Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A remote authorization method for access control

A remote authorization and access control technology, applied in the direction of instruments, electrical components, transmission systems, etc., can solve the problems of requesting users to be rejected, hidden dangers of access control, inconvenient use, etc., to achieve the effect of improving experience, ensuring safety, and facilitating authorization

Active Publication Date: 2016-02-10
SHANGHAI PEOPLENET SECURITY TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, there are still great risks in the current access control system. For example, the electronic card is easy to imitate, and once the cardholder loses the electronic card, he will not be able to enter the access control, or if the electronic card is picked up by criminals, it will bring hidden dangers to the access control. ; Similarly, the user information is collected by inputting a password. As long as the user is requested to have the password, the access control can be entered, and the input password is relatively easy to be obtained by criminals. This method will also bring hidden dangers to the access control. An access control system that can guarantee the security performance of access control has become a demand
[0004] In addition, there is another hidden danger in the current access control system, that is, when the requesting user is a user who does not have authorization but needs to enter, and the legitimate user cannot open the door for the visitor in time, if the legal user is not in the house, the requesting user only needs to enter. Can be shut out, which brings great inconvenience to users, so an access control system that can provide convenience for users is also a demand for current access control systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A remote authorization method for access control
  • A remote authorization method for access control
  • A remote authorization method for access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the present invention will be specifically described below in conjunction with the accompanying drawings and embodiments. The drawings in the following description are only some embodiments of the invention. For those skilled in the art, other drawings can also be obtained based on these drawings without creative effort.

[0053] As a specific embodiment one of the present invention, such as figure 1As shown, the present invention provides a method for access control remote authorization, including a control unit and an authorization unit, specifically comprising the following steps:

[0054] The S1 control unit acquires the information to be authorized, and at the same time encrypts the information to be authorized in combination with the time of obtaining the information into the first encrypted information;

[0055] S2 The control unit sends the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of safety protection, and in particular relates to an access control remote authorization method which comprises the following steps of acquiring information to be authorized by a control unit, and encrypting the information to be authorized by combining information acquisition time to form first encrypted information; sending the first encrypted information into an authorization unit by the control unit; decrypting the first encrypted information by the authorization unit to form first decrypted information, and confirming the first decrypted information; encrypting the first decrypted information by combining the confirmation information by the authorization unit to form second encrypted information, and sending the second encrypted information into the control unit; decrypting the second encrypted information by the control unit to form second decrypted information, and confirming the information by verification; and executing access control remote authorization operation. According to the access control remote authorization method, an encryption module and a communication module are arranged in the control unit and the authorization unit, respectively, so that the safety of the information to be authorized is guaranteed in the communication process, and the remote communication between the control unit and the authorization unit can be realized.

Description

technical field [0001] The invention relates to the field of security protection, in particular to an access control authorization method. Background technique [0002] As an important means for people to protect their own property, security has been paid more and more attention by people. As the most important part of security and also the most basic part, access control system is applied to almost all communities. Existing access control systems usually collect user information by swiping electronic cards and entering passwords to confirm the legal identity of the user, and at the same time judge whether the request is legal by comparing the information in the database with the access control unit. [0003] However, there are still great risks in the current access control system. For example, the electronic card is easy to imitate, and once the cardholder loses the electronic card, he will not be able to enter the access control, or if the electronic card is picked up by ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/00H04L29/08
Inventor 谈剑锋尤磊王力
Owner SHANGHAI PEOPLENET SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products