Unlocking instruction sending method and unlocking information sending method, device and system
A technology for command sending and unlocking devices, which is applied in the direction of instruments, time registers, single input port/output port registers, etc., can solve the problems of easy demagnetization of access control cards, and achieve the effect of avoiding easy degaussing
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0043] In order to solve the problem that the access control card is easily degaussed in the prior art, an embodiment of the present application provides a method for sending an unlocking instruction. The execution subject of the method for sending an unlocking instruction provided in the embodiment of the present application may be an unlocking device, or a module in the unlocking device that controls unlocking of a lock, or an access control. The unlocking device can be applied to a deposit box or a combination box, such as a mailbox, express locker, supermarket locker, safe, and the like.
[0044] For the convenience of description, the implementation of the method will be introduced below by taking the subject of execution of the method as the access control as an example. It can be understood that the execution subject of the method is access control, which is only an exemplary description, and should not be understood as a limitation of the method.
[0045] Embodiment 1...
Embodiment 2
[0066] In order to solve the problem that the access control card is easily degaussed in the prior art, an embodiment of the present application provides a method for sending unlocking information. The execution subject of the method for sending unlocking information provided in the embodiment of the present application may be a mobile device, or a module in the mobile device that controls the unlocking of the lock, or a software installed in the mobile device that controls the unlocking of the lock. The mobile device can be a mobile phone or a tablet computer.
[0067] For ease of description, the implementation of the method will be introduced below by taking the mobile phone as an example for executing the method. It can be understood that the implementation subject of the method is the mobile phone is only an exemplary description, and should not be understood as a limitation of the method.
[0068] Embodiment 2 of the present application provides a method for sending unl...
Embodiment 3
[0078] Embodiment 3 is based on an implementation flow of an unlocking instruction sending method and an unlocking information sending method, as shown in image 3 As shown, the scene is: the mobile device is a mobile phone, the unlocking device is an access control, and the access control is a residential area access control. The method includes the following steps:
[0079] Step 301, the mobile phone determines user identity information.
[0080] After the user starts the mobile phone, input the user identity information of the user. The user identity information may include information such as the user's name, gender, ID number, building number and house number.
[0081] For the specific implementation of this step, refer to step 201 in the above-mentioned embodiment 2, which will not be repeated in this embodiment of the present application.
[0082] Step 302, the mobile phone sends the user identity information in the form of an optical signal.
[0083] The mobile phon...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


