GSM network-based access control system and access control method

A technology of GSM network and access control system, applied in the field of access control system of wireless data communication mode, can solve the problem of unmanageable access control system, and achieve the effect of convenient management and maintenance, simple operation and convenient operation.

Inactive Publication Date: 2012-03-14
YUNNAN LANGDAO TECH
View PDF16 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented innovation allows people who want to connect wirelessly without having their own device attached at all times while still being able to use it effectively. Its main purpose is that this helps reduce costs associated with installing new devices throughout homes. Additionally, there may exist situations where traditional methods cannot work well due to limited space available within them. Overall, these improvements make accessing controlled systems more accessible through both Wireless Network (GSM)/GPRS networks and speech recognition technologies.

Problems solved by technology

This patented technical solution described in this patents allows for easy installation and replacement of security devices without requiring long connections over large distances. Additionally, existing methods require multiple units installed every floor, making them expensive and difficult to maintain properly.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • GSM network-based access control system and access control method
  • GSM network-based access control system and access control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] Implementation method for registered users (a registered user refers to a user who pre-stores the user's identification data in the core control module.)

[0036] When the user uses the password to open the door, he only needs to input the password in a certain format through the button on the keyboard 42 of the front-end identification module 4, and after the control core module 1 receives the password, compare it with the password set by the user pre-stored in the internal EEPROM And judgment, if consistent, core control module 1 sends the door-opening instruction, and the on-off of control relay 31 is to complete the door-opening action;

[0037] When the user adopts the method of swiping the card to open the door, for example, a 125K ID card is used. After the user swipes the card, the card reader 41 of the front-end identification module 4 reads the card number information, and the control core module 1 receives the ID card number. If the card number set by the user i

Embodiment 2

[0042] Implementation method for non-registered users (non-registered users refer to users who have not pre-stored user identification data in the core control module, such as visitors.)

[0043] When the visitor needs to enter and operate the button on the keyboard 42 of the front-end identification module 4 (for example, the room number), the control core module 1 sends the key information to the user's fixed phone or mobile phone through the GSM embedding module 2. It can be a landline phone call, a mobile phone call, or a mobile phone text message to inform the user (proprietor) that "there is a visitor". The user (proprietor) who receives this information can operate the landline phone button or mobile phone button in the call state, or Voice (acquisition of voice with microphone 7) or mobile phone text messages send the "door open" command to the control core module 1 through the GSM embedded module 2, and then the control core module 1 controls the electric lock execution m

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a GSM network-based access control system, which comprises: an AVR single-chip microcomputer and a GSM embedded module. Specifically, the AVR single-chip microcomputer is a core control chip of the system, and the GSM embedded module is responsible for the GSM communication of the whole system. The AVR single-chip microcomputer is in connection with the GSM embedded module through a serial port, by which control command transmission and data receiving between the AVR single-chip microcomputer and the GSM embedded module can be conducted. The GSM embedded module collects information about a fixed-line telephone incoming call, a mobile phone incoming call or a short message of a user. By combining the wireless GSM network communication technology and voice/image processing technology, the access control system puts forward a wireless access control system based on a GSM, solves the existing access control system line problem, and substitutes the content of an original indoor unit and line. And only a mobile phone or fixed-line telephone is needed in each household, and this can be satisfied in each common family. Therefore, the installation cost is substantially reduced already. The invention also relates to an access control method.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner YUNNAN LANGDAO TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products