CN104464045A - Two-dimension code-based access control method and two-dimension code-based access control system - Google Patents

Two-dimension code-based access control method and two-dimension code-based access control system Download PDF

Info

Publication number
CN104464045A
CN104464045A CN201410633236.9A CN201410633236A CN104464045A CN 104464045 A CN104464045 A CN 104464045A CN 201410633236 A CN201410633236 A CN 201410633236A CN 104464045 A CN104464045 A CN 104464045A
Authority
CN
China
Prior art keywords
quick response
response code
access control
network data
access permission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410633236.9A
Other languages
Chinese (zh)
Inventor
曾桓涛
李健
景立健
陈鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201410633236.9A priority Critical patent/CN104464045A/en
Publication of CN104464045A publication Critical patent/CN104464045A/en
Pending legal-status Critical Current

Links

Landscapes

  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

The invention discloses a two-dimension code based access control method and a two-dimension code-based access control system. The method comprises the following steps: carrying out a two-dimension code scanning step, namely, scanning the two-dimension code carrying access control privilege information which comprises owner identity information or visitor identity information; carrying out an analysis processing step, namely, analyzing the access control privilege information and converting the access control privilege information into network data carrying the access control privilege information, and transmitting the network data via a network; carrying out a back-stage management step, namely, receiving the network data, and verifying the network data at the back stage, and judging whether the verification is legal, and if so, opening the access control switch. According to the two-dimension code-based access control method and the two-dimension code-based access control system, the management safety can be improved, and also the demand on human resources can be lowered.

