Application design of the time-based access control system

Kefeng Li, Luhua Cao, D. Xu, Zichun Chen
{"title":"Application design of the time-based access control system","authors":"Kefeng Li, Luhua Cao, D. Xu, Zichun Chen","doi":"10.1117/12.2667526","DOIUrl":null,"url":null,"abstract":"This paper introduces a design and implementation method of an access control management system based on remote control, which consists of the identity collection device and the database server access controller and realizes access control through remote reading and background data identification. When the target person wants to open the door, the door lock control device sends the acquired personnel data to the database server. The database server compares the data with the time information stored in the database in advance by the person, and quickly determines whether the door needs to be opened. If required, the access controller sends a signal to the electric control lock to open the door and the person can enter the house. Otherwise, the person cannot enter the house. This design integrates the human-computer interaction technology, data transmission technology, and communication technology to implement automatic management of intelligent devices through remote time control. Therefore, this design can efficiently identify and authenticate personal identity. In addition, this design features high reliability, low cost, small volume, complete functionality, and strong scalability on information collection. The time-based access control system fully realizes the automatic management of personnel who attempt to pass the access control system based on the identity information of the personnel stored on the database server and the time node to be reserved and by using the computer as the background processing tool.","PeriodicalId":128051,"journal":{"name":"Third International Seminar on Artificial Intelligence, Networking, and Information Technology","volume":"76 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Third International Seminar on Artificial Intelligence, Networking, and Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.2667526","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This paper introduces a design and implementation method of an access control management system based on remote control, which consists of the identity collection device and the database server access controller and realizes access control through remote reading and background data identification. When the target person wants to open the door, the door lock control device sends the acquired personnel data to the database server. The database server compares the data with the time information stored in the database in advance by the person, and quickly determines whether the door needs to be opened. If required, the access controller sends a signal to the electric control lock to open the door and the person can enter the house. Otherwise, the person cannot enter the house. This design integrates the human-computer interaction technology, data transmission technology, and communication technology to implement automatic management of intelligent devices through remote time control. Therefore, this design can efficiently identify and authenticate personal identity. In addition, this design features high reliability, low cost, small volume, complete functionality, and strong scalability on information collection. The time-based access control system fully realizes the automatic management of personnel who attempt to pass the access control system based on the identity information of the personnel stored on the database server and the time node to be reserved and by using the computer as the background processing tool.
基于时间的门禁系统的应用设计
本文介绍了一种基于远程控制的门禁管理系统的设计与实现方法,该系统由身份采集装置和数据库服务器访问控制器组成,通过远程读取和后台数据识别实现门禁。当目标人想要开门时,门锁控制装置将采集到的人员数据发送到数据库服务器。数据库服务器将数据与人事先存储在数据库中的时间信息进行比对,快速判断是否需要开门。如果需要,门禁控制器发送一个信号到电控锁打开门,人可以进入房子。否则,这个人不能进入房子。本设计结合人机交互技术、数据传输技术、通信技术,通过远程时间控制实现对智能设备的自动管理。因此,本设计可以有效地识别和认证个人身份。此外,本设计在信息采集方面具有可靠性高、成本低、体积小、功能齐全、可扩展性强等特点。基于时间的门禁系统基于存储在数据库服务器上的人员身份信息和待保留的时间节点,以计算机作为后台处理工具,充分实现了对试图通过门禁系统的人员的自动管理。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信