Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intelligent gate inhibition realization method, terminal, gate inhibition identification apparatus and user authorization service center

A user authorization and service center technology, applied in the field of terminals, access control identification devices, user authorization service centers, and intelligent access control implementation methods, can solve problems such as non-existence, flexibility limitations, and increased workload of property staff

Inactive Publication Date: 2016-04-27
LIAONING MOBILE COMM
View PDF19 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Existing technologies such as RFID identification, Bluetooth identification, fingerprint and iris identification have the following defects: due to the need to pre-enter user identification features such as keys, fingerprints, iris, etc. The held user characteristics are identified and compared with the user identification characteristics in the main control device to confirm the visitor's access authority, which limits the flexibility of this method. When the user does not belong to the information entered by the main control device When a resident user, especially when the user is a temporary visitor, the visitor will not be able to pass through the access control system because the user characteristics of the visitor do not exist in the master control device. At this time, other manual intervention methods are usually required to solve the problem, such as Manual registration, telephone communication with the property, or interviewees directly leading visitors to enter, etc.
In some places where temporary visits are very frequent, such as many residential quarters and commercial buildings, the availability of the access control system decreases due to the large number of temporary visits, which greatly increases the workload of property staff and brings many discomforts to the interviewees. necessary trouble

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent gate inhibition realization method, terminal, gate inhibition identification apparatus and user authorization service center
  • Intelligent gate inhibition realization method, terminal, gate inhibition identification apparatus and user authorization service center
  • Intelligent gate inhibition realization method, terminal, gate inhibition identification apparatus and user authorization service center

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0086] Embodiment 1 of the present invention provides a method for implementing intelligent access control, such as figure 1 As shown, the method includes the following steps:

[0087] Step 101: the user authorization service center receives the passage authorization application information sent by the first terminal;

[0088] Specifically, the user authorization service center here can be implemented by a server, a personal computer (PC, PersonalComputer) or other methods;

[0089] The first terminal is a visitor terminal. Before step 101, a communication connection has been established between the first terminal and the user authorization service center. Specifically, a communication connection can be established through Near Field Communication (NFC, Near Field Communication), Bluetooth, Wireless Fidelity (WIFI) , WIreless-Fidelity), instant messaging tools or 2G, 3G, 4G and other data mobile communication methods to establish communication connections.

[0090] The pass ...

Embodiment 2

[0115] Embodiment 2 of the present invention provides a method for implementing intelligent access control, such as figure 2 As shown, the method includes the following steps:

[0116] Step 201: the first terminal sends the application information of the authorization to the user to the user authorization service center;

[0117] Specifically, before step 201, the first terminal needs to establish a communication connection with the user authorization service center, specifically, through NFC, Bluetooth, wireless fidelity (WIFI, WIreless-Fidelity), instant messaging tools or 2G, 3G, 4G and other data mobile communication methods to establish communication connections.

[0118] The pass authorization application information sent by the first terminal includes interviewee information, and the interviewee information includes at least one of the following information: interviewee name, interviewee phone number, interviewee house number. Further described communication authoriz...

Embodiment 3

[0132] Embodiment 3 of the present invention provides a method for implementing intelligent access control, such as image 3 As shown, the method includes the following steps:

[0133] Step 301: the access control identification device receives sensing signals sent by other terminals;

[0134] Specifically, the sensing signal includes at least one of the following signals: a vibration signal, an audio signal, and a flash signal;

[0135] Step 302: the access control identification device parses the sensing signal into a digital signal, and sends the digital signal to the access control center to confirm whether the digital signal is a legal authorization instruction code;

[0136] The access control identification device resolves the sensing signal into a digital signal, including:

[0137] When the sensing signal is a vibration signal, the access control identification device resolves the vibration signal into a vibration frequency, and resolves the vibration frequency into...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an intelligent gate inhibition realization method. The method is characterized in that a first terminal sends access authorization application information to a user authorization service center; the first terminal receives an authorization instruction code sent by the user authorization service center; the first terminal parses the authorization instruction code to terminal part movement state information, and corresponding part movement can be executed according to the terminal part movement state information. The invention also discloses a terminal, gate inhibition identification apparatus and the user authorization service center.

Description

technical field [0001] The invention relates to the fields of information technology and data services, in particular to a method for realizing intelligent access control, a terminal, an access control identification device and a user authorization service center. Background technique [0002] With the continuous improvement of modernization, more and more residential quarters, commercial buildings and government and enterprise offices in our country have installed access control systems to strengthen the management of people entering and leaving. While strengthening the security measures of these places, access control The system also brings inconvenience to the normal passage of some temporary visitors and non-resident personnel. [0003] The access control system that is often used at present mainly uses radio frequency identification (RFID, Radio Frequency Identification) technology including near field communication (NFC, Near Field Communication), Bluetooth identificat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07C9/00
Inventor 史远宋炜
Owner LIAONING MOBILE COMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products