Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and equipment for finishing entrance guard authentication using wireless communication device

A wireless communication device, access control technology, applied in the direction of wireless communication, security communication device, security device, etc., can solve the problems of abnormal control, inability to read data, and difficulty, and achieve the effect of improving security

Inactive Publication Date: 2005-04-20
LITE ON TECH CORP
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, this kind of magnetic card is adhered with a magnetic sheet, and the data stored in the magnetic sheet is susceptible to external contact wear and degaussing, making it difficult or impossible to read the data on the magnetic sheet of the magnetic card, so it is common that the magnetic card must be read. The magnetic card can only be fully read after several times or the magnetic card is frequently replaced. In addition, the magnetic card reader used in the magnetic card is easily affected by external interference signals, which makes the control of access control abnormal and impractical.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and equipment for finishing entrance guard authentication using wireless communication device
  • Method and equipment for finishing entrance guard authentication using wireless communication device
  • Method and equipment for finishing entrance guard authentication using wireless communication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to have a further understanding and understanding of the features and achieved effects of the present invention, preferred embodiments and coordination are described in detail as follows.

[0018] The present invention mainly discloses the uniqueness of an International Mobile Subscriber Identity (IMSI) using a wireless communication device, and uses it in access control to improve its security mechanism, and even add a password mechanism-retina or fingerprint identification A method and a device for making it have another layer of safety protection function. The wireless communication device of the present invention is described by taking a mobile phone as an example.

[0019] Such as figure 1 As shown, it is a schematic block diagram of a preferred embodiment of the present invention. Generally, a unique International Mobile Subscriber Identity (IMSI) 12 is included in the mobile phone 10, and the International Mobile Subscriber Identity (IMSI) 12 can be pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to a method for finishing gate certification by a wireless communication device and a device which utilizes the exclusiveness of a wireless communication device, such as cell phone (IMSI) and non-contact sensing fetcher to fetch said IMSI identification code as the identity certification of a user and to control the operation of unlocking and locking of an electronic lock. Since said IMSI has the only property, the safety of threshold management is increased greatly to reach the aim of using said wireless communication device to be the certification unit of gates, car gates.

Description

technical field [0001] The present invention relates to a method and device for using a wireless communication device to complete access control authentication, in particular to a non-contact inductive reader to read the unique international mobile subscriber identification code in the wireless communication device as an access control authentication The basis method and device. Background technique [0002] Usually, with the decline of social security, thieves are becoming more and more rampant, so that in order to obtain the safety and security of life and property, residents often need to resort to methods such as hiring guards, installing anti-theft equipment or security systems, etc. to achieve preventive effects. However, nowadays Most of the security equipment used is based on access control, and the way of access control is to use a magnetic card reader to read the magnetic card to identify the authenticity of the residents. The magnetic card reader is connected to t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06G07C9/00H04L9/00H04L9/32H04M11/00H04W12/08
Inventor 洪玠荣
Owner LITE ON TECH CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products