Secondary door access system adopting biological character identification technology and control method

A biometric identification and biometric technology, which is applied in the field of access control and biometric identification, can solve problems such as unsolved problems, and achieve the effect of increasing the time for handling police, flexible and simple operation, and ensuring safety and legality.

Inactive Publication Date: 2007-10-24
ZHEJIANG MIAXIS TECH CO LTD
View PDF0 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The existing two-way access control system has no solution to the above-mentioned problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secondary door access system adopting biological character identification technology and control method
  • Secondary door access system adopting biological character identification technology and control method
  • Secondary door access system adopting biological character identification technology and control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] Embodiment 1: In this embodiment, fingerprints are used as biometric features. The system includes fingerprint access control equipment, a controller, an electric lock, a switch box, a fingerprint information registration terminal, and an access control system server, as shown in Figures 4 and 5:

[0058] The fingerprint access control device is mainly used to complete the collection, transmission and comparison of fingerprint data, and send the door opening application to the controller for the authorized fingerprint. The device further includes: a fingerprint sensor, a fingerprint processing module, a data storage unit, a main processing unit, a keyboard, and an LCD. in:

[0059] 1) Fingerprint sensor for detecting and collecting fingerprints;

[0060] 2) fingerprint processing module, used for processing, searching and comparing the collected fingerprint data;

[0061] 3) data storage unit, used to store user information, feature data, user belonging group informat...

Embodiment 2

[0070] Embodiment 2: When the staff wants to go out from the inside of the business point through the second door, they can pass in the following way, as shown in Figure 3:

[0071] As in step 301, the staff activates the button on the switch box 5, and then judges whether the inner door 4 and the outer door 2 are closed, as in step 302. After receiving the door closing report, the controller 6 sends an electrical signal to open the inner door 4 to the electric control lock 7 of the inner door, opens the inner door 4, and stores the record of the inner door 9, as in step 303. The staff walks into the isolation area 9 of the second door and closes the inner door 4 . After entering the isolation area, the staff performs fingerprint verification operation on the fingerprint access control device 3 in the isolation area. First press the specified key of opening the outer door 2 such as step 304, send the operation report of the outer door 2, and then perform fingerprint verificat...

Embodiment 3

[0072] Embodiment 3: When the staff enters from the outside of the business point through the second door, a gangster raid occurs temporarily. Facing the threat of gangsters, the staff operates as follows, as shown in Figure 2,

[0073] The staff directly presses the threat alarm fingerprint, as in step 201. The fingerprint access control device detects and receives fingerprint information, and extracts and compares the fingerprint information, such as steps 201 to 205. After the duress alarm fingerprint is verified, an alarm signal is sent to the controller 4 at the same time, as in step 207, the controller 4 directly outputs an alarm after receiving the signal. While performing step 207, continue to interrupt the door opening application, and detect whether the inner door 4 and the outer door 2 are currently closed, as in step 208. After satisfying the condition of closing at the same time, the controller 4 outputs an electric signal to open the outer door 2 to the electri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a two-door gate inhibition system and a control method, based on biology character recognize technique, comprising a biology character gate inhibition device, a controller, an electric lock, a switch box, a biology character register terminal, and a gate inhibition system server, wherein the biology character register terminal registers the biology character information, to record and build database for general biology character and alarm biology character, when passes two doors, the gate inhibition device checks and receives biology character, to extract and compare the biology character information, and when the biology character information is authorized one, to send an outer door open request to the controller, and when the biology character information is alarm biology character, send out an outdoor door open request and an alarm signal. The invention provides forced alarm method, to open door with starting alarm response, to alarm on time and protect owner.

Description

Technical field: [0001] The invention relates to the field of access control and the field of biometric feature identification, in particular to a secondary door access control system and control method using biometric feature identification technology. Background technique: [0002] For banks, savings banks, treasuries and other security-heavy places, their safety and anti-coercion are the most important. When entering and exiting the internal checkpoints of these places, it is required to control the entry and exit of staff through the double-door interlocking of the second door and the protection function of the isolation area to resist the emergency raid of gangsters. At present, there are generally two ways for employees who go out to enter the business site through the second door: [0003] The first is manual authorization, that is, to directly call the personnel inside the business point with the help of the electric bell, and they will start the switch control of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00G06K9/00
Inventor 梁敏李建荣徐明川胡永骁
Owner ZHEJIANG MIAXIS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products