Safe access control method based on computer

A security control and computer technology, applied in computing, fire alarms, instruments, etc., can solve problems such as disturbing work order, and achieve the effect of improving safety

Inactive Publication Date: 2018-07-06
HARBIN DONGZHUAN TECH
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For small and medium-sized enterprises, although various rules and regulations (including attendance system, access management system, etc.) Insurance salesmen disturb your...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe access control method based on computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0013] A computer access control security control method uses an inductive IC card, and all personnel need to enter with an authorized inductive card. The cardholder puts the card close to the card reader, and within the effective distance of the card reader, the card reader will read the data (password) in the card and transmit it to the controller at the same time, and the controller will automatically identify the identity instantly and activate the electronic door Lock. At this time, the controller and the main control computer will record the cardholder's card number, name, time of entry and exit, access control point and other information in real time, and can print reports at any time as needed. If the cardholder has no access authority, the electric lock will not act. In case of forced entry or door opening overtime, the system will automatically send an alarm signal to the main control computer for processing by security personnel. In this way, the purpose of prohib...

Embodiment 2

[0015] A computer access control security control method, the access control controller one (1) is respectively connected with the electric door lock 2, the door sensor, the card reader 3, and the exit pressing board 4 through lines, and the access control controller one is connected through the RS485 communication line or The TCP communication line 5 is connected with the access control controller two 6 or the communication converter 7 respectively, and the access control controller two is connected with the access control controller N8 through the RS485 communication line or the TCP communication line, and the access control controller one is connected with the access control controller N8 through the RS485 communication line or the TCP communication line. , the access controller 2 and the access controller N are connected to the UPS power supply 9 .

Embodiment 3

[0017] According to the computer access control security control system and method described in embodiment 1, the communication converter is connected to the network interface 10, the network interface is connected to the access control management machine 11, and the access control management machine is connected to the printer 12 connect.

[0018] The said access controller can control one, two or four said electric door locks.

[0019] Each person will hold a proximity card the size of a credit card. According to the authorization obtained, the designated door lock can be opened within the validity period to enter the public passage or door that implements access control. The data collected on the card reader will form attendance Management, for each defense zone, realize the alarm function by installing various detectors, sensors and various alarm devices. The central management computer records all system events, and configures relevant management software to perform reco...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safe access control method based on a computer. With the continuous development of world economy, access control and work attendance management systems have become indispensable hardware of enterprises, modern intelligent buildings, hotels and residential districts. The management of enterprises with insufficient management personnel cannot keep up with the development ofenterprises, which may become an adverse factor for the development of enterprises. According to the invention, inductive IC cards are employed, and all the people need authorized inductive IC cards before entering; when a card of an owner approaches a card reader, the card reader reads out data (a cipher) in the card within the effective distance of the card reader and transmits the data to a controller at the same time, and the controller automatically and instantly identifies an identity and then unlocks an electronic door lock; the controller and a master-control computer record the card number, name, entrance and exit time, entrance and exit sites under access control and other information of the owner in real time and can carry out report printing at any time as needed; if the ownerdoes not have entry permission, the electronic door lock does not work; and if someone is about to force an entrance or unlocking time is out, a system automatically transmits an alarm signal to the master-control computer to inform security personnel to handle the situation. The method provided by the invention is applied to the field of computer network security control.

Description

Technical field: [0001] The invention relates to a computer access control security control method. Background technique: [0002] With the continuous development of the world economy, access control and attendance management systems have become indispensable in the hardware of enterprises, modern intelligent buildings, hotels and even residential quarters. For small and medium-sized enterprises, although various rules and regulations (including attendance system, access management system, etc.) Insurance salesmen disturb your normal work order; Unidentified people walk into your office and take away important documents on your desktop; Unauthorized people break into your office rashly; It is overwhelming. Invention content: [0003] The purpose of the present invention is to provide a computer access security control method. [0004] Above-mentioned purpose realizes by following technical scheme: [0005] A computer access control security control method uses an induc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G07C9/00G06Q50/26G08B17/00
CPCG06Q50/265G07C9/20G07C9/27G08B17/00
Inventor 王冠红
Owner HARBIN DONGZHUAN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products