[go: up one dir, main page]

CN118397740B - An access control system using RFID technology combined with IoT door locks - Google Patents

An access control system using RFID technology combined with IoT door locks Download PDF

Info

Publication number
CN118397740B
CN118397740B CN202410435575.XA CN202410435575A CN118397740B CN 118397740 B CN118397740 B CN 118397740B CN 202410435575 A CN202410435575 A CN 202410435575A CN 118397740 B CN118397740 B CN 118397740B
Authority
CN
China
Prior art keywords
lock
access control
internet
things
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410435575.XA
Other languages
Chinese (zh)
Other versions
CN118397740A (en
Inventor
徐云生
肖宇
周于雷
何小勇
覃元
姚育栋
张圣祥
任利剑
向星辰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Three Gorges New Energy Offshore Wind Power Operation And Maintenance Jiangsu Co ltd
Three Gorges High Technology Information Technology Co ltd
Original Assignee
Three Gorges New Energy Offshore Wind Power Operation And Maintenance Jiangsu Co ltd
Three Gorges High Technology Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Three Gorges New Energy Offshore Wind Power Operation And Maintenance Jiangsu Co ltd, Three Gorges High Technology Information Technology Co ltd filed Critical Three Gorges New Energy Offshore Wind Power Operation And Maintenance Jiangsu Co ltd
Priority to CN202410435575.XA priority Critical patent/CN118397740B/en
Publication of CN118397740A publication Critical patent/CN118397740A/en
Application granted granted Critical
Publication of CN118397740B publication Critical patent/CN118397740B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses an access control system adopting an RFID technology and combining with an internet of things door lock, which comprises: the RFID access control reader is used for reading the signal of the RFID tag and transmitting the signal to the Internet of things lock when the distance between the access control card loaded with the RFID chip and the access control card is within a preset range; the internet of things lock is used for acquiring signals of the RFID tag and carrying out identity recognition, and when the identity of a user is determined, a lock cylinder on the door body is opened. The safety, the use experience and the maintenance cost saving of the access control system are improved, and the convenience of data management is improved.

