Access control method and access control system

An access control and access control technology, applied in the field of communication, to achieve the effect of convenient use, not easy to crack, and high security

Active Publication Date: 2011-11-30
ZTE CORP
View PDF5 Cites 95 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there is a lack of access control technology based on mobile communication network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and access control system
  • Access control method and access control system
  • Access control method and access control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] In this embodiment, an access control system is provided, figure 1 It is a schematic structural diagram of an access control system according to Embodiment 1 of the present invention. The system includes: a remote access control management system 100 and a plurality of access control switch devices 102, wherein,

[0025] Each access control switch device 102 is used to obtain the door opening request and the user account number input by the user using the mobile terminal 104, send the door opening request and the user account number to the remote access control management system 100, and is used to receive the door opening request from the access control management system 100. The verification code, and use the verification code to verify the password entered by the user, and if the verification is passed, the door will be opened;

[0026] The access control management system 100 stores the corresponding relationship between the user account number and the user mobile t...

Embodiment 2

[0036] In the implementation process, system administrators, access control administrators and users (entrants) are required to interact with the access control system provided by Embodiment 1 to realize the door opening or closing operation of each access control switch device. The preferred access control system provided by Example 1 is introduced in detail, as in figure 2 In the shown access control system, the access control management system 100 also provides a WAP portal page to provide registration or setting services for system administrators, access control administrators and entrants, wherein the three roles can have the following usage rights respectively:

[0037] 1. The system administrator has the following authority:

[0038] (1) Have all permissions to operate the access control system, including setting system parameters and portal permissions;

[0039] (2) Has the authority to manage access control administrators and entrants, mainly including: specifying w...

Embodiment 3

[0053] In this embodiment, an access control method is provided, image 3 It is a flow chart of the access control method according to Embodiment 3 of the present invention, such as image 3 As shown, the method includes:

[0054] Step S302, the access control switch device obtains the door opening request and the user account input by the user, and sends the door opening request and the user account to the remote access control management system, wherein the access control management system stores the corresponding relationship between the user account and the user's mobile terminal identifier;

[0055] Step S304, the access control management system generates a password and a verification code corresponding to the user account in response to the door opening request, and sends the password to the mobile terminal corresponding to the user account according to the corresponding relationship between the user account and the user mobile terminal identifier, and sends the verific...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an entrance guard control method and an entrance guard control system. The method provided by the invention comprises the following steps of: obtaining a door-opening request and a user account number which are input by a user by an entrance guard switch apparatus and sending the door-opening request and the user account number to an entrance guard managing system at the far end; storing a corresponding relation between the user account number and a user mobile terminal sign by the entrance guard managing system; responding the entrance guard managing system to the door-opening request to generate a password and a check code which correspond to the user account number; sending the password to a mobile terminal corresponding to the user account number and sending the check code to the entrance guard switch apparatus according to the corresponding relation between the user account number and the user mobile terminal sign; obtaining the password input by the user by the entrance guard switch apparatus; utilizing the check code to check the password and executing a door-opening operation after the check is passed. The technical scheme provided by the invention is as follows: the entrant does not need to carry a key substitution and also does not need to remember complicated password so that the system provided by the invention is convenient for user to use and the problem of losing the password is not existed; and the password is not easy to be cracked so that the safety is high.

Description

technical field [0001] The present invention relates to the communication field, in particular to an access control method and an access control system. Background technique [0002] Traditional access control systems mainly include keyboard password, contact IC card, RFID card, and Bluetooth access control systems. [0003] The access control system using IC card, RFID card or Bluetooth requires the user to carry a key substitute. If the wireless key is lost, the access control can be opened directly after picking up the key substitute; It is easy for the user to forget the password of the access control. [0004] With the rapid development of mobile communication services, ordinary users have a mobile phone terminal. Moreover, the security level of the mobile communication network itself is very high. Various mobile communication technologies have their own encryption methods, and the network is complex and not easy to be attacked. The mobile communication network has c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00H04W12/02H04W12/04H04W12/03H04W12/043
CPCG07C9/00015G07C9/00142G07C9/00571G07C9/0069G07C9/38G07C9/33
Inventor 罗永华高磊唐晶
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products