Access control system and method

A management method and access control technology, which is applied in the access control management system and its management field, can solve problems such as inability to communicate, scattered distribution of substations, low difficulty in copying cards, etc., and achieve the effect of reducing the risk of theft

Inactive Publication Date: 2016-10-12
常州市科能电器有限公司 +1
View PDF12 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Access control management is a relatively important link in the security system. At present, most of the existing access control systems cannot reliably guarantee the safety of users' property. For example, if the door is opened by a key, the key is easily copied and lost. Replacing the door lock requires high maintenance costs and low security. Another example is to open the door through an access control card. At present, criminals have special machines for copying cards. The difficulty of copying cards is extremely low, and cards are more likely to be lost.
However, in some special environments, the existing access control system cannot meet the needs. For example, substations are built underground, without mobile networks, unable to communicate, and the distribution of substations is relatively scattered. Building wired broadband The cost is too high, so it is necessary to design an access control management system to meet the needs of special practical use environments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control system and method
  • Access control system and method
  • Access control system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0091] Such as image 3 As shown, the present invention provides a first embodiment of a mobile smart terminal, including:

[0092] The first communication unit is used to connect with the server and send user identity verification information to the server; after the verification is passed, obtain the second identity mark; it is also used to obtain the door opening authority from the server; each access controller corresponds to a first identity mark, The door-opening authority includes at least one first identification of an access controller that is allowed to open the door and their opening time periods;

[0093] The first storage unit is used to store the authority to open the door;

[0094] a first clock unit, configured to form an independent clock;

[0095] The second communication unit is used to connect with the access controller to obtain the first identity of the access controller to be opened;

[0096] Judging unit: used to verify whether the first identity of ...

Embodiment 2

[0102] Such as Figure 4 As shown, the present invention provides a second embodiment of a mobile smart terminal. Compared with the first embodiment, the mobile smart terminal also includes:

[0103] An operation record unit, configured to generate an operation record corresponding to the second identity;

[0104] The second communication unit is also used to obtain the access control record corresponding to the first identity from the access control controller;

[0105] The first storage unit is also used for storing operation records and access control records;

[0106] The first communication unit is also used to transmit the operation record and access control record to the server.

Embodiment 3

[0107] Such as Figure 5 As shown, the present invention provides a third embodiment of a mobile smart terminal. Compared with the second embodiment, the mobile smart terminal also includes:

[0108]An encryption unit, configured to encrypt the setting operation of the first clock unit;

[0109] a decryption unit, configured to decrypt the encrypted first clock unit;

[0110] Calibration unit for synchronizing the stand-alone clock with the network clock on the server.

[0111] Such as Image 6 As shown, the invention provides a kind of access controller, comprising:

[0112] The third communication unit is used to connect with the mobile smart terminal to obtain the door opening instruction;

[0113] The lock control unit is used to control the opening or closing of the door lock.

[0114] An access control record unit, configured to generate an access control record corresponding to the first identity;

[0115] The second clock unit is used to reflect the current momen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an access control method. An access controller is controlled by a mobile intelligent terminal to open a door. The method includes the steps that S1, the mobile intelligent terminal obtains a door opening authority; S2, the mobile intelligent terminal is connected with the access controller of a to-be-opened door and then judges whether the access controller conforms to the door opening authority or not, if yes, the mobile intelligent terminal sends a door opening instruction to the access controller and the access controller opens the door, and if not, the mobile intelligent terminal refuses to send the door opening instruction. The access control system is particularly suitable for the underground environment without an external network; the mobile intelligent terminal obtains the door opening authority on the ground and then moves to the underground, then the access controller can be controlled to open the door without the support of the external network; different from the door opening forms of keys and cards, copying is avoided, thievery risks are reduced, and safety and reliability are achieved.

Description

technical field [0001] The invention relates to the technical field of access control management, in particular to an access control management system and a management method thereof. Background technique [0002] Access control management is a relatively important link in the security system. At present, most of the existing access control systems cannot reliably guarantee the safety of users' property. For example, if the door is opened by a key, the key is easily copied and lost. Replacing the door lock requires high maintenance costs and low security. Another example is to open the door through an access control card. At present, criminals have special machines for copying cards. The difficulty of copying cards is extremely low, and cards are more likely to be lost. However, in some special environments, the existing access control system cannot meet the needs. For example, substations are built underground, without mobile networks, unable to communicate, and the distrib...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
CPCG07C9/38
Inventor 杨振宇顾新陈海涛
Owner 常州市科能电器有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products