Access control method, device, equipment and storage medium based on narrow-band Internet of things

文档序号:736819 发布日期:2021-04-20 浏览:25次 中文

阅读说明:本技术 基于窄带物联网的门禁控制方法、装置、设备及存储介质 (Access control method, device, equipment and storage medium based on narrow-band Internet of things ) 是由 唐瑞波 王鑫 马凤鸣 李玮棠 陈杰文 刘毅 于 2020-12-31 设计创作,主要内容包括:本申请实施例公开了基于窄带物联网的门禁控制方法、装置、设备及存储介质。本申请实施例提供的技术方案通过无线门禁提供随时间改变的门禁二维码,由用户终端扫描门禁二维码得到目标门禁信息并发出门禁解锁请求,在接收到用户终端发出的门禁解锁请求后,根据目标门禁信息和用户信息生成门禁验证信息,并由云服务器基于门禁验证信息进行门禁验证,根据云服务器返回的门禁验证结果确定对门禁进行上锁或解锁,不需要用户终端在解锁时选择需要解锁的门禁,解锁操作过程简单,有效提升用户体验。(The embodiment of the application discloses a narrow-band Internet of things-based access control method, device, equipment and storage medium. The technical scheme that this application embodiment provided provides the entrance guard two-dimensional code that changes along with the time through wireless entrance guard, obtain target entrance guard information and issue the entrance guard unblock request by user terminal scanning entrance guard two-dimensional code, after receiving the entrance guard unblock request that user terminal sent, according to target entrance guard information and user information generation entrance guard verification information, and carry out the entrance guard by the cloud ware based on entrance guard verification information and verify, confirm to lock or the unblock the entrance guard according to the entrance guard verification result that the cloud ware returned, do not need the user terminal to select the entrance guard that needs the unblock when the unblock, entrance guard unblock operation process is simple, effectively promote user experience.)

1. A narrow-band Internet of things-based access control method is characterized by comprising the following steps:

responding to an access control unlocking request sent by a user terminal connected to the same narrow-band Internet of things network, and determining wireless access control information carried by the access control unlocking request and user information of the user terminal, wherein the wireless access control information is obtained by identifying the user terminal based on an access control two-dimensional code which is provided by a wireless access control and changes along with time, and the wireless access control and the user terminal are connected to the same narrow-band Internet of things network;

generating access control verification information based on the wireless access control information and the user information, sending the access control verification information to a cloud server, and performing access control verification by the cloud server based on the access control verification information to obtain an access control verification result;

and sending control information to the wireless access control based on the access control verification result so as to inform the wireless access control to execute an access control locking action or an access control unlocking action.

2. The access control method based on the narrowband internet of things of claim 1, wherein the wireless access control information is obtained by encrypting an access timestamp and access identification information by the wireless access control based on a set access key, and the access two-dimensional code is generated by the wireless access control based on the wireless access control information.

3. The access control method based on the narrowband internet of things of claim 2, wherein the generating of access verification information based on the wireless access control information and the user information comprises:

decrypting the wireless access control information based on the set access control key to obtain an access control timestamp and access control identification information, and judging whether the distance between the access control timestamp and the current time is within a verification time threshold value;

and if the access control information is within the verification time threshold, generating access control verification information based on the access control identification information and the user information.

4. The access control method based on the narrowband internet of things of claim 2, further comprising:

and randomly generating a new entrance guard key based on a set time interval, and informing the wireless entrance guard to update the original entrance guard key into the new entrance guard key.

5. The access control method based on the narrowband internet of things of claim 4, wherein the notifying the wireless access control to update the original access key to a new access key comprises:

the access control key is encrypted based on the public key and is sent to each wireless access control after encryption, and the wireless access control is based on the public key is updated the access control key is updated in a covering manner to the original access control key.

6. The access control method based on the narrowband internet of things of claim 4, wherein the notifying the wireless access control to update the original access key to a new access key comprises:

confirming a communication channel communicated with each wireless access control, sequentially sending a new access control key to the wireless access control based on the corresponding communication channel, and simultaneously sending artificial noise orthogonal to the communication information vector, wherein the wireless access control is based on the access control key to originally cover and update the access control key.

