CN105303656B - A kind of implementation method of the intelligent access control system based on the application identification of CA technologies - Google Patents

A kind of implementation method of the intelligent access control system based on the application identification of CA technologies Download PDF

Info

Publication number
CN105303656B
CN105303656B CN201510608678.2A CN201510608678A CN105303656B CN 105303656 B CN105303656 B CN 105303656B CN 201510608678 A CN201510608678 A CN 201510608678A CN 105303656 B CN105303656 B CN 105303656B
Authority
CN
China
Prior art keywords
access
card reader
sim cards
control system
app
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510608678.2A
Other languages
Chinese (zh)
Other versions
CN105303656A (en
Inventor
李健诚
李新跃
时成
黄婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou League wisdom Information Technology Co., Ltd.
Original Assignee
Guangzhou League Wisdom Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou League Wisdom Information Technology Co Ltd filed Critical Guangzhou League Wisdom Information Technology Co Ltd
Priority to CN201510608678.2A priority Critical patent/CN105303656B/en
Publication of CN105303656A publication Critical patent/CN105303656A/en
Application granted granted Critical
Publication of CN105303656B publication Critical patent/CN105303656B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention proposes a kind of intelligent access control system based on the application identification of CA technologies, it is characterized by comprising access-control card reader, mobile terminal and the cloud background service terminal for presetting authentication processing software, CA SIM cards built in the mobile terminal, APP application software is loaded with the mobile terminal, the access-control card reader connects the cloud background service terminal by wireless network, the cloud background service terminal connects the mobile terminal by wireless network, the CA SIM cards carry out data with access-control card reader in communication context and mutually pass, the access-control card reader senses identification according to the key to the CA SIM cards, and the unlocking that responds.The invention also provides a kind of implementation method of the intelligent access control system based on the application identification of CA technologies comprises the following steps CA SIM cards authentication, APP bindings, identification of unlocking, CA identifications, APP inquiries, background process.The intelligent access control system based on the application identification of CA technologies of the present invention enhances access control system security defensive system, access control system operation mode is gone on numerical and intelligent.

