Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control method and access control system using same

An access control and access control system technology, applied in the field of security, can solve the problems of user inconvenience, inability to open the access control, inconvenient use experience, etc., to achieve the effect of convenient use and reducing conditions.

Pending Publication Date: 2019-11-26
南泽(广东)科技股份有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] There are certain limitations in using the IC card to enter and exit the access control. When a visitor comes, the user needs to go to the door to greet him, and the experience is not convenient enough. In addition, if the IC card is forgotten or the IC card is lost, the access control cannot be opened. user inconvenience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and access control system using same
  • Access control method and access control system using same
  • Access control method and access control system using same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment example 1

[0054] In the present invention, the access control system is used for example under the situation that visitors arrive figure 1 shown, including:

[0055] 1) The background server 1 is used to analyze the access control information sent by the access control 4, and judge whether the analyzed user information matches the preset user information in the background server 1, whether the time of opening the door and the duration of opening the door match the current time, and analyze Whether the number of door openings is exhausted. It is also used to generate and send unlocking information to the door lock controller 5.

[0056] 2) user's mobile phone 2, for the user information preserved according to WeChat server 7, the door opening time set by the user, the door opening time length, the number of times of opening the door generates a two-dimensional code for opening the door; and the two-dimensional code is sent to the visitor's mobile phone 3 .

[0057] 3) The visitor's mo...

Embodiment example 2

[0064] In the present invention, the access control system uses an example under the situation that the user forgets to bring the IC card, such as figure 2 shown, including:

[0065] 1) The background server 1 is used to analyze the access control information sent by the access control 4, and judge whether the analyzed user information matches the preset user information in the background server 1. It is also used to generate and send unlocking information to the door lock controller 5.

[0066] 2) The user's mobile phone 2 is used to generate a two-dimensional code for opening the door according to the user information stored in the device itself; and display the two-dimensional code to the access control 4.

[0067] 3) access control 4, identifying the two-dimensional code of the user's mobile phone 2, and generating and sending access control information to the background server 1 according to the two-dimensional code.

[0068] 4) The door lock controller 5 is used to ex...

Embodiment example 3

[0072] In the present invention, the access control system is used under the situation of security authorization to open the door, such as image 3 shown, including:

[0073] 1) Background server 1 is used to generate a two-dimensional code for opening the door according to the user information, the set opening time, the opening time, and the number of times of opening the door and send it to the printer 6, and is also used to analyze the access control information sent by the access control 4, And judge whether the analysis user information matches the preset user information in the background server 1, whether the analysis opening time and the analysis opening duration match the current moment, and whether the analysis opening times are exhausted. It is also used to generate and send unlocking information to the door lock controller 5.

[0074] 2) The security phone 8 is used to generate a two-dimensional code for opening the door according to the user information saved by ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access control method and an access control system using the method. According to the method, user information is preset in a background server. The method comprises the steps that 1 a mobile terminal generates a corresponding image according to the user information; 2 access control reads the image, generates corresponding access control information based on the image,and sends the access control information to the background server, and the background server generates corresponding analysis information according to the access control information; and 3 if the analysis information matches the user information, the background server generates a door opening instruction and transmits the door opening instruction to a door lock controller. According to the methodand the access control system, users can authorize visitors to pass through the access control without going to the access control place in person, making the use of the access control more flexible and convenient.

Description

technical field [0001] The present invention relates, in particular, to the field of security technology, and in particular to an access control method and an access control system. Background technique [0002] The access control system is a new type of modern security management system, also known as the access management control system, which is an intelligent management system for the access of managers. The access control system is used to protect the safety of personnel and property, therefore, it must have high security and reliability. At the same time, as the access control system is more and more infiltrated into production and life, the access control system should also have high practicability. [0003] At present, the control mode of the access control system is usually that the user carries an IC card, and uses the IC card to swipe the card to enter and exit the access control. Among them, the IC card is provided with relevant information matching with the ac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
Inventor 郑兆军
Owner 南泽(广东)科技股份有限公司