7. The access control method based on the narrowband internet of things of claim 6, wherein the sending new access keys to the wireless access control in sequence based on the corresponding communication channels comprises:

sequentially sending a new access control key and a key timestamp generated by the access control key to the wireless access control based on the corresponding communication channel;

the wireless entrance guard is informed the wireless entrance guard will be original after the entrance guard key is updated to new entrance guard key, still include:

and determining whether the wireless access control successfully updates the access control key or not based on the key timestamp returned by the wireless access control, wherein the wireless access control responds to the key timestamp returned by the access control key updating successfully.

8. The utility model provides an entrance guard control device based on narrowband thing networking which characterized in that, includes request response module, entrance guard verification module and entrance guard execution module, wherein:

the request response module is used for responding to an entrance guard unlocking request sent by a user terminal connected to the same narrow-band Internet of things network, determining wireless entrance guard information carried by the entrance guard unlocking request and user information of the user terminal, wherein the wireless entrance guard information is obtained by identifying an entrance guard two-dimensional code which is provided by the user terminal and changes along with time and is based on wireless entrance guard, and the wireless entrance guard and the user terminal are connected to the same narrow-band Internet of things network;

the access control verification module is used for generating access control verification information based on the wireless access control information and the user information, sending the access control verification information to a cloud server, and performing access control verification by the cloud server based on the access control verification information to obtain an access control verification result;

and the access control execution module is used for issuing control information to the wireless access control based on the access control verification result so as to inform the wireless access control to execute access control locking action or access control unlocking action.

9. The utility model provides an entrance guard's controlgear based on narrowband thing networking which characterized in that includes: a memory and one or more processors; the memory for storing one or more programs;

when the one or more programs are executed by the one or more processors, the one or more processors implement the access control method based on the narrowband internet of things according to any one of claims 1 to 7.

10. A storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform the narrowband internet of things based access control method according to any one of claims 1 to 7.

Technical Field

The embodiment of the application relates to the technical field of narrowband Internet of things, in particular to a method, a device, equipment and a storage medium for access control based on narrowband Internet of things.

Background

With the acceleration of the rhythm of social life, more and more people can choose to rent houses in the city of work, and in order to ensure the safety of the living environment of people, a wireless entrance guard is usually arranged at an entrance and an exit of the house.

At present, cellular communication technologies such as GSM, CDMA, WCDMA, etc. are generally adopted as communication technologies of a wireless access control system, and the communication technologies have the problem of weak signal coverage capability, and the situations of unsmooth communication and incapability of implementation often occur in a complex environment. The narrow-band Internet of things technology solves the problem of signal coverage of access control in a complex environment, but when a user needs to unlock the access control, the user needs to select the access control needing unlocking on a user terminal, the unlocking operation process is complex, and the user experience is poor.

Disclosure of Invention

The embodiment of the application provides an access control method, an access control device, access control equipment and a storage medium based on a narrowband Internet of things, and aims to solve the problems that a wireless access control unlocking operation process is complex and user experience is poor.

In a first aspect, an embodiment of the present application provides an access control method based on a narrowband internet of things, including:

responding to an access control unlocking request sent by a user terminal connected to the same narrow-band Internet of things network, and determining wireless access control information carried by the access control unlocking request and user information of the user terminal, wherein the wireless access control information is obtained by identifying the user terminal based on an access control two-dimensional code which is provided by a wireless access control and changes along with time, and the wireless access control and the user terminal are connected to the same narrow-band Internet of things network;

generating access control verification information based on the wireless access control information and the user information, sending the access control verification information to a cloud server, and performing access control verification by the cloud server based on the access control verification information to obtain an access control verification result;

and sending control information to the wireless access control based on the access control verification result so as to inform the wireless access control to execute an access control locking action or an access control unlocking action.

Further, wireless entrance guard information by wireless entrance guard obtains based on the entrance guard key of setting up carries out the encryption to entrance guard timestamp and entrance guard identification information, the entrance guard two-dimensional code by wireless entrance guard is based on wireless entrance guard information generates.

Further, generating access control verification information based on the wireless access control information and the user information includes:

decrypting the wireless access control information based on the set access control key to obtain an access control timestamp and access control identification information, and judging whether the distance between the access control timestamp and the current time is within a verification time threshold value;

and if the access control information is within the verification time threshold, generating access control verification information based on the access control identification information and the user information.