Description

A kind of implementation method of the intelligent access control system based on the application identification of CA technologies
Technical field
The present invention relates to a kind of application field of CA technologies, is carried out more particularly to a kind of using CA technologies using identification Access control system.
Background technology
As high-tech industry develops with making rapid progress, society enters information age, traditional access control system management Strong barrier can not be provided for the safe precaution measure of people, its reason is as follows:
Lack system of real name authentication:
Traditional access control system lacks system of real name authentication link on business circuit, and system administration is supervised there are drawback, led Cause to produce a degree of personal safety as well as the property safety hidden danger in coverage.
In the presence of identification loophole:
The most common identification method of traditional access control system is Password Input pattern, easily causes Key Exposure, security Difference.
Information Security is low:
Traditional access control system key complexity is low, and common password input mode easily causes Key Exposure, security Difference.
Data resource isolates:
Gate inhibition's operation data is the important references resource of access control system management.In traditional access control system, data resource In scrappy and isolated state, it is not collected and vitalizes utilization, cause system administration can not make scientific and reasonable decision-making.
The content of the invention
The present invention proposes a kind of intelligent access control system based on the application identification of CA technologies, solves gate inhibition of the prior art System is existing to be lacked system of real name authentication, there is the defects of identification loophole, Information Security are low, data resource is isolated.
The technical proposal of the invention is realized in this way:A kind of intelligent access control system based on the application identification of CA technologies, its It is characterized in that including access-control card reader, mobile terminal and the cloud background service terminal for presetting ca authentication processing software, it is described CA-SIM cards built in mobile terminal, are loaded with APP application software under the mobile terminal, the access-control card reader is connected by wireless network The cloud background service terminal is connect, the CA-SIM is stuck in communication context mutually to be passed with access-control card reader progress data, the door Prohibit card reader and identification is sensed according to the key to the CA-SIM cards, and the unlocking that responds, the cloud background service terminal exist Automatically the information that the access-control card reader uploads is received under networking situation, plans as a whole the data that system operation is generated, and magnanimity is stored up It is stored in large database concept, while the data of database purchase is issued to APP clients automatically.
Further, the APP application software includes rights parameters configuration module, business information summarizing module, businessman's business Option mod, personal business option module, the rights parameters configuration module are used to include following authorization message management:Card number Code, door mark, rights state, number of swiping the card, residue degree, enabling time, out-of-service time;The business information summarizing module bag Containing record queries submodule and the attendance record inquiry submodule of swiping the card;Businessman's business option module is registered comprising merchant registration Submodule and businessman's service handling submodule;Individual's business option module is registered one's residence comprising individual registers submodule and personal industry Business accepts submodule, and individual registration submodule of registering one's residence is used to register and includes following interior same associated personal information:Client's surname Name, card mark, ownership company, relevant department, post title, gender and contact method.
Cell phone application software automatic updating data under networking state, provides visualization interface for system user, supports gate inhibition The operations such as record queries, gate inhibition announce reception, gate inhibition authorizes and applies.Wherein, cell phone application identification link introduces CA technologies, with System of real name authentication mode logs in cell phone application client, strengthens user security data management, prevents the leakage of system user information.
CA-SIM is stuck on the basis of the function of RF-SIM cards the CA technologies that introduce, be a collection 2.4GHz or 13.56M radio frequencies, New of Bluetooth wireless communication function, 2K magnetic coupling distance controllings technology, ca authentication and basic telecommunication voice data traffic Type intelligent SIM card, can connect cell phone application by 4.0 communication channel of bluetooth.CA-SIM card softwares system uses layer architecture side Formula is realized, i.e., is made of hardware layer, interface driver layer, OS layers and application layer.The technology of the compatible each access control system of CA-SIM cards With operation flow, such as access control system of residential community, enterprise's access control system, the compatibility mode of realization " all-purpose card ".
The cloud background service terminal receives the information that the access-control card reader uploads automatically under networking situation, plans as a whole system System runs generated data, and mass storage is issued to APP automatically in large database concept, while by the data of database purchase Client.Resource fragmentation is vitalized in high in the clouds, realizes the business such as interface account management, supervision tracking, system maintenance.Cloud backstage is whole The control axis of a access control system, including data storage module and data management mould.Data storage module collects CA-SIM cards fortune User's real name information, card reader that business provides is sought to upload bill, and establish DB Backup submodule.Data management module is special Regular arrangement is made for access control system traffic flow information, and is issued to cell phone application client.
