CN118397740B - An access control system using RFID technology combined with IoT door locks - Google Patents
An access control system using RFID technology combined with IoT door locks Download PDFInfo
- Publication number
- CN118397740B CN118397740B CN202410435575.XA CN202410435575A CN118397740B CN 118397740 B CN118397740 B CN 118397740B CN 202410435575 A CN202410435575 A CN 202410435575A CN 118397740 B CN118397740 B CN 118397740B
- Authority
- CN
- China
- Prior art keywords
- lock
- access control
- internet
- things
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000005516 engineering process Methods 0.000 title claims abstract description 30
- 238000012544 monitoring process Methods 0.000 claims description 53
- 230000004044 response Effects 0.000 claims description 17
- 230000008859 change Effects 0.000 claims description 5
- 238000012937 correction Methods 0.000 claims description 5
- 230000002159 abnormal effect Effects 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 claims description 3
- 230000001052 transient effect Effects 0.000 claims description 3
- 238000012423 maintenance Methods 0.000 abstract description 7
- 238000013523 data management Methods 0.000 abstract description 6
- 238000007726 management method Methods 0.000 description 14
- 238000013475 authorization Methods 0.000 description 8
- 230000009286 beneficial effect Effects 0.000 description 5
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000000034 method Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 241001391944 Commicarpus scandens Species 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000013499 data model Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000004043 responsiveness Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Alarm Systems (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses an access control system adopting an RFID technology and combining with an internet of things door lock, which comprises: the RFID access control reader is used for reading the signal of the RFID tag and transmitting the signal to the Internet of things lock when the distance between the access control card loaded with the RFID chip and the access control card is within a preset range; the internet of things lock is used for acquiring signals of the RFID tag and carrying out identity recognition, and when the identity of a user is determined, a lock cylinder on the door body is opened. The safety, the use experience and the maintenance cost saving of the access control system are improved, and the convenience of data management is improved.
Description
Technical Field
The invention relates to the technical field of access control systems, in particular to an access control system adopting an RFID technology and combining with an Internet of things door lock.
Background
Currently, the following access control systems exist in the market: magnetic card access control system: the magnetic card access control system is a common access control system, and identity verification and access control switch control are realized mainly by reading information on a magnetic stripe card. IC card access control system: an IC card access control system is an access control system that performs authentication and access control by reading information on an IC card (wafer card). The security is higher, but the card making and management costs are higher. NFC access control system: the NFC access control system is an access control system which uses radio frequency identification technology to perform identity verification and access control by reading information stored on an NFC chip. Face recognition access control system: the face recognition access control system collects and analyzes face images of a doorway by using a computer vision technology, and performs identity authentication and access control. The safety is high, but the equipment cost is high. Fingerprint identification access control system: the fingerprint identification access control system is an access control system for performing identity authentication and access control switch control by collecting fingerprint information of a user. The security is high, but use experience is not as good as face recognition access control system.
The existing access control system has the following problems: 1. safety problem: the traditional entrance guard system adopts traditional identity recognition technologies such as card swiping and face swiping, the identity authentication can be stolen or used, and the entrance guard system is easy to break. The maintenance cost is high: the maintenance cost of the traditional access control system is high, equipment such as an access control terminal, a card reader, an access control controller and the like need to be replaced frequently, and special persons need to check and maintain regularly. The use experience is poor: the traditional access control system is required to be equipped with special access control cards, card readers and other devices, and the situation that the access control cards are lost, damaged and the like is quite common. In addition, the traditional access control system needs to be close to a card reader, remote access control cannot be realized, and the application of large-scale activity occasions is inconvenient. The failure rate is high: the components such as a switch commonly used in the traditional access control system are easy to wear and interfere, the failure rate is high, and frequent maintenance is needed to ensure the normal operation of the system. Data management problem: the traditional access control system has the problems of data management, manual input of data recording, drop-out, error recording and the like, and has limitations on the aspects of data precision, real-time performance and the like.
Disclosure of Invention
The present invention aims to solve, at least to some extent, one of the technical problems in the above-described technology. Therefore, the invention aims to provide an access control system adopting an RFID technology and combining with an Internet of things door lock, which improves the safety, the use experience, the maintenance cost saving and the convenience of data management of the access control system.
