The present invention is generally related to access control systems, and more particular to an access control system for a residential community.
Various access control systems have long been adopted in residential communities. The ID cards or security cards recognize only the cards, not the card holders. Voice intercoms provide only limited identifiability. Video intercoms require large bandwidth and high maintenance. Moreover, there lacks a common communication standard among the various products. Once a product is defective or phased out, it is difficult to find a replacement. This is why the access control systems for many communities are often out of order, the access control is slack, and criminal activities shift from street corners into communities.
Conventional analog or digital intercoms require cable layout to connect the door units with the indoor units. These cables often run across public areas. There are often disputes about who should be responsible for the maintenance, the residents or the home association of the community.
To obviate the above shortcomings, the present invention teaches a cloud-based access control system, which includes a mobile application program and a door unit. The mobile application program has a first identification code, and includes a scanning sub-program and a receiving sub-program. The door unit includes a camera unit and a two-dimensional code generation unit for capturing a first image and producing a two-dimensional code, where a second identification code is encoded in the two-dimensional code. The first image and the second identification code are transmitted to a cloud server. On the other hand, the second identification code may be obtained by the scanning sub-program through scanning the two-dimensional code. The first and second identification codes are transmitted by the mobile application program to a pairing unit of the cloud server for matching and authentication. When the first and second identification codes match, the cloud server sends the first image and the second identification code to the receiving sub-program for visual confirmation and an electronic lock may be unlocked if the first image shows no stranger.
The foregoing objectives and summary provide only a brief introduction to the present invention. To fully appreciate these and other objects of the present invention as well as the invention itself, all of which will become apparent to those skilled in the art, the following detailed description of the invention and the claims should be read in conjunction with the accompanying drawings. Throughout the specification and drawings identical reference numerals refer to identical or similar parts.
Many other advantages and features of the present invention will become manifest to those versed in the art upon making reference to the detailed description and the accompanying sheets of drawings in which a preferred structural embodiment incorporating the principles of the present invention is shown by way of illustrative example.
The following descriptions are exemplary embodiments only, and are not intended to limit the scope, applicability or configuration of the invention in any way. Rather, the following description provides a convenient illustration for implementing exemplary embodiments of the invention. Various changes to the described embodiments may be made in the function and arrangement of the elements described without departing from the scope of the invention as set forth in the appended claims.
As shown in
As shown in
As shown in
A mobile application program 31 is installed in the mobile communication device 30, and is data-linked with the cloud server 10. The first identification code 11 is stored in the mobile application program 31. The mobile application program 31 also provides a scanning sub-program 311 and a receiving sub-program 312. The receiving sub-program 312 provides an unlock button 3121.
The touch display 22 is in a stand-by mode or an advertisement mode when it is not activated. The touch display 22 is activated when the touch display 22 is touched by a resident holding the mobile communication device 30. Then, the camera unit 23 is engaged to capture at least a first image 232. The two-dimensional code generation unit 222 is also engaged to produce a two-dimensional code 2221 where the second identification code 221 is encoded. The door unit 20 then transmits the first image 232 and the second identification code 221 to the pairing unit 12.
When the two-dimensional code 2221 is produced, it may be scanned by the scanning sub-program 311 to extract the second identification code 221. The first and second identification codes 11 and 221 are both transmitted to the pairing unit 12 by the mobile application program 31. If the first and second identification codes 11 and 221 are matched and authenticated, the cloud server 10 transmits the first image 232 and the second identification code 221 to the receiving sub-program 312. The resident then confirms the first image 232 and clicks the unlock button 3121 to unlock the electronic lock 21.
As shown in
The caller button 223 is linked with the camera unit 23. When the caller button 223 is engaged, the camera unit 23 captures a second image 233, which is delivered to the receiving sub-program 312 through the cloud server 10. The resident as such may examine the second image 233. If the second image 233 shows that the caller button 223 is engaged by a known visitor, the resident may engage the unlock button 3121 to unlock the electronic lock 21.
In other words, the MQTT server 40 is for notifying a resident that a visitor is at the door unit 20. Then, regardless whether the resident is at home, the resident may be notified by receiving the second signal 41 from the MQTT server 40 by the mobile application program 31. The MQTT server 40 relies on the second identification code 221 to obtain a corresponding first identification code 11 from the cloud server 10, and then notifies the mobile application program 31 with the first identification code 11.
When there is a visitor calling on a resident (or a resident forgets to bring his/her mobile communication device 30), the caller button of the door unit 20 is operated to notify the resident (or other people of the same household). After verifying the second image 233, the electronic lock 21 is unlocked to allow entrance. If a stranger is shown on the second image, the resident may choose not to unlock the electronic lock 233.
As shown in
The above scenario happens when a visitor calls on a resident by himself/herself. For example, the visitor informs the resident that he/she is already at the door unit 20 by telephone or through network. The resident uses the mobile application program 31 to link with the door unit 20 with the corresponding second identification code 221 to active the camera unit 23. In the meantime, the mobile application program 31 transmits the first identification code 11 to the cloud server 10. On the other hand, the third image 234 captured by the camera unit 23 is delivered to the receiving sub-program 312 of the mobile application program 31 through the cloud server 10 so that the resident may examiner the third image 234 and selectively unlock the electronic lock 21.
As shown in
The mobile communication device 30 and the door unit 20 further include a first near-filed communication (NFC) unit 32 and a second NFC unit 24, respectively. The first and second NFC units 32 and 24 have the first and second identification codes, respectively. When the mobile communication device 30 and the door unit 20 are at close proximity, the first and second NFC units 32 and 24 sense each other so that the camera unit 23 is activated to capture a fourth image 235. The fourth image 235 is delivered to the mobile application program 31 through the cloud server so that the resident may inspect the fourth image 235 and unlock the electronic lock 21 selectively.
In this embodiment, the mobile application program 31 may be implemented as a plug-in sub-program 61 to a social media application program 60. Therefore, a resident may operate the door unit 20 to unlock conveniently from within the social media application program 60.
For example, the social media application program 60 may be the WeChat application program widely popular in China, and the plug-in sub-program 61 is a plug-in component supported by WeChat to add additional feature to the existing WeChat functionality. Therefore, the resident may select and execute the plug-in sub-program 61, which is the mobile application program 31, directly from WeChat, which is a convenient option to the resident.
While certain novel features of this invention have been shown and described and are pointed out in the annexed claim, it is not intended to be limited to the details above, since it will be understood that various omissions, modifications, substitutions and changes in the forms and details of the device illustrated and in its operation can be made by those skilled in the art without departing in any way from the claims of the present invention.
Number | Name | Date | Kind |
---|---|---|---|
20140240087 | Liu | Aug 2014 | A1 |
20160328896 | Zheng | Nov 2016 | A1 |
20170193723 | Park | Jul 2017 | A1 |
20190088059 | Santhosh | Mar 2019 | A1 |