Description

Based on access control method and the system of Quick Response Code
Technical field
The present invention relates to intelligent entrance guard control technology field, particularly relate to a kind of access control method based on Quick Response Code and system.
Background technology
Along with improving constantly of people's living standard, make us have higher requirement to the condition of living, the importance of the security system of residential quarters, more and more receives the attention of people.Entrance guard management is the important component part of current area safety management, and strengthens residential quarter entrance guard management work, then needing provides more man power and material, and this can add the estate management expense burden of community owner undoubtedly indirectly.
Therefore, be necessary that design one can improve management security, the access control method based on Quick Response Code and the system of demand of human resources can be reduced again.
Summary of the invention
An object of the present invention is to provide one can improve management security, can reduce again the access control method based on Quick Response Code of demand of human resources.
Two of object of the present invention is to provide one can improve management security, can reduce again the access control system based on Quick Response Code of demand of human resources.
One of to achieve these goals, technical scheme provided by the invention is: provide a kind of access control method based on Quick Response Code, comprise the steps:
Quick Response Code scanning step, the Quick Response Code of access permission information is carried in scanning, and described access permission information comprises owner's identity information or visitor's identity information;
Analyzing and processing step, analyzes described access permission information and is converted to the network data of carrying access permission information, and by network data described in Internet Transmission;
Back-stage management step, receives described network data, and network data described in background authentication, and judge whether legal checking, if so, then open gate inhibition's switch.
Back-stage management step, receives described network data, and network data described in background authentication, and judge whether legal checking, and if not, then the illegal checking of prompting, and send illegal verification tip.
Also comprise Quick Response Code generation step, described Quick Response Code generation step generates the Quick Response Code carrying owner's identity information or visitor's identity information.
Described back-stage management step also comprises entrance guard management step, and after network data described in background authentication, no matter whether legal checking, all enters described entrance guard management step, if legal checking, then open gate inhibition's switch; If illegally verify, then the illegal checking of prompting, and send illegal verification tip.
Described entrance guard management step also comprises the step to the unified management of multiple gate inhibition's switch.
Described back-stage management step also comprises data base administration step, and described data base administration step comprises the management of user data tissue, gate inhibition's data management.
Described access permission information also comprises the entry-into-force time of access permission, and user is that to obtain entry-into-force time of access permission by owner's identity information be T1, and user be the entry-into-force time T2 by visitor's identity information acquisition access permission, T1>T2.
Described access permission information also comprises the number of times that comes into force of access permission, and user is that to obtain the number of times that comes into force of access permission by owner's identity information be unlimited, and user be preset value by the number of times that comes into force of visitor's identity information acquisition access permission.
To achieve these goals two, technical scheme provided by the invention is: provide a kind of access control system based on Quick Response Code, comprising:
Quick Response Code scan module, the Quick Response Code of access permission information is carried in scanning, and described access permission information comprises owner's identity information or visitor's identity information;
Analysis and processing module, analyzes described access permission information and is converted to the network data of carrying access permission information, and by network data described in Internet Transmission;
Back Administration Module, receives described network data, and network data described in background authentication, and judge whether legal checking, if so, then open gate inhibition's switch.
Back Administration Module, receives described network data, and network data described in background authentication, and judge whether legal checking, and if not, then the illegal checking of prompting, and send illegal verification tip.
Also comprise two-dimensional code generation module, described two-dimensional code generation module generates the Quick Response Code carrying owner's identity information or visitor's identity information.
Described Back Administration Module also comprises entrance guard management module, after network data described in background authentication, if legal checking, then opens gate inhibition's switch; If illegally verify, then the illegal checking of prompting, and send illegal verification tip.
Described entrance guard management module is to the unified management of multiple gate inhibition's switch.
Described Back Administration Module also comprises database management module, and described database management module comprises the management of user data tissue, gate inhibition's data management.