To achieve the above objective, an embodiment of the present invention provides an access control system using an RFID technology in combination with an internet of things door lock, including:
The RFID access control reader is used for reading the signal of the RFID tag and transmitting the signal to the Internet of things lock when the distance between the access control card loaded with the RFID chip and the access control card is within a preset range;
The internet of things lock is used for acquiring signals of the RFID tag and carrying out identity recognition, and when the identity of a user is determined, a lock cylinder on the door body is opened.
According to some embodiments of the invention, the internet of things lock is connected with the background server and is used for receiving a remote unlocking instruction sent by the background server, and executing the remote unlocking instruction to open a lock cylinder on the door body.
According to some embodiments of the invention, the background server comprises:
The granting module is used for granting permission to the access control card management loaded with the RFID chip;
The acquisition module is used for acquiring the state information of the Internet of things lock;
and the updating module is used for updating and upgrading the program prestored in the lock of the Internet of things.
According to some embodiments of the invention, the system further comprises a storage module for storing the access control record.
According to some embodiments of the invention, the RFID tag in the access card loaded with the RFID chip is digitally encrypted.
According to some embodiments of the invention, further comprising: and the transmission module is used for uploading the access control record to the background server for backup.
According to some embodiments of the invention, further comprising: the monitoring module is used for:
Monitoring when the Internet of things lock executes a remote unlocking instruction, acquiring monitoring information, and determining the response frequency of the Internet of things lock according to the monitoring information;
Wherein, The response frequency of the lock is the response frequency of the lock of the Internet of things; arccos is the inverse trigonometric function cosine value; i is current information in the monitoring information; r1 is the ultra-transient reactance of the Internet of things lock in the monitoring information; e is the voltage in the monitoring information; θ is the voltage phase angle in the monitoring information; k1 is a monitoring period, which is 3s; τ is a preset leakage inductance, τ=0.3;
Determining the working current of the Internet of things lock according to the response frequency of the Internet of things lock;
wherein I1 is the working current of the Internet of things lock; r2 is transient reactance of an Internet of things lock for monitoring information; r3 is the steady-state reactance of the Internet of things lock for monitoring information;
judging the execution state of the Internet of things lock according to the working current of the Internet of things lock;
wherein L is a working state judgment coefficient of the lock of the Internet of things; pw is the rated power of the Internet of things lock; lambda is the power coefficient; when L is smaller than 0.5, indicating that the Internet of things lock has executed the remote unlocking instruction, and opening a lock cylinder on the door body; when L is more than or equal to 0.5, the remote unlocking instruction is not executed yet, and the lock cylinder on the door body is not opened.
According to some embodiments of the invention, further comprising: an alarm module for:
acquiring monitoring data of each module, and associating the monitoring data of each module in the time window according to architecture layer information corresponding to the monitoring data of each module in the time window to obtain a plurality of association links;
Extracting entity information, entity attribute information and entity relation information from each associated link based on a predefined Schema;
Generating a knowledge graph node based on the format of the entity-relation-entity triplet according to the entity information and the entity relation information; establishing association between entity attribute information and an entity corresponding to the entity attribute information in the knowledge graph nodes, and associating the entity information of a plurality of knowledge graph nodes to obtain a knowledge graph corresponding to each association link;
dividing the knowledge patterns corresponding to each associated link together, and de-duplicating the data with the same basic information to obtain a corrected knowledge pattern corresponding to each associated link;
Sorting the corrected knowledge maps corresponding to each associated link according to TTL values from large to small;
taking the associated links corresponding to the first-ranked corrected knowledge patterns as target associated links; taking the rest associated links as bypass links;
creating a unidirectional weighted directed graph, and respectively assigning values to the target associated link and the bypass link to obtain a target weighted directed graph;
determining a system safety operation coefficient according to the target weighted directed graph, and comparing the system safety operation coefficient with a preset threshold value; and when the safe operation coefficient of the system is smaller than the preset threshold value, sending out an alarm prompt.
According to some embodiments of the invention, determining a system safe operating coefficient from a target weighted directed graph includes:
K=SY×D/g
Wherein K is a system safety operation coefficient; s is a preset correction parameter, S epsilon (0, 1); y is system dynamic change data determined based on the target weighted directed graph; d is a system safety response index determined based on the target weighted directed graph; g is a preset safe operation level of the system.