Further, the access control method further comprises the following steps:

and randomly generating a new entrance guard key based on a set time interval, and informing the wireless entrance guard to update the original entrance guard key into the new entrance guard key.

Further, notifying the wireless access control to update the original access control key to a new access control key, including:

the access control key is encrypted based on the public key and is sent to each wireless access control after encryption, and the wireless access control is based on the public key is updated the access control key is updated in a covering manner to the original access control key.

Further, notifying the wireless access control to update the original access control key to a new access control key, including:

confirming a communication channel communicated with each wireless access control, sequentially sending a new access control key to the wireless access control based on the corresponding communication channel, and simultaneously sending artificial noise orthogonal to the communication information vector, wherein the wireless access control is based on the access control key to originally cover and update the access control key.

Further, based on correspond communication channel in proper order to wireless entrance guard sends newly the entrance guard's key includes:

sequentially sending a new access control key and a key timestamp generated by the access control key to the wireless access control based on the corresponding communication channel;

the wireless entrance guard is informed the wireless entrance guard will be original after the entrance guard key is updated to new entrance guard key, still include:

and determining whether the wireless access control successfully updates the access control key or not based on the key timestamp returned by the wireless access control, wherein the wireless access control responds to the key timestamp returned by the access control key updating successfully.

In a second aspect, an embodiment of the present application provides an entrance guard control device based on a narrowband internet of things, including a request response module, an entrance guard verification module and an entrance guard execution module, wherein:

the request response module is used for responding to an entrance guard unlocking request sent by a user terminal connected to the same narrow-band Internet of things network, determining wireless entrance guard information carried by the entrance guard unlocking request and user information of the user terminal, wherein the wireless entrance guard information is obtained by identifying an entrance guard two-dimensional code which is provided by the user terminal and changes along with time and is based on wireless entrance guard, and the wireless entrance guard and the user terminal are connected to the same narrow-band Internet of things network;

the access control verification module is used for generating access control verification information based on the wireless access control information and the user information, sending the access control verification information to a cloud server, and performing access control verification by the cloud server based on the access control verification information to obtain an access control verification result;

and the access control execution module is used for issuing control information to the wireless access control based on the access control verification result so as to inform the wireless access control to execute access control locking action or access control unlocking action.

In a third aspect, an embodiment of the present application provides an access control device based on a narrowband internet of things, including: a memory and one or more processors; the memory for storing one or more programs;

when the one or more programs are executed by the one or more processors, the one or more processors implement the access control method based on the narrowband internet of things according to the first aspect.

In a fourth aspect, embodiments of the present application provide a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform the method for controlling a narrow-band internet of things-based access control according to the first aspect.

The embodiment of the application provides the entrance guard two-dimensional code that changes along with time through wireless entrance guard, obtain target entrance guard information and send out the entrance guard unblock request by user terminal scanning entrance guard two-dimensional code, after receiving the entrance guard unblock request that user terminal sent, according to target entrance guard information and user information generation entrance guard verification information, and carry out the entrance guard by the cloud ware based on entrance guard verification information and verify, confirm to lock or unblock the entrance guard according to the entrance guard verification result that the cloud ware returned, do not need the entrance guard that user terminal selected the needs unblock when the unblock, unblock operation process is simple, effectively promote user experience.

Drawings

Fig. 1 is a flowchart of an access control method based on a narrowband internet of things provided in an embodiment of the present application;

fig. 2 is a flowchart of another access control method based on a narrowband internet of things according to an embodiment of the present application;

fig. 3 is a schematic structural diagram of an access control device based on a narrowband internet of things according to an embodiment of the present application;

fig. 4 is a schematic structural diagram of an access control device based on a narrowband internet of things provided by an embodiment of the application.

Detailed Description

In order to make the objects, technical solutions and advantages of the present application more apparent, specific embodiments of the present application will be described in detail with reference to the accompanying drawings. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be further noted that, for the convenience of description, only some but not all of the relevant portions of the present application are shown in the drawings. Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently or simultaneously. In addition, the order of the operations may be re-arranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.

