Long-distance door access control method and long-distance door access control system utilizing acoustic wave communication
An access control and sound wave technology, which is applied to user identity/authority verification and key distribution, can solve problems such as increased costs, and achieve the effects of improved security, low cost, and high security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0062] Example 1: The owner asks the cleaning staff to come to the house every Sunday this month to do sanitation: the access time authority is limited to Sundays, limited to 4 times, and expired;
[0063] According to the temporary access permission required by the cleaning staff (limited to 4 times on Sundays), a key is generated, and then converted into sound wave data through encoding;
[0064] The owner determines the temporary access permission information required by the cleaning staff. The permission information is on Sundays, limited to 4 times, and becomes invalid when it expires;
[0065] Then the server generates a unique random key and the permission according to the permission information of the temporary access, and saves it locally;
[0066] The server performs sound wave encoding on the key and converts it into sound wave data.
[0067] Send the sound wave data to the mobile phone of the cleaning staff;
[0068] The cleaning staff arrives at the gate and pla...
Embodiment 2
[0071] Embodiment 2: The entrance of the school dormitory is controlled from 6:00 to 22:00, and at other times, random entry and exit are not allowed;
[0072] According to the student's temporary access permission (dormitory access control 6:00~22:00), generate a key, and then convert it into sound wave data through encoding;
[0073] The building manager determines the temporary access permission information required by the students. The permission information is: dormitory access control from 6:00 to 22:00;
[0074] According to the permission information of the temporary access, the ladder machine generates a unique random key and the permission, and saves it locally;
[0075] The ladder machine performs sound wave encoding on the key and converts it into sound wave data.
[0076] Send the sound wave data to the student's tablet or mobile phone;
[0077] Students arrive at the access control at the door of the dormitory, and play the sound wave data through the player of...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com