Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control system based on intelligent terminal and control method of access control system

A technology of intelligent terminal and access control system, applied in the direction of instruments, time registers, single input port/output port registers, etc., can solve the problems of lack of versatility, message cracking, and lack of control intelligence, etc., to improve security , avoid instability or damage, high reliability effect

Inactive Publication Date: 2015-01-28
CHANGAN UNIV
View PDF7 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] There are two solutions for existing similar solutions: the first is to activate the camera through the QR code for security authentication, and perform remote identification through the camera and perform door control operations; the second is to use the QR code to open the verification included in Among the information in the QR code, there is a danger of the message being cracked; there are three main problems in these two technologies:
[0005] 3) Security verification in the existing access control system requires remote human verification, which lacks versatility and does not give full play to the control intelligence under the condition of informatization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control system based on intelligent terminal and control method of access control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] Step 1: The server host generates verification information. The verification information includes the server address domain name (or IP address), the timestamp for verifying the validity period of the verification, and the interference code. The number of characters is within 200 characters, and the server host will verify the information. Send to the QR code generating device;

[0043] Step 2: After receiving the verification information, the two-dimensional code generating device generates two-dimensional code graphics using the matrix two-dimensional code standard, and displays the two-dimensional code graphics on the display;

[0044] Step 3: The user scans the QR code on the display with the camera of the smart phone, and the smart phone prompts to scan the fingerprint, and the user collects the fingerprint through the smart phone for verification. After the user verification, the verified information is transmitted to the server host through the wireless communicat...

Embodiment 2

[0048] Step 1: The server host generates verification information. The verification information includes the server address domain name (or IP address), the timestamp for verifying the validity period of the verification, and the interference code. The number of characters is within 200 characters, and the server host will verify the information. Send to the QR code generating device;

[0049] Step 2: After receiving the verification information, the two-dimensional code generating device generates two-dimensional code graphics using the matrix two-dimensional code standard, and displays the two-dimensional code graphics on the display;

[0050] Step 3: The user uses the camera of the smartphone to scan the QR code on the display, the smartphone prompts to enter a password, and the user enters the password for verification. After the user verifies, the verified information is transmitted to the server host through the wireless communication network;

[0051] Step 4: The server...

Embodiment 3

[0054]Step 1: The server host generates verification information. The verification information includes the server address domain name (or IP address), the timestamp for verifying the validity period of the verification, and the interference code. The number of characters is within 200 characters, and the server host will verify the information. Send to the QR code generating device;

[0055] Step 2: After receiving the verification information, the two-dimensional code generating device generates two-dimensional code graphics using the matrix two-dimensional code standard, and displays the two-dimensional code graphics on the display;

[0056] Step 3: The user scans the QR code on the display with the camera of the smart phone, and the smart phone prompts to scan the fingerprint. After the user collects the fingerprint through the smart phone, the smart phone prompts to enter the password. The password is transmitted to the server host through the wireless communication netwo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access control system based on an intelligent terminal and a control method of the access control system. The system sends verification information to a two-dimension code generation and display device by use of a server host; the intelligent terminal scans a two-dimension code generated by the two-dimension code generation and display device and a user performs validation; after validation, the validated information is sent to the server host for comparison validation; after the comparison validation is successful, the server host sends a door opening signal code to an access control controller to open the door; and if the comparison validation fails, the server host sends validation failure information to a display. The access control system based on the intelligent terminal has the advantages that a key, an access control card or other articles cannot be required so that the trouble caused by forgetting carrying or wrong use can be reduced, such input devices as a coded lock or a fingerprint lock do not need to be arranged and the functions can be completed by use of the carried intelligent terminal, and therefore, the instability or damage of the existing coded lock or fingerprint lock device due to long-term touch is avoided, and the trouble of manual password change of the existing coded lock is avoided.

Description

technical field [0001] The invention belongs to the field of access control safety devices, and in particular relates to an access control system based on an intelligent terminal and a control method thereof. Background technique [0002] There are two solutions for existing similar solutions: the first is to activate the camera through the QR code for security authentication, and perform remote identification through the camera and perform door control operations; the second is to use the QR code to open the verification included in Among the information in the QR code, there is a danger of the message being cracked; there are three main problems in these two technologies: [0003] 1) The existing access control system requires a card reader and a fingerprint reading device, which are easily damaged by frequent contact. [0004] 2) The traditional access control system uses a static method to read information in the QR code, or conducts compliance monitoring after simple e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
Inventor 崔建明白艳
Owner CHANGAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products