Access control monitoring method and system thereof

An access control and user technology, applied to instruments, single input/output registers, time registers, etc., can solve problems such as easy loss of card devices, potential safety hazards, and limited face recognition technology, and achieve The authentication method is convenient and the effect of improving user experience

Active Publication Date: 2016-06-08
GOERTEK INC
View PDF9 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Among them, card devices are easy to be lost and forgotten, which not only causes inconvenience in identity verification, but also has potential safety hazards. If obtained by criminals, theft can be carried out; fingerprint recognition can solve the shortage of card products, but about 5% People on the left and right cannot be identified by fingerprints, and the way of contact identification is easy to spread diseases. There is still a problem that fingerprint identification needs to be successfully identified several times in a row when the season changes or the climate is dry; face recognition technology is limited by light , gestures, and decorations. During face comparison, if the user shaves his beard, wears more glasses, or changes his expression, the system authentication may fail, which brings great inconvenience to user identity verification.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control monitoring method and system thereof
  • Access control monitoring method and system thereof
  • Access control monitoring method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057]This embodiment provides an access control monitoring method suitable for a controlled area with multiple rooms, where each room in the controlled area is provided with an access control terminal.

[0058] figure 1 The flow chart of the access control monitoring method provided by this embodiment, such as figure 1 as shown, figure 1 The methods in include:

[0059] S110, matching with a mobile terminal equipped with a short-distance wireless communication function on the user side, and establishing an authentication list in which user identity information is recorded.

[0060] Short-range wireless communication technologies mainly include Bluetooth Low Energy (BLE), ZigBee, Near Field Communication (NFC) and Wireless Local Area Networks (WLAN). Due to the extensive application of BLE technology, such as mobile phones The BLE function on mobile devices such as mobile devices and wristbands, this embodiment preferably uses the BLE function of the mobile device to authen...

Embodiment 2

[0101] This embodiment adopts the access control monitoring method in the first embodiment to control the access control of the access control terminal.

[0102] In this embodiment, when controlling the opening and closing of the access control of the access control terminal, the entry of the user identity is completed first. That is, by matching with a mobile terminal equipped with a short-distance wireless communication function on the user side, an authentication list recording user identity information is established to realize user identity entry.

[0103] It should be noted that the user identity information in this embodiment includes an identification code uniquely identifying the mobile terminal, user voice information, and user authority information, wherein the identification code of the mobile terminal is the UUID of the mobile terminal.

[0104] The monitoring method of the access control monitoring system of the present embodiment to the access control terminal is ...

Embodiment 3

[0130] Based on the same technical idea as that of Embodiment 1 or Embodiment 2, this embodiment provides an access control monitoring system, which is suitable for a controlled area with multiple rooms.

[0131] Figure 4 A schematic diagram of the composition and structure of the access control monitoring system provided in this embodiment, such as Figure 4 As shown, the access control monitoring system in the present embodiment includes an access control terminal 40 and an access control monitoring server 41 arranged in each room;

[0132] The access control monitoring server 41 is used to complete the entry of user identity, interact with the data of each access control terminal and control each access control terminal;

[0133] The access control terminal 40 is used to play broadcast information to the environment, play prompts to the user under the control of the access control monitoring server 41, and perform data interaction with the access control monitoring server...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access control monitoring method and a system thereof. The method comprises the following steps: matching with a mobile terminal arranged at a user side and provided with a short distance wireless communication function, and establishing an authentication list with recorded user identity information; controlling an access control terminal to identify the mobile terminal in the monitored area of the access control terminal when the monitoring function is started; authenticating the user identity information of the user of the mobile terminal when the mobile terminal is identified; positioning the user of the mobile terminal when the user identity information passes the identification; and starting a voice identification mode for the successfully positioned user, controlling the access control terminal to play an identity identification warning tone to the user, verifying the identity of the user according to the user response voice returned by the access control terminal, and controlling access control opening or closing according to a voice verifying result. Compared with present contact authentication modes and face identification authentication modes, the method adopting the above technical scheme is convenient and safe, and can effectively improve user experiences.

Description

technical field [0001] The invention relates to the technical field of access control methods, in particular to an access control monitoring method and system. Background technique [0002] At present, the domestic access control system mainly realizes identity verification through card devices, fingerprints and face recognition technologies. [0003] Among them, card devices are easy to be lost and forgotten, which not only causes inconvenience in identity verification, but also has potential safety hazards. If obtained by criminals, theft can be carried out; fingerprint recognition can solve the shortage of card products, but about 5% People on the left and right cannot be identified by fingerprints, and the way of contact identification is easy to spread diseases. There is still a problem that fingerprint identification needs to be successfully identified several times in a row when the season changes or the climate is dry; face recognition technology is limited by light ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G07C9/00
CPCG07C9/27G07C9/37G07C9/38G07C9/00G07C9/257G07C9/28G07C9/25G07C9/29
Inventor 赵培杰
Owner GOERTEK INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products