According to some embodiments of the invention, further comprising: the network monitoring module is used for monitoring the network state between the Internet of things lock and the background server, and generating prompt information when the network state is abnormal.
The invention discloses an access control system adopting an RFID technology and combining with an Internet of things door lock, which improves the safety, the use experience, the maintenance cost saving and the convenience of data management of the access control system.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention may be realized and attained by the structure particularly pointed out in the written description and drawings.
The technical scheme of the invention is further described in detail through the drawings and the embodiments.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate the invention and together with the embodiments of the invention, serve to explain the invention. In the drawings:
FIG. 1 is a block diagram of an access control system incorporating an Internet of things door lock using RFID technology in accordance with one embodiment of the present invention;
FIG. 2 is a block diagram of an access control system incorporating an Internet of things door lock using RFID technology in accordance with yet another embodiment of the present invention;
fig. 3 is a block diagram of an access control system incorporating an internet of things door lock using RFID technology according to yet another embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described below with reference to the accompanying drawings, it being understood that the preferred embodiments described herein are for illustration and explanation of the present invention only, and are not intended to limit the present invention.
As shown in fig. 1, an embodiment of the present invention provides an access control system using an RFID technology in combination with an internet of things door lock, including:
The RFID access control reader is used for reading the signal of the RFID tag and transmitting the signal to the Internet of things lock when the distance between the access control card loaded with the RFID chip and the access control card is within a preset range;
The internet of things lock is used for acquiring signals of the RFID tag and carrying out identity recognition, and when the identity of a user is determined, a lock cylinder on the door body is opened.
The technical scheme has the working principle and beneficial effects that: RFID technology: an access card or a staff card employing an RFID chip, the tag is capable of receiving and transmitting wireless signals. RFID entrance guard reader: the RFID access reader is equipment arranged at the door edge, and can read signals of the RFID tag and transmit the signals to the internet of things lock. Internet of things lock: the internet of things lock is a device for connecting the lock core of the door body with the access control device through wireless protocols such as Wi-F i or Bluetooth, and has high unlocking safety, attractive appearance and easy manageability. The internet of things lock is used for acquiring signals of the RFID tag and carrying out identity recognition, and when the identity of a user is determined, a lock cylinder on the door body is opened. The security, the use experience, the maintenance cost saving and the convenience of data management of the access control system are improved conveniently.
According to some embodiments of the invention, the internet of things lock is connected with the background server and is used for receiving a remote unlocking instruction sent by the background server, and executing the remote unlocking instruction to open a lock cylinder on the door body.
According to some embodiments of the invention, the background server comprises:
The granting module is used for granting permission to the access control card management loaded with the RFID chip;
The acquisition module is used for acquiring the state information of the Internet of things lock;
and the updating module is used for updating and upgrading the program prestored in the lock of the Internet of things.
In an implementation, the background server further comprises a network server, a security system, an application server and the like, and is mainly responsible for managing and monitoring the access control RFID reader-writer and the Internet of things lock, so that operations such as remote management and permission modification are realized.
According to some embodiments of the invention, the system further comprises a storage module for storing the access control record. Typically, the storage is performed using a database, cloud storage, or the like.
The RFID access control system combines the RFID technology with the Internet of things lock, the principle of the RFID access control system is that the Internet of things lock is installed on a door, and registered access tokens are displayed through a wireless network and a reader-writer. When the authorized card is read and verified, the internet of things lock is commanded to be opened to access the authorized room.
The access control system has three unlocking modes.
Mode one: an access control card or a staff card adopting an RFID chip is adopted. The background can control the formulated access control card and employee card to unlock.
Mode two: the mobile phone app or the background system is adopted for remote unlocking, the mode realizes remote unlocking, and staff without authority is remotely unlocked.
Mode three: the mechanical key is used for unlocking, and under the condition of power failure, the normal unlocking of the gate can be ensured.
The access control system is more excellent in safety, convenience, maintainability and flexibility, can realize multi-person authorization management, can realize remote control, and can control access control at any time and place.
According to some embodiments of the invention, the RFID tag in the access card loaded with the RFID chip is digitally encrypted.