Description

Access control system adopting RFID technology and Internet of things door lock
Technical Field
The invention relates to the technical field of access control systems, in particular to an access control system adopting an RFID technology and combining with an Internet of things door lock.
Background
Currently, the following access control systems exist in the market: magnetic card access control system: the magnetic card access control system is a common access control system, and identity verification and access control switch control are realized mainly by reading information on a magnetic stripe card. IC card access control system: an IC card access control system is an access control system that performs authentication and access control by reading information on an IC card (wafer card). The security is higher, but the card making and management costs are higher. NFC access control system: the NFC access control system is an access control system which uses radio frequency identification technology to perform identity verification and access control by reading information stored on an NFC chip. Face recognition access control system: the face recognition access control system collects and analyzes face images of a doorway by using a computer vision technology, and performs identity authentication and access control. The safety is high, but the equipment cost is high. Fingerprint identification access control system: the fingerprint identification access control system is an access control system for performing identity authentication and access control switch control by collecting fingerprint information of a user. The security is high, but use experience is not as good as face recognition access control system.
The existing access control system has the following problems: 1. safety problem: the traditional entrance guard system adopts traditional identity recognition technologies such as card swiping and face swiping, the identity authentication can be stolen or used, and the entrance guard system is easy to break. The maintenance cost is high: the maintenance cost of the traditional access control system is high, equipment such as an access control terminal, a card reader, an access control controller and the like need to be replaced frequently, and special persons need to check and maintain regularly. The use experience is poor: the traditional access control system is required to be equipped with special access control cards, card readers and other devices, and the situation that the access control cards are lost, damaged and the like is quite common. In addition, the traditional access control system needs to be close to a card reader, remote access control cannot be realized, and the application of large-scale activity occasions is inconvenient. The failure rate is high: the components such as a switch commonly used in the traditional access control system are easy to wear and interfere, the failure rate is high, and frequent maintenance is needed to ensure the normal operation of the system. Data management problem: the traditional access control system has the problems of data management, manual input of data recording, drop-out, error recording and the like, and has limitations on the aspects of data precision, real-time performance and the like.
Disclosure of Invention
The present invention aims to solve, at least to some extent, one of the technical problems in the above-described technology. Therefore, the invention aims to provide an access control system adopting an RFID technology and combining with an Internet of things door lock, which improves the safety, the use experience, the maintenance cost saving and the convenience of data management of the access control system.
To achieve the above objective, an embodiment of the present invention provides an access control system using an RFID technology in combination with an internet of things door lock, including:
The RFID access control reader is used for reading the signal of the RFID tag and transmitting the signal to the Internet of things lock when the distance between the access control card loaded with the RFID chip and the access control card is within a preset range;
The internet of things lock is used for acquiring signals of the RFID tag and carrying out identity recognition, and when the identity of a user is determined, a lock cylinder on the door body is opened.
According to some embodiments of the invention, the internet of things lock is connected with the background server and is used for receiving a remote unlocking instruction sent by the background server, and executing the remote unlocking instruction to open a lock cylinder on the door body.
According to some embodiments of the invention, the background server comprises:
The granting module is used for granting permission to the access control card management loaded with the RFID chip;
The acquisition module is used for acquiring the state information of the Internet of things lock;
and the updating module is used for updating and upgrading the program prestored in the lock of the Internet of things.
According to some embodiments of the invention, the system further comprises a storage module for storing the access control record.
According to some embodiments of the invention, the RFID tag in the access card loaded with the RFID chip is digitally encrypted.
According to some embodiments of the invention, further comprising: and the transmission module is used for uploading the access control record to the background server for backup.
According to some embodiments of the invention, further comprising: the monitoring module is used for:
Monitoring when the Internet of things lock executes a remote unlocking instruction, acquiring monitoring information, and determining the response frequency of the Internet of things lock according to the monitoring information;
Wherein, The response frequency of the lock is the response frequency of the lock of the Internet of things; arccos is the inverse trigonometric function cosine value; i is current information in the monitoring information; r1 is the ultra-transient reactance of the Internet of things lock in the monitoring information; e is the voltage in the monitoring information; θ is the voltage phase angle in the monitoring information; k1 is a monitoring period, which is 3s; τ is a preset leakage inductance, τ=0.3;
Determining the working current of the Internet of things lock according to the response frequency of the Internet of things lock;
wherein I1 is the working current of the Internet of things lock; r2 is transient reactance of an Internet of things lock for monitoring information; r3 is the steady-state reactance of the Internet of things lock for monitoring information;
judging the execution state of the Internet of things lock according to the working current of the Internet of things lock;
wherein L is a working state judgment coefficient of the lock of the Internet of things; pw is the rated power of the Internet of things lock; lambda is the power coefficient; when L is smaller than 0.5, indicating that the Internet of things lock has executed the remote unlocking instruction, and opening a lock cylinder on the door body; when L is more than or equal to 0.5, the remote unlocking instruction is not executed yet, and the lock cylinder on the door body is not opened.
