Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method, authentication device and access control system

An access control system and authentication technology, which is applied in the direction of instruments, time registers, and individual input/output registers, etc., can solve the problems of reducing the authentication efficiency and increasing the complexity of user authentication, so as to improve the authentication Efficiency, simplifying authentication methods, and ensuring the effect of security

Active Publication Date: 2018-04-10
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, multiple authentication methods are used to realize the authentication of the access control system, which will increase the complexity of user authentication and reduce the efficiency of authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, authentication device and access control system
  • Authentication method, authentication device and access control system
  • Authentication method, authentication device and access control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to have a clearer understanding of the above objects, features and advantages of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0035] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0036] figure 1 A schematic flowchart of an authentication method according to an embodiment of the present invention is shown.

[0037] Such as figure 1 As shown, the authentication method according ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication method and device and an access control system.The authentication method comprises the steps that the current distance between the access control system and a terminal is obtained, and the number of users in a room with the access control system is detected; according to the current distance and the number of the users in the room, whether the authentication mode of the access control system needs to be switched or not is judged; if the authentication mode of the access control system needs to be switched, the current authentication mode of the access control system is switched to other authentication modes, wherein the variety of the current authentication mode is larger than that of the other authentication modes.According to the technical scheme, safety of the access control system is ensured, the authentication mode of the access control system can be simplified, and therefore the authentication efficiency of the access control system is improved.

Description

technical field [0001] The present invention relates to the technical field of access control systems, in particular to an authentication method, an authentication device and an access control system. Background technique [0002] The authentication methods of the access control system can be password authentication, gesture authentication, fingerprint authentication, etc. However, a single authentication method cannot effectively guarantee the security of the access control system. At present, the authentication of the access control system is realized through a variety of authentication methods. For example, if the access control system successfully authenticates the gesture pattern input by the user, the user is required to input the fingerprint again. If the fingerprint entered by the user matches the pre-stored fingerprint successfully, then The user authentication is successful. However, multiple authentication methods are used to implement the authentication of the a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/00
CPCG07C9/32G07C9/37
Inventor 谭中军
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD