Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control management method based on wireless communication network

A technology of wireless communication and management method, which is applied to security communication devices, encryption devices with shift registers/memory, instruments, etc., and can solve problems such as inconvenient use of access control systems

Inactive Publication Date: 2019-12-13
杭州享钥科技有限公司
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The main purpose of this application is to provide an access control management method based on a wireless communication network to solve the problem of inconvenient use of the access control system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control management method based on wireless communication network
  • Access control management method based on wireless communication network
  • Access control management method based on wireless communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0041] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It should be understood that the data so used may be interchanged under appropriate circumstances for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access control management method based on a wireless communication network. The method comprises the steps as follows: a mobile terminal scans a two-dimensional code of an access control device to obtain equipment information of the access control device; the mobile terminal transmits the equipment information to a server; the server verifies the equipment information, and sends a first digital secret key corresponding to the equipment information to the mobile terminal if the equipment information is correct; the mobile terminal sends the first digital secret key tothe access control device through a Bluetooth protocol; the access control device judges whether the first digital secret key is matched with a pre-stored second digital secret key or not; and the access control device outputs a control signal for driving a driving device according to the matching result. The beneficial effect is that the mobile terminal, the server and the access control deviceare combined into a complete intelligent service circle and a humanized and intelligent method for managing and using the access control device is realized.

Description

technical field [0001] The present application relates to a management method of an access control system, in particular to a management method of access control based on a wireless communication network. Background technique [0002] In related technologies, the access control system uses an authorized IC card for identification and access control. However, access control systems that use IC cards for identification often have the following defects: [0003] There are following defectives in existing access control system: [0004] 1. The door opening mode of the district unit door and the pedestrian gate is single, and the owner will not be able to pass through if he forgets or loses his card; [0005] 2. Cards are easily copied, which is not conducive to the safety of community owners; [0006] 3. The lines and equipment of the access control system aged over five years have a high failure rate, and the cost of re-arranging a new system is high, and the property is in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07C9/00H04L9/06
CPCH04L9/0631
Inventor 戴红山
Owner 杭州享钥科技有限公司
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More