Fig. 1 is a flowchart of an access control method based on a narrowband internet of things provided in an embodiment of the present application, where the access control method based on the narrowband internet of things provided in the embodiment of the present application may be executed by an access control device based on the narrowband internet of things, and the access control device based on the narrowband internet of things may be implemented in a hardware and/or software manner and integrated in an access control device based on the narrowband internet of things (e.g., a narrowband internet of things gateway).

The following description will be given by taking as an example that the access control device based on the narrowband internet of things executes the access control method based on the narrowband internet of things. Referring to fig. 1, the access control method based on the narrowband internet of things includes:

s101: the method comprises the steps of responding to an entrance guard unlocking request sent by a user terminal connected to the same narrow-band Internet of things network, determining target entrance guard information carried by the entrance guard unlocking request, and user information of the user terminal, wherein the target entrance guard information is obtained by identifying an entrance guard two-dimensional code which is provided by the user terminal based on wireless entrance guard and changes along with time, and the wireless entrance guard and the user terminal are connected to the same narrow-band Internet of things network.

The access control device based on the narrowband internet of things (hereinafter referred to as an access control device), the user terminal and the wireless access control provided by the embodiment are all connected in the same narrowband internet of things network, wherein the wireless access control is in communication connection with the access control device in a wired and/or wireless manner, and the user terminal can be an intelligent device which can establish communication connection with the access control device in a short-distance wireless communication (such as WiFi, NFC, bluetooth and the like) manner, such as a smart phone, a tablet computer and the like. Further, the embodiment of the application also provides a cloud server which is communicated with the entrance guard control device through an internet network.

Wherein, the wireless entrance guard that this embodiment provided is provided with the display screen that is used for showing the entrance guard two-dimensional code, the wireless entrance guard two-dimensional code of difference corresponds different entrance guard, the entrance guard two-dimensional code record has the target entrance guard information that corresponds wireless entrance guard, and the entrance guard two-dimensional code that every wireless entrance guard shows changes along with time (the target entrance guard information that corresponds also changes along with time), can acquire target entrance guard information through scanning and analytic entrance guard two-dimensional code, can confirm the wireless entrance guard that this entrance guard two-dimensional code corresponds according to this target entrance guard information. The entrance guard two-dimensional code which changes along with time is provided through the wireless entrance guard, the entrance guard two-dimensional code remote unlocking wireless entrance guard of the record of taking a picture can be reduced for users, and the condition that the users who do not carry the user terminal pass through the wireless entrance guard is caused, and the safety of the wireless entrance guard is effectively guaranteed.

Further, the user terminal provided by this embodiment has a camera module, and can scan the two-dimensional code and acquire information recorded by the two-dimensional code through the camera module. Specifically, when the wireless access control device needs to be unlocked, the user terminal can scan the access control two-dimensional code provided by the wireless access control device to be opened, target access control information recorded in the access control two-dimensional code is acquired, an access control unlocking request carrying the target access control information and user information of the user terminal is generated, and the access control unlocking request is sent to the access control device through the narrow-band internet of things.

Illustratively, after receiving an access unlocking request sent by a user terminal, the access unlocking request is analyzed to obtain target access information and user information carried by the access unlocking request, and the wireless access required to be unlocked by the user terminal can be determined according to the target access information.

S102: and generating access control verification information based on the target access control information and the user information, sending the access control verification information to a cloud server, and performing access control verification by the cloud server based on the access control verification information to obtain an access control verification result.

Illustratively, after target access control information and user information carried by an access control unlocking request are determined, access control verification information is generated based on the target access control information and the user information, and the access control verification information is sent to a cloud server so as to inform the cloud server of performing access control verification based on the access control verification information.

The cloud server provided by the embodiment of the application records the user information of different authorized users and the user entrance guard corresponding relation between the wireless entrance guards (represented by entrance guard identification information) with unlocking authorities of all the user information, and records the user entrance guard corresponding relation in the user entrance guard linked list. It can be understood that one piece of user information may correspond to one or more wireless access controls, that is, one or more wireless access controls may be unlocked through a user terminal corresponding to one piece of user information.