According to some embodiments of the invention, further comprising: and the transmission module is used for uploading the access control record to the background server for backup.
Based on the adoption of RFID technology and the door access control system of the door lock of the internet of things, accurate identity recognition can be realized: the access control system utilizes the RFID technology to identify, can accurately identify the authorization token information, and avoids the situation that the identity is falsely used. Convenient access control management: the RFID access control system integrates application program management software, and an administrator can perform intelligent access control management on a mobile phone, including unlocking, authorization, log recording and the like. Flexible rights management: the system administrator can set different authorization levels according to the requirements and allocate different authorities. Only authorized users can enter a particular area. Remote access authorization management: an administrator easily registers tokens or modification and authorization rights for visitors at a remote control center, thereby eliminating the need for on-site authorization. Unified access control management: and a system administrator can intensively manage all access control readers and Internet of things locks through a background system, so that unified RFID access control management and monitoring are realized, and the efficiency is improved. And (3) safety management: the entrance guard system adopts an encryption RFID tag and a high-safety Internet of things lock, so that entrance guard safety is guaranteed, and entrance cracking and information leakage are prevented. Data recording and analysis: the RFID access control system records all unlocking events, and uploads the events to the database for backup, so that an administrator can query and analyze the data at any time to know the service condition. In general, the RFID technology is combined with the access control system of the internet of things lock to realize intelligent management in the aspects of identity authentication automation, access control authorization management automation, access control recording and analysis automation and the like, so that the safety, the efficiency and the convenience are improved.
As shown in fig. 2, according to some embodiments of the invention, further comprising: the monitoring module is used for:
Monitoring when the Internet of things lock executes a remote unlocking instruction, acquiring monitoring information, and determining the response frequency of the Internet of things lock according to the monitoring information;
Wherein, The response frequency of the lock is the response frequency of the lock of the Internet of things; arccos is the inverse trigonometric function cosine value; i is current information in the monitoring information; r1 is the ultra-transient reactance of the Internet of things lock in the monitoring information; e is the voltage in the monitoring information; θ is the voltage phase angle in the monitoring information; k1 is a monitoring period, which is 3s; τ is a preset leakage inductance, τ=0.3;
Determining the working current of the Internet of things lock according to the response frequency of the Internet of things lock;
wherein I1 is the working current of the Internet of things lock; r2 is transient reactance of an Internet of things lock for monitoring information; r3 is the steady-state reactance of the Internet of things lock for monitoring information;
judging the execution state of the Internet of things lock according to the working current of the Internet of things lock;
wherein L is a working state judgment coefficient of the lock of the Internet of things; pw is the rated power of the Internet of things lock; lambda is the power coefficient; when L is smaller than 0.5, indicating that the Internet of things lock has executed the remote unlocking instruction, and opening a lock cylinder on the door body; when L is more than or equal to 0.5, the remote unlocking instruction is not executed yet, and the lock cylinder on the door body is not opened.
The technical scheme has the working principle and beneficial effects that: the response frequency of the remote unlocking instruction of the Internet of things lock is accurately determined based on the monitoring information, so that the working current of the Internet of things lock is accurately calculated, and the execution state of the Internet of things lock is judged according to the working current of the Internet of things lock; when L is smaller than 0.5, indicating that the Internet of things lock has executed the remote unlocking instruction, and opening a lock cylinder on the door body; when L is more than or equal to 0.5, the remote unlocking instruction is not executed yet, and the lock cylinder on the door body is not opened. The execution state of the remote unlocking instruction of the lock of the Internet of things is accurately obtained, recording is convenient, and feedback is timely carried out to a background server.