Further, the APP application software includes rights parameters configuration module, business information summarizing module, businessman's business Option mod, personal business option module, the rights parameters configuration module are used to include following authorization message management:Card number Code, door mark, rights state, number of swiping the card, residue degree, enabling time, out-of-service time;The business information summarizing module bag Containing record queries submodule and the attendance record inquiry submodule of swiping the card;Businessman's business option module is registered comprising merchant registration Submodule and businessman's service handling submodule;Individual's business option module is registered one's residence comprising individual registers submodule and personal industry Business accepts submodule, and individual registration submodule of registering one's residence is used to register and includes following interior same associated personal information:Client's surname Name, card mark, ownership company, relevant department, post title, gender and contact method etc..
Further, the mobile terminal is equipped with the key case for placing unlocking key.Gate inhibition's key handset is intelligent entrance guard System-specific mobile phone, it reserves the space of key case in physical Design, makes a key and the gate inhibition of mobile phone economic benefits and social benefits unification Special mobile phone, two-way choice is provided for user when unlocking.
Further, the mobile terminal is mobile phone.
A kind of implementation method of intelligent access control system based on the application identification of CA technologies as described in claim 1 or 3, bag Include following steps:
Step 1, CA-SIM cards certificate issues:The user of CA-SIM cards is used first, and carrying out real name on cloud backstage recognizes Card, after certification is errorless, daemon software system registers the system of real name information of the CA-SIM cards automatically, while generates the CA cards of user Book, and certificate is issued in card by specified terminal device, the certificate of CA-SIM cards issues flow completion at this time;
Step 2, APP is bound:By the interface operation of mobile terminal APP, system of real name application information is uploaded into CA centers, And the instruction that CA centers issue is received, successful registration gate inhibition's APP accounts, cell phone application account is bound with system of real name information;
Step 3, unlock and identify:Intelligent access control system, which is swiped the card, senses unlocking mode, i.e., with the movement of built-in CA-SIM cards Terminal carries out data with the access-control card reader in communication context and mutually passes, and the access-control card reader is according to the close of CA-SIM cards Key sensing identification, and the unlocking that responds;
Step 4, CA is authenticated:When user logs in cell phone application, ca authentication need to be carried out;The APP clients of mobile terminal are to institute State cloud background service terminal and send certification instruction, after the cloud background service terminal receives information, utilize the CA certificate at card end Verification flow is performed with cloud background data base, the authorizing procedure of CA-SIM cards is completed at this time, can log in personal mobile phone APP homepages;
Step 5, APP preengages:User logs in the personal homepage of cell phone application client, submits gate inhibition to preengage and applies, in application Hold the access-control card reader account for including and accessing date, period and access.The gate inhibition preengages application by corresponding entrance guard management Member's authorisation process.
Step 6, APP is inquired about:User inquires about gate inhibition's record according to demands of individuals at cell phone application end and is announced with gate inhibition;
Step 7, background process:Entrance guard management person can carry out interface account management in cloud background service terminal, supervision chases after The business operations such as track, system maintenance.
Further, step 31 and step 32 are also equipped between the step 3 and the step 4 successively;Step 31 is data Upload:After access-control card reader identifies effective CA-SIM card keys, by access-control card reader sequence number, CA-SIM cards account and time Bill is automatically generated, and uploads cloud background server automatically;Step 32 is data synchronization updating:Cloud back-end server receives door Prohibit the bill that card reader is sent, carry out data acquisition and processing (DAP) automatically, and cell phone application user is synchronously issued under networking mode End.
Further, the mobile terminal is equipped with the key case for placing unlocking key, and intelligent access control system is opened using machinery Lock mode, the mechanical unlatching of progress is locked with traditional key on the door.
Further, the access-control card reader uses 13.56M RF wireless communication modes, and the key of CA-SIM cards is sensed Identification, and the unlocking that responds.Access-control card reader uses 13.56M RF wireless communication modes, supports 13.56M CA-SIM cards Sensing application, improve the Quality of experience of user, strengthen user identity identification to a certain extent, greatly improve access control system Prevention-Security.
Beneficial effects of the present invention are:The intelligent access control system based on the application identification of CA technologies of the present invention is directed to radio frequency skill The extensive prospect of art, CA technologies and biological identification technology application, devises a kind of intelligent recognition application access control system.This is System induction type radio-frequency technique and intelligent identification technology is integrated, applied to subscription authentication, unlock identification, APP inquiry and The links such as background user management, enhance access control system security defensive system, make access control system operation mode go on digitlization with It is intelligent.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is attached drawing needed in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, without having to pay creative labor, may be used also To obtain other attached drawings according to these attached drawings.
Fig. 1 is a kind of structural framing of intelligent access control system one embodiment based on the application identification of CA technologies of the present invention Figure;
Fig. 2 is a kind of flow chart of the intelligent access control system implementation method based on the application identification of CA technologies of the present invention;
Fig. 3 is a kind of flow chart of intelligent access control system and its implementation based on the application identification of CA technologies of the present invention;
