Unlock instant, AI-driven research and patent intelligence for your innovation.

A method of using access control and an access control device based on a stranger's visit

A stranger and access control technology, applied in the field of access control use methods and access control devices based on strangers visiting, can solve problems such as inconvenience of use, inconvenience to put down, hidden dangers, etc., to achieve the effect of convenient use and improved user experience

Active Publication Date: 2022-06-21
WUHAN GREENET INFORMATION SERVICE
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, every time a visitor needs to enter the door of the building to make a call, the person to be visited needs to put down the things in his hand to go to the door for identity verification and open the door, which is extremely inconvenient to use; especially if the visitor is calling when the visitor is calling. Doing housework, etc., it may be temporarily inconvenient to put down the work in hand to open the door, and the door cannot be opened in time at this time
On the other hand, if it is an acquaintance visiting, the door can be confirmed and opened through simple verification. Opening the door to allow visitors to enter the building may pose certain safety hazards

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of using access control and an access control device based on a stranger's visit
  • A method of using access control and an access control device based on a stranger's visit
  • A method of using access control and an access control device based on a stranger's visit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] The embodiment of the present invention provides an access control method based on a stranger's visit, which can record the user's movement track according to the smart device carried by the user, and then open the access control by verifying the user's historical movement track. Wherein, the smart device may be a smart phone, a smart bracelet, or a smart watch that users often carry. Since smart phones are most commonly used, the smart devices are usually smart phones.

[0043] Suppose user A is a visitor, user B is a visited person, and user A is a stranger to user B. In the application scenario of the embodiment of the present invention, user A is usually a staff member of a related company and is responsible for temporarily providing door-to-door service for user B. Since user A usually visits temporarily, the departure location is uncertain, but the working address of user A can be According to the company's determination, no matter where the departure location is,...

Embodiment 2

[0068] On the basis of the method for using access control based on a stranger's visit provided in the above-mentioned embodiment 1, the present invention also provides an access control device based on a stranger's visit that can be used to implement the above method, such as Figure 5 As shown, it is a schematic diagram of an apparatus architecture according to an embodiment of the present invention. The access control device based on a stranger's visit in this embodiment includes one or more processors 21 and a memory 22 . in, Figure 5 Take one processor 21 as an example.

[0069] The processor 21 and the memory 22 can be connected by a bus or in other ways, Figure 5 Take the connection through the bus as an example.

[0070] The memory 22 is used as a non-volatile computer-readable storage medium based on the access control method when a stranger visits, and can be used to store non-volatile software programs, non-volatile computer-executable programs and modules, suc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the technical field of access control, and in particular to an access control method and an access control device based on strangers' visits. The method includes: after user B determines that user A is coming to visit, issue a track fingerprint verification task for user A, track fingerprint The verification task includes user A's work address information; when user A arrives at user B's location, the access control device obtains user A's historical track fingerprints in the latest preset time period through user A's smart device; The obtained historical track fingerprint of user A is verified, and if the verification is successful, user A is allowed to enter. The present invention can use the portable smart device to record the movement trajectory, and verify the visitor through the historical movement trajectory. Only after the verification is successful, can the door opening operation be performed, so that the visited person does not need to go to open the door control, which is convenient to use and can also Visiting users are authenticated to improve user experience.

Description

【Technical field】 [0001] The invention relates to the technical field of access control, in particular to an access control method and an access control device based on a stranger's visit. 【Background technique】 [0002] With the rapid development of science and technology, more and more people pay attention to the construction of smart communities and smart transportation, and community convenience services will inevitably embark on a smart and technological road. In the past, the traditional access control device in the community used a traditional metal key at the door of the unit, which must be carried with you every time you go out, and it is troublesome to replace the lost key, and the key itself is easy to be copied, and the security is poor; with the development and progress of technology, it has been Smartphones can be used to open the access control of communities and unit buildings, which brings great convenience to users. [0003] In the traditional access contr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/22G07C9/27
CPCG07C9/22G07C9/27
Inventor 叶志钢李明栋
Owner WUHAN GREENET INFORMATION SERVICE