Triple-authentication gate control system and control method

An access control system and re-authentication technology, applied to TV system components, color TV components, TVs, etc., can solve the problems of unable to open the access control, easy to be stolen or copied, expensive equipment, etc., to achieve the accuracy of authentication High, low communication cost, and short transit time

Inactive Publication Date: 2010-09-08
GUANGZHOU HORIZONTAL INFORMATION TECH
View PDF8 Cites 64 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the development of technology, these single technologies are either easily cracked, or not suitable for practical use in remote unattended power rooms
[0003] For example, with a single password, it is easy for others to see the password when entering the password; with IC / ID card technology, the IC / ID card itself is easy to be stolen or copied; with barcode technology, whether it is a paper barcode or other forms Barcodes are easily copied or duplicated; biometrics (whether fingerprints, palm prints or irises) are used. On the one hand, these devices are very expensive and not suitable for use in this remote wilderness.
On the other hand, the recognition rate of these technologies is relatively low, and the construction personnel in the electric room or machine room have been dealing with cables, copper wires, iron wires or network cables for a long time, which is particularly easy to scratch fingers or palms and often stay up late, which will lead to fingerprint identification, The pass rate of palmprint recognition and iris recognition has become very low, resulting in the failure to open the access control
[0004] To sum up, the current access control system either has a single authentication method and is easy to be stolen or copied, or the technology is so advanced that the recognition rate is low and the equipment cost is very expensive, so it is not suitable for large-scale application in unattended electric rooms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Triple-authentication gate control system and control method
  • Triple-authentication gate control system and control method
  • Triple-authentication gate control system and control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0037] The triple authentication access control system includes triple authentication of ID card, random two-dimensional code and time stamp.

[0038] as attached figure 1 As shown, a triple-authentication access control system includes an image acquisition module, a card reader module, a local controller module, an access control output module, a mobile phone, a system management module, and a database module.

[0039] The image collection module is connected with the local controller module to obtain the visitor's image, and uploaded to the system management module by the local controller module.

[0040] The card reader module is connected with the local controller module, and integrates two identification technologies of ID card and two-dimensional code. After reading the ID card number and two-dimensional code information, it is uplo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a triple-authentication gate control system and a control method. The triple-authentication gate control system comprises an image collection module, a card reader module, a local controller module, a gate control output module, a mobile phone, a system management module and a database module. Through verifying whether an identity card is legal or not, the local controller module is triggered to be connected to Internet through 3G/GPRS, the system management module receives the login request of the local controller to generate random two-dimensional codes and time stamps which are sent into the mobile phone and the local controller module through multimedia messages and network, then, the local controller obtains two-dimensional codes through the card reader module, and compares the obtained two-dimensional codes to the two-dimensional codes downloaded from the system management module through 3G/GPRS network, next, the time stamp comparison is carried out, finally, whether all the authentication is legal or not is judged, and the gate is opened and images are collected if all the authentication is legal. The invention ensures high safety of the gate control system, has the advantages of short authentication time, high authentication accurate rate and low cost, and is favorable for large-range application and popularization.

Description

technical field [0001] The invention relates to an access control system and a control method, in particular to a triple authentication access control system and a control method for an unattended power distribution room. Background technique [0002] At present, the access control systems used to restrict the passage of unauthorized personnel generally use passwords, IC / ID cards, barcodes, biometrics and other technologies. With the development of science and technology, these single technologies are either easily cracked, or are not suitable for practical use in remote unattended power rooms. [0003] For example, with a single password, it is easy for others to see the password when entering the password; with IC / ID card technology, the IC / ID card itself is easy to be stolen or copied; with barcode technology, whether it is a paper barcode or other forms Barcodes are easily copied or copied; biometrics (whether fingerprints, palm prints, or irises) are used. On the one h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00G06K7/00G06K9/00H04N5/225
Inventor 王炅余春生
Owner GUANGZHOU HORIZONTAL INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products