According to some embodiments of the invention, further comprising: an alarm module for:
acquiring monitoring data of each module, and associating the monitoring data of each module in the time window according to architecture layer information corresponding to the monitoring data of each module in the time window to obtain a plurality of association links;
Extracting entity information, entity attribute information and entity relation information from each associated link based on a predefined Schema;
Generating a knowledge graph node based on the format of the entity-relation-entity triplet according to the entity information and the entity relation information; establishing association between entity attribute information and an entity corresponding to the entity attribute information in the knowledge graph nodes, and associating the entity information of a plurality of knowledge graph nodes to obtain a knowledge graph corresponding to each association link;
dividing the knowledge patterns corresponding to each associated link together, and de-duplicating the data with the same basic information to obtain a corrected knowledge pattern corresponding to each associated link;
Sorting the corrected knowledge maps corresponding to each associated link according to TTL values from large to small;
taking the associated links corresponding to the first-ranked corrected knowledge patterns as target associated links; taking the rest associated links as bypass links;
creating a unidirectional weighted directed graph, and respectively assigning values to the target associated link and the bypass link to obtain a target weighted directed graph;
determining a system safety operation coefficient according to the target weighted directed graph, and comparing the system safety operation coefficient with a preset threshold value; and when the safe operation coefficient of the system is smaller than the preset threshold value, sending out an alarm prompt.
According to some embodiments of the invention, determining a system safe operating coefficient from a target weighted directed graph includes:
K=SY×D/g
Wherein K is a system safety operation coefficient; s is a preset correction parameter, S epsilon (0, 1); y is system dynamic change data determined based on the target weighted directed graph; d is a system safety response index determined based on the target weighted directed graph; g is a preset safe operation level of the system.
According to some embodiments of the invention, further comprising: the network monitoring module is used for monitoring the network state between the Internet of things lock and the background server, and generating prompt information when the network state is abnormal.
The invention discloses an access control system adopting an RFID technology and combining with an Internet of things door lock, which improves the safety, the use experience, the maintenance cost saving and the convenience of data management of the access control system.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention may be realized and attained by the structure particularly pointed out in the written description and drawings.
The technical scheme of the invention is further described in detail through the drawings and the embodiments.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate the invention and together with the embodiments of the invention, serve to explain the invention. In the drawings:
FIG. 1 is a block diagram of an access control system incorporating an Internet of things door lock using RFID technology in accordance with one embodiment of the present invention;
FIG. 2 is a block diagram of an access control system incorporating an Internet of things door lock using RFID technology in accordance with yet another embodiment of the present invention;
fig. 3 is a block diagram of an access control system incorporating an internet of things door lock using RFID technology according to yet another embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described below with reference to the accompanying drawings, it being understood that the preferred embodiments described herein are for illustration and explanation of the present invention only, and are not intended to limit the present invention.
As shown in fig. 1, an embodiment of the present invention provides an access control system using an RFID technology in combination with an internet of things door lock, including:
The RFID access control reader is used for reading the signal of the RFID tag and transmitting the signal to the Internet of things lock when the distance between the access control card loaded with the RFID chip and the access control card is within a preset range;
The internet of things lock is used for acquiring signals of the RFID tag and carrying out identity recognition, and when the identity of a user is determined, a lock cylinder on the door body is opened.
The technical scheme has the working principle and beneficial effects that: RFID technology: an access card or a staff card employing an RFID chip, the tag is capable of receiving and transmitting wireless signals. RFID entrance guard reader: the RFID access reader is equipment arranged at the door edge, and can read signals of the RFID tag and transmit the signals to the internet of things lock. Internet of things lock: the internet of things lock is a device for connecting the lock core of the door body with the access control device through wireless protocols such as Wi-F i or Bluetooth, and has high unlocking safety, attractive appearance and easy manageability. The internet of things lock is used for acquiring signals of the RFID tag and carrying out identity recognition, and when the identity of a user is determined, a lock cylinder on the door body is opened. The security, the use experience, the maintenance cost saving and the convenience of data management of the access control system are improved conveniently.
According to some embodiments of the invention, the internet of things lock is connected with the background server and is used for receiving a remote unlocking instruction sent by the background server, and executing the remote unlocking instruction to open a lock cylinder on the door body.
According to some embodiments of the invention, the background server comprises:
The granting module is used for granting permission to the access control card management loaded with the RFID chip;
The acquisition module is used for acquiring the state information of the Internet of things lock;
and the updating module is used for updating and upgrading the program prestored in the lock of the Internet of things.
In an implementation, the background server further comprises a network server, a security system, an application server and the like, and is mainly responsible for managing and monitoring the access control RFID reader-writer and the Internet of things lock, so that operations such as remote management and permission modification are realized.
