Unlock instant, AI-driven research and patent intelligence for your innovation.

Unlocking instruction sending method and unlocking information sending method, device and system

A technology for command sending and unlocking devices, which is applied in the direction of instruments, time registers, single input port/output port registers, etc., can solve the problems of easy demagnetization of access control cards, and achieve the effect of avoiding easy degaussing

Inactive Publication Date: 2017-09-29
THE PLA INFORMATION ENG UNIV
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides a method for sending an unlocking instruction to solve the problem that the access control card is easily degaussed in the prior art
[0005] The embodiment of the present application also provides a method for sending unlocking information to solve the problem that the access control card is easily degaussed in the prior art
[0006] The embodiment of the present application also provides an unlocking command sending device to solve the problem that the access control card is easily degaussed in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unlocking instruction sending method and unlocking information sending method, device and system
  • Unlocking instruction sending method and unlocking information sending method, device and system
  • Unlocking instruction sending method and unlocking information sending method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] In order to solve the problem that the access control card is easily degaussed in the prior art, an embodiment of the present application provides a method for sending an unlocking instruction. The execution subject of the method for sending an unlocking instruction provided in the embodiment of the present application may be an unlocking device, or a module in the unlocking device that controls unlocking of a lock, or an access control. The unlocking device can be applied to a deposit box or a combination box, such as a mailbox, express locker, supermarket locker, safe, and the like.

[0044] For the convenience of description, the implementation of the method will be introduced below by taking the subject of execution of the method as the access control as an example. It can be understood that the execution subject of the method is access control, which is only an exemplary description, and should not be understood as a limitation of the method.

[0045] Embodiment 1...

Embodiment 2

[0066] In order to solve the problem that the access control card is easily degaussed in the prior art, an embodiment of the present application provides a method for sending unlocking information. The execution subject of the method for sending unlocking information provided in the embodiment of the present application may be a mobile device, or a module in the mobile device that controls the unlocking of the lock, or a software installed in the mobile device that controls the unlocking of the lock. The mobile device can be a mobile phone or a tablet computer.

[0067] For ease of description, the implementation of the method will be introduced below by taking the mobile phone as an example for executing the method. It can be understood that the implementation subject of the method is the mobile phone is only an exemplary description, and should not be understood as a limitation of the method.

[0068] Embodiment 2 of the present application provides a method for sending unl...

Embodiment 3

[0078] Embodiment 3 is based on an implementation flow of an unlocking instruction sending method and an unlocking information sending method, as shown in image 3 As shown, the scene is: the mobile device is a mobile phone, the unlocking device is an access control, and the access control is a residential area access control. The method includes the following steps:

[0079] Step 301, the mobile phone determines user identity information.

[0080] After the user starts the mobile phone, input the user identity information of the user. The user identity information may include information such as the user's name, gender, ID number, building number and house number.

[0081] For the specific implementation of this step, refer to step 201 in the above-mentioned embodiment 2, which will not be repeated in this embodiment of the present application.

[0082] Step 302, the mobile phone sends the user identity information in the form of an optical signal.

[0083] The mobile phon...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an unlocking instruction sending method and an unlocking information sending method, device and system, aiming at solving the problem in the prior art that an access control card is easy to demagnetize. The method comprises the following steps: receiving an optical signal sent by mobile equipment; analyzing the optical signal to obtain user identity information carried in the optical signal; when the verification of the user identity information passes, sending an unlocking instruction.

Description

technical field [0001] The present application relates to the technical field of access control, and in particular to a method for sending an unlock instruction, a method, a device and a system for sending unlock information. Background technique [0002] With the rapid development of smart communities, more and more communities, schools and office buildings are equipped with access control systems. At present, the access control system is mainly a card-swiping access control system. Taking the community access control system as an example, for the business tenants who move in, the property will generally issue an access control card to the business owner, and the access control card is used to unlock the community access control or unit access control. [0003] At present, the access control card is usually a magnetic card, and the business owner can unlock the community access control or unit access control by pasting the access control card on the identification area of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
CPCG07C9/22
Inventor 朱义君吴刚于宏毅张剑王超田忠骏任嘉伟张效义
Owner THE PLA INFORMATION ENG UNIV