As shown in fig. 3, according to some embodiments of the invention, further comprising: an alarm module for:
acquiring monitoring data of each module, and associating the monitoring data of each module in the time window according to architecture layer information corresponding to the monitoring data of each module in the time window to obtain a plurality of association links;
Extracting entity information, entity attribute information and entity relation information from each associated link based on a predefined Schema;
Generating a knowledge graph node based on the format of the entity-relation-entity triplet according to the entity information and the entity relation information; establishing association between entity attribute information and an entity corresponding to the entity attribute information in the knowledge graph nodes, and associating the entity information of a plurality of knowledge graph nodes to obtain a knowledge graph corresponding to each association link;
dividing the knowledge patterns corresponding to each associated link together, and de-duplicating the data with the same basic information to obtain a corrected knowledge pattern corresponding to each associated link;
Sorting the corrected knowledge maps corresponding to each associated link according to TTL values from large to small;
taking the associated links corresponding to the first-ranked corrected knowledge patterns as target associated links; taking the rest associated links as bypass links;
creating a unidirectional weighted directed graph, and respectively assigning values to the target associated link and the bypass link to obtain a target weighted directed graph;
determining a system safety operation coefficient according to the target weighted directed graph, and comparing the system safety operation coefficient with a preset threshold value; and when the safe operation coefficient of the system is smaller than the preset threshold value, sending out an alarm prompt.
The technical scheme has the working principle and beneficial effects that: each module comprises an RFID access control reader-writer, an Internet of things lock and other modules. The monitoring data includes operational data, status data, and the like. The architecture layer information is a corresponding logical layer. Correlating the monitoring data of each module in the time window to obtain a plurality of correlation links; representing determining the dynamically coordinated signal flow paths of the various modules upon completion of an instruction task. Schema is a structural description of a database that defines the layout and structure of objects such as data tables, views, indexes, and the like. The method comprises information such as table names, field names, data types, constraints and the like, and is an important concept for organizing and managing data in a database. Extracting entity information, entity attribute information and entity relation information from each associated link based on a predefined Schema; generating a knowledge graph node based on the format of the entity-relation-entity triplet according to the entity information and the entity relation information; establishing association between entity attribute information and an entity corresponding to the entity attribute information in the knowledge graph nodes, and associating the entity information of a plurality of knowledge graph nodes to obtain a knowledge graph corresponding to each association link; and finishing all data on each associated link to generate a corresponding data model. Dividing the knowledge patterns corresponding to each associated link together, and de-duplicating the data with the same basic information to obtain a corrected knowledge pattern corresponding to each associated link; And redundant data can be conveniently removed, and the data processing amount is reduced. The TTL value is the time that a given packet survives in the network. As a packet travels through the network, its TTL value is decremented each time it passes a router or network node. When the TTL value drops to 0, the packet will be dropped and a "Time Exceeded" message will be sent to the packet source. The method is convenient for realizing the sorting processing of the associated links, and determines the associated link corresponding to the corrected knowledge graph with the first sorting as the target associated link; the rest of the associated links are taken as bypass links. Creating a unidirectional weighted directed graph, respectively assigning values to a target associated link and a bypass link to obtain the target weighted directed graph, determining nodes and edges of the graph, determining the weight of each edge, and using the information to create the target weighted directed graph through a Python language and networkx library. By way of example, install networkx library, create weighted directed graph using networkx, assign values for target association link and bypass link respectively, create directed graph, add nodes A ',' B ',' C ',' D ',' E, add edges and weights, assume (A, B) is target association link, (A, C) is bypass link, A-B is 5, A-C is 3, B-D is 4, C-D is 1, D-E is 2. When assigning, the weight of the link closer to the target is greater than the weight of the link farther from the target. The target weighted directed graph is convenient to accurately determine, the safe operation coefficient of the system is determined according to the target weighted directed graph, and the safe operation coefficient is compared with a preset threshold; and when the safe operation coefficient of the system is smaller than the preset threshold value, sending out an alarm prompt. Whether the equipment operation of an access control system adopting the RFID technology and the door lock of the internet of things is abnormal or not is conveniently monitored, and the safety is improved.
According to some embodiments of the invention, determining a system safe operating coefficient from a target weighted directed graph includes:
K=SY×D/g
Wherein K is a system safety operation coefficient; s is a preset correction parameter, S epsilon (0, 1); y is system dynamic change data determined based on the target weighted directed graph; d is a system safety response index determined based on the target weighted directed graph; g is a preset safe operation level of the system.
The technical scheme has the working principle and beneficial effects that: the preset correction parameters are related to the running time of the system, and the longer the running time is, the smaller the preset correction parameters are. The system dynamic change data is determined based on the change direction of each line in the target weighted directed graph. The system safety response index is determined based on the number of lines included in the target weighted directed graph, and the system safety response index is larger as the number of lines is smaller. The preset system security operation level indicates that several system security operation levels are preset in total. Based on the algorithm, the system safety operation coefficient is conveniently and accurately calculated, the accuracy of judging the system safety operation coefficient and the preset threshold value is improved, and the alarm accuracy is further improved.
