{"title":"Application design of the time-based access control system","authors":"Kefeng Li, Luhua Cao, D. Xu, Zichun Chen","doi":"10.1117/12.2667526","DOIUrl":null,"url":null,"abstract":"This paper introduces a design and implementation method of an access control management system based on remote control, which consists of the identity collection device and the database server access controller and realizes access control through remote reading and background data identification. When the target person wants to open the door, the door lock control device sends the acquired personnel data to the database server. The database server compares the data with the time information stored in the database in advance by the person, and quickly determines whether the door needs to be opened. If required, the access controller sends a signal to the electric control lock to open the door and the person can enter the house. Otherwise, the person cannot enter the house. This design integrates the human-computer interaction technology, data transmission technology, and communication technology to implement automatic management of intelligent devices through remote time control. Therefore, this design can efficiently identify and authenticate personal identity. In addition, this design features high reliability, low cost, small volume, complete functionality, and strong scalability on information collection. The time-based access control system fully realizes the automatic management of personnel who attempt to pass the access control system based on the identity information of the personnel stored on the database server and the time node to be reserved and by using the computer as the background processing tool.","PeriodicalId":128051,"journal":{"name":"Third International Seminar on Artificial Intelligence, Networking, and Information Technology","volume":"76 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Third International Seminar on Artificial Intelligence, Networking, and Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.2667526","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper introduces a design and implementation method of an access control management system based on remote control, which consists of the identity collection device and the database server access controller and realizes access control through remote reading and background data identification. When the target person wants to open the door, the door lock control device sends the acquired personnel data to the database server. The database server compares the data with the time information stored in the database in advance by the person, and quickly determines whether the door needs to be opened. If required, the access controller sends a signal to the electric control lock to open the door and the person can enter the house. Otherwise, the person cannot enter the house. This design integrates the human-computer interaction technology, data transmission technology, and communication technology to implement automatic management of intelligent devices through remote time control. Therefore, this design can efficiently identify and authenticate personal identity. In addition, this design features high reliability, low cost, small volume, complete functionality, and strong scalability on information collection. The time-based access control system fully realizes the automatic management of personnel who attempt to pass the access control system based on the identity information of the personnel stored on the database server and the time node to be reserved and by using the computer as the background processing tool.