Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network access identity recognition system and method

A technology of identification and identification, which is applied in the direction of instruments, time registers, single input port/output port registers, etc., can solve the problems of high cost, high system construction cost, inconvenient use for users, etc., and achieve convenient use , save cost, and facilitate project deployment

Inactive Publication Date: 2014-03-26
深圳市呤云科技有限公司
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] These systems all have a common feature, that is, the identification devices are based on the feature recognition of entities (such as RFID cards, human bodies), and all need to be installed outside the access control so that users can operate in close contact. For some outdoor application scenarios, this Such equipment usually has the characteristics of high temperature resistance, high humidity, waterproof, etc., and the product cost is relatively high.
[0004] In addition, the RFID card access control system needs to issue a large number of RFID cards, and the construction cost of the system is relatively high; the cost of biometric access control systems such as fingerprint recognition and facial recognition is relatively high. When users use it, they need to perform close contact with the access control equipment. Unable to realize remote sensing to open the access control, which is inconvenient for users to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access identity recognition system and method
  • Network access identity recognition system and method
  • Network access identity recognition system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The principle of the network access control identification system of the present invention is as follows: figure 1 and figure 2 As shown, it includes a network access control identification device and a communication terminal, and the network access control identification device and the communication terminal communicate through a local area network or the Internet.

[0031] The network access control identity recognition device is used to process the registration of the communication terminal and issue the user access control identity to the communication terminal; process the door opening request of the communication terminal, and perform the corresponding access control authority operation according to the result of the legality verification of the user access control identity;

[0032] The communication terminal is used for: completing the user registration operation, and initiating a door opening request according to the stored user access control identity. The s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network access identity recognition system. The network access identity recognition system consists of a network access identity recognition device and a communication terminal, wherein the communication terminal transmits user registration to the network access identity recognition device; after the registration passes, the network access identity recognition device transmits a user access identity marker to the communication terminal; the communication terminal transmits door-opening request to the network access identity recognition device; the network access identity recognition device receives the door-opening request, performs user access identity marker legality verification on the door-opening request and executes corresponding access permission operation after the user access identity marker verification passes. A user can use the network access system without swiping a card or other biological identity recognition methods; in particular, when a visitor comes, the user can open the door at the office, home or any places through the communication terminal, so that a user can use the network access identity recognition system conveniently and quickly; the network access identity recognition system can be mounted at any places near a door lock as the user contact operation is not required, so that the engineering arrangement is greatly facilitated.

Description

technical field [0001] The invention relates to the security field, in particular to an access control identification method and device. Background technique [0002] The traditional access control system is usually composed of an identification device, an access control controller, a lock unlocker and management software. The identification and permission confirmation are carried out by the logo. After the identification is passed, the access control system opens the corresponding access control. With the development of technology, it is derived: non-contact RFID card (IC / ID card) access control system, fingerprint recognition access control system, face recognition access control system, etc. [0003] These systems all have a common feature, that is, the identification devices are based on the feature recognition of entities (such as RFID cards, human bodies), and all need to be installed outside the access control so that users can operate in close contact. For some ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
Inventor 张耀光刘德田程越
Owner 深圳市呤云科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products