The cloud server analyzes the entrance guard verification information to obtain corresponding target entrance guard information and user information after receiving the entrance guard verification information, searches the user information in the recorded user entrance guard linked list, further searches whether a wireless entrance guard corresponding to the target entrance guard information carried by the entrance guard verification information is recorded in the user entrance guard linked list if the user information is searched, generates an entrance guard verification result indicating that the entrance guard passes the entrance guard verification when the wireless entrance guard corresponding to the target entrance guard information carried by the entrance guard verification information is recorded, and generates an entrance guard verification result indicating that the entrance guard does not pass the entrance guard verification if the user information is not searched or the wireless entrance guard corresponding to the target entrance guard information carried by the entrance guard verification information is not recorded in the user entrance guard linked list.

Further, after the entrance guard verification result is determined, corresponding target entrance guard information is attached to the entrance guard verification result, and the entrance guard verification result is sent to the entrance guard control device.

S103: and sending control information to the wireless access control based on the access control verification result so as to inform the wireless access control to execute an access control locking action or an access control unlocking action.

Illustratively, after receiving an access control verification result returned by the cloud server, corresponding control information is generated according to the access control verification result. For example, when the entrance guard verification result indicates that the entrance guard verification passes, control information indicating unlocking is generated, the control information is sent to the wireless entrance guard corresponding to the target entrance guard information attached to the entrance guard verification result, and the wireless entrance guard executes an entrance guard unlocking action after receiving the control information, so that the user can pass through the wireless entrance guard.

And when the entrance guard verification result indicates that the entrance guard verification fails, the wireless entrance guard does not respond and terminates the entrance guard control flow, at the moment, the wireless entrance guard is kept in a locked state, or control information indicating locking is generated according to the entrance guard verification result, the control information is sent to the wireless entrance guard corresponding to the target entrance guard information attached to the entrance guard verification result, and the wireless entrance guard performs entrance guard locking action after receiving the control information to prevent an unauthorized user from passing through the wireless entrance guard.

The access control system comprises a cloud server, a wireless access control server and a wireless access control server, wherein the cloud server is used for sending access control verification information to the access control server, the access control verification information comprises access control verification information, access control two-dimensional codes changing along with time are provided through the wireless access control server, the user terminal scans the access control two-dimensional codes to obtain target access control information and sends out access control unlocking requests, after the access control unlocking requests sent by the user terminal are received, the access control verification information is generated according to the target access control information and the user information, access control verification is carried out by the cloud server based on the access control verification information, the access control is locked or. Meanwhile, through providing the entrance guard two-dimensional code which changes along with time, the wireless entrance guard can be unlocked remotely by the entrance guard two-dimensional code of the shooting record of the reducible user, so that the situation that the user who does not carry the user terminal passes through the wireless entrance guard is caused, and the entrance guard unlocking request sent by the user terminal on the spot is received through the narrow-band Internet of things, so that the user who requests the wireless entrance guard unlocking at the wireless entrance guard can be ensured, and the safety of the wireless entrance guard is effectively ensured.

On the basis of the foregoing embodiment, fig. 2 is a flowchart of another access control method based on a narrowband internet of things provided in the embodiment of the present application, and the access control method based on the narrowband internet of things is a concrete implementation of the access control method based on the narrowband internet of things. Referring to fig. 2, the access control method based on the narrowband internet of things includes:

s201: and randomly generating a new entrance guard key based on a set time interval, and informing the wireless entrance guard to update the original entrance guard key into the new entrance guard key.

The access control device that this embodiment provided all keeps the same entrance guard key with each wireless entrance guard that it connects to this entrance guard key is updated by access control device according to the time interval that sets for, and updates in other wireless entrance guards in step.

Specifically, a new access key is randomly generated based on a set key bit number (for example, 8-16 bits) at set time intervals (for example, 30-120 min). And after generating the new entrance guard key, sending the new entrance guard key to the connected wireless entrance guards so as to inform the wireless entrance guards that the original entrance guard key is updated into the new entrance guard key.

In one embodiment, when notifying the wireless access control to update the original access control key to a new access control key, the method specifically includes:

the access control key is encrypted based on the public key and is sent to each wireless access control after encryption, and the wireless access control is based on the public key is updated the access control key is updated in a covering manner to the original access control key.

