Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intelligent access control system and operation method thereof

An intelligent access control system, access control system technology, applied in instruments, time registers, individual input/output registers, etc., can solve problems such as increased after-sales maintenance costs, low safety factor, and loopholes in security mechanisms, reducing The effect of after-sales maintenance costs, reducing excessive dependence, and reducing communication links

Inactive Publication Date: 2016-05-11
WENZHOU UNIVERSITY
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Common access control systems include the following two types: 1. Password access control, which uses the method of entering a password to judge the identity of the person entering and exiting. After the user enters the password, the system will automatically identify and match with the database. The advantage is that the cost is low , and easy to use, no additional accessories are needed. The disadvantage is that the safety factor is low, and it is only suitable for applications in places with low security requirements; 2. Card access control, which consists of access control cards, card readers and control hosts. After the user swipes the card, the card reader sends the read signal to the control host, and the control host judges that the password is correct and then transmits the door opening instruction; among them, the access control principle using the ID card is relatively simple, and the security system is extremely low, so it is rarely used; Although the access control using the IC card has the characteristics of logical encryption, is not easy to be cracked, and has a high safety factor, it is inconvenient to use. Because in the process of use, the visitor needs to communicate repeatedly with the owner and the security guard to confirm the identity, and it is safe. There are serious loopholes in the mechanism, and at the same time, the dependence on electronic equipment is extremely high, which increases the cost of after-sales maintenance. Once the electronic equipment is damaged and no one repairs it, the access control system will fail, and even threaten the owner's life and property safety.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent access control system and operation method thereof
  • Intelligent access control system and operation method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0030] Such as figure 1 As shown, it is an intelligent access control system provided in the embodiment of the present invention. The access control system includes a core controller 1, and a mobile data transceiver terminal 2 connected to the core controller 1, a householder verification terminal 3, and a cloud server. 4 and intelligent network door lock 5; wherein,

[0031] The mobile data transceiver terminal 2 is used to send visitor requests and receive the verification QR code issued by the owner verification terminal 3, and obtain the first verification serial number issued by the cloud server 4 by identifying the preset QR code, and further pass the identification After verifying the two-dimensional code issued by the verification terminal 3 of the househ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an intelligent access control system. The intelligent access control system comprises a core controller, a mobile data transceiving terminal, a householder verification terminal, a cloud server and an intelligent network door lock, wherein the mobile data transceiving terminal, the householder verification terminal, the cloud server and the intelligent network door lock are connected with the core controller; the mobile data transceiving terminal is used for sending a visitor request, receiving a verification two-dimension code issued by the householder verification terminal, acquiring a first verification sequence number issued by the cloud server by recognizing a preset two-dimension code and inputting a second verification sequence number to the cloud server after the verification two-dimension code is recognized; the householder verification terminal is used for issuing the verification two-dimension code; the cloud server is used for issuing the first verification sequence number, receiving the second verification sequence number and detecting the matching condition of the first verification sequence number and the second verification sequence number; the core controller is used for realizing data interaction and sending corresponding instructions to unlock and lock the intelligent network door lock according to a matching result detected by the cloud server. The intelligent access control system is convenient to use and relatively high in safety; furthermore, the over-high dependence on electronic equipment is reduced, and the after-sale maintenance cost is lowered.

Description

technical field [0001] The invention relates to the technical field of access control systems, in particular to an intelligent access control system and an operating method thereof. Background technique [0002] With the development of technology, the access control system is widely used in everyone's life, making the owners enjoy the convenience and safety protection brought by the access control system, but also has a lot of troubles due to the access control system. [0003] Common access control systems include the following two types: 1. Password access control, which uses the method of entering a password to judge the identity of the person entering and exiting. After the user enters the password, the system will automatically identify and match with the database. The advantage is that the cost is low , and easy to use, no additional accessories are needed. The disadvantage is that the safety factor is low, and it is only suitable for applications in places with low se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07C9/00
CPCG07C9/21G07C2209/41
Inventor 谢文彬许梦羊朱翔鸥
Owner WENZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products