Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control method and device

An access control and access control technology, which is applied in the field of access control, can solve problems such as loss, identity verification items drop, increase user inconvenience, etc., to achieve the effect of improving response efficiency and eliminating restrictions

Active Publication Date: 2018-06-08
ALIBABA GRP HLDG LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, identity verification items such as access control cards are specially used for access control identification, so that users have to carry these identity verification items additionally, thereby increasing the user's inconvenience, and it is easy to cause these identity verification items to be dropped and lost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and device
  • Access control method and device
  • Access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Aiming at the inconvenient portability of special identity verification items such as access control cards, related technologies propose that users' mobile phones, tablets and other electronic devices can be reused in the access control process, so that users do not need to carry additional identity verification items such as access control cards. Wherein, the access control transmits a notification message signal to the outside, so that when the electronic device receives the notification message signal, it returns an unlocking signal containing user identity information to the access control, and the access control can perform identity verification based on the user identity information in the unlocking signal. In order to realize the corresponding access control operation.

[0042] However, when the access control transmits the notification message signal according to the default power, due to the different sensitivity of different electronic devices to the notificati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an access control method and device. The method comprises steps as follows: a user triggering notification message uploaded by access control is received, wherein the user triggering notification message indicates that the access control detects user triggering operation; a manager corresponding to the access control is determined; a communication event between the access control and the manager is established, so that the user and the manager communicate through the communication event. By means of the technical scheme, the access control response efficiency can be improved.

Description

technical field [0001] The present application relates to the technical field of access control, in particular to an access control method and device. Background technique [0002] Access control can control the smooth passage of authenticated users and the inaccessibility of unauthenticated users through user identity verification and management. In related technologies, by issuing registered access control cards and other identity verification items to authorized users, when the user approaches the access control card, the access control can read the information in the access control card based on RFID (Radio Frequency Identification, radio frequency identification) technology, etc. card information, when the card information is pre-registered at the access control office, it can be determined that the corresponding user has passed the identity verification, otherwise it can be determined that the corresponding user has not passed the verification. [0003] However, ident...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
CPCG07C9/20
Inventor 孙健康陈京昌朱碧军杨豪
Owner ALIBABA GRP HLDG LTD