Remote control method and system of access control equipment and storage medium

An access control and equipment technology, applied in the field of Internet communication, can solve the problems of remote command tampering and forgery, the access control system lacks remote management capability, and the remote control function command is single, so as to enrich remote control functions, avoid tampering and forgery, and improve security. Effect

Pending Publication Date: 2020-11-13
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the access control system generally lacks remote management capabilities. For example, when the access control machine installed in the customer's office building has a recognition problem, it cannot be quickly located and solved remotely; information to meet customer needs
Even though some access control systems have implemented some remote control functions, the existing access control systems often send simple command data directly to remote access control devices. The remote control function commands are single, and there are security problems such as tampered and forged remote commands.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote control method and system of access control equipment and storage medium
  • Remote control method and system of access control equipment and storage medium
  • Remote control method and system of access control equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in the present application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present application.

[0034] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the application described herein can be practiced in sequences other than those illustrated or des...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a remote control method and system of access control equipment and a storage medium. The method comprises the following steps that an access control management terminal sends aremote command to a command issuing transit server; the command issuing transit server obtains a first secret key, a second secret key and an encryption protocol from a first secret key issuing server, a second secret key issuing server and an encryption protocol issuing server respectively; the command issuing transit server encrypts the remote command according to the encryption protocol, the first secret key and the second secret key to obtain an encrypted remote command, and sends the encrypted remote command to access control equipment; and the access control equipment acquires the encryption protocol, the first secret key and the second secret key from an encryption management client, decrypts the encrypted remote command based on the acquired encryption protocol, the first secret key and the second secret key to obtain a decrypted command, and analyzes the decrypted command based on a preset command analysis engine. By utilizing the technical scheme provided by the invention, the remote control function of the access control equipment can be enriched, and the data security is improved.

Description

technical field [0001] The present application relates to the technical field of Internet communication, and in particular to a remote control method, system and storage medium of an access control device. Background technique [0002] With the popularization of face recognition, fingerprint recognition, voiceprint recognition and other biometric technologies and radio frequency technologies, users' demand for various access control systems based on biometric technologies or radio frequency technologies is also increasing. [0003] At present, the access control system generally lacks remote management capabilities. For example, when the access control machine installed in the customer's office building has a recognition problem, it cannot be quickly located and solved remotely; information to meet customer needs. Even if some access control systems implement some remote control functions, the existing access control systems often send simple command data directly to remote...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G07C9/32G07C9/33H04L29/06H04L29/08
CPCG07C9/32G07C9/33H04L69/22H04L67/125H04L63/0428
Inventor 赵伟段克晓李火荣杨程
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products