 2014-12-23 2018-04-19 Gate Labs Inc. Access management system
CN105847451A (en) * 2016-06-12 2016-08-10 深圳益强信息科技有限公司 Method and system for controlling intelligent access control unit by using mobile terminal
CN106447855A (en) * 2016-09-19 2017-02-22 深圳博科智能科技有限公司 Shake-based unlocking method and terminal equipment
CN107492167A (en) * 2017-07-14 2017-12-19 咪咕音乐有限公司 A kind of method, apparatus and computer-readable recording medium for releasing door-control lock

Similar Documents

Publication Publication Date Title
US20210295327A1 (en) Unique transaction identifier, which may also include a time expiration value, is assigned by a first network website to an electronic instruction to collect specified distinctive identifiers from a local/mobile computing device seeking access to said first network website
CN105939326B (en) Method and device for processing message
US10826684B1 (en) System and method of validating Internet of Things (IOT) devices
EP3346660B1 (en) Authentication information update method and device
US10068397B2 (en) System and method for access control using context-based proof
CN108259502B (en) Authentication method for obtaining interface access authority, server and storage medium
CN109088865B (en) User identity authentication method and device, readable storage medium and computer equipment
KR101451359B1 (en) User account recovery
US20060009195A1 (en) Wireless communications unauthorized use verification system
CN107086979B (en) User terminal verification login method and device
CN113542399B (en) Remote control method and device for vehicle, vehicle and storage medium
CN110768942B (en) Identity authentication system
CN104243158A (en) Authentication method, communication system, device and server
CN103686651A (en) Emergency call based authentication method, device and system
CN111182547A (en) Login protection method, device and system
CN107872588B (en) Call processing method, related device and system
WO2015113351A1 (en) Information processing method, terminal and server, and communication method and system
CN107872446B (en) Communication account management method and device and server
JP2013122784A (en) Information processing method, information processor and system
CN105828322B (en) A kind of method, mobile terminal and security centre that user logs in
CN109460647A (en) A kind of method that more equipment safeties log in
CN110503750A (en) Access control method, apparatus and system
CN110011992B (en) System login method and electronic equipment
CN104703173A (en) Terminal application account configuration and detection method, device and system
KR102020488B1 (en) An apparatus for Internet access control of IoT devices and a method therefor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191126