According to some embodiments of the invention, the system further comprises a storage module for storing the access control record. Typically, the storage is performed using a database, cloud storage, or the like.
The RFID access control system combines the RFID technology with the Internet of things lock, the principle of the RFID access control system is that the Internet of things lock is installed on a door, and registered access tokens are displayed through a wireless network and a reader-writer. When the authorized card is read and verified, the internet of things lock is commanded to be opened to access the authorized room.
The access control system has three unlocking modes.
Mode one: an access control card or a staff card adopting an RFID chip is adopted. The background can control the formulated access control card and employee card to unlock.
Mode two: the mobile phone app or the background system is adopted for remote unlocking, the mode realizes remote unlocking, and staff without authority is remotely unlocked.
Mode three: the mechanical key is used for unlocking, and under the condition of power failure, the normal unlocking of the gate can be ensured.
The access control system is more excellent in safety, convenience, maintainability and flexibility, can realize multi-person authorization management, can realize remote control, and can control access control at any time and place.
According to some embodiments of the invention, the RFID tag in the access card loaded with the RFID chip is digitally encrypted.
According to some embodiments of the invention, further comprising: and the transmission module is used for uploading the access control record to the background server for backup.
Based on the adoption of RFID technology and the door access control system of the door lock of the internet of things, accurate identity recognition can be realized: the access control system utilizes the RFID technology to identify, can accurately identify the authorization token information, and avoids the situation that the identity is falsely used. Convenient access control management: the RFID access control system integrates application program management software, and an administrator can perform intelligent access control management on a mobile phone, including unlocking, authorization, log recording and the like. Flexible rights management: the system administrator can set different authorization levels according to the requirements and allocate different authorities. Only authorized users can enter a particular area. Remote access authorization management: an administrator easily registers tokens or modification and authorization rights for visitors at a remote control center, thereby eliminating the need for on-site authorization. Unified access control management: and a system administrator can intensively manage all access control readers and Internet of things locks through a background system, so that unified RFID access control management and monitoring are realized, and the efficiency is improved. And (3) safety management: the entrance guard system adopts an encryption RFID tag and a high-safety Internet of things lock, so that entrance guard safety is guaranteed, and entrance cracking and information leakage are prevented. Data recording and analysis: the RFID access control system records all unlocking events, and uploads the events to the database for backup, so that an administrator can query and analyze the data at any time to know the service condition. In general, the RFID technology is combined with the access control system of the internet of things lock to realize intelligent management in the aspects of identity authentication automation, access control authorization management automation, access control recording and analysis automation and the like, so that the safety, the efficiency and the convenience are improved.
As shown in fig. 2, according to some embodiments of the invention, further comprising: the monitoring module is used for:
Monitoring when the Internet of things lock executes a remote unlocking instruction, acquiring monitoring information, and determining the response frequency of the Internet of things lock according to the monitoring information;
Wherein, The response frequency of the lock is the response frequency of the lock of the Internet of things; arccos is the inverse trigonometric function cosine value; i is current information in the monitoring information; r1 is the ultra-transient reactance of the Internet of things lock in the monitoring information; e is the voltage in the monitoring information; θ is the voltage phase angle in the monitoring information; k1 is a monitoring period, which is 3s; τ is a preset leakage inductance, τ=0.3;
Determining the working current of the Internet of things lock according to the response frequency of the Internet of things lock;
wherein I1 is the working current of the Internet of things lock; r2 is transient reactance of an Internet of things lock for monitoring information; r3 is the steady-state reactance of the Internet of things lock for monitoring information;
judging the execution state of the Internet of things lock according to the working current of the Internet of things lock;
wherein L is a working state judgment coefficient of the lock of the Internet of things; pw is the rated power of the Internet of things lock; lambda is the power coefficient; when L is smaller than 0.5, indicating that the Internet of things lock has executed the remote unlocking instruction, and opening a lock cylinder on the door body; when L is more than or equal to 0.5, the remote unlocking instruction is not executed yet, and the lock cylinder on the door body is not opened.
The technical scheme has the working principle and beneficial effects that: the response frequency of the remote unlocking instruction of the Internet of things lock is accurately determined based on the monitoring information, so that the working current of the Internet of things lock is accurately calculated, and the execution state of the Internet of things lock is judged according to the working current of the Internet of things lock; when L is smaller than 0.5, indicating that the Internet of things lock has executed the remote unlocking instruction, and opening a lock cylinder on the door body; when L is more than or equal to 0.5, the remote unlocking instruction is not executed yet, and the lock cylinder on the door body is not opened. The execution state of the remote unlocking instruction of the lock of the Internet of things is accurately obtained, recording is convenient, and feedback is timely carried out to a background server.
As shown in fig. 3, according to some embodiments of the invention, further comprising: an alarm module for:
acquiring monitoring data of each module, and associating the monitoring data of each module in the time window according to architecture layer information corresponding to the monitoring data of each module in the time window to obtain a plurality of association links;
Extracting entity information, entity attribute information and entity relation information from each associated link based on a predefined Schema;
