Access control system, client and access control identity authentication method

An identity verification method and access control system technology, applied in the field of access control security, can solve the problems of low recognition rate and low processing efficiency, and achieve the effect of solving the problem of low recognition rate

Active Publication Date: 2016-07-27
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of the present invention is to provide an access control system, a client, and an identity verification method for access control, which can solve the problems of low recognition rate and low processing efficiency in the prior art.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control system, client and access control identity authentication method
  • Access control system, client and access control identity authentication method
  • Access control system, client and access control identity authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] see figure 2 , which is a schematic diagram of the modules of the access control system in the embodiment of the present invention. The access control system 10 includes: a beacon transmitting module 11 , a signal receiver 12 , a memory 13 , an authority judging module 14 , a distance judging module 15 , a door opening device 16 , an early warning device 17 and a processor 18 .

[0038] The beacon transmitting module 11 is configured to transmit a beacon broadcast to wake up the client to send a short distance communication signal.

[0039] It can be understood that: the beacon broadcast includes a beacon ID, which is used to wake up the client matching the beacon ID. Usually, the broadcast range of the beacon transmitting module is about 50 meters, which may deviate according to the geographical environment, but it is enough to support the access control function in the present invention.

[0040] The signal receiver 12 is used to receive the near-field communicatio...

Embodiment 2

[0071] see image 3 , which is a schematic flowchart of an identity verification method for access control in an embodiment of the present invention. In short, divided by function includes two parts: registration, access control.

[0072] Registration section, including:

[0073] In step S301, the registered account number and client identification information are stored in the access control authority list, and the access control authority is assigned to the registered account number.

[0074] It can be understood that: the registered account is used to confirm whether it has the authority to modify the client identification information in the access control authority list, usually one of employee ID + employee name, employee name + password, or employee ID + password One or other combination of information that contains employee information that is not readily available through heuristics.

[0075] In the access control permission list, the permission to add rows and modi...

Embodiment 3

[0093] see Figure 4 , which is a schematic diagram of the workflow of the access control system in the embodiment of the present invention. In short, it includes four parts by function: registration, access control, attendance, and early warning.

[0094] Registration section, including:

[0095] In step S401, the registered account number and client identification information are stored in the access control authority list, and the access control authority is assigned to the registered account number.

[0096] It can be understood that: the registered account is used to confirm whether it has the authority to modify the client identification information in the access control authority list, usually one of employee ID + employee name, employee name + password, or employee ID + password One or other combination of information that contains employee information that is not readily available through heuristics.

[0097] In the access control permission list, the permission to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access control system, a client and an access control identity authentication method. The access control system comprises a signal receiver which receives near field communication signals comprising signal content and signal intensity, a memory which is used for storing an access control permission list and at least comprises client identification information and access control authority, an authority determination module which is used for determining if the near field communication signal content matches with the access control permission list, a distance judgement module which is used for determining a distance between a client and a corresponding access control device according to intensity of the matching near field communication signals and transmitting an opening signal to a door opening device when the distance is less than a first distance threshold value, and the door opening device which opens the corresponding access control device according to the opening signal. Through judgment of signal content and signal intensity, basic functions of the automatic access control device are realized. The access control system supports and authorizes user self-updating when a mobile phone is replaced, realizes work attendance recording of multiple people and is safe and portable.

Description

technical field [0001] The invention belongs to the field of access control security, and in particular relates to an access control system, a client, and an identity verification method for access control. Background technique [0002] Most of the current access control technology adopts traditional mechanical management. People need to carry keys with them, which often causes a lot of inconvenience to life because they forget to bring keys. Moreover, with the development of information technology, people's pursuit of intelligence is getting higher and higher. [0003] Biometric access control systems such as fingerprint recognition and facial recognition can meet the needs of intelligence, but in the case of dryness and injury in winter, as well as the shade of makeup, the accuracy of access control system recognition may be affected. More importantly, , Biometrics is difficult to promote in personnel-intensive enterprises, which will cause a large number of employees to w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
Inventor 何畅
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products