Specifically, before sending a new entrance guard key to each wireless entrance guard, the new entrance guard key is encrypted based on a public key commonly stored by the entrance guard control device and each wireless entrance guard, and then the encrypted entrance guard key is sent to each wireless entrance guard. After receiving the encrypted access key, the wireless access control decrypts the encrypted access key according to the public key to obtain a new access key, and performs coverage updating on the originally stored access key by using the new access key. Through encrypting the transmitted access control key, the risk that the access control key is stolen is reduced, and the safety of the wireless access control is effectively ensured.

In another embodiment, when notifying the wireless access control to update the original access control key to a new access control key, the method specifically includes:

confirming a communication channel communicated with each wireless access control, sequentially sending a new access control key to the wireless access control based on the corresponding communication channel, and simultaneously sending artificial noise orthogonal to the communication information vector, wherein the wireless access control is based on the access control key to originally cover and update the access control key.

Specifically, after a new entrance guard key is obtained, a communication channel for communicating with each wireless entrance guard is determined, the new entrance guard key is sequentially sent to each wireless entrance guard based on the corresponding communication channel, and artificial noise orthogonal to a corresponding communication channel vector is sent while the entrance guard key is sent to each wireless entrance guard. It can be understood that the artificial noise with orthogonal vectors has less influence on the receiver (wireless access control) of the corresponding communication channel, but is interfered by the artificial noise signal for eavesdroppers of other communication channels, thereby effectively ensuring the information security of the access control key in the transmission process. And after receiving the access key, the wireless access control utilizes the new access key to update the coverage of the originally stored access key. Optionally, on the basis of adding artificial noise to the communication channel, the new access key may be encrypted based on a public key that needs to be stored in common with each wireless access, and then the encrypted access key may be sent.

In a possible embodiment, the sequentially sending the new access key to the wireless access control based on the corresponding communication channel specifically includes: and sequentially sending the new access control key and the key timestamp generated by the access control key to the wireless access control based on the corresponding communication channel.

Notifying the wireless access control to update the original access control key to a new access control key, further comprising: and determining whether the wireless access control successfully updates the access control key or not based on the key timestamp returned by the wireless access control, wherein the wireless access control responds to the key timestamp returned by the access control key updating successfully.

Specifically, the new access control key is sequentially sent to each wireless access control based on the communication channel, and meanwhile, the corresponding key timestamp generated by the access control key is sent to each wireless access control. And after receiving the new access control key and performing coverage updating, the wireless access control returns the received key timestamp and feeds back that the access control key is updated.

After receiving the key timestamp returned by the wireless access control, comparing the key timestamp with the key timestamp stored by the wireless access control, if the key timestamps are consistent, determining that the corresponding wireless access control successfully updates the access control key, if the returned key timestamp is not received after the set time or the key timestamps are inconsistent, considering that the corresponding wireless access control key fails, and retransmitting a new access control key.

In a possible embodiment, when a new access key is generated and a wireless access control key with incomplete access key updating exists, the original access key is cached first until all the wireless access control keys complete key updating, and then the new access key is used for replacing the originally stored access key in a covering manner. And if receiving an access unlocking request pointing to the wireless access control with uncompleted access key updating, decrypting the target access control information based on the original access key.

S202: responding to an access control unlocking request sent by a user terminal connected to the same narrow-band Internet of things network, determining target access control information carried by the access control unlocking request, and user information of the user terminal, wherein the target access control information is obtained by encrypting an access control timestamp and access control identification information based on a set access control key of the wireless access control, and the access control two-dimensional code is generated based on the target access control information by the wireless access control, and the wireless access control and the user terminal are connected in the same narrow-band Internet of things network.

S203: and decrypting the target access control information based on the set access control key to obtain an access control timestamp and access control identification information, and judging whether the distance between the access control timestamp and the current time is within the verification time threshold value.

The target entrance guard information provided by the embodiment of the application is obtained by encrypting the entrance guard timestamp and the entrance guard identification information by the wireless entrance guard based on the set entrance guard key, and the entrance guard two-dimensional code is generated by the wireless entrance guard based on the target entrance guard information. The access control identification information may be an IP address, an MAC address, a device ID, a number of a wireless access control device, and the like, which is not limited in the present application.