Generating a knowledge graph node based on the format of the entity-relation-entity triplet according to the entity information and the entity relation information; establishing association between entity attribute information and an entity corresponding to the entity attribute information in the knowledge graph nodes, and associating the entity information of a plurality of knowledge graph nodes to obtain a knowledge graph corresponding to each association link;
dividing the knowledge patterns corresponding to each associated link together, and de-duplicating the data with the same basic information to obtain a corrected knowledge pattern corresponding to each associated link;
Sorting the corrected knowledge maps corresponding to each associated link according to TTL values from large to small;
taking the associated links corresponding to the first-ranked corrected knowledge patterns as target associated links; taking the rest associated links as bypass links;
creating a unidirectional weighted directed graph, and respectively assigning values to the target associated link and the bypass link to obtain a target weighted directed graph;
determining a system safety operation coefficient according to the target weighted directed graph, and comparing the system safety operation coefficient with a preset threshold value; and when the safe operation coefficient of the system is smaller than the preset threshold value, sending out an alarm prompt.
The technical scheme has the working principle and beneficial effects that: each module comprises an RFID access control reader-writer, an Internet of things lock and other modules. The monitoring data includes operational data, status data, and the like. The architecture layer information is a corresponding logical layer. Correlating the monitoring data of each module in the time window to obtain a plurality of correlation links; representing determining the dynamically coordinated signal flow paths of the various modules upon completion of an instruction task. Schema is a structural description of a database that defines the layout and structure of objects such as data tables, views, indexes, and the like. The method comprises information such as table names, field names, data types, constraints and the like, and is an important concept for organizing and managing data in a database. Extracting entity information, entity attribute information and entity relation information from each associated link based on a predefined Schema; generating a knowledge graph node based on the format of the entity-relation-entity triplet according to the entity information and the entity relation information; establishing association between entity attribute information and an entity corresponding to the entity attribute information in the knowledge graph nodes, and associating the entity information of a plurality of knowledge graph nodes to obtain a knowledge graph corresponding to each association link; and finishing all data on each associated link to generate a corresponding data model. Dividing the knowledge patterns corresponding to each associated link together, and de-duplicating the data with the same basic information to obtain a corrected knowledge pattern corresponding to each associated link; And redundant data can be conveniently removed, and the data processing amount is reduced. The TTL value is the time that a given packet survives in the network. As a packet travels through the network, its TTL value is decremented each time it passes a router or network node. When the TTL value drops to 0, the packet will be dropped and a "Time Exceeded" message will be sent to the packet source. The method is convenient for realizing the sorting processing of the associated links, and determines the associated link corresponding to the corrected knowledge graph with the first sorting as the target associated link; the rest of the associated links are taken as bypass links. Creating a unidirectional weighted directed graph, respectively assigning values to a target associated link and a bypass link to obtain the target weighted directed graph, determining nodes and edges of the graph, determining the weight of each edge, and using the information to create the target weighted directed graph through a Python language and networkx library. By way of example, install networkx library, create weighted directed graph using networkx, assign values for target association link and bypass link respectively, create directed graph, add nodes A ',' B ',' C ',' D ',' E, add edges and weights, assume (A, B) is target association link, (A, C) is bypass link, A-B is 5, A-C is 3, B-D is 4, C-D is 1, D-E is 2. When assigning, the weight of the link closer to the target is greater than the weight of the link farther from the target. The target weighted directed graph is convenient to accurately determine, the safe operation coefficient of the system is determined according to the target weighted directed graph, and the safe operation coefficient is compared with a preset threshold; and when the safe operation coefficient of the system is smaller than the preset threshold value, sending out an alarm prompt. Whether the equipment operation of an access control system adopting the RFID technology and the door lock of the internet of things is abnormal or not is conveniently monitored, and the safety is improved.
According to some embodiments of the invention, determining a system safe operating coefficient from a target weighted directed graph includes:
K=SY×D/g
Wherein K is a system safety operation coefficient; s is a preset correction parameter, S epsilon (0, 1); y is system dynamic change data determined based on the target weighted directed graph; d is a system safety response index determined based on the target weighted directed graph; g is a preset safe operation level of the system.
The technical scheme has the working principle and beneficial effects that: the preset correction parameters are related to the running time of the system, and the longer the running time is, the smaller the preset correction parameters are. The system dynamic change data is determined based on the change direction of each line in the target weighted directed graph. The system safety response index is determined based on the number of lines included in the target weighted directed graph, and the system safety response index is larger as the number of lines is smaller. The preset system security operation level indicates that several system security operation levels are preset in total. Based on the algorithm, the system safety operation coefficient is conveniently and accurately calculated, the accuracy of judging the system safety operation coefficient and the preset threshold value is improved, and the alarm accuracy is further improved.
According to some embodiments of the invention, further comprising: the network monitoring module is used for monitoring the network state between the Internet of things lock and the background server, and generating prompt information when the network state is abnormal.
The beneficial effects of the technical scheme are that: the network state can be adjusted in time conveniently, and the responsiveness of remote control based on the background server is improved.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (9)

