Method, equipment and system used for realization of intelligent entrance guard

A smart access control and access control technology, applied in the field of access control, can solve problems such as potential safety hazards, cumbersome processes, and unsuitable scenarios for temporary use, and achieve the effect of cost saving and wide application

Inactive Publication Date: 2014-02-26
XIAOMI INC
View PDF13 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the current smart access control also has the following problems: First, pre-fabricated cards will cost a certain amount of money.
Secondly, the information stored in the card is usually valid for a long time. For s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, equipment and system used for realization of intelligent entrance guard
  • Method, equipment and system used for realization of intelligent entrance guard
  • Method, equipment and system used for realization of intelligent entrance guard

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] see figure 1 , this embodiment provides a method for implementing intelligent access control, including the following steps.

[0063] In step 101, a two-dimensional code pattern carrying access control authority information is received, the access control authority information includes identity information and authority information, and the authority information is used to set an effective period of access control authority.

[0064] Wherein, the two-dimensional code pattern is obtained by converting the access control authority information into two-dimensional codes. The access control authority information is a string of characters, which can be converted into a two-dimensional code to obtain a two-dimensional code graphic. The identity information may be an identity ID, and the identity ID is unique.

[0065] In step 102, when the command to use the access control authority is received, the two-dimensional code pattern is displayed.

[0066] Wherein, the two-dimen...

Embodiment 2

[0075] see figure 2 , this embodiment provides a method for implementing intelligent access control, including the following steps.

[0076] In step 201, generate a two-dimensional code graphic containing access control authority information, the access control authority information includes identity information and authority information, and the authority information is used to set the effective period of the access control authority;

[0077] Wherein, the two-dimensional code pattern is obtained by converting the access control authority information into two-dimensional codes. The access control authority information is a string of characters, which can be converted into a two-dimensional code to obtain a two-dimensional code graphic. The identity information may be an identity ID, and the identity ID is unique.

[0078] In step 202, the two-dimensional code graphic is sent to the terminal;

[0079] In step 203, the two-dimensional code pattern displayed by the terminal ...

Embodiment 3

[0092] see image 3 , this embodiment provides a method for implementing intelligent access control, including the following steps.

[0093] In step 301, receive a two-dimensional code graphic carrying access control authority information, the access control authority information includes identity information and authority information, the authority information is used to set the effective period of the access control authority, and the authority information includes the effective time of the access control authority and / or effective times.

[0094] Wherein, the two-dimensional code pattern is obtained by converting the access control authority information into two-dimensional codes. The access control authority information is a string of characters, which can be converted into a two-dimensional code to obtain a two-dimensional code graphic. The identity information may be an identity ID, and the identity ID is unique.

[0095] By setting the effective time and / or effective...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, equipment and a system used for realization of intelligent entrance guard, and belongs to the field of entrance guard technology. The method comprises following steps: a 2-dimensional bar code graph carrying entrance guard authority information is received, wherein the entrance guard authority information comprises identity information and authority information, and the authority information is used for setting an effective date of entrance guard authority; when commands of using entrance guard authority are received, the 2-dimensional bar code graph is displayed, the 2-dimensional bar code graph is scanned by a verification device, and the identity information and the authority information are verified so as to confirm entrance guard authority. According to the method, the equipment and the system, the entrance guard authority information is transferred in a 2-dimensional bar code manner, and it does no need to prepare card for information storage, so that cost of intelligent entrance guard is reduced. In addition, the authority information contained by the entrance guard authority information can be used for setting the effective date of entrance guard authority, so that the method, the equipment and the system are suitable for long-term utilization of entrance guard, and temporary utilization of entrance guard, and application range is more extensive.

Description

technical field [0001] The present disclosure relates to the technical field of access control, in particular to a method, device and system for realizing intelligent access control. Background technique [0002] Intelligent access control is a mode of new modern security management. It transmits the information in the access control card to the access control through NFC (Near Field Communication, short-range wireless communication) technology or RFID (Radio Frequency Identification, radio frequency identification) technology, and the access control determines whether to open the door after identification. Intelligent access control has become an effective measure to solve the security of entrances and exits, and is widely used in banks, hotels, computer rooms, armories, confidential rooms, factories, offices, intelligent communities and other fields. [0003] The principle of smart access control is: store the card number on the information carrier card, which supports NF...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G07C9/00
Inventor 刘宇翔王彪相里飞康上明学
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products