Access control management method, device and system

A management method and management system technology, applied in the field of access control management methods, devices and systems, can solve problems such as lack of intelligence and inconvenience, and achieve the effect of improving user experience

Inactive Publication Date: 2016-02-03
马孝康
View PDF5 Cites 69 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the object of the present invention is to provide an access control management method, system and device to improve the problem that the access control management method in the prior art is relatively inconvenient and less intelligent to a certain extent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control management method, device and system
  • Access control management method, device and system
  • Access control management method, device and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0027] figure 2 It is a flow chart of the access control management method provided by the first embodiment of the present invention. The access control management method is applied to an access control management system including a mobile terminal, a server and an access control machine. see figure 2, this embodiment mainly describes the method based on the interaction between the mobile terminal, the access control machine and the server. Specifically, the access control management method provided in this embodiment includes the following steps:

[0028] Step S11, the client of the mobile terminal acquires the identification code displayed on the access control machine, and sends an access control opening request to the server according to the acquired identification code, the identification code is generated by the server and includes the The access control machine ID of the access control machine, the access control opening request includes the access control machine ...

no. 2 example

[0052] Figure 8 It is a flow chart of the access control management method provided by the second embodiment of the present invention. see Figure 8 , the present embodiment is an access control management method performed by a server, comprising the following steps:

[0053] Step S21, the server receives the access control door opening request sent by the mobile terminal, and the access control door opening request is generated by the client of the mobile terminal after obtaining the identification code displayed on the access control machine, and the identification code includes the access control machine identification of the access control machine , the access control door opening request includes the access control machine identifier and the account bound to the client;

[0054] Step S22, the server searches for a user record corresponding to the account according to the door opening request;

[0055] Step S23, when the user record corresponding to the account number ...

no. 3 example

[0060] Figure 9 It is a schematic structural diagram of the access control management system provided by the third embodiment of the present invention. see Figure 9 , the access control management system 300 provided in this embodiment may include a mobile terminal 310 , a server 320 and an access control machine 330 .

[0061] The mobile terminal 310 is used to obtain the identification code displayed on the access control machine 330 through its client terminal, and send a door control opening request to the server 320 according to the obtained identification code, and the identification code is generated by the server 320 It also includes the access control machine identification of the access control machine 330, and the access control opening request includes the access control machine identification and the account bound to the client.

[0062] The server 320 is configured to, when the user record corresponding to the account is found according to the request for ope...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access control management method, device and system. The method comprises the following steps: acquiring an identification code displayed on an access control machine by a client of a mobile terminal, and transmitting an access control opening request to a server according to the acquired identification code, wherein the identification code is generated by the server and comprises an access control machine marker of the access control machine, and the access control opening request comprises the access control machine marker and an account bound with the client; when the server finds out a user record corresponding to the account according to the access control opening request, comparing the access control machine marker corresponding to the account in the found user record with the access control machine marker in the access control opening request by the server, and transmitting a door opening instruction to the access control machine when compared results are matched; and performing door opening operation according to the door opening instruction by the access control machine. With the adoption of the method, a user can conveniently and intelligently open access control by using the client on the mobile terminal.

Description

technical field [0001] The present invention relates to the field of access control management, in particular to an access control management method, device and system. Background technique [0002] At present, basically every community or some companies and hotels are equipped with access control systems to ensure safety, and the commonly used access control systems are generally password access control, biometric access control and card swiping access control. With the continuous improvement of social development and quality of life, people gradually began to expect the access control management of their related communities or companies to be more intelligent and have a better experience. Because the password access control in the prior art is cumbersome for users and the password is easy to be stolen by others, the cost of biometric access control is high and error-prone in identification, and the card swiping access control requires the user to carry the access control c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
Inventor 马孝康
Owner 马孝康
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products