Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security access control system communicated with smart home and interaction method thereof

A family and smart technology, applied in the field of security access control system and its interaction, can solve the problems affecting the usability and function expansion of the security access control system

Active Publication Date: 2020-03-20
重庆特斯联智慧科技股份有限公司
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the purpose of this application is to propose a security access control system and its interaction method for Unicom Smart Home, to solve the closed and isolated architecture adopted by the security access control system in the prior art, which affects the ease of use and Technical issues with function extensions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security access control system communicated with smart home and interaction method thereof
  • Security access control system communicated with smart home and interaction method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0092] When a visitor enters the security access control system, the steps are as follows:

[0093] The visitor initiates a video call to the user through the access control machine, and the cloud background server transmits the video call to the home gateway;

[0094] Further, the home gateway of the smart home forwards the received video call request to the TV, mobile phone and other devices in the smart home;

[0095] Furthermore, when the owner connects to the video call, he can observe the video of the visitor on the mobile phone or TV, talk to the visitor, and authorize the visitor to pass;

[0096] Further, the access authorization instruction is transmitted to the cloud background server through the home gateway, and the cloud background server transmits the access authorization instruction to the access control machine, and the access control machine releases the visitor according to the access authorization instruction.

[0097] Or, when the visitor initiates a vide...

Embodiment 2

[0101] The steps of access control pre-authorization mode are as follows:

[0102] The user uses the mobile phone to upload the pre-authorized dynamic password or the visitor's face image, and the home gateway of the smart home transmits the pre-authorized dynamic password or the visitor's face image to the cloud background server;

[0103]Further, the cloud background server sends the pre-authorized dynamic password and the visitor's face image to the access control machine;

[0104] Furthermore, when visitors arrive, they can use dynamic passwords or faces to directly verify and obtain authorization to pass;

[0105] Furthermore, the access control machine transmits the visitor's visit information to the cloud background server, and then the cloud background server transmits it to the home gateway of the smart home, so as to prompt on the TV and mobile phone of the smart home.

Embodiment 3

[0107] When the visitor does not know the user's house number, the interaction steps of the security access control system are as follows:

[0108] Support visitors to directly make video calls with owners through mobile phones. During video calls, owners can upload visitor face information and authorization instructions to the home gateway of the smart home;

[0109] Further, the home gateway uploads the instruction to the cloud background server;

[0110] Further, the cloud background server sends the visitor's face information and authorized pass instructions to the access control machine, and the access control machine recognizes the visitor and performs the pass operation on the visitor who matches the visitor's face information;

[0111] Furthermore, the access control machine transmits the visitor's visit information to the cloud background server, and then the cloud background server transmits it to the home gateway of the smart home, so as to prompt on the TV and mobi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a security access control system communicated with a smart home. The security access control system comprises a home gateway, an access control machine and a cloud background server, wherein the home gateway is connected with the cloud background server, home internal equipment and a user terminal, the access control machine is connected with the cloud background server, and the cloud background server is arranged in a community estate and is connected with the home gateway and the access control machine. According to the system, the home gateway is utilized to enable the user terminal to interact with the background server, so that the security access control system is stronger in usability and more in functions, and the function extension of the security access control system is realized.

Description

technical field [0001] The present application relates to the technical field applied to smart homes, in particular to a security access control system for Unicom smart homes and an interaction method thereof. Background technique [0002] The security access control system is used to authorize or restrict the entry and exit of community personnel (such as owners, long-term tenants, property service personnel) and non-community personnel (such as visitors, couriers, etc.) at the entrance and exit of the community, the entrance and exit of residential buildings, and the door of each family Access; At present, the security access control system has developed a variety of authentication modes such as card access, dynamic password verification access, and face recognition access, as well as one-way and two-way video call functions. [0003] However, the current security access control system is mostly a closed and independent system, including the access control machine installe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07C9/33G07C9/37G07C9/38H04N7/18
CPCH04N7/186
Inventor 沈玺寇京珅
Owner 重庆特斯联智慧科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products