The present invention is based on access control method and the system of Quick Response Code, can lead to Quick Response Code scanning step, the Quick Response Code of access permission information is carried in scanning, and described access permission information comprises owner's identity information or visitor's identity information; Analyzing and processing step, analyzes described access permission information and is converted to the network data of carrying access permission information, and by network data described in Internet Transmission; Back-stage management step, receives described network data, and network data described in background authentication, and judge whether legal checking, if so, then open gate inhibition's switch.Making card is not needed to store because Quick Response Code transmits gate inhibition's authority information, also without storage medium, only need by therefore, it is possible to save the cost of gate inhibition's card, card reader, only need be scanned Quick Response Code by Quick Response Code scan module, can access permission be determined, can greatly save gate inhibition's cost.
By following description also by reference to the accompanying drawings, the present invention will become more clear, and these accompanying drawings are for explaining embodiments of the invention.
Accompanying drawing explanation
Fig. 1 is the FB(flow block) of an embodiment of the access control method that the present invention is based on Quick Response Code.
Fig. 2 is the module map of an embodiment of the access control system that the present invention is based on Quick Response Code.
Embodiment
With reference now to accompanying drawing, describe embodiments of the invention, element numbers similar in accompanying drawing represents similar element.
Embodiment 1
Please refer to shown in Fig. 1, a kind of access control method based on Quick Response Code is provided, comprises the steps:
S001 Quick Response Code scanning step, the Quick Response Code of access permission information is carried in scanning, and described access permission information comprises owner's identity information or visitor's identity information; In this step, gate inhibition's switch periphery is provided with Quick Response Code scan module, user in advance by the Quick Response Code of the Quick Response Code or paper that carry the electronic version of access permission with allow this Quick Response Code scan module carry out scanning recognition; Quick Response Code then sends to every owner by the public number of infrastructure management company, or every owner downloads voluntarily at the webpage of infrastructure management company and obtains; The Quick Response Code carrying visitor's identity information is then that owner sends to corresponding visitor by mobile phone or other-end equipment in advance.
S002 analyzing and processing step, analyzes described access permission information and is converted to the network data of carrying access permission information, and by network data described in Internet Transmission; The 2 D code information obtained is scanned to Quick Response Code scan module and carries out analyzing and processing, and it is converted to network data, by cable network or WIFI or Zigbee transmission, enter back-stage management step.
S003 back-stage management step, receives described network data, and network data described in background authentication, and judge whether legal checking, if so, then open gate inhibition's switch.
Embodiment 2
Difference from Example 1 is, back-stage management step, receives described network data, and network data described in background authentication, and judge whether legal checking, and if not, then the illegal checking of prompting, and send illegal verification tip.
Embodiment 3
Quick Response Code generation step, described Quick Response Code generation step generates the Quick Response Code carrying owner's identity information or visitor's identity information.In this step, carry the Quick Response Code of owner's identity information, it can obtain the Quick Response Code of 24 hours access permissions; If the Quick Response Code of visitor's identity information then can be given in an official hour section, between such as during 9-11, it can obtain n access permission, wherein n=1,2,3 ... so just time of community gate inhibition's switch can be entered to visitor and number of times strictly controls, under extremely low cost, can greatly improve the safety management of community.
Embodiment 4
Described back-stage management step also comprises entrance guard management step, and after network data described in background authentication, no matter whether legal checking, all enters described entrance guard management step, if legal checking, then open gate inhibition's switch; If illegally verify, then the illegal checking of prompting, and send illegal verification tip.
Embodiment 5
Described entrance guard management step also comprises the step to the unified management of multiple gate inhibition's switch, interface as each gate inhibition's switching circuit docks, state shows, numbering manages, increase deletion etc. newly, because may there be multiple gate inhibition's switch a community, and these gate inhibition's switches all carry out unified management by the mode of networking.
Embodiment 6
Described back-stage management step also comprises data base administration step, and described data base administration step comprises the management of user data tissue, gate inhibition's data management.Namely the management of this user data tissue is in a period of time, such as in one month, the user of turnover community gate inhibition's switch adds up, and is unit according to each household family, manages with owner's identity information or with the user record of visitor's identity information access each household family; Gate inhibition's data management then passes in and out the number of times of community gate inhibition's switch within a certain period of time to each user.
Embodiment 7