Fig. 4 is a kind of structural frames of the APP application software of the intelligent access control system based on the application identification of CA technologies of the present invention Frame figure.
Embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other without creative efforts Embodiment, belongs to the scope of protection of the invention.
As shown in Fig. 1 or 3, a kind of intelligent access control system based on the application identification of CA technologies of the invention, it is characterised in that Including access-control card reader, mobile terminal and the cloud background service terminal for presetting ca authentication, CA- built in the mobile terminal SIM card, APP application software is loaded with the mobile terminal, and the access-control card reader connects the cloud backstage by wireless network and takes Business terminal, the cloud background service terminal connect the mobile terminal by wireless network, and the CA-SIM cards pass through wireless telecommunications The access-control card reader is connected, the CA-SIM is stuck in communication context mutually to be passed with access-control card reader progress data, the gate inhibition Card reader senses identification according to the key to the CA-SIM cards, and the unlocking that responds, the cloud background service terminal are joining Automatically the information that the access-control card reader uploads is received in the case of net, plans as a whole the data that system operation is generated, and mass storage APP clients are issued to automatically in large database concept, while by the data of database purchase.The mobile terminal, which is equipped with, to be placed The key case of unlocking key.Gate inhibition's key handset is the special mobile phone of intelligent access control system, it reserves key case in physical Design Space, make the special mobile phone of gate inhibition of a key and mobile phone economic benefits and social benefits unification, two-way choice provided in unlocking for user.Institute It is mobile phone to state mobile terminal.
As shown in figure 4, the APP application software includes rights parameters configuration module, business information summarizing module, Shang Jiaye Business option mod, personal business option module, the rights parameters configuration module are used to include following authorization message management:Card Number, door mark, rights state, number of swiping the card, residue degree, enabling time, out-of-service time;The business information summarizing module Include record queries submodule and the attendance record inquiry submodule of swiping the card;Businessman's business option module is stepped on comprising merchant registration Remember submodule and businessman's service handling submodule;Individual's business option module is registered one's residence comprising individual registers submodule and individual Service handling submodule, the individual register one's residence registration submodule be used for register include it is following it is interior together associated personal information:Client Name, card mark, ownership company, relevant department, post title, gender and contact method.
Cloud background service terminal supports WIFI wireless telecommunications, can be by encrypting the LAN of certification and controller and mobile phone APP issues and receives related data.
As shown in Fig. 2, a kind of implementation method of the intelligent access control system based on the application identification of CA technologies, including following step Suddenly:
Step 1, CA-SIM cards certificate issues:The user of CA-SIM cards is used first, and carrying out real name on cloud backstage recognizes Card, after certification is errorless, daemon software system registers the system of real name information of the CA-SIM cards automatically, while generates the CA cards of user Book, and certificate is issued in card by specified terminal device, the certificate of CA-SIM cards issues flow completion at this time;
Step 2, APP is bound:By the interface operation of mobile terminal APP, system of real name application information is uploaded into CA centers, And the instruction that CA centers issue is received, successful registration gate inhibition's APP accounts, cell phone application account is bound with system of real name information;
Step 3, unlock and identify:Intelligent access control system, which is swiped the card, senses unlocking mode, i.e., with the movement of built-in CA-SIM cards Terminal carries out data with the access-control card reader in communication context and mutually passes, and the access-control card reader is according to the close of CA-SIM cards Key sensing identification, and the unlocking that responds;
Step 4, CA is authenticated:When user logs in cell phone application, ca authentication need to be carried out;The APP clients of mobile terminal are to institute State cloud background service terminal and send certification instruction, after the cloud background service terminal receives information, utilize the CA certificate at card end Verification flow is performed with cloud background data base, the authorizing procedure of CA-SIM cards is completed at this time, can log in personal mobile phone APP homepages;
Step 5, APP preengages:User logs in the personal homepage of cell phone application client, submits gate inhibition to preengage and applies, in application Hold the access-control card reader account for including and accessing date, period and access.The gate inhibition preengages application by corresponding entrance guard management Member's authorisation process.
Step 6, APP is inquired about:User inquires about gate inhibition's record according to demands of individuals at cell phone application end and is announced with gate inhibition;
Step 7, background process:Entrance guard management person can carry out interface account management in cloud background service terminal, supervision chases after The business operations such as track, system maintenance.
Step 31 and step 32 are also equipped between the step 3 and the step 4 successively;Step 31 uploads for data:Door After prohibiting the effective CA-SIM card keys of reader identification, access-control card reader sequence number, CA-SIM cards account and time are automatically generated Bill, and cloud background server is uploaded automatically;Step 32 is data synchronization updating:Cloud back-end server receives access-control card reader The bill of transmission, carries out data acquisition and processing (DAP) automatically, and cell phone application user terminal is synchronously issued under networking mode.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention With within principle, any modification, equivalent replacement, improvement and so on, should all be included in the protection scope of the present invention god.

Claims (4)

1. a kind of implementation method of the intelligent access control system based on the application identification of CA technologies, it is characterised in that comprise the following steps:
Step 1, CA-SIM cards certificate issues:CA-SIM cards built in mobile terminal, APP is loaded with the mobile terminal using soft Part, access-control card reader preset the cloud background service terminal of ca authentication processing software by wireless network connection, and the cloud backstage takes Business terminal connects the mobile terminal by wireless network, first using the user of CA-SIM cards, in the cloud background service terminal Real-name authentication is carried out, after certification is errorless, daemon software system registers the system of real name information of the CA-SIM cards automatically, generates at the same time The CA certificate of user, and certificate is issued in card by specified terminal device, the certificate of CA-SIM cards issues flow at this time Complete;
Step 2, APP is bound:By the interface operation of mobile terminal APP, system of real name application information is uploaded into CA centers, and receive The instruction that CA centers issue, successful registration gate inhibition's APP accounts, cell phone application account is bound with system of real name information;
Step 3, unlock and identify:Intelligent access control system, which is swiped the card, senses unlocking mode, i.e., with the mobile terminal of built-in CA-SIM cards Data are carried out in communication context with the access-control card reader mutually to pass, the access-control card reader is according to the key sense to CA-SIM cards It should identify, and the unlocking that responds;
Step 4, CA is authenticated:The cloud background service terminal receives the letter that the access-control card reader uploads automatically under networking situation Breath, plans as a whole the data that are generated of system operation, and mass storage is in large database concept, while the data of database purchase are automatic APP clients are issued to, when user logs in cell phone application, ca authentication need to be carried out;The APP clients of mobile terminal are to after the cloud Platform service terminal sends certification instruction, after the cloud background service terminal receives information, after the CA certificate and cloud at card end Platform database performs verification flow, and the authorizing procedure of CA-SIM cards is completed at this time, can log in personal mobile phone APP homepages;
Step 5, APP preengages:User logs in the personal homepage of cell phone application client, submits gate inhibition to preengage application, and application content is contained Include the access-control card reader account for accessing date, period and access;The gate inhibition preengages application and is awarded by corresponding entrance guard management person Power processing;
Step 6, APP is inquired about:User inquires about gate inhibition's record according to demands of individuals at cell phone application end and is announced with gate inhibition;
Step 7, background process:Entrance guard management person can carry out interface account management, supervision tracking in cloud background service terminal, be System is safeguarded.
2. the implementation method of the intelligent access control system as claimed in claim 1 based on the application identification of CA technologies, it is characterised in that: Step 31 and step 32 are also equipped between the step 3 and the step 4 successively;Step 31 uploads for data:Access-control card reader After identifying effective CA-SIM card keys, access-control card reader sequence number, CA-SIM cards account and time are automatically generated into bill, and certainly It is dynamic to upload cloud background server;Step 32 is data synchronization updating:Cloud back-end server receives the account of access-control card reader transmission It is single, data acquisition and processing (DAP) is carried out automatically, and cell phone application user terminal is synchronously issued under networking mode.
3. the implementation method of the intelligent access control system as claimed in claim 1 based on the application identification of CA technologies, it is characterised in that: The mobile terminal is equipped with the key case for placing unlocking key, and intelligent access control system is using mechanical unlocking mode, with tradition Key lock the mechanical unlatching of progress on the door.
4. the implementation method of the intelligent access control system as claimed in claim 1 based on the application identification of CA technologies, it is characterised in that: The access-control card reader uses 13.56M radio frequencies or 2.4GHz wireless communication modes, senses identification to the key of CA-SIM cards, and Respond unlocking.
CN201510608678.2A 2015-09-22 2015-09-22 A kind of implementation method of the intelligent access control system based on the application identification of CA technologies Active CN105303656B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510608678.2A CN105303656B (en) 2015-09-22 2015-09-22 A kind of implementation method of the intelligent access control system based on the application identification of CA technologies

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510608678.2A CN105303656B (en) 2015-09-22 2015-09-22 A kind of implementation method of the intelligent access control system based on the application identification of CA technologies

Publications (2)

Publication Number Publication Date
CN105303656A CN105303656A (en) 2016-02-03
CN105303656B true CN105303656B (en) 2018-05-11

Family

ID=55200871

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510608678.2A Active CN105303656B (en) 2015-09-22 2015-09-22 A kind of implementation method of the intelligent access control system based on the application identification of CA technologies

Country Status (1)

