Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Lock management method, access control terminal, server and system

A management method and management system technology, applied in the direction of instruments, time registers, single input port/output port registers, etc., can solve problems such as poor anti-theft effect, difficult evidence collection, insufficient records, etc., to ensure personal and property safety , safe, intelligent, convenient, and practical

Inactive Publication Date: 2017-01-11
朱哲宇
View PDF7 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Combination locks are generally used in the existing lock management systems, but when opening the door, the password can only be entered according to the number of digits inherent in the system. When the password is entered through the keys of this combination lock, it is easy to be remembered by a third party, and the anti-theft effect is poor. , and it is easy to ignore abnormal visits, and there are problems such as untimely handling and insufficient records of visits that come before the appointed time; in addition, for special groups of people (such as the elderly and children, they are easy to forget and have weak self-protection capabilities) When using the existing door lock system, potential safety hazards are easy to occur; there is no reminder for visitors, it is easy to cause the agreed visitors to wait, and when there are abnormalities or illegal visitors break in, they cannot be found in time, the alarm is not timely, and evidence collection It is also very difficult to ensure the safety of people's personal and property

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lock management method, access control terminal, server and system
  • Lock management method, access control terminal, server and system
  • Lock management method, access control terminal, server and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] Embodiment 1. A lock management method. Combine below Figure 1 to Figure 3 The method provided in this embodiment will be described in detail.

[0059] see figure 1 and figure 2 , a lock management method applied to a door lock terminal, comprising the following steps:

[0060] S1. When the doorbell rings, collect the entry image and convert it, and / or collect the visitor's voice information and convert it.

[0061] Specifically, when the doorbell rings, the image of entering the door is collected and subjected to light compensation, and then converted into a grayscale image, and / or the voice information of the visitor is collected and converted into a voice string. It can only collect the entrance image or only the visitor's voice information or both, which are set by the user.

[0062] S2. Transmitting the converted door entry image and / or voice information to the server for verification.

[0063] Specifically, the converted door-entry image and / or voice infor...

Embodiment 2

[0080] Embodiment 2, a lock management system. Combine below Figure 4 The system provided in this embodiment will be described in detail.

[0081] see Figure 4 , a lock management system, the system includes a door lock terminal, a server and a user terminal. The door lock terminal specifically includes a collection unit, a processor, a first communication unit, a snapshot unit, a door lock control unit, a door lock sensing unit, an external force monitoring unit, a deformation monitoring unit, a local alarm unit and a storage unit.

[0082] The collecting unit is used for collecting the image of entering the door and / or collecting the voice information of the visitor when the doorbell rings.

[0083] Specifically, when the doorbell rings, the collection unit collects the image of entering the door and / or collects the voice information of the visitor. It can only collect the entrance image or only the visitor's voice information or both, and the door can be opened by col...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a lock management method, an access control terminal, a server and a system. The method comprises the steps that a collected entrance image and / or voice information of a visitor can be verified, the identity of the visitor can be determined only when the entrance image and / or the voice information of the visitor are / is consistent with pre-stored information, then a door is opened, a user terminal is informed, a snapped facial image of the visitor is transmitted to the user terminal before unlocking is conducted, and a user can obtain the information of the visitor in time conveniently. According to the lock management method, the access control terminal, the server and the system, the identity of the visitor can be determined by identifying the identity of the visitor, operation is easy, the personal and property safety of the user is guaranteed, safety, intelligence and convenience are achieved, and the practicability is high.

Description

technical field [0001] The invention relates to the technical field of locks, in particular to a lock management method, an access control terminal, a server and a system. Background technique [0002] Combination locks are generally used in the existing lock management systems, but when opening the door, the password can only be entered according to the number of digits inherent in the system. When the password is entered through the keys of this combination lock, it is easy to be remembered by a third party, and the anti-theft effect is poor. , and it is easy to ignore abnormal visits, and there are problems such as untimely handling and insufficient records of visits that come before the appointed time; in addition, for special groups of people (such as the elderly and children, they are easy to forget and have weak self-protection capabilities) When using the existing door lock system, potential safety hazards are easy to occur; there is no reminder for visitors, it is e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07C9/00
CPCG07C9/00571G07C9/00563
Inventor 朱哲宇
Owner 朱哲宇
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products