Described access permission information also comprises the entry-into-force time of access permission, and user is that to obtain entry-into-force time of access permission by owner's identity information be T1, and user be the entry-into-force time T2 by visitor's identity information acquisition access permission, T1>T2.
Embodiment 8
Described access permission information also comprises the number of times that comes into force of access permission, and user is that to obtain the number of times that comes into force of access permission by owner's identity information be unlimited, and user be preset value by the number of times that comes into force of visitor's identity information acquisition access permission.The number of times that comes into force that owner's identity information obtains access permission is unlimited, has repeated no more; For the access permission that visitor's identity information obtains, such as certain family family authorizes an outside services workman gate inhibition's switch entering community, the owner of this family family then can send to this service worker by micro-letter by having the Quick Response Code entering community gate inhibition's switch authority for 1 time or 2 times in a period of time in advance, so just effectively can improve gate inhibition's switch safety of community.
Embodiment 9
Please refer to Fig. 2, a kind of access control system 100 based on Quick Response Code be provided, comprise:
Quick Response Code scan module 1, the Quick Response Code of access permission information is carried in scanning, and described access permission information comprises owner's identity information or visitor's identity information; In this module, gate inhibition's switch periphery is provided with Quick Response Code scan module, user in advance by the Quick Response Code of the Quick Response Code or paper that carry the electronic version of access permission with allow this Quick Response Code scan module carry out scanning recognition; Quick Response Code then sends to every owner by the public number of infrastructure management company, or every owner downloads voluntarily at the webpage of infrastructure management company and obtains; The Quick Response Code carrying visitor's identity information is then that owner sends to corresponding visitor by mobile phone or other-end equipment in advance.
Analysis and processing module 2, analyzes described access permission information and is converted to the network data of carrying access permission information, and by network data described in Internet Transmission; The 2 D code information obtained is scanned to Quick Response Code scan module and carries out analyzing and processing, and it is converted to network data, is transferred to Back Administration Module 3 by cable network or WIFI or Zigbee, and carry out data interaction in Back Administration Module 3.
Back Administration Module 3, receives described network data, and network data described in background authentication, and judge whether legal checking, if so, then open gate inhibition's switch.
Embodiment 10
Back Administration Module, receives described network data, and network data described in background authentication, and judge whether legal checking, and if not, then the illegal checking of prompting, and send illegal verification tip.
Embodiment 11
Also comprise two-dimensional code generation module 4, described two-dimensional code generation module generates the Quick Response Code carrying owner's identity information or visitor's identity information.In this module, carry the Quick Response Code of owner's identity information, it can obtain the Quick Response Code of 24 hours access permissions; If the Quick Response Code of visitor's identity information then can be given a time period, between such as during 9-11, it can obtain n access permission, wherein n=1,2,3 ... so just time of community gate inhibition's switch can be entered to visitor and number of times strictly controls, under extremely low cost, can greatly improve the safety management of community.
Embodiment 12
Described Back Administration Module also comprises entrance guard management module 31, after network data described in background authentication, if legal checking, then opens gate inhibition's switch; If illegally verify, then the illegal checking of prompting, and send illegal verification tip.
Embodiment 13
Described entrance guard management module is to the unified management of multiple gate inhibition's switch, interface as each gate inhibition's switching circuit docks, state shows, numbering manages, increase deletion etc. newly, because may there be multiple gate inhibition's switch a community, and these gate inhibition's switches all carry out unified management by the mode of networking.
Embodiment 14
Described Back Administration Module also comprises database management module 32, and described database management module comprises the management of user data tissue, gate inhibition's data management.Namely the management of this user data tissue is in a period of time, such as in one month, the user of turnover community gate inhibition's switch adds up, and is unit according to each household family, manages with owner's identity information or with the user record of visitor's identity information access each household family; Gate inhibition's data management then passes in and out the number of times of community gate inhibition's switch within a certain period of time to each user.
Embodiment 1.
Described Back Administration Module, also according to owner's personal information and solicited message, generates Quick Response Code.
Above disclosedly be only the preferred embodiments of the present invention, certainly can not limit the interest field of the present invention with this, therefore according to the equivalent variations that the present patent application the scope of the claims is done, still belong to the scope that the present invention is contained.