Country Link
CN (1) CN105303656B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106952351A (en) * 2017-03-09 2017-07-14 广州国联智慧信息技术有限公司 Highway ETC E-payment systems and method
CN106803298A (en) * 2017-03-09 2017-06-06 广州国联智慧信息技术有限公司 Intelligent intercom system and method based on recognition of face
CN110800028A (en) * 2017-05-03 2020-02-14 开利公司 On-demand access control authorization using mobile devices
CN107358693A (en) * 2017-07-04 2017-11-17 安徽工程大学 A kind of smart lock and method for unlocking
CN109360316A (en) * 2018-11-20 2019-02-19 上海古鳌电子科技股份有限公司 A kind of intelligent lock system and working method
CN109754501A (en) * 2018-11-20 2019-05-14 国民技术股份有限公司 Method for unlocking and smart lock, the computer readable storage medium of smart lock
CN109816832B (en) * 2019-02-01 2021-11-16 北京华大智宝电子系统有限公司 Unlocking method and device
CN110049044A (en) * 2019-04-18 2019-07-23 王毛路 A kind of block chain visualization CA configuring management method
CN110349302A (en) * 2019-05-29 2019-10-18 巫协森 One kind can program intelligent entrance guard control protection operational method and its system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103778705A (en) * 2014-02-19 2014-05-07 北京中泰方信科技有限公司 Realization method and system of NFC (near field communication) electronic lock and NFC electronic lock card reader
CN104134261A (en) * 2014-08-05 2014-11-05 武汉百施达智能技术有限公司 Smartphone-based intelligent lock management system
CN203966220U (en) * 2014-07-10 2014-11-26 重庆慧居智能电子有限公司 A kind of access control system based on smart mobile phone
CN104851168A (en) * 2015-05-19 2015-08-19 上海思慧德安防设备有限公司 Power-free lock door control system
US9426653B2 (en) * 2013-07-17 2016-08-23 Honeywell International Inc. Secure remote access using wireless network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2223033T3 (en) * 2002-02-13 2005-02-16 Swisscom Ag ACCESS CONTROL SYSTEM, ACCESS CONTROL PROCEDURE AND SUITABLE DEVICES FOR THEM.

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9426653B2 (en) * 2013-07-17 2016-08-23 Honeywell International Inc. Secure remote access using wireless network
CN103778705A (en) * 2014-02-19 2014-05-07 北京中泰方信科技有限公司 Realization method and system of NFC (near field communication) electronic lock and NFC electronic lock card reader
CN203966220U (en) * 2014-07-10 2014-11-26 重庆慧居智能电子有限公司 A kind of access control system based on smart mobile phone
CN104134261A (en) * 2014-08-05 2014-11-05 武汉百施达智能技术有限公司 Smartphone-based intelligent lock management system
CN104851168A (en) * 2015-05-19 2015-08-19 上海思慧德安防设备有限公司 Power-free lock door control system

Also Published As

Publication number Publication date
CN105303656A (en) 2016-02-03

Similar Documents

Publication Publication Date Title
CN105303656B (en) A kind of implementation method of the intelligent access control system based on the application identification of CA technologies
CN105678872B (en) A kind of access control system and its authorization method and access control terminal equipment
US8466773B2 (en) Method of authorization
CN101635743B (en) System and method using biologic characteristic certification result to validate identity of mobile terminal holder
US20100088749A1 (en) System and method for personal authentication using anonymous devices
CN102037706B (en) Method for the temporary personalization of a communication device
CN107800725A (en) A kind of digital certificate remote online managing device and method
US20130257589A1 (en) Access control using an electronic lock employing short range communication with mobile device
CN109147111A (en) It is self-service to move in management system and method, electronic equipment and storage medium
CN106803298A (en) Intelligent intercom system and method based on recognition of face
CN106991317A (en) Safe verification method, platform, device and system
CN107734158A (en) The method and system of remote management is carried out using intelligent hand-held terminal Lock device with two same action member
CN106652109A (en) Intelligent lock control method, device and lock management server
CN106097519B (en) A kind of control device of electronic lock, electronic lock, control method and its application
US20050138394A1 (en) Biometric access control using a mobile telephone terminal
CN104253818B (en) Server, terminal authentication method and server, terminal
CN107222373A (en) Control method, system, terminal, FIDO servers and the safety means of smart home
CN105574967A (en) Intelligent access control system and operation method thereof
CN104424676A (en) Identity information sending method, identity information sending device, access control card reader and access control system
CN110535882A (en) A kind of identity authentication service method and system based on heterogeneous terminals
CN107426160A (en) Control method, system, terminal, FIDO servers and the safety means of smart home
CN110163998A (en) A kind of intelligent door lock application method of intelligent door lock system and offline authentication
CN109215204A (en) A kind of intelligent door lock security system based on ether mill
CN110298942A (en) A kind of access control system and method
CN109409057A (en) Security system and its control method, control device and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20180312

Address after: No. 601, No. 16 (A), No. 16, Yunshan street, Sha Wei, Panyu District City, Panyu District City, Guangdong

Applicant after: Guangzhou League wisdom Information Technology Co., Ltd.

Address before: 510000 CITIC Plaza, No. 233, Tianhe North Road, Tianhe District, Guangzhou, Guangdong province 7205-7207

Applicant before: CHINA ELITE INFO. SERVICES CO., LTD. (GUANGZHOU)

GR01 Patent grant
GR01 Patent grant