According to some embodiments of the invention, further comprising: the network monitoring module is used for monitoring the network state between the Internet of things lock and the background server, and generating prompt information when the network state is abnormal.
The beneficial effects of the technical scheme are that: the network state can be adjusted in time conveniently, and the responsiveness of remote control based on the background server is improved.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.
Claims (9)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410435575.XA CN118397740B (en) | 2024-04-11 | 2024-04-11 | An access control system using RFID technology combined with IoT door locks |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410435575.XA CN118397740B (en) | 2024-04-11 | 2024-04-11 | An access control system using RFID technology combined with IoT door locks |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN118397740A CN118397740A (en) | 2024-07-26 |
| CN118397740B true CN118397740B (en) | 2024-11-22 |
Family
ID=91990682
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202410435575.XA Active CN118397740B (en) | 2024-04-11 | 2024-04-11 | An access control system using RFID technology combined with IoT door locks |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN118397740B (en) |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111554020A (en) * | 2020-06-15 | 2020-08-18 | 安徽理工大学 | IoT access control system based on RFID and biometrics |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114726634B (en) * | 2022-04-14 | 2023-07-25 | 北京金睛云华科技有限公司 | Knowledge graph-based hacking scene construction method and device |
| CN117091676A (en) * | 2023-08-18 | 2023-11-21 | 合肥工业大学 | Electromagnetic flowmeter frequency tracking method based on phase feedback |
| CN117668826A (en) * | 2023-10-19 | 2024-03-08 | 中孚安全技术有限公司 | Event association analysis method and system based on graph model |
-
2024
- 2024-04-11 CN CN202410435575.XA patent/CN118397740B/en active Active
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111554020A (en) * | 2020-06-15 | 2020-08-18 | 安徽理工大学 | IoT access control system based on RFID and biometrics |
Also Published As
| Publication number | Publication date |
|---|---|
| CN118397740A (en) | 2024-07-26 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7730126B2 (en) | Systems and methods for controlling access within a system of networked and non-networked processor-based systems | |
| US8590013B2 (en) | Method of managing and communicating data pertaining to software applications for processor-based devices comprising wireless communication circuitry | |
| US20210019971A1 (en) | Offline storage system and method of use | |
| US10891816B2 (en) | Spatio-temporal topology learning for detection of suspicious access behavior | |
| US20080290988A1 (en) | Systems and methods for controlling access within a system of networked and non-networked processor-based systems | |
| US20120098638A1 (en) | Systems and methods of operating a secured facility | |
| Chandra et al. | Challenges and constraints to the diffusion of biometrics in information systems | |
| US20070219950A1 (en) | Systems and methods for controlling access within a system of networked and non-networked processor-based systems | |
| US11373472B2 (en) | Compact encoding of static permissions for real-time access control | |
| US20070061272A1 (en) | Access administration system and method for a currency compartment | |
| CN104240014A (en) | Door access control method and door access control platform | |
| CN110148264A (en) | A kind of management method and equipment of locker | |
| CN111310151A (en) | Distributed permission set-based permission management method, device and storage medium | |
| CN119337354A (en) | A method for secure management of BIM data in engineering construction | |
| KR102480285B1 (en) | Access controlling system based on fido | |
| CN118397740B (en) | An access control system using RFID technology combined with IoT door locks | |
| CN118567244A (en) | Intelligent control system for museums | |
| US11410478B2 (en) | Visualization and management of access levels for access control based al hierarchy | |
| US20120068814A1 (en) | Systems and methods of operating a secured facility | |
| CN118395403A (en) | Control method of personnel authority in power generation enterprise | |
| US20070157290A1 (en) | Systems and methods of communicating access log information within a system of networked and non-networked processor-based systems | |
| CN114373241A (en) | Point location card punching system and method | |
| CN107742140B (en) | Intelligent identity information identification method based on RFID technology | |
| Essien | Enhancing Role-Based Access Control with Embedded Facial Recognition RBAC-EFR System | |
| CN110191122A (en) | A kind of parking lot management platform and its right management method and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |