Access control method, device and system

An access control and access control technology, applied in the field of devices and systems, and access control methods, can solve problems affecting the security of access control, and achieve the effects of preventing intrusion attacks and improving security.

Inactive Publication Date: 2019-11-26
HANGZHOU HIKVISION DIGITAL TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the access control device uses the same access control verification rule to verify the access control release operation triggered by all mobile terminals at any time, which will affect the security of access control control and bring opportunities for third-party illegal users to illegally invade the access control device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method, device and system
  • Access control method, device and system
  • Access control method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In the access control method provided by the present application, the current time when the mobile terminal triggers the access control verification, and the duration, posture, and times of the access control release operation performed by the mobile terminal are involved in the access control verification. Compared with the existing fixed access control equipment, all mobile The terminal has the same access control verification rules in all time periods. This application can greatly improve the security of the access control equipment and effectively prevent intrusion attacks by third-party illegal users. In an example, the access control device here may be a door station, an access control card reader, etc., which are not specifically limited in this application.

[0050] In order to make the purpose, technical solutions and advantages of the present application clearer, the present invention will be described in detail below in conjunction with the accompanying drawin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an access control method, an access control device and an access control system. According to the access control method, the access control device and the access control system,a mobile terminal regards current time as access control release time when sensing that the mobile terminal is subjected to execute access control release operation, and transmits the access controlrelease time, an access control authentication identifier and access control release operation parameters to access control equipment for verification, therefore, when the access control equipment receives the access control release time, the access control authentication identifier and the access control release operation parameters which are transmitted from the mobile terminal, the received access control release time, the access control authentication identifier and the access control release operation parameters are verified based on an access control authority corresponding to the mobileterminal, and thus the access control equipment participates the access control authentication identifier and the access control release time of the mobile terminal into access control verification.Compared with a scheme that the access control equipment fixes access control authorities of all mobile terminals at all times to be the same, the access control method, the access control device andthe access control system can significantly improve the security of the access control equipment, and effectively prevents intrusion attacks of third-party illegal users.

Description

technical field [0001] The present application relates to security control technology, in particular to an access control method, device and system. Background technique [0002] The access control security management system is a new modern security management system. It integrates microcomputer automatic identification technology and modern security management measures. It involves many new technologies such as electronics, machinery, optics, computers, communications, and biology. It is suitable for various scenarios such as banks and hotels. , computer room, armory, confidential room, office room, factory, etc. [0003] At present, the access control authority of the access control device does not specifically distinguish between time periods, nor does it distinguish between mobile terminals, and the access control release operations triggered by all mobile terminals at any time period are verified according to the same access control verification rule. Take shaking to u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
CPCG07C9/00174
Inventor 应鹏魁胡坤龙
Owner HANGZHOU HIKVISION DIGITAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products