1.一种采用RFID技术结合物联网门锁的门禁系统,其特征在于,包括:1. An access control system using RFID technology combined with an Internet of Things door lock, characterized by comprising: RFID门禁读写器,用于在装载有RFID芯片的门禁卡与之距离在预设范围内时,读取RFID标签的信号并将其传送至物联网锁;RFID access control reader/writer, used to read the signal of the RFID tag and transmit it to the IoT lock when the access control card loaded with the RFID chip is within a preset range; 物联网锁,用于获取RFID标签的信号并进行身份识别,在确定用户身份时,打开门体上的锁芯;The IoT lock is used to obtain the signal of the RFID tag and perform identity recognition. When the user's identity is determined, the lock cylinder on the door body is opened; 还包括:报警模块,用于:Also includes: an alarm module for: 获取各个模块的监控数据,根据时间窗内的各个模块的监控数据对应的架构层信息,将时间窗内的各个模块的监控数据进行关联,得到若干条关联链路;Acquire monitoring data of each module, and associate the monitoring data of each module within the time window according to the architecture layer information corresponding to the monitoring data of each module within the time window to obtain several association links; 基于预先定义的Schema从每条关联链路中抽取实体信息、实体属性信息和实体关系信息;Extract entity information, entity attribute information, and entity relationship information from each associated link based on a predefined schema; 根据实体信息和实体关系信息基于实体-关系-实体的三元组的格式生成知识图谱节点;将实体属性信息与知识图谱节点中与该实体属性信息对应的实体建立关联,将多个知识图谱节点的实体信息进行关联,得到每条关联链路对应的知识图谱;Generate a knowledge graph node based on the entity information and entity relationship information in the format of entity-relationship-entity triples; associate the entity attribute information with the entity corresponding to the entity attribute information in the knowledge graph node, associate the entity information of multiple knowledge graph nodes, and obtain the knowledge graph corresponding to each associated link; 将每条关联链路对应的知识图谱划分到一起,并将基本信息相同的数据进行去重,得到每条关联链路对应的修正知识图谱;The knowledge graphs corresponding to each associated link are divided together, and the data with the same basic information are deduplicated to obtain the revised knowledge graph corresponding to each associated link; 对每条关联链路对应的修正知识图谱,按照TTL值从大到小进行排序;Sort the modified knowledge graph corresponding to each associated link from large to small according to the TTL value; 将排序第一的修正知识图谱对应的关联链路,作为目标关联链路;将其余关联链路作为旁路链路;The associated link corresponding to the first ranked modified knowledge graph is used as the target associated link; the remaining associated links are used as bypass links; 创建单向加权有向图,对目标关联链路和旁路链路分别赋值,得到目标加权有向图;A unidirectional weighted directed graph is created, and values are assigned to the target associated links and bypass links respectively to obtain a target weighted directed graph; 根据目标加权有向图确定系统安全运行系数,并与预设阈值进行比较;在确定系统安全运行系数小于预设阈值时,发出报警提示。The system safety operation coefficient is determined according to the target weighted directed graph and compared with the preset threshold; when it is determined that the system safety operation coefficient is less than the preset threshold, an alarm is issued. 2.如权利要求1所述的采用RFID技术结合物联网门锁的门禁系统,其特征在于,所述物联网锁,与后台服务器连接,用于接收后台服务器发送的远程开锁指令,执行远程开锁指令打开门体上的锁芯。2. The access control system using RFID technology combined with an Internet of Things door lock as described in claim 1 is characterized in that the Internet of Things lock is connected to a background server, is used to receive a remote unlocking instruction sent by the background server, and executes the remote unlocking instruction to open the lock core on the door body. 3.如权利要求2所述的采用RFID技术结合物联网门锁的门禁系统,其特征在于,所述后台服务器包括:3. The access control system using RFID technology combined with an Internet of Things door lock as claimed in claim 2, characterized in that the background server comprises: 授予模块,用于对装载有RFID芯片的门禁卡管理是否授予权限;The granting module is used to manage whether to grant permissions to access control cards equipped with RFID chips; 获取模块,用于获取物联网锁的状态信息;The acquisition module is used to obtain the status information of the IoT lock; 更新模块,用于对物联网锁预存储的程序进行更新升级。The update module is used to update and upgrade the programs pre-stored in the IoT lock. 4.如权利要求2所述的采用RFID技术结合物联网门锁的门禁系统,其特征在于,还包括存储模块,用于将门禁记录进行存储。4. The access control system using RFID technology combined with an Internet of Things door lock as described in claim 2 is characterized in that it also includes a storage module for storing access control records. 5.如权利要求1所述的采用RFID技术结合物联网门锁的门禁系统,其特征在于,所述装载有RFID芯片的门禁卡中的RFID标签为经过数字加密的。