Cloud control the access control management system and the authentication method

A management system and cloud-based control technology, applied to instruments, time registers, individual input/output registers, etc., can solve the problem of high construction cost, poor convenience, and lack of humanization of access control management systems. problems, to achieve the effect of reducing installation costs, improving aesthetics and saving time

Inactive Publication Date: 2014-01-29
EGE TECH
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In order to solve the problems of high construction cost, low security, poor convenience and lack of humanization of the existing access control management system, the present invention provides a cloud-controlled access control management system and its authentication method, which mainly integ

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud control the access control management system and the authentication method
  • Cloud control the access control management system and the authentication method
  • Cloud control the access control management system and the authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] In the following, the technical means adopted by the present invention to achieve the intended purpose of the invention will be further described in conjunction with the accompanying drawings and preferred embodiments of the present invention.

[0061] Please refer to figure 2 , is a circuit block diagram of the present invention, a function identification data 201 is input to a cloud-controlled lock 30 by a manager 10 or a user 20, and the manager 10 is transmitted by a mobile device 101 through an encrypted network 40 and then Control a cloud-controlled access control management system 50, the cloud-controlled access control management system 50 returns a message to the manager 10 through a communication device 102, and the cloud-controlled lock 30 and the cloud-controlled access control management system 50 also transmit 40 to each other through an encrypted network To transmit data, the cloud-controlled lock 30 is an electronic lock controlled by the cloud, especia...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A cloud control the access control management system and the authentication method used with one or a plurality of C-Lock connection management, the system includes at least: a system program and provide the management interface for programming operations, which contain five functional modules: a user module, a permission system module, a device management module, a virtual computing module and an event processing module combination; a database for storing the management information and function of identification information. Certification Department of the present invention is the use of multi-functional identification of cloud control lock mechanism through the encryption of network traffic and Cloud control the access control management system connection; it is close and remote two ways to achieve the purpose of certification.

Description

technical field [0001] The present invention is a cloud-based access control management system and its authentication method, especially the cloud-based control and authentication combined with short-distance and remote authentication, which utilizes the multi-functional identification mechanism of the access control device and transmits it to the access control management system through an encrypted network. method. Background technique [0002] Existing access control systems such as figure 1 As shown, the user inputs his identification data through an access control controller 91, and the access control controller 91 has an identification reading device 911 to identify the identification data input by the user, and the access control controller 91 is connected to an access control The control management system 92 is used to verify the identity identification data. The access control management system 92 includes a database 921. If the identity identification data input b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G07C9/00
Inventor 徐铭达
Owner EGE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products