Unlock instant, AI-driven research and patent intelligence for your innovation.

In-out management system

A technology of access management and area, applied in the direction of single input/output register, instrument, lock application, etc.

Active Publication Date: 2010-06-02
HITACHI INFORMATION & CONTROL SOLUTIONS LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, even if B wants to leave a specific area, B cannot leave the area because B's actual current location is inconsistent with the current current location information in the card

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • In-out management system
  • In-out management system
  • In-out management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] Hereinafter, embodiments of the entry and exit management system will be described with reference to the drawings.

[0015] figure 1 It is a structural diagram of the access management system.

[0016] The access management system consists of living room 1 (1-1, 1-2), authentication device 2 (2-1, 2-2, 2-3, 2-4), mobile detection device 3 (3-1, 3-2) , gates 4 (4-1, 4-2) and a network 5 (LAN, serial cable, etc.), and the authentication device 2 and the movement detection device 3 are connected via the network 5 . The authentication devices 2-1, 2-3 are respectively used at the entrances of the living room 1-1 and the living room 1-2, and are installed on the doors 4-1, 4-2, and the authentication devices 2-2, 2-4 are respectively used in the living room 1 -1. The exit of the living room 1-2 is arranged on the doors 4-1 and 4-2. The movement detection device 3 is installed on each door, and uses a camera, a sensor, or the like to detect whether or not the authenticated...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

When a user is authenticated and a door is unlocked, the user finds some articles are not taken and does not enter into a specific region, the real current position of the user is different from the position information in a card, therefore, the user is viewed as illegal movement when authenticated next time. The invention relates to an in-out management system, comprising a first authentication device for authenticating when the user moves from a first region to the second region; and a second authentication device for authenticating when the user moves from the first region to the third region. The first authentication device is connected to the second authentication device by a network, wherein the first authentication device authenticates when the user moves from the first region to the second region, and sends the information that the user has not enter into the second region to the second authentication device, and the second authentication device authenticates the user dependenton the information when the user moves from the first region to the third region.

Description

technical field [0001] The invention relates to an entry and exit management system for managing the entry and exit of users to a specific area. Background technique [0002] Currently, a system is used in which a user is authenticated by an authentication device when the user enters or exits a specific area. [0003] Here, in order to solve the problem of "combined entry" in which other users pass through the gate together without authentication when one user is authenticated, it is known that the current location is written in the card held by the user, and the card is updated at the time of authentication. The method of the current current location information in (refer to Japanese Unexamined Patent Publication No. 2005-146652). For example, when the legitimate user A enters a specific area, the current location information in the card is rewritten from "outside the area" to "specific area". Therefore, when A leaves a specific area, because A's actual current location i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/00G06K17/00E05B49/00G07B15/00
Inventor 中本与一牧元喜宣泷田功
Owner HITACHI INFORMATION & CONTROL SOLUTIONS LTD