Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control verification method and system

A verification method and verification system technology, applied in the field of access control and unlocking, can solve the problems of low cost, high cost, low accuracy and security

Active Publication Date: 2017-12-05
GUANGDONG ANJUBAO DIGITAL TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Based on this, it is necessary to provide an access control verification method for the existing access control opening method in the background technology, which is inconvenient to use, relatively low in accuracy and security, and high in cost. low cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control verification method and system
  • Access control verification method and system
  • Access control verification method and system

Examples

Experimental program
Comparison scheme
Effect test

no. 4 example

[0090] see Figure 4 , is the flow chart of the fourth embodiment of the access control verification method of the present invention;

[0091] Step 401: The mobile client receives the verification instruction, connects to the cloud server according to the verification instruction, and requests to obtain the verification voiceprint segment;

[0092] Step 402: The cloud server uses the registration information stored in the cloud server and corresponding to the identification information of the mobile client to generate a verification voiceprint segment according to the set rules and send it to the mobile client;

[0093] Step 403: The mobile client receives and plays the verification voiceprint segment to the access control device;

[0094] Step 404: The access control device side records and verifies the voiceprint segment;

[0095] Step 405: The access control device side judges whether the unlocking authority voiceprint segment in the verified voiceprint segment has the au...

no. 1 example

[0102] According to above-mentioned a kind of access control verification method, the scheme of the present invention also provides access control verification system, please refer to Figure 5 , is a structural diagram of the first embodiment of the access control verification system of the present invention;

[0103] An access control request verification system includes a mobile client, and the mobile client includes a receiving instruction unit 10, an information transceiving unit 11, and a playing unit 12;

[0104] The receiving instruction unit 10 receives a verification instruction, and the information transceiving unit 11 sends a request to obtain a verification voiceprint segment instruction to the cloud server according to the verification instruction, wherein the request to obtain a verification voiceprint segment instruction includes identification information;

[0105] The information transceiving unit 11 receives the verification voiceprint segment fed back by the ...

no. 3 example

[0129] see Figure 7 , is a structural diagram of the third embodiment of the access control verification system of the present invention;

[0130] An access control verification system includes a cloud server, and the cloud server includes a second receiving unit 30, a generating unit 31, a second sending unit 32, and a verification legal unit 33;

[0131] The second receiving unit 30 receives the request to obtain the verification voiceprint fragment instruction sent by the first client, and the request to obtain the verification voiceprint fragment instruction includes identification information; receives the request verification verification key voiceprint fragment sent by the second client Instructions, the request to verify and verify the key voiceprint fragment instruction includes verifying the key voiceprint fragment;

[0132] The generating unit 31 uses the registration information corresponding to the identification information to generate verification voiceprint s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access control verification method and an access control verification system. The access control verification method includes steps of receiving verification instructions, transmitting verification voiceprint segment acquisition requesting instructions to a cloud server according to the verification instructions; receiving verification voiceprint segments fed by the cloud server; playing the verification voiceprint segments. The verification voiceprint segment acquisition requesting instructions contain identification information. The verification voiceprint segments are generated by the cloud server according to set rules and registration information which is stored in the cloud server and corresponds to the identification information, and include verification requesting voiceprint segments, unlocking permission voiceprint segments, verification key voiceprint segments and completion voiceprint segments. According to the scheme, the access control verification method and the access control verification system have the advantages that access control verification can be carried out by the aid of the verification voiceprint segments, and accordingly the access control verification method and the access control verification system are convenient to use, high in safety and low in cost.

Description

technical field [0001] The invention relates to the technical field of access control unlocking, in particular to an access control verification method and system. Background technique [0002] At present, the traditional building access control method is to open the access control by swiping the access control IC card (Integrated Circuit Card, integrated circuit card). Residents need to carry the access control IC card with them. When the access control IC card is lost or damaged, the building access control cannot be opened , it is very inconvenient to use and the cost of making access control IC cards is also higher. However, although there is also an access control verification by verifying the voice of the resident at present, that is, the voice of the resident in the building is first stored in the access control device, and then when verifying that the access control is opened, whether the voice of the person requesting to open is stored in the access control device. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06G07C9/00
Inventor 马学骎赵华峰谭阳
Owner GUANGDONG ANJUBAO DIGITAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products