Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control system and method

A management system and access control technology, which is applied to record carriers used by machines, short-distance communication services, instruments, etc., can solve the problems of easy copying and stealing, easy leakage of verification information, and complicated verification process, so as to ensure convenience and efficiency. security, convenient authentication method, and the effect of enhancing the comfort experience

Inactive Publication Date: 2019-10-01
GUANGXI UNIVERSITY OF TECHNOLOGY
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Most of the access control systems of various residential areas that appear on the market now have basic functions such as identity security verification and access authority management. The identity verification technologies involved are mainly non-contact IC card technology, traditional password verification technology, fingerprint recognition, Face recognition, iris recognition and other biometric verification technologies, but with the accelerated development of urbanization, the living population is becoming denser, social activities are more frequent, and the relationship is more complicated, which also puts forward new requirements for the security access control system. It is reflected in two aspects: on the one hand, the traditional access control system basically does not have the functions of access authorization and management for visitors, which makes the relatives and friends of the residents who visit the community often need to face interrogation (usually involving related private information) and registration ( Usually it also involves identity privacy information) or even the head of the household’s personal recognition, etc., which often directly challenges the harmonious atmosphere of mutual trust between people, and in many cases even directly intensifies the direct conflict between security personnel and visitors and the head of the household. On the other hand, the identity verification technology needs to be upgraded urgently. The relatively cheap identity verification technology (such as: IC card, password) has the risk of verification information being easily leaked or easily copied and stolen, while the complex and high-end identity verification technology (e.g. fingerprint, face recognition) are usually expensive, and the verification process is complicated and time-consuming

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control system and method
  • Access control system and method
  • Access control system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Such as Figure 1 to Figure 8 As shown, an access control management system of the present invention includes a mobile phone APP client, a PC server equipped with a management system, and an access control device.

[0032] The mobile APP client is developed based on Android (Android) and iOS systems, and the mobile APP client is used for resident information collection, identity verification and visitor vehicle management. Such as figure 1 As shown, the mobile APP client includes a user information collection module, an identity verification module, and a visitor parking module.

[0033] The user information collection module is used for the collection and management of basic personal information of residents, such as figure 2 As shown, the information collected by the user information collection module is encrypted and transmitted from the network to the PC server. The collected information includes the collection of basic personal information of residents, informatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access control system and method. The access control system comprises a mobile phone APP client, a PC server terminal carrying a management system, and an access control device; the mobile phone APP client is used for collecting resident information, checking identity and managing visitor vehicles; the mobile phone APP client comprises a user information collection module, an identity checking module and a visitor parking module; the PC server terminal comprises an information and public parking space management module and an identity checking module; the access control device comprises a two-dimensional code scanning module, an NFC communication module, an access control module and a prompting and alarm device. The access control method adopts the access controlsystem to perform access control. The access control system and method have the safe and convenient identification mode, the user does not need to carry the access control card in any form, the usercan be identified and thus can go in and out without pausing and touching any interface by only needing to carry the mobile phone, the visitor access right verification and authorization management can be achieved, and the friendly identification experience can be provided for visiting relatives and friends.

Description

technical field [0001] The present invention relates to the field of access control management, in particular to an access control management system and method based on a dynamic two-dimensional code, near-field communication (NFC) technology, and visitor invitation function. Background technique [0002] Most of the access control systems of various residential areas that appear on the market now have basic functions such as identity security verification and access authority management. The identity verification technologies involved are mainly non-contact IC card technology, traditional password verification technology, fingerprint recognition, Face recognition, iris recognition and other biometric verification technologies, but with the accelerated development of urbanization, the living population is becoming denser, social activities are more frequent, and the relationship is more complicated, which also puts forward new requirements for the security access control syst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07C9/00H04W4/80G06K19/06
CPCH04W4/80G06K19/06046G07C9/27G07C9/22
Inventor 刘洪杨超蓝赠美刘晓晖王日凤李厚君徐金伟张伟星崔祖晗蒋经洲
Owner GUANGXI UNIVERSITY OF TECHNOLOGY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More