Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

52results about How to "Improve Access Control Efficiency" patented technology

Parking lot control method and system, and computer readable storage medium

ActiveCN107909661AAvoid the situation where the license plate picture cannot be obtainedImprove match rateTicket-issuing apparatusCharacter and pattern recognitionPaymentControl system
The invention discloses a parking lot control method. The method is applied to a parking lot control system including a plurality of entrance license plate identifiers. The method includes steps of: obtaining a plurality of first license plate images and recognizing a plurality of pieces of corresponding first license plate information through the plurality of entrance license plate identifiers when detecting the information of the entrance to the parking lot of the vehicle; when a first payment request is received, determining whether the second license plate information in the first paymentrequest matches at least one of the plurality of pieces of first license plate information; and if not, calling and sending the plurality of license plate images corresponding to the plurality of pieces of first license plate information similar with the second license plate information to a user terminal, and generating a piece of corresponding payment information according to a first confirmation result fed back by the user terminal. The invention also discloses a parking lot control system and a computer readable storage medium. When the license plate recognition is wrong, the payment information can be normally generated by sending the license plate picture for confirmation of the user, thereby improving the parking lot access control efficiency.
Owner:XIAN IRAIN IOT TECH SERVICES CO LTD

Loose coupling role authorized-type implementation access control method and system thereof

The invention discloses a loose coupling role authorized-type implementation access control method and a system thereof. The method comprises the following steps of: adding a user role incidence relation based on a type implementation access control method; adding a related process type transformation rule definition relating to a user role and a corresponding type transformation decision mechanism; when a system process type is transformed, according to the process type transformation rule, judging whether to perform role related type transformation according to a current role of the user to change a user process execution flow; and entering a specific security domain of the user role. The system comprises a type implementation access control policy module, a policy security configuration module and a policy rule configuration module, wherein the type implementation access control policy module is operated in the kernel of an operating system; the policy security configuration module is operated on the user layer of the operating system; and the policy rule configuration module is positioned in a file system. The method and the system have the advantages of reducing the influence of user role configuration change on a type implementation rule system, reducing the security configuration difficulties, facilitating flexible configuration according to actual service conditions.
Owner:NAT UNIV OF DEFENSE TECH

Access control system realizing people flow counting control and working method of access control system

PendingCN107341892AEliminate the situation of tailgating through the access control channelGuarantee property securityIndividual entry/exit registersMedia access controlSelf-service
The invention relates to the field of access control systems, and discloses an access control system realizing people flow counting control and a working method of the access control system. According to the access control system, a people flow counting module comprising a counting unit and a people detecting unit is arranged, people entering an access control passage can be recognized, the purpose of counting people flows is achieved, and accordingly, after the access control system is opened for a single time, only the people passing authentication can be allowed to pass through the access control passage; remote alarm can be triggered after excess people pass through the access control passage, the access control passage is blocked automatically, the system enters a management mode of site access control by a remote monitoring center, unauthorized people can be prevented from passing through the access control passage through following, accompanying security holes are eliminated, and property security of unmanned stores and self-service shops are ensured. Besides, the access control system can be used as a security access control system for the unmanned stores, the self-service shops, ticket exits and other places, and actual promotion and application are facilitated.
Owner:兰庆天

Comprehensive meteorological data acquisition system based on NB-IoT communication

The invention discloses a comprehensive meteorological data acquisition system. The system comprises a man-machine interaction system, a terminal and a key acquisition module, the key acquisition module is used for generating a system public key and a first user private key; the information receiving module is used for receiving a ciphertext and a verification token which are generated based on anaccess structure and a plaintext and sent by a terminal, receiving a conversion key and a second user private key which are generated based on the system public parameter, the first user private keyand the corresponding user attribute and are sent by the user access end, the division and decryption text generation module is used for generating a partial division and decryption text based on thesystem public parameters, the unique user identifier of the user access end, the conversion key and the ciphertext; and the information sending module is used for sending the partial divided decryptedmessage to the user access end, so that the user access end decrypts the partial divided decrypted message by using the system public parameter and the second user private key to obtain a plaintext.The system mitigates the computing and storage load of the user.
Owner:SUZHOU UNIV

Intelligent access control management method and system based on Internet of Things

The invention discloses an intelligent access control management method and system based on the Internet of Things. The method comprises the steps that an intelligent terminal is connected with an access control server in a communicating mode; the access control server receives an access instruction sent by the intelligent terminal; when the access control server verifies that the access instruction sent by the intelligent terminal is consistent with a preset correct instruction, the access control server controls the access control opening, so that an user is connected with the access controlserver by scanning an access control QR code in a communicating mode, then the user can input the access control instruction directly on the intelligent terminal, when the access control instructioninput by the user is correct, the access control opens, and the user can enter; inputting the instruction before the access control is not required, plagiarism by illegal persons is prevented, card wiping to enter the access control is not required, forgetting or loss of a card is not required to worry about, and manual management is not required; and labor costs are reduced, the efficiency of theaccess control is improved, convenience is brought to the user, and meanwhile, the security of the access control is improved.
Owner:合肥凌极西雅电子科技有限公司

Comprehensive meteorological data acquisition system based on NB-IoT communication

The invention discloses a comprehensive meteorological data acquisition system. The system comprises a human-computer interaction system, a terminal and a key acquisition module, the key acquisition module is used for generating a system public key and a first user private key; the information receiving module is used for receiving a ciphertext and a verification token which are sent by the terminal and generated based on the access structure and the plaintext; receiving a conversion key and a second user private key which are sent by the user access end and are generated based on the system public parameter, the first user private key and the corresponding user attribute; a split and decrypted message generation module is used for generating a partial split and decrypted message based onthe system public parameters, the user unique identifier of the user access end, the conversion key and the ciphertext; and an information sending module is used for sending the partial split and decrypted message to the user access end, so that the user access end decrypts the partial split and decrypted message by utilizing the system public parameter and the second user private key to obtain aplaintext. The system mitigates the user's computational and storage load.
Owner:SUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products