Long-distance door access control method and long-distance door access control system utilizing acoustic wave communication

An access control and sound wave technology, which is applied to user identity/authority verification and key distribution, can solve problems such as increased costs, and achieve the effects of improved security, low cost, and high security

Active Publication Date: 2015-09-30
FUJIAN STAR NET COMM
View PDF8 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above-mentioned patent uses two controllers and two wireless transceiver modules to calculate the transmission distance. After obtaining the receiving distance signal, it is judged whether the door is opened by induction. The two controllers and two wireless transceiver modules undoubtedly increase the cost.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Long-distance door access control method and long-distance door access control system utilizing acoustic wave communication
  • Long-distance door access control method and long-distance door access control system utilizing acoustic wave communication
  • Long-distance door access control method and long-distance door access control system utilizing acoustic wave communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] Example 1: The owner asks the cleaning staff to come to the house every Sunday this month to do sanitation: the access time authority is limited to Sundays, limited to 4 times, and expired;

[0063] According to the temporary access permission required by the cleaning staff (limited to 4 times on Sundays), a key is generated, and then converted into sound wave data through encoding;

[0064] The owner determines the temporary access permission information required by the cleaning staff. The permission information is on Sundays, limited to 4 times, and becomes invalid when it expires;

[0065] Then the server generates a unique random key and the permission according to the permission information of the temporary access, and saves it locally;

[0066] The server performs sound wave encoding on the key and converts it into sound wave data.

[0067] Send the sound wave data to the mobile phone of the cleaning staff;

[0068] The cleaning staff arrives at the gate and pla...

Embodiment 2

[0071] Embodiment 2: The entrance of the school dormitory is controlled from 6:00 to 22:00, and at other times, random entry and exit are not allowed;

[0072] According to the student's temporary access permission (dormitory access control 6:00~22:00), generate a key, and then convert it into sound wave data through encoding;

[0073] The building manager determines the temporary access permission information required by the students. The permission information is: dormitory access control from 6:00 to 22:00;

[0074] According to the permission information of the temporary access, the ladder machine generates a unique random key and the permission, and saves it locally;

[0075] The ladder machine performs sound wave encoding on the key and converts it into sound wave data.

[0076] Send the sound wave data to the student's tablet or mobile phone;

[0077] Students arrive at the access control at the door of the dormitory, and play the sound wave data through the player of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a long-distance door access control method utilizing acoustic wave communication. The method comprises the following steps: 1, according to the temporary visit required authority of a visitor, generating a secret key, and then, converting the secret key into acoustic wave data through coding; 2, sending the acoustic wave data to mobile terminal equipment of the visitor; 3, collecting the acoustic wave data sent by the mobile terminal equipment through a built-in sound sensor of a door access; 4, analyzing the acoustic wave data by the door access or building equipment to recover the secret key, and then, judging whether a door is opened or not by the building equipment according to the authority corresponding to the secrete key. The invention also provides a long-distance door access control system utilizing the acoustic wave communication, and the temporary authorization way of the door access control system low in cost, convenient and fast is realized.

Description

technical field [0001] The invention relates to the technical field of access control, in particular to a remote access control method and system using sound wave communication. Background technique [0002] At present, most of the access control authorization technologies mostly adopt methods such as inputting passwords, swiping cards, fingerprints, etc. These methods are suitable for fixed owners. However, it is not suitable for visitors who need to enter temporarily, because it is inconvenient to set a fixed password and the cost is high. [0003] A "remote sensing access control system" is disclosed in the prior art. See the Chinese patent with the publication number: 202650103U and the publication date: 2013-01-02. The access control system includes a tag card, an access control controller, and a fixed The card reader and the ultrasonic generator on the door frame, the described card reader includes the first wireless transceiver module, the first controller that contr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32G07C9/00
Inventor 吴振文卢云飞陈风
Owner FUJIAN STAR NET COMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products