Exemplarily, wireless entrance guard acquires current timestamp as entrance guard timestamp according to set time interval (for example, 5-30s), and integrate entrance guard timestamp and entrance guard identification information in real time (for example, overlap entrance guard timestamp and entrance guard identification information, or take out data and insert in the new numerical queue from entrance guard timestamp and entrance guard identification information according to the order of inserting of setting for in proper order), encrypt entrance guard timestamp and entrance guard identification information after the integration based on the entrance guard password, and according to the entrance guard timestamp after encrypting and entrance guard identification information generation corresponding entrance guard two-dimensional code, and show the entrance guard two-dimensional code.

Specifically, after determining target entrance guard information carried by the entrance guard unlocking request, the target entrance guard information is decrypted based on a corresponding entrance guard key to obtain an entrance guard timestamp and entrance guard identification information. Further, whether the distance between the access control timestamp and the current time is within a verification time threshold (for example, 10-40s) or not is judged, if the distance exceeds the verification time threshold, the access control unlocking request is considered to be overtime, the access control flow is terminated, and an overtime prompt is returned to the corresponding wireless access control or the user terminal.

S204: and if the access control information is within the verification time threshold, generating access control verification information based on the access control identification information and the user information.

Specifically, if the access control timestamp is within the verification time threshold from the current time, access control verification information is generated according to access control identification information obtained by decrypting the target access control information and user information sent by the user terminal.

S205: and sending the access control verification information to a cloud server, and performing access control verification by the cloud server based on the access control verification information to obtain an access control verification result.

S206: and sending control information to the wireless access control based on the access control verification result so as to inform the wireless access control to execute an access control locking action or an access control unlocking action.

The access control system comprises a cloud server, a wireless access control server and a wireless access control server, wherein the cloud server is used for sending access control verification information to the access control server, the access control verification information comprises access control verification information, access control two-dimensional codes changing along with time are provided through the wireless access control server, the user terminal scans the access control two-dimensional codes to obtain target access control information and sends out access control unlocking requests, after the access control unlocking requests sent by the user terminal are received, the access control verification information is generated according to the target access control information and the user information, access control verification is carried out by the cloud server based on the access control verification information, the access control is locked or. Meanwhile, through providing the entrance guard two-dimensional code which changes along with time, the entrance guard two-dimensional code remote unlocking wireless entrance guard of the shooting record of the user can be reduced, and the condition that the user who does not carry the user terminal passes through the wireless entrance guard is caused, and the safety of the wireless entrance guard is effectively guaranteed. The target entrance guard information is encrypted and protected in the transmission process of the target entrance guard information, the information safety in the transmission process of the target entrance guard information is guaranteed, an entrance guard key used for encrypting the target entrance guard information is updated regularly, the threat that the target entrance guard information is intercepted is further reduced, and the safety of wireless entrance guard is effectively protected.

Fig. 3 shows a schematic structural diagram of an access control device based on a narrowband internet of things according to an embodiment of the present application. Referring to fig. 3, the access control device based on the narrowband internet of things includes a request response module 31, an access authentication module 32, and an access execution module 33.

The request response module 31 is configured to respond to an access unlocking request sent by a user terminal connected to the same narrowband internet of things network, and determine target access information carried by the access unlocking request and user information of the user terminal, where the target access information is obtained by identifying, by the user terminal, an access two-dimensional code that changes with time and is provided by a wireless access, and the wireless access and the user terminal are connected to the same narrowband internet of things network; the access control verification module 32 is configured to generate access control verification information based on the target access control information and the user information, send the access control verification information to a cloud server, and perform access control verification by the cloud server based on the access control verification information to obtain an access control verification result; and the access control execution module 33 is configured to issue control information to the wireless access control based on the access control verification result so as to notify the wireless access control to execute an access control locking action or an access control unlocking action.

The access control system comprises a cloud server, a wireless access control server and a wireless access control server, wherein the cloud server is used for sending access control verification information to the access control server, the access control verification information comprises access control verification information, access control two-dimensional codes changing along with time are provided through the wireless access control server, the user terminal scans the access control two-dimensional codes to obtain target access control information and sends out access control unlocking requests, after the access control unlocking requests sent by the user terminal are received, the access control verification information is generated according to the target access control information and the user information, access control verification is carried out by the cloud server based on the access control verification information, the access control is locked or.

