Access control task execution method, system, access control system and readable storage medium

A task execution and task technology, applied in the direction of instruments, individual input/output port registers, time registers, etc., can solve the problem of low efficiency of access control task execution, achieve the effect of reducing the time required for connection and improving efficiency

Active Publication Date: 2021-09-03
广州邦讯信息系统有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on this, it is necessary to provide an access control task execution method, system, access control system and readable storage medium for the problem of low efficiency of the above access control task execution

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control task execution method, system, access control system and readable storage medium
  • Access control task execution method, system, access control system and readable storage medium
  • Access control task execution method, system, access control system and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0058] The access control task execution method provided by this application can be applied to such as figure 1 In the application environment shown, figure 1It is an application environment diagram of the access control task execution method in one embodiment. Wherein, the server 110 communicates with the client 120 through the network, the client 120 is connected to the server through the network, the client 120 communicates with the key terminal 130, the client 120 is not necessarily connected to the key terminal 130 through the network, and the key terminal 130 may in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application relates to an access control task execution method, system, access control system and readable storage medium. The method includes: receiving the authentication message sent by the server, judging whether the task message has been tampered with according to the task message, the task signature string and the public key, and sending the authentication message to the lock key when it is determined that the task message has not been tampered with terminal, and the key terminal is used to execute the access control task corresponding to the task message in the authentication message. Using this method, the authentication message issued by the server can be sent to the lock and key end. The lock and key end does not need to obtain the authentication message through the connection with the server, and obtains the access control task according to the authentication message, which reduces the need for the lock and key end to connect with the server, and can adapt to In scenarios where the signal of the mobile communication network is poor or there is no mobile communication network, the time required for the key terminal to connect to the server is reduced, and the time for the key terminal to obtain task messages from the server is reduced, improving the efficiency of access control tasks.

Description

technical field [0001] The present application relates to the technical field of access control systems, in particular to an access control task execution method, an access control task execution system, an access control system and a readable storage medium. Background technique [0002] In the access control system, the security of the access control can be well guaranteed by controlling the lock and key end through the server and the client to perform access control tasks such as opening or closing the door, wherein the lock and key end includes a door lock or a key. [0003] However, in actual use, the lock and key end may be used in relatively remote places or places with dense buildings. In the above-mentioned use position, the network where the lock and key end is located is often prone to low network signal strength, resulting in It is impossible to make the lock and key end perform the access control task or the time it takes to perform the access control task is lo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/20G07C9/27G07C9/00
CPCG07C9/00309G07C9/00571G07C2009/00412G07C9/20G07C9/27
Inventor 江泽鑫常海龙魏利浩钟柯佳王豪博练金初李佳佳
Owner 广州邦讯信息系统有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products