Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control verification method based on two-dimensional code

A verification method and two-dimensional code technology, which is applied to instruments, time registers, single input port/output port registers, etc., can solve the problems of difficult statistics of personnel access, potential safety hazards, and low security

Inactive Publication Date: 2018-03-06
徐下兵
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] There are many students in the school. In order to ensure the safety of the students, parents or other outsiders need to register when they enter the school. However, the traditional registration is too troublesome, and at the same time, the security is low, and the manpower and material resources required are also large. This kind of registration method is also difficult to grasp the statistics of the entry and exit of personnel, and there are potential safety hazards

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control verification method based on two-dimensional code
  • Access control verification method based on two-dimensional code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] In order to make the above objects, features and advantages of the present invention more comprehensible, specific implementations of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0017] see figure 1 , an access control verification method based on a two-dimensional code, including an access terminal, a server, an access control terminal, an electronic lock set on the door, and a database storing multiple user information, the access terminal is connected to the access control terminal through a network, and the access control terminal Generate a QR code dynamic picture, and the access control terminal is equipped with a display screen. After the access terminal is connected to the access control terminal through the network, the access terminal can send an access request to the access control terminal, and the access control terminal generates a dynamic QR code image after receiving it, and displays it screen d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an access control verification method based on a two-dimensional code. The access control verification method comprises the following steps: (1) connecting an accessing terminal with an access control end through a network and generating a two-dimensional code dynamic picture at the access control end; (2) screening the code by the accessing terminal to receive the two-dimensional code dynamic picture generated by the access control end and filling user information by the accessing terminal; sending the user information to the access control end through the accessing terminal; (3) searching and matching the user information on a server by the access control end and carrying out corresponding access control actions according to a matching result; (4) generating monitoring information at the access control end, wherein the monitoring information comprises personal information, entering time and leaving time of a user of the accessing terminal; (5) when the accessing terminal leaves away, scanning the two-dimensional code of the access control end again and stopping recording the monitoring information. According to the access control verification method basedon the two-dimensional code, the utilization burdens of the user are alleviated and the user can conveniently enter an access control system; materials are saved and environment protection is facilitated; the information of people who enter and leave away can be rapidly recorded and is convenient to wholly count, so that conditions of people who enter and leave away are grasped and the safety ofthe access control system is improved.

Description

technical field [0001] The invention relates to an access control system, in particular to an access control verification method based on a two-dimensional code. Background technique [0002] There are many students in the school. In order to ensure the safety of the students, parents or other outsiders need to register when they enter the school. However, the traditional registration is too troublesome, and at the same time, the security is low, and the manpower and material resources required are also large. Such a registration method is also difficult to grasp statistics on the entry and exit of personnel, and there are potential safety hazards. Contents of the invention [0003] Based on this, a two-dimensional code-based access control verification method is provided. [0004] An access control verification method based on a two-dimensional code, comprising the steps of: [0005] (1) The access terminal is connected to the access control terminal through the network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
CPCG07C9/32
Inventor 徐下兵
Owner 徐下兵
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products