Claims (14)

1. based on an access control method for Quick Response Code, it is characterized in that, comprise the steps:
Quick Response Code scanning step, the Quick Response Code of access permission information is carried in scanning, and described access permission information comprises owner's identity information or visitor's identity information;
Analyzing and processing step, analyzes described access permission information and is converted to the network data of carrying access permission information, and by network data described in Internet Transmission;
Back-stage management step, receives described network data, and network data described in background authentication, and judge whether legal checking, if so, then open gate inhibition's switch.
2., as claimed in claim 1 based on the access control method of Quick Response Code, it is characterized in that, back-stage management step, receive described network data, and network data described in background authentication, and judge whether legal checking, if not, then the illegal checking of prompting, and send illegal verification tip.
3. as claimed in claim 1 based on the access control method of Quick Response Code, it is characterized in that, also comprise Quick Response Code generation step, described Quick Response Code generation step generates the Quick Response Code carrying owner's identity information or visitor's identity information.
4. as claimed in claim 2 based on the access control method of Quick Response Code, it is characterized in that, described back-stage management step also comprises entrance guard management step, after network data described in background authentication, no matter whether legal checking, all enter described entrance guard management step, if legal checking, then open gate inhibition's switch; If illegally verify, then the illegal checking of prompting, and send illegal verification tip.
5., as claimed in claim 3 based on the access control method of Quick Response Code, it is characterized in that, described entrance guard management step is to the step of multiple gate inhibition's switch unified management.
6. as claimed in claim 1 based on the access control method of Quick Response Code, it is characterized in that, described back-stage management step also comprises data base administration step, and described data base administration step comprises the management of user data tissue, gate inhibition's data management.
7. the access control method based on Quick Response Code as described in any one of claim 1-6, it is characterized in that, described access permission information also comprises the entry-into-force time of access permission, user is T1 for obtaining entry-into-force time of access permission by owner's identity information, user is the entry-into-force time T2 being obtained access permission by visitor's identity information, T1>T2.
8. the access control method based on Quick Response Code as described in any one of claim 1-6, it is characterized in that, described access permission information also comprises the number of times that comes into force of access permission, user is setting value for obtaining the number of times that comes into force of access permission by owner's identity information, and user be preset value by the number of times that comes into force of visitor's identity information acquisition access permission.
9. based on an access control system for Quick Response Code, it is characterized in that, comprising:
Quick Response Code scan module, the Quick Response Code of access permission information is carried in scanning, and described access permission information comprises owner's identity information or visitor's identity information, effective information time T1;
Analysis and processing module, analyzes described access permission information and is converted to the network data of carrying access permission information, and by network data described in Internet Transmission;
Back Administration Module, receives described network data, and network data described in background authentication, and judge whether legal checking, if so, then open gate inhibition's switch.
10., as claimed in claim 9 based on the access control system of Quick Response Code, it is characterized in that, Back Administration Module, receive described network data, and network data described in background authentication, and judge whether legal checking, if not, then the illegal checking of prompting, and send illegal verification tip.
11., as claimed in claim 10 based on the access control system of Quick Response Code, is characterized in that, also comprise two-dimensional code generation module, and described two-dimensional code generation module generates the Quick Response Code carrying owner's identity information or visitor's identity information.
12. as claimed in claim 10 based on the access control system of Quick Response Code, and it is characterized in that, described Back Administration Module also comprises entrance guard management module, after network data described in background authentication, if legal checking, then opens gate inhibition's switch; If illegally verify, then the illegal checking of prompting, and send illegal verification tip.
13. as claimed in claim 12 based on the access control system of Quick Response Code, and it is characterized in that, described entrance guard management module is to the unified management of multiple gate inhibition's switch.
14. access control systems based on Quick Response Code as described in any one of claim 9-13, it is characterized in that, described Back Administration Module also comprises database management module, and described database management module comprises the management of user data tissue, gate inhibition's data management.
CN201410633236.9A 2014-11-11 2014-11-11 Two-dimension code-based access control method and two-dimension code-based access control system Pending CN104464045A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410633236.9A CN104464045A (en) 2014-11-11 2014-11-11 Two-dimension code-based access control method and two-dimension code-based access control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410633236.9A CN104464045A (en) 2014-11-11 2014-11-11 Two-dimension code-based access control method and two-dimension code-based access control system

