Lock management method, access control terminal, server and system

A management method and management system technology, applied in the direction of instruments, time registers, single input port/output port registers, etc., can solve problems such as poor anti-theft effect, difficult evidence collection, insufficient records, etc., to ensure personal and property safety , safe, intelligent, convenient, and practical

Inactive Publication Date: 2017-01-11
朱哲宇
View PDF7 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Combination locks are generally used in the existing lock management systems, but when opening the door, the password can only be entered according to the number of digits inherent in the system. When the password is entered through the keys of this combination lock, it is easy to be remembered by a third party, and the anti-theft effect is poor. , and it is easy to ignore abnormal visits, and there are problems such as untimely handling and insufficient records of visits that come before the appointed time; in addit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lock management method, access control terminal, server and system
  • Lock management method, access control terminal, server and system
  • Lock management method, access control terminal, server and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0058] Embodiment 1. A lock management method. Combine below Figure 1 to Figure 3 The method provided in this embodiment is described in detail.

[0059] See figure 1 and figure 2 , A lock management method, applied to a door lock terminal, includes the following steps:

[0060] S1. When the doorbell rings, the door image is collected and converted and processed, and / or the voice information of the visitor is collected and converted.

[0061] Specifically, when the doorbell rings, the entrance image is collected and the light is compensated, and then converted into a grayscale image, and / or the voice information of the visitor is collected and converted into a voice string. You can collect only the entrance image or only the voice information of the visitor or both, which can be set by the user.

[0062] S2. Transmit the converted door image and / or voice information to the server for verification.

[0063] Specifically, the converted door entry image and / or voice information is tra...

Example Embodiment

[0080] Embodiment 2. A lock management system. Combine below Figure 4 The system provided in this embodiment will be described in detail.

[0081] See Figure 4 , A lock management system, the system includes a door lock terminal, a server and a user terminal. The door lock terminal specifically includes an acquisition unit, a processor, a first communication unit, a capture unit, a door lock control unit, a door lock sensing unit, an external force monitoring unit, a deformation monitoring unit, a local alarm unit, and a storage unit.

[0082] The collection unit is used to collect door entry images and / or collect voice information of visitors when the doorbell rings.

[0083] Specifically, when the doorbell rings, the collection unit collects door entry images and / or collects voice information of visitors. It is possible to collect only the entrance image or only the voice information of the visitor or both, and the door can be opened by collecting one type of information or two...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a lock management method, an access control terminal, a server and a system. The method comprises the steps that a collected entrance image and/or voice information of a visitor can be verified, the identity of the visitor can be determined only when the entrance image and/or the voice information of the visitor are/is consistent with pre-stored information, then a door is opened, a user terminal is informed, a snapped facial image of the visitor is transmitted to the user terminal before unlocking is conducted, and a user can obtain the information of the visitor in time conveniently. According to the lock management method, the access control terminal, the server and the system, the identity of the visitor can be determined by identifying the identity of the visitor, operation is easy, the personal and property safety of the user is guaranteed, safety, intelligence and convenience are achieved, and the practicability is high.

Description

technical field [0001] The invention relates to the technical field of locks, in particular to a lock management method, an access control terminal, a server and a system. Background technique [0002] Combination locks are generally used in the existing lock management systems, but when opening the door, the password can only be entered according to the number of digits inherent in the system. When the password is entered through the keys of this combination lock, it is easy to be remembered by a third party, and the anti-theft effect is poor. , and it is easy to ignore abnormal visits, and there are problems such as untimely handling and insufficient records of visits that come before the appointed time; in addition, for special groups of people (such as the elderly and children, they are easy to forget and have weak self-protection capabilities) When using the existing door lock system, potential safety hazards are easy to occur; there is no reminder for visitors, it is e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G07C9/00
CPCG07C9/00571G07C9/00563
Inventor 朱哲宇
Owner 朱哲宇
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products