5. The access control system using RFID technology combined with an Internet of Things door lock as claimed in claim 1, characterized in that the RFID tag in the access control card loaded with an RFID chip is digitally encrypted. 6.如权利要求4所述的采用RFID技术结合物联网门锁的门禁系统,其特征在于,还包括:传输模块,用于将门禁记录上传到后台服务器进行备份。6. The access control system using RFID technology combined with an Internet of Things door lock as described in claim 4 is characterized in that it also includes: a transmission module for uploading access control records to a background server for backup. 7.如权利要求2所述的采用RFID技术结合物联网门锁的门禁系统,其特征在于,还包括:监测模块,用于:7. The access control system using RFID technology combined with an Internet of Things door lock as claimed in claim 2, characterized in that it also includes: a monitoring module for: 在物联网锁执行远程开锁指令时进行监测,获取监测信息,根据监测信息确定物联网锁的响应频率;When the IoT lock executes a remote unlocking command, monitoring is performed, monitoring information is obtained, and the response frequency of the IoT lock is determined based on the monitoring information; 其中,为物联网锁的响应频率;arccos为反三角函数余弦值;I为监测信息中的电流信息;R1为监测信息中物联网锁的超瞬态电抗;E为监测信息中的电压;θ为监测信息中的电压相角;K1为监测周期,为3s;τ为预设漏磁系数,τ=0.3;in, is the response frequency of the IoT lock; arccos is the cosine value of the inverse trigonometric function; I is the current information in the monitoring information; R1 is the ultra-transient reactance of the IoT lock in the monitoring information; E is the voltage in the monitoring information; θ is the voltage phase angle in the monitoring information; K1 is the monitoring period, which is 3s; τ is the preset leakage magnetic coefficient, τ=0.3; 根据物联网锁的响应频率,确定物联网锁的工作电流;Determine the working current of the IoT lock according to the response frequency of the IoT lock; 其中,I1为所述物联网锁的工作电流;R2为监测信息的物联网锁的暂态电抗;R3为监测信息的物联网锁的稳态电抗;Among them, I1 is the working current of the IoT lock; R2 is the transient reactance of the IoT lock for monitoring information; R3 is the steady-state reactance of the IoT lock for monitoring information; 根据物联网锁的工作电流判断所述物联网锁的执行状态;Determining the execution state of the IoT lock according to the working current of the IoT lock; 其中,L为物联网锁的工作状态判定系数;Pw为所述物联网锁的额定功率;λ为功率系数;当L小于0.5时,表示物联网锁已经执行完毕远程开锁指令,并打开门体上的锁芯;当L大于等于0.5时,表示物联网锁还未执行完毕远程开锁指令,并没有打开门体上的锁芯。Among them, L is the working state determination coefficient of the Internet of Things lock; Pw is the rated power of the Internet of Things lock; λ is the power coefficient; when L is less than 0.5, it means that the Internet of Things lock has completed the remote unlocking command and opened the lock core on the door body; when L is greater than or equal to 0.5, it means that the Internet of Things lock has not yet completed the remote unlocking command and has not opened the lock core on the door body. 8.如权利要求1所述的采用RFID技术结合物联网门锁的门禁系统,其特征在于,根据目标加权有向图确定系统安全运行系数,包括:8. The access control system using RFID technology combined with an Internet of Things door lock as claimed in claim 1, characterized in that the system safety operation coefficient is determined according to the target weighted directed graph, including: K=SY×D/gK=SY×D/g 其中,K为系统安全运行系数;S为预设修正参数,S∈(0,1);Y为基于目标加权有向图确定的系统动态变化数据;D为基于目标加权有向图确定的系统安全响应指数;g为预设的系统安全运行等级。Among them, K is the system safety operation coefficient; S is the preset correction parameter, S∈(0,1); Y is the system dynamic change data determined based on the target weighted directed graph; D is the system safety response index determined based on the target weighted directed graph; g is the preset system safety operation level. 9.如权利要求2所述的采用RFID技术结合物联网门锁的门禁系统,其特征在于,还包括:网络监控模块,用于监控物联网锁与后台服务器之间的网络状态,在确定网络状态异常时,生成提示信息。9. The access control system using RFID technology combined with an Internet of Things door lock as described in claim 2 is characterized in that it also includes: a network monitoring module for monitoring the network status between the Internet of Things lock and the background server, and generating a prompt message when it is determined that the network status is abnormal.
CN202410435575.XA 2024-04-11 2024-04-11 An access control system using RFID technology combined with IoT door locks Active CN118397740B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410435575.XA CN118397740B (en) 2024-04-11 2024-04-11 An access control system using RFID technology combined with IoT door locks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410435575.XA CN118397740B (en) 2024-04-11 2024-04-11 An access control system using RFID technology combined with IoT door locks