The embodiment of the application further provides access control equipment based on the narrowband Internet of things, and the access control equipment based on the narrowband Internet of things can integrate the access control device based on the narrowband Internet of things provided by the embodiment of the application. Fig. 4 is a schematic structural diagram of an access control device based on a narrowband internet of things provided by an embodiment of the application. Referring to fig. 4, the access control device based on the narrowband internet of things includes: an input device 43, an output device 44, a memory 42, and one or more processors 41; the memory 42 for storing one or more programs; when the one or more programs are executed by the one or more processors 41, the one or more processors 41 implement the access control method based on the narrowband internet of things as provided in the above embodiment. Wherein the input device 43, the output device 44, the memory 42 and the processor 41 may be connected by a bus or other means, for example, in fig. 4.

The memory 42 is a storage medium readable by a computing device and can be used for storing software programs, computer executable programs, and modules, such as program instructions/modules corresponding to the access control method based on the narrowband internet of things according to any embodiment of the present application (for example, the request response module 31, the access authentication module 32, and the access execution module 33 in the access control device based on the narrowband internet of things). The memory 42 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of the device, and the like. Further, the memory 42 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, memory 42 may further include memory located remotely from processor 41, which may be connected to the device over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.

The input device 43 may be used to receive input numeric or character information and to generate key signal inputs relating to user settings and function controls of the apparatus. The output device 44 may include a display device such as a display screen.

The processor 41 executes various functional applications and data processing of the device by running software programs, instructions and modules stored in the memory 42, that is, the above-mentioned access control method based on the narrowband internet of things is realized.

The access control device, the equipment and the computer based on the narrow-band Internet of things can be used for executing the access control method based on the narrow-band Internet of things provided by any embodiment, and have corresponding functions and beneficial effects.

An embodiment of the present application further provides a storage medium containing computer-executable instructions, where the computer-executable instructions are executed by a computer processor to perform the access control method based on a narrowband internet of things provided in the foregoing embodiment, and the access control method based on the narrowband internet of things includes: responding to an access control unlocking request sent by a user terminal connected to the same narrow-band Internet of things network, and determining target access control information carried by the access control unlocking request and user information of the user terminal, wherein the target access control information is obtained by identifying a user terminal based on a time-varying access control two-dimensional code provided by a wireless access control, and the wireless access control and the user terminal are connected to the same narrow-band Internet of things network; generating access control verification information based on the target access control information and the user information, sending the access control verification information to a cloud server, and performing access control verification by the cloud server based on the access control verification information to obtain an access control verification result; and sending control information to the wireless access control based on the access control verification result so as to inform the wireless access control to execute an access control locking action or an access control unlocking action.

Storage medium-any of various types of memory devices or storage devices. The term "storage medium" is intended to include: mounting media such as CD-ROM, floppy disk, or tape devices; computer system memory or random access memory such as DRAM, DDR RAM, SRAM, EDO RAM, Lanbas (Rambus) RAM, etc.; non-volatile memory such as flash memory, magnetic media (e.g., hard disk or optical storage); registers or other similar types of memory elements, etc. The storage medium may also include other types of memory or combinations thereof. In addition, the storage medium may be located in a first computer system in which the program is executed, or may be located in a different second computer system connected to the first computer system through a network (such as the internet). The second computer system may provide program instructions to the first computer for execution. The term "storage medium" may include two or more storage media that may reside in different locations, such as in different computer systems that are connected by a network. The storage medium may store program instructions (e.g., embodied as a computer program) that are executable by one or more processors.

Of course, in the storage medium containing the computer-executable instructions provided in the embodiments of the present application, the computer-executable instructions are not limited to the access control method based on the narrowband internet of things described above, and may also perform related operations in the access control method based on the narrowband internet of things provided in any embodiment of the present application.

The access control device, the equipment and the storage medium based on the narrowband internet of things provided in the above embodiments may execute the access control method based on the narrowband internet of things provided in any embodiment of the present application, and reference may be made to the access control method based on the narrowband internet of things provided in any embodiment of the present application without detailed technical details described in the above embodiments.

The foregoing is considered as illustrative of the preferred embodiments of the invention and the technical principles employed. The present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present application has been described in more detail with reference to the above embodiments, the present application is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present application, and the scope of the present application is determined by the scope of the claims.

15页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种实验仪器的监控系统

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!