Entrance guard system, terminal, cloud server and safety strategy setting method

An access control system and security policy technology, applied in transmission systems, instruments, time registers, etc., can solve the problems of single function of access control system and inability to change the tag terminal.

Inactive Publication Date: 2016-04-20
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, such an access control system has a relatively single function, and can only read tag information from the access control in one direction, and cannot allow the tag terminal to undergo corresponding changes based on the authorization information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Entrance guard system, terminal, cloud server and safety strategy setting method
  • Entrance guard system, terminal, cloud server and safety strategy setting method
  • Entrance guard system, terminal, cloud server and safety strategy setting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0040] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0041] figure 1 A block diagram of an access control system according to an embodiment of the present invention is shown.

[0042] Such as figure 1 As shown, the access control system 100 accordin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an entrance guard system, a terminal, a cloud server and a safety strategy setting method. The gate entrance system comprises a reception unit, a determining unit and a sending unit; when it is detected any terminal sends an entrance authentication request to the entrance guard system in a near-field communication manner, the reception unit receives the entrance authentication request; the determining unit determines the safety level of the terminal according to the entrance authentication request; and according to the safety level of the terminal, the sending unit sends a corresponding entrance authentication code to the terminal so that the terminal adopts corresponding safety strategy according to the entrance authentication code. According to the technical scheme of the invention, the safety of the entrance guard system is enhanced, communication between the terminal and the entrance guard system is improved to adapt to practical requirements of users, the convenience of users is improved, and the user can timely know the state of the terminal after withdrawing from the safety strategy.

Description

technical field [0001] The present invention relates to the technical field of terminals, in particular, to an access control system, a terminal, a cloud server and a security policy setting method. Background technique [0002] Now near-field communication (NFC) technology is widely used in access control systems. Passive electronic tags are used at the tag (tag) end, user information and passwords are input in advance, and reader (reading) technology is used at the access control end. The electronic tag information determines whether the user is qualified to pass the access control. However, such an access control system has relatively simple functions, and can only read tag information from the access control in one direction, and cannot allow the tag terminal to undergo corresponding changes based on the authorization information. [0003] Therefore, a new technical solution is needed, which can make the terminal make changes according to the authorization information w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G07C9/00
Inventor 侯永竞
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products