Publications (2)

Publication Number Publication Date
CN118397740A CN118397740A (en) 2024-07-26
CN118397740B true CN118397740B (en) 2024-11-22

Family

ID=91990682

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410435575.XA Active CN118397740B (en) 2024-04-11 2024-04-11 An access control system using RFID technology combined with IoT door locks

Country Status (1)

Country Link
CN (1) CN118397740B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111554020A (en) * 2020-06-15 2020-08-18 安徽理工大学 IoT access control system based on RFID and biometrics

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114726634B (en) * 2022-04-14 2023-07-25 北京金睛云华科技有限公司 Knowledge graph-based hacking scene construction method and device
CN117091676A (en) * 2023-08-18 2023-11-21 合肥工业大学 Electromagnetic flowmeter frequency tracking method based on phase feedback
CN117668826A (en) * 2023-10-19 2024-03-08 中孚安全技术有限公司 Event association analysis method and system based on graph model

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111554020A (en) * 2020-06-15 2020-08-18 安徽理工大学 IoT access control system based on RFID and biometrics

Also Published As

Publication number Publication date
CN118397740A (en) 2024-07-26

Similar Documents

Publication Publication Date Title
US7730126B2 (en) Systems and methods for controlling access within a system of networked and non-networked processor-based systems
US8590013B2 (en) Method of managing and communicating data pertaining to software applications for processor-based devices comprising wireless communication circuitry
US20210019971A1 (en) Offline storage system and method of use
US10891816B2 (en) Spatio-temporal topology learning for detection of suspicious access behavior
US20080290988A1 (en) Systems and methods for controlling access within a system of networked and non-networked processor-based systems
US20120098638A1 (en) Systems and methods of operating a secured facility
Chandra et al. Challenges and constraints to the diffusion of biometrics in information systems
US20070219950A1 (en) Systems and methods for controlling access within a system of networked and non-networked processor-based systems
US11373472B2 (en) Compact encoding of static permissions for real-time access control
US20070061272A1 (en) Access administration system and method for a currency compartment
CN104240014A (en) Door access control method and door access control platform
CN110148264A (en) A kind of management method and equipment of locker
CN111310151A (en) Distributed permission set-based permission management method, device and storage medium
CN119337354A (en) A method for secure management of BIM data in engineering construction
KR102480285B1 (en) Access controlling system based on fido
CN118397740B (en) An access control system using RFID technology combined with IoT door locks
CN118567244A (en) Intelligent control system for museums
US11410478B2 (en) Visualization and management of access levels for access control based al hierarchy
US20120068814A1 (en) Systems and methods of operating a secured facility
CN118395403A (en) Control method of personnel authority in power generation enterprise
US20070157290A1 (en) Systems and methods of communicating access log information within a system of networked and non-networked processor-based systems
CN114373241A (en) Point location card punching system and method
CN107742140B (en) Intelligent identity information identification method based on RFID technology
Essien Enhancing Role-Based Access Control with Embedded Facial Recognition RBAC-EFR System
CN110191122A (en) A kind of parking lot management platform and its right management method and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant