Safety access control method

A security door and gate technology, applied in electromagnetic radiation induction, instrument, character and pattern recognition, etc., can solve problems such as hidden safety hazards, high cost of fingerprint recognition systems, and the inability of fingerprint readers to distinguish user fingers.

Active Publication Date: 2016-01-20
西安知行知识产权服务有限责任公司
View PDF7 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, there are many types of access control systems in residential quarters or offices, including a simple punch card system, that is, the user carries a door card with a user ID inside, and approaches the card reader when entering the door. If the door card has been authorized to access, then The background server sends the information of the access control system to the access control system, and the access control system opens the door with the card reader for the user to enter. The advantage of this method is that the equipment is simple, and the steps for the user to enter the door are relatively simple, but the disadvantages are very obvious. , that is, if the door card is lost, anyone who picks up the door card can enter at will, which is a great challenge to residents and office security; it also includes some biometric technologies, such as fingerprint recognition, that is, the background has recorded The fingerprint and other user information entered by the user, when the user puts the recorded finger on the fingerprint reader, the reader will send the read user fingerprint to the background, after the background comparison, if the match is successful, the user is allowed to enter, Otherwise, the user is prohibited from entering. The advantage of this method is that it is more secure than the access control card, because the user's fingerprint is not easy to "lose". Finger cots and real user fingers also have certain potential safety hazards. Moreover, the high cost of the fingerprint recognition system has brought a certain economic burden to the community or company that uses the system. Similar to this iris detection system There are also similar defects; in addition, there is an access control system that uses facial recognition technology, that is, the camera collects face photos and compares them with the pre-stored face photos in the background database. If the match is successful, the user is allowed to enter, otherwise the user is not allowed to enter , but the safety factor of this method is not high, because face photos are easy to forge. For example, it is easy to break through the access control system by using remake photos in front of the camera. The remake photos are paper photos or electronic photos of faces, etc. ; In addition, the above-mentioned existing methods are all single-layer verification processes, and do not consider the potential safety hazards caused by the breakthrough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety access control method
  • Safety access control method
  • Safety access control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The following examples are presented for illustrative purposes only and do not limit the scope of the invention.

[0021] As described in the background technology, the access control system of the prior art has the problem that either the safety factor is not high, or the cost of the equipment is high, see at first figure 1 , introduces the device architecture adopted for realizing the method proposed by the present invention, it can be seen that the present invention uses a combination of various devices with low cost, which ensures that the realization cost of the present invention is low.

[0022] Such as figure 1 As shown, the access control system includes a background server 101, a plurality of cameras 102, a plurality of two-dimensional code readers 103, a plurality of mobile phones 104 communicating with the background server in a wired or wireless manner, and located in the monitoring room and capable of communicating with the background server. Multiple moni...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A safety access control method includes the steps that a user selects the time when the user will arrive at a gate through a mobile phone; a sending module in the mobile phone sends user identification presorted in the mobile phone and the time when the user will arrive at the gate to a background server; the background server records the user identification and the time when the user will arrive at the gate; a two-dimension code generation module in the mobile phone generates a two-dimension code containing the user identification; after the user arrives at the gate, a two-dimension code reader corresponding to the gate reads the two-dimension code displayed by a screen of the mobile phone and sends the read information to the background server; the background server judges whether the information is authorized information or not, the user passes two-dimension code verification if the information is authorized information, and otherwise the user does not pass two-dimension code verification. By means of the scheme, safety of an access control system is improved under the condition of not increasing the device cost, privacy and timeliness of two-dimension code verification are ensured, and the access control system with multiple layers of verification is provided through the combination with other verification processes.

Description

technical field [0001] The invention relates to the technical field of access control security, and in particular to an access control method based on two-dimensional code and / or image processing technology. Background technique [0002] At present, there are many types of access control systems in residential quarters or offices, including a simple punch card system, that is, the user carries a door card with a user ID inside, and approaches the card reader when entering the door. If the door card has been authorized to access, then The background server sends the information of the access control system to the access control system, and the access control system opens the door with the card reader for the user to enter. The advantage of this method is that the equipment is simple, and the steps for the user to enter the door are relatively simple, but the disadvantages are very obvious. , that is, if the door card is lost, anyone who picks up the door card can enter at wil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G07C9/00G06K7/10G06K9/62
Inventor 熊桂荣
Owner 西安知行知识产权服务有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products