Gate control all-in-one machine adopting multi-verification to obtain complete open password

A technology for unlocking passwords and multiple verifications, applied in instruments, time registers, and individual input/output registers, etc., to solve the problems of access control password theft, forgetting, and misunderstanding, and achieving simple and extensive implementation. applied effect

Inactive Publication Date: 2013-07-31
姬志刚
7 Cites 24 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0002] The purpose of the password-opened access control system is mainly for security and isolation, but so...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Abstract

The invention discloses a gate control all-in-one machine adopting multi-verification to obtain a complete open password. The machine comprises an electric control lock, a communication module, a controller, a cell module, verification modules and password terminals, and the information acquisition and verification of two or three of the verification modules are carried out and the successive valid verification of the two or three modules to be verified from the password terminal is carried out to obtain a complete password which is used as the gate control open password. Compared with the prior art, the above technical scheme adopting two-time or three-time verification to obtain the gate control system open password allows a random password to be generated after each-time valid verification and be sent to an assigned password terminal in a short message form, and random passwords to be combined to obtain the safe reliable high-security-level complete password, is simple to enforce, and can be widely applied.

Application Domain

Technology Topic

Image

  • Gate control all-in-one machine adopting multi-verification to obtain complete open password

Examples

  • Experimental program(1)

Example Embodiment

[0012] As shown in the figure, an all-in-one access control machine that uses multiple verifications to obtain a complete opening password includes an electric control lock, a communication module, a controller, a battery module, a verification module and a password terminal. The electric control lock passes through the controller I/O The port is connected to its data, the communication module is connected to its data through the Uart port of the controller, the verification module is connected to its data through the controller I/O port, and the battery module is connected to the controller, the communication module, the verification module, and the wire of the electric lock And provide them with electricity.
[0013] The communication module, the controller, the battery module, and the verification module are packaged in a box, and the box is installed on a wall 60 cm away from the electric control lock.
[0014] The verification module includes a fingerprint module and a face recognition module.
[0015] Said The password terminal is a mobile phone equipped with a registered GSM card.
[0016] The controller is STC12C5630 single chip microcomputer.
[0017] The opening of the door and the electric control lock first needs to pass the separate verification of the verification module, that is, the fingerprint module and the face recognition module. The specific steps are that the fingerprint module first verifies the collected fingerprint, and sends it to the controller after the verification is legal. A valid signal, the controller stores and controls the communication module to send an automatically randomly generated 5-digit password digital short message to the password terminal; then the face recognition module verifies the collected face information to verify the legality The controller sends out a legal verification signal, the controller stores and controls the communication module to send an automatically randomly generated 5-digit password digital short message to the password terminal; finally, the aforementioned two sets of 5-digit password numbers are combined to obtain a 10-digit final access control opening password .
[0018] The aforementioned fingerprint module is a capacitive ZAZ-020 fingerprint module, which can independently complete fingerprint collection, fingerprint registration, fingerprint comparison, and fingerprint search functions. It has reflective sensing detection technology, live fingerprint detection function, and can distinguish fingerprints and fake fingerprints. ability.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Similar technology patents

Classification and recommendation of technical efficacy words

  • Wide range of applications
  • Easy to implement
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products