Intelligent entrance guard system for mobile terminal user verification

An intelligent access control system and user verification technology, applied in user identity/authority verification, instruments, time registers, etc., can solve the problems of high access control cost, inconvenient key carrying, low security, etc., and achieve convenient management and use costs. Low, high safety effect

Inactive Publication Date: 2013-04-03
边高伟
View PDF6 Cites 105 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The present invention aims to provide an access control system with low cost, high security and convenient use, whic...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent entrance guard system for mobile terminal user verification
  • Intelligent entrance guard system for mobile terminal user verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The hardware part of the present invention is composed of a mobile intelligent communication terminal (1), a wireless network server (2), an electric control lock drive unit (3) and an electric control lock (4).

[0027] Terminals are intelligent electronic devices such as smart phones, portable computers, PDAs, and tablet computers. The present invention installs client software on general intelligent terminal devices to provide client functions such as human-computer interaction interface, user information reading, and data processing and transmission.

[0028] The server is an embedded computer system with wireless routing function, which is composed of MIPS microcontroller (MCU) chip with integrated routing network communication function such as Broadcom or Atheros, peripherals equipped with memory, interface and other modules. Install and run server-side software on the server to complete functions such as user authentication and management.

[0029] The electric c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an intelligent entrance guard system which uses mobile phones and other mobile communication terminals as user information reading and communication devices, utilizes a wireless network communication, and realizes dual verification for the terminals and the user identities. The system provided by the invention is composed of a mobile intelligent communication terminal, a wireless network server, an electronically controlled lock drive unit, and an electronically controlled lock, wherein the terminal is accessed to the Internet through a wireless LAN or a GPRS mobile telephone network, and builds a wireless communication connection verified by the terminal with the server; a client software of the terminal provides a human-computer interaction interface, and reads, entries, analyzes and identifies the user information; and a server software of the wireless network server realizes user verification, database management and controlling motions of the electronically controlled lock. The entrance guard system is low in cost, high in safety and convenient to use.

Description

technical field [0001] The invention relates to an intelligent access control system, which can be specifically described as a mobile intelligent communication terminal such as a mobile phone as a communication device for user information reading and input and data processing, and uses wireless network communication to realize the identification of the communication terminal equipment used and the identity of the user. A smart access control system with double authentication. Background technique [0002] Existing access control systems can be divided into three categories according to their verification methods: one is physical key verification; the second is password verification; the third is biometric verification. In the physical key verification method, the system has a key in physical form, and the system verifies by confirming the characteristic information of the key. Only the characteristics that meet the system's approval can pass the verification to open the acce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G07C9/00H04L9/32
Inventor 边高伟
Owner 边高伟
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products