A method of using access control and an access control device based on a stranger's visit
A stranger and access control technology, applied in the field of access control use methods and access control devices based on strangers visiting, can solve problems such as inconvenience of use, inconvenience to put down, hidden dangers, etc., to achieve the effect of convenient use and improved user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0042] The embodiment of the present invention provides an access control method based on a stranger's visit, which can record the user's movement track according to the smart device carried by the user, and then open the access control by verifying the user's historical movement track. Wherein, the smart device may be a smart phone, a smart bracelet, or a smart watch that users often carry. Since smart phones are most commonly used, the smart devices are usually smart phones.
[0043] Suppose user A is a visitor, user B is a visited person, and user A is a stranger to user B. In the application scenario of the embodiment of the present invention, user A is usually a staff member of a related company and is responsible for temporarily providing door-to-door service for user B. Since user A usually visits temporarily, the departure location is uncertain, but the working address of user A can be According to the company's determination, no matter where the departure location is,...
Embodiment 2
[0068] On the basis of the method for using access control based on a stranger's visit provided in the above-mentioned embodiment 1, the present invention also provides an access control device based on a stranger's visit that can be used to implement the above method, such as Figure 5 As shown, it is a schematic diagram of an apparatus architecture according to an embodiment of the present invention. The access control device based on a stranger's visit in this embodiment includes one or more processors 21 and a memory 22 . in, Figure 5 Take one processor 21 as an example.
[0069] The processor 21 and the memory 22 can be connected by a bus or in other ways, Figure 5 Take the connection through the bus as an example.
[0070] The memory 22 is used as a non-volatile computer-readable storage medium based on the access control method when a stranger visits, and can be used to store non-volatile software programs, non-volatile computer-executable programs and modules, suc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