Publications (1)

Publication Number Publication Date
CN104464045A true CN104464045A (en) 2015-03-25

Family

ID=52910025

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410633236.9A Pending CN104464045A (en) 2014-11-11 2014-11-11 Two-dimension code-based access control method and two-dimension code-based access control system

Country Status (1)

Country Link
CN (1) CN104464045A (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105069869A (en) * 2015-07-23 2015-11-18 成都优家生活科技有限公司 Entrance guardsystem based on two dimension code
CN105262752A (en) * 2015-10-26 2016-01-20 广州畅联信息科技有限公司 Data processing method and device of virtual key, mobile terminal and server
CN105469477A (en) * 2015-11-14 2016-04-06 合肥骇虫信息科技有限公司 Visitor management system
CN105472037A (en) * 2016-01-06 2016-04-06 深圳市呤云科技有限公司 Method and device for opening entrance guard through scanning two-dimension code
CN105574967A (en) * 2015-12-16 2016-05-11 温州大学 Intelligent access control system and operation method thereof
CN105629749A (en) * 2015-10-10 2016-06-01 深圳市宝来威智能科技有限公司 Intelligent room control WeChat security control system and authentication method
CN105741394A (en) * 2016-02-02 2016-07-06 成都优家生活科技有限公司 Intelligent access control system based on mobile phone control
CN105741395A (en) * 2016-02-03 2016-07-06 慧锐通智能科技股份有限公司 Entrance guard access method and system based on two-dimension code and face identification
CN105913527A (en) * 2016-05-03 2016-08-31 武汉睿和智云科技有限公司 Intelligent visitor two-dimensional code verification system and intelligent visitor two-dimensional code verification method based on community cloud
CN105926486A (en) * 2016-04-15 2016-09-07 广东工业大学 Subway gate device supporting payment by scanning code
CN106408689A (en) * 2015-07-29 2017-02-15 北京千丁互联科技有限公司 Visitor reservation management method and visitor reservation management system
CN106447834A (en) * 2016-07-05 2017-02-22 福建意昂机电股份公司 Access authentication control system based on mobile phone client
CN106548224A (en) * 2016-10-25 2017-03-29 中冶华天工程技术有限公司 A kind of IC card management system and management method based on Quick Response Code
CN107564137A (en) * 2016-07-02 2018-01-09 济南中安科技有限公司 A kind of barcode scanning building access control system
CN107610283A (en) * 2017-08-21 2018-01-19 东莞市富卡网络科技有限公司 Visitor's data processing method, device, storage medium and server
CN108010160A (en) * 2016-11-02 2018-05-08 天津太卡科技发展有限公司 A kind of intelligent access control system
CN108447167A (en) * 2018-05-24 2018-08-24 上海亦源智能科技有限公司 One kind can call Guest Pass integrated system and its control method
CN108460875A (en) * 2018-03-20 2018-08-28 深圳市西克智能技术有限公司 A kind of entrance guard authentication method and device based on dynamic two-dimension code
CN108550208A (en) * 2018-04-09 2018-09-18 深圳市靓工创新应用科技有限公司 Method for managing user right, server and the readable medium of intelligent door lock
CN108846928A (en) * 2018-06-26 2018-11-20 北京奇虎科技有限公司 Gate inhibition's verification method and device
CN109712287A (en) * 2018-12-26 2019-05-03 浙江添锦建筑装饰工程有限公司 A kind of intelligent district access control system
CN109941857A (en) * 2019-03-15 2019-06-28 深圳达实软件有限公司 Visitors of elevator management system and management method based on two dimensional code
CN110503762A (en) * 2019-09-19 2019-11-26 南泽(广东)科技股份有限公司 A kind of access control method and the access control system using this method

