Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An access control system based on two-dimensional code

An access control system, two-dimensional code technology, applied in the direction of instruments, time register, single input port/output port register, etc., can solve the problems of unsuitable promotion, no personal identity information in the card, complicated work and so on

Active Publication Date: 2017-08-04
CHENGDU UHOME TECH CO LTD
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The keyboard of the random keyboard method is fixed on the door, and the user easily leaks the password when entering the password; the security of the card identification method is also very poor, only the card is recognized but not the person, it is easy to copy, there is no personal identity information in the card, and visitors enter and exit the door Without systematic tracking, security guards need to manually check and record information, the work is complicated and the security is low; the safety factor of the biometric identification method is high, but the cost is high, and the identification rate is not high, and slight changes in the biological itself will affect the identification effect, so it is not suitable mass promotion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An access control system based on two-dimensional code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] Develop and install a two-dimensional code-based access control system, including a mobile terminal 1 and an access control system 2, wherein the mobile terminal 1 includes a resident terminal 11, and the access control system 2 includes an access control QR code 21, a system server 22 and an access control system. switch 23.

[0029] The resident terminal 11 includes an account number generation request sending unit 111 and an access control request acknowledgment unit 112; the account number generation request sending unit 111 is that the owner mobile terminal 1 sends the mobile phone code and the bound resident room number to the system server 22 and then generates a resident terminal account, so that the identification information of the mobile terminal 1 is filed with the system server 22; the access control request acceptance unit 112 is that the owner mobile terminal 1 scans the access control two-dimensional code 21 and then sends the access request information t...

Embodiment 2

[0039] The mobile terminal 1 in the access control system based on the two-dimensional code in embodiment 1 is used as the owner's mobile terminal 11, and a visitor terminal 12 and a security terminal 13 are added in addition; the resident terminal 11 also includes a visitor two-dimensional code generating unit 115 and a visitor Two-dimensional code sending unit 116, the visitor terminal 12 includes a visitor two-dimensional code receiving unit 121, a visitor two-dimensional code display unit 122, and the security terminal 13 includes a two-dimensional code scanning and access control request issuing unit 131.

[0040]The visitor two-dimensional code generation unit 115 is used for the owner to receive the code of the visitor terminal 12, bind the code of the visitor terminal with the owner code, generate a visitor two-dimensional code for opening the access control switch, and store it in the system server 22 superior.

[0041] The visitor two-dimensional code sending unit 11...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An access control system based on a two-dimensional code, including a mobile terminal and an access control system, the mobile terminal includes a resident terminal, the access control system includes an access control two-dimensional code, a system server, and an access control switch, and the access control switch is connected to the system server through a network; In addition, the mobile terminal also includes a visitor terminal and a security terminal; the resident terminal includes an account number generation request sending unit and an access control request acknowledgment unit, and the visitor mobile terminal includes a visitor two-dimensional code receiving unit and a visitor two-dimensional code display unit, and the security terminal includes Two-dimensional code scanning and access control request issuing unit; its beneficial effect is that the use of two-dimensional codes for access control identification can make the access control system simply, quickly and comprehensively record personnel entry and exit information; for unrecognizable two-dimensional codes, it can prohibit entry and exit or alarm; Visitors can also quickly generate and record their entry and exit information, which can effectively improve the safety management effect of the community and reduce the workload of security personnel.

Description

technical field [0001] The invention relates to the technical field of access control systems, in particular to an access control system based on two-dimensional codes. Background technique [0002] With the improvement of living standards, people have put forward higher requirements for the living environment, and the security system of residential quarters has attracted more and more attention. Access control management is an important part of community safety management. Existing access control systems include out-of-sequence keyboard methods, card identification methods, biometric identification methods, and the like. The keyboard of the random keyboard method is fixed on the door, and the user is easy to leak the password when entering the password; the security of the card identification method is also very poor, only the card is recognized but not the person, it is easy to copy, there is no personal identity information in the card, and visitors enter and exit the doo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/00
Inventor 曾万刚李力
Owner CHENGDU UHOME TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products