Unlock instant, AI-driven research and patent intelligence for your innovation.

Multiple authentication set combination door-opening authentication method and system for access control

A multi-authentication, access control technology, applied in user identity/authority verification, instruments, time registers, etc., can solve the problems of fixed, no multi-authentication groups and combinations, and authentication methods cannot be changed at will, to achieve flexible access control The effect of certification

Active Publication Date: 2016-04-20
HANGZHOU HIKVISION SYST TECH
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing multi-authentication method has the problem that the authentication method is not flexible enough. For example, the authentication method of the authenticated user cannot be changed at will, and it cannot be configured as a mode in which any number of individual users in a user group swipe their cards to open the door. Cannot be sorted and the number is fixed, no multiple authentication groups and combined authentication methods, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multiple authentication set combination door-opening authentication method and system for access control
  • Multiple authentication set combination door-opening authentication method and system for access control
  • Multiple authentication set combination door-opening authentication method and system for access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] The form of combination of multiple authentication groups in this embodiment, such as figure 1 Shown:

[0052] First, consider the impact of time factors on the form of multiple authentication group combinations, and define the specific forms of multiple authentication group combinations according to different time periods;

[0053] Secondly, the form of multiple authentication group combinations in each time period includes multiple authentication group information and multiple authentication group combination information;

[0054]Among them, the multiple authentication group information includes information on the number of role groups to be authenticated in the form of multiple authentication group combinations for each time period, sequence information between role groups, and group information; group information includes multiple authentication groups for each time period Information on the number of members to be authenticated in each role group in the combined f...

Embodiment 2

[0072] The form of combination of multiple authentication groups in this embodiment, such as image 3 Shown:

[0073] First, consider the impact of time factors on the form of multiple authentication group combinations, and define the specific forms of multiple authentication group combinations according to different time periods;

[0074] Secondly, the form of multiple authentication group combinations in each time period includes multiple authentication group information, multiple authentication group combination information and additional authentication information;

[0075] Among them, the multiple authentication group information includes information on the number of role groups to be authenticated in the form of multiple authentication group combinations for each time period, sequence information between role groups, and group information; group information includes multiple authentication groups for each time period Information on the number of members to be authentica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a multiple authentication set combination door-opening authentication method and system for access control. The method and system carry out authentication of groups, role sets, the quantity and sequence of a multiple authentication set and the combination manner of the multiple authentication set on members represented by acquired authentication data in the form of multiple authentication set combination determined in different time periods, thereby realizing flexible and variable access control authentication.

Description

Background technique [0001] For the purpose of improving security, the access control of existing security technology requires multi-authentication to open the door. However, the existing multi-authentication method has the problem that the authentication method is not flexible enough. For example, the authentication method of the authenticated user cannot be changed at will, and it cannot be configured as a mode in which any number of individual users in a user group swipe their cards to open the door. The number cannot be sorted and the number is fixed. There are no multiple authentication groups and combinations of authentication methods, etc. Contents of the invention [0002] The invention provides an access control multiple authentication group combination door opening authentication method and system, so as to realize flexible access control authentication matching various scenarios. [0003] The technical means adopted in the present invention are as follows: [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07C9/00H04L9/32
Inventor 何铁龙梁彬
Owner HANGZHOU HIKVISION SYST TECH