Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control device and verification method thereof, verification device and verification method thereof, verification system and verification method thereof

The technology of a verification device and verification method is applied in transmission systems, digital transmission systems, safety communication devices, etc., and can solve problems such as illegal pass verification of access control cards

Inactive Publication Date: 2019-07-02
NATIONZ TECH INC
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The technical problem to be solved by the present invention is: in the existing access control verification process, only the access control card is authenticated but not the user of the access control card, resulting in the problem that it is easy to illegally pass the verification by forging the access control card. Aiming at this technical problem, a Access control device, verification device, verification system and verification method thereof

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control device and verification method thereof, verification device and verification method thereof, verification system and verification method thereof
  • Access control device and verification method thereof, verification device and verification method thereof, verification system and verification method thereof
  • Access control device and verification method thereof, verification device and verification method thereof, verification system and verification method thereof

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0058] figure 1 The basic flow chart of the access control verification device verification method provided in this embodiment, the method includes:

[0059] S101. Receive information to be verified from an access control device to be verified.

[0060] In this embodiment, the information to be verified here includes the device verification information of the access control device to be verified and the feature verification information of the user of the access control device to be verified. In the actual application process, the device verification information can be a unique sequence in the device SN, and the feature verification information can be biometric features such as fingerprint features, vein features, and palmprint features, which can uniquely determine the user of the access control device.

[0061] In some other examples of this embodiment, before the step S101, it further includes sending the random factor to the access control device, and pre-storing the sent ...

no. 2 example

[0070] figure 2 The basic flow chart of the access control device verification method provided in this embodiment, the method includes:

[0071] S201. Obtain feature verification information of a user of the access control device, and obtain device verification information of the access control device itself.

[0072] In the actual application process, the access control device is in the use state, that is, when the verification is performed, the device verification information and feature verification information in the access control device itself is obtained. Swipe a card, or use an access control module such as a car key to trigger verification. In this embodiment, the obtained device verification information is such as the unique serial number SN in the device, and the obtained feature verification information is to collect the feature verification information of the user of the access control device. The feature information can be fingerprint features, vein features, p...

no. 3 example

[0080] This embodiment will introduce the access control verification device verification method and the access control device verification method in the present invention according to specific community access control application scenarios, and the application scenarios should not be construed as limitations on the present invention. Specifically in the present embodiment, the access control verification device specifically refers to the access control card reader, and the access control device refers to the access control card. fingerprints are collected. At the same time, this embodiment also includes an access control system, which communicates with the access control card through a card reader. The access control system pre-stores an SN database, a public key database corresponding to the SN, and a fingerprint feature information database.

[0081] It is understandable that in the actual application process, before the access control card is used, the access control card ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access control device and verification method thereof, a verification device and verification method thereof, a verification system and verification method thereof. The verification method of the access control verification device comprises the following steps that: to-be-verified information of a to-be-verified access control device is received; device verification information and feature verification information in the to-be-verified information are verified by using preset legal verification information; and when the device verification information and feature verification information in the to-be-verified information are verified successfully, the to-be-verified access control device is determined to be verified successfully. Therefore, the access control device is verified and the identity verification of the access control user is realized; and thus a problem that the identity verification of the card reader is done successfully illegally by counterfeiting the access control card easily because the existing access card reader only verifies the access control card instead of the identity of the card user in the existing access control verification process is solved.

Description

technical field [0001] The invention relates to the field of access control systems, and more specifically, to an access control device, a verification device, a verification system and a verification method thereof. Background technique [0002] The current access control system generally uses the access control card reader to verify the unique serial number SN in the access control card for identity verification, but only verifying the SN in the access control card cannot verify the information of the access card user. When the card is lost, the person who finds it will forge the access control card by copying the unique serial number SN in the access control card, so as to achieve the purpose of illegally entering the protected area of ​​the access control system. [0003] In order to solve the problem that the access control system cannot verify the access control users, the prior art provides a fingerprint access control IC card. The fingerprint access control IC card m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00H04L9/08H04L9/32
CPCH04L9/0869H04L9/32G07C9/215G07C9/22
Inventor 张浩
Owner NATIONZ TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products