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105069869A (en) * 2015-07-23 2015-11-18 成都优家生活科技有限公司 Entrance guardsystem based on two dimension code
CN106408689A (en) * 2015-07-29 2017-02-15 北京千丁互联科技有限公司 Visitor reservation management method and visitor reservation management system
CN105629749A (en) * 2015-10-10 2016-06-01 深圳市宝来威智能科技有限公司 Intelligent room control WeChat security control system and authentication method
CN105262752A (en) * 2015-10-26 2016-01-20 广州畅联信息科技有限公司 Data processing method and device of virtual key, mobile terminal and server
CN105469477A (en) * 2015-11-14 2016-04-06 合肥骇虫信息科技有限公司 Visitor management system
CN105574967A (en) * 2015-12-16 2016-05-11 温州大学 Intelligent access control system and operation method thereof
CN105472037A (en) * 2016-01-06 2016-04-06 深圳市呤云科技有限公司 Method and device for opening entrance guard through scanning two-dimension code
CN105741394A (en) * 2016-02-02 2016-07-06 成都优家生活科技有限公司 Intelligent access control system based on mobile phone control
CN105741395A (en) * 2016-02-03 2016-07-06 慧锐通智能科技股份有限公司 Entrance guard access method and system based on two-dimension code and face identification
CN105926486A (en) * 2016-04-15 2016-09-07 广东工业大学 Subway gate device supporting payment by scanning code
CN105913527A (en) * 2016-05-03 2016-08-31 武汉睿和智云科技有限公司 Intelligent visitor two-dimensional code verification system and intelligent visitor two-dimensional code verification method based on community cloud
CN107564137A (en) * 2016-07-02 2018-01-09 济南中安科技有限公司 A kind of barcode scanning building access control system
CN106447834A (en) * 2016-07-05 2017-02-22 福建意昂机电股份公司 Access authentication control system based on mobile phone client
CN106548224A (en) * 2016-10-25 2017-03-29 中冶华天工程技术有限公司 A kind of IC card management system and management method based on Quick Response Code
CN108010160A (en) * 2016-11-02 2018-05-08 天津太卡科技发展有限公司 A kind of intelligent access control system
CN107610283A (en) * 2017-08-21 2018-01-19 东莞市富卡网络科技有限公司 Visitor's data processing method, device, storage medium and server
CN108460875A (en) * 2018-03-20 2018-08-28 深圳市西克智能技术有限公司 A kind of entrance guard authentication method and device based on dynamic two-dimension code
CN108550208A (en) * 2018-04-09 2018-09-18 深圳市靓工创新应用科技有限公司 Method for managing user right, server and the readable medium of intelligent door lock
CN108550208B (en) * 2018-04-09 2021-04-23 深圳市靓工创新应用科技有限公司 User authority management method of intelligent door lock, server and readable medium
CN108447167A (en) * 2018-05-24 2018-08-24 上海亦源智能科技有限公司 One kind can call Guest Pass integrated system and its control method
CN108846928A (en) * 2018-06-26 2018-11-20 北京奇虎科技有限公司 Gate inhibition's verification method and device
CN109712287A (en) * 2018-12-26 2019-05-03 浙江添锦建筑装饰工程有限公司 A kind of intelligent district access control system
CN109941857A (en) * 2019-03-15 2019-06-28 深圳达实软件有限公司 Visitors of elevator management system and management method based on two dimensional code
CN110503762A (en) * 2019-09-19 2019-11-26 南泽(广东)科技股份有限公司 A kind of access control method and the access control system using this method

Similar Documents

Publication Publication Date Title
CN104464045A (en) Two-dimension code-based access control method and two-dimension code-based access control system
CN104517336B (en) Yunmen access control system and its implementation based on mobile internet
CN105303670A (en) Access control management method, device and system
CN105303664A (en) Intelligent access control system based on two dimensional code technology and control method thereof
CN106056707A (en) Residential quarter network access control scheme
CN102037706B (en) Method for the temporary personalization of a communication device
CN106506442A (en) A kind of smart home multi-user identification and its Rights Management System
CN103955975A (en) Cellphone-based dynamic two-dimension code access control system
CN104637131A (en) Authorization method and authorization device for access control system and access control system
CN104751038A (en) Identity authentication method, device and system
CN104299303A (en) Intelligent access control system and implementation method of intelligent access control system
CN110598385B (en) Air conditioner user account sharing authorization method and system
CN106127906A (en) The unlocking method of a kind of door-control lock, Apparatus and system
KR20160050841A (en) System, apparatus and method for managing entrance and exit
CN105446293A (en) Binding method, device and system of intelligent household equipment and intelligent terminal
CN109743532B (en) Doorbell control method, electronic equipment, doorbell system and storage medium
CN102984689A (en) System and method for verifying mobile terminal
CN103297236B (en) Subscriber authentication authoring system
CN104424676A (en) Identity information sending method, identity information sending device, access control card reader and access control system
CN105488875B (en) A kind of gate inhibition's verification method and device
CN107833315A (en) Cell automates access control system
CN105488870A (en) Entrance guard control method, apparatus, terminal and control server
CN103810017A (en) Method and device for sending and receiving command information
CN108171850A (en) Substation safety system and electric power management system
CN104156807B (en) Floating population, rental house and three little Locale information management method and systems

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150325