Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A 4G communication-based access control system and its access authorization method

An access control and access control technology, which is applied in the field of access control system based on 4G communication, can solve problems such as hidden dangers of access control, irregular actions, and the inability of cardholders to enter the access control with electronic cards, so as to prevent leakage of user information and increase security protection effect of ability

Active Publication Date: 2017-06-06
SHANDONG LUNENG SOFTWARE TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are still great risks. For example, electronic cards are easy to imitate, and once the cardholder loses the electronic card, he will not be able to enter the access control. At the same time, if the electronic card is picked up by criminals, it will bring hidden dangers to the access control; It seems that the method that can greatly improve the security performance of access control also has many problems in actual operation, such as irregular movements when collecting fingerprints, foreign objects on the surface of fingers, sensor aging and external temperature environment changes, etc., which will lead to identity verification. s failure
At present, the more prominent hidden dangers of the access control system include that when other users without authorization information need to enter, and the legitimate user is not in the house and cannot open the door for the visitor, the visitor can only be turned away or follow other legitimate users to enter , which brings great inconvenience to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A 4G communication-based access control system and its access authorization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be further described below in conjunction with the accompanying drawings.

[0023] Such as figure 1 As shown, a kind of access control system based on 4G communication of the present invention comprises an access control device and a service center, and the access control device includes a central processing unit, a video acquisition module, an audio module, an input and output module, a storage module, a communication module, and a door lock control module;

[0024] Among them, the video acquisition module is connected with the central processing unit through RS232, and is responsible for collecting visitor video information and transmitting it to the central processing unit; the audio module is connected with the central processing unit through RS232, responsible for collecting audio information and transmitting it to the central processing unit, and Decoding the audio data sent by the service center received by the central processing unit;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a door access control system based on 4G communication. The door access control system comprises a door access device and a service center, wherein the door access device comprises a video acquisition module, a voice frequency module, an input / output module, a communication module and a door lock control module; the video acquisition module is used for acquiring visitor video information and transmitting the visitor video information to a central processing unit; the voice frequency module is used for acquiring voice frequency information and transmitting the voice frequency information to the central processing unit, and decoding voice frequency data which is received by the central processing unit and is transmitted by the service center; the input / output module is used for acquiring householder identity card information and password information; the communication module is communicated with the service center by a 4G communication system and is used for receiving a command and data transmitted by the service center, transmitting the command and data to the central processing unit and transmitting the data of the central processing unit to the service center; and the door lock control module is used for receiving a door lock opening / closing command of the central processing unit and carrying out opening / closing operation on a lock. The invention further provides a door access authorization method of the door access control system. According to the door access control system and the door access authorization method, remote user authorization can be realized, and potential safety hazards can be effectively prevented when identity authentication of an electronic card is carried out; and a door access switch can be flexibly, conveniently and safely operated.

Description

technical field [0001] The invention relates to the field of security protection, in particular to a 4G communication-based access control system and an access authorization method thereof. Background technique [0002] Existing access control systems usually collect card information, password information or fingerprint information by swiping electronic cards, entering passwords or collecting fingerprints to confirm the legal identity of the user, and at the same time judge the request by comparing the information in the database with the access control controller. is it legal. However, there are still great risks. For example, electronic cards are easy to imitate, and once the cardholder loses the electronic card, he will not be able to enter the access control. At the same time, if the electronic card is picked up by criminals, it will bring hidden dangers to the access control; It seems that the method that can greatly improve the security performance of access control a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/00
Inventor 马浩周志坚王茜张宗慧杨勇吕昭家武晓文杨宁李青
Owner SHANDONG LUNENG SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products