Entrance guard control method, apparatus, terminal and control server

A control server and access control technology, applied in the Internet field, can solve problems such as low intelligence, loss or abuse of access control cards, and insufficient environmental protection, and achieve the effects of improving efficiency, improving security, and improving intelligence

Inactive Publication Date: 2016-04-13
TENCENT TECH (SHENZHEN) CO LTD
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are two main types of existing access control schemes. One is manual control. The access control administrator checks the identity of the access control personnel and manually controls the access control status. This artificial control scheme is inefficient and requires a lot of human resources; the other One is card swiping control. The access control status is controlled by the person holding the access control card. This solution also has the problem of low efficiency and requires the production of a large number of access control cards, which is not environmentally friendly, and the access control card may be lost or abused. Smart lower sex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Entrance guard control method, apparatus, terminal and control server
  • Entrance guard control method, apparatus, terminal and control server
  • Entrance guard control method, apparatus, terminal and control server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0125] In a first feasible implementation manner, step S509 specifically includes the following steps A-B:

[0126] A. The control server judges whether the system time corresponding to the receiving moment of the access control request is the effective use time of the key information included in the aging rule.

[0127] B. If the system time is the effective use time of the key information, the control server confirms that the key information is used according to the aging rule.

[0128] If the system time is the valid time of the key information included in the aging rule, it indicates that the second terminal uses the key information within the valid time of the key information, and the control server confirms that the The key information is used according to the aging rules. Otherwise, if the system time is not the valid time of the key information included in the aging rule, indicating that the second terminal uses the key information at the expiration time of the key in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an entrance guard control method, an apparatus, a terminal and a control server. The method comprises the following steps: a second terminal can obtain secret key information used for gate inhibition control according to a notification message sent by a first terminal; a secret key information and requester identification-carried gate inhibition control request is generated by the second terminal; the second terminal and the control server establish short-range communication connection, the gate inhibition control request is sent to the control server; the control server performs authentication verification on the second terminal according to the secret key information and the requester identification carried by the gate inhibition control request, after the verification is passed, a gate inhibition state is controlled according to the gate inhibition control request. According to the invention, gate inhibition control efficiency can be effectively increased, and security and intelligence of the gate inhibition control can be enhanced.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to an access control method, device, terminal and control server. Background technique [0002] Access control refers to the entrances and exits of passageways, such as: doors or passageways entrances and exits of banks, hotels, computer rooms, armories, confidential rooms, offices, intelligent communities, factories, etc. Access control refers to the management and control of the access control state, that is, the management and control of the entrance and exit of the passageway. The access control state may include an open state or a closed state, for example: the intelligent community is in the access control open state; or, the factory is in the access control closed state. There are two main types of existing access control schemes. One is manual control. The access control administrator checks the identity of the access control personnel and manually controls the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
Inventor 陈华山
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products