Movatterモバイル変換


[0]ホーム

URL:


CN113810157A - Access control data transmission processing method and system based on RS485 protocol - Google Patents

Access control data transmission processing method and system based on RS485 protocol
Download PDF

Info

Publication number
CN113810157A
CN113810157ACN202111067773.8ACN202111067773ACN113810157ACN 113810157 ACN113810157 ACN 113810157ACN 202111067773 ACN202111067773 ACN 202111067773ACN 113810157 ACN113810157 ACN 113810157A
Authority
CN
China
Prior art keywords
data
dimensional code
protocol
card
entrance guard
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111067773.8A
Other languages
Chinese (zh)
Inventor
何煜升
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Xiyun Information Technology Co ltd
Original Assignee
Shanghai Xiyun Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Xiyun Information Technology Co ltdfiledCriticalShanghai Xiyun Information Technology Co ltd
Priority to CN202111067773.8ApriorityCriticalpatent/CN113810157A/en
Publication of CN113810157ApublicationCriticalpatent/CN113810157A/en
Pendinglegal-statusCriticalCurrent

Links

Images

Classifications

Landscapes

Abstract

Translated fromChinese

本申请公开了基于RS485协议的门禁数据传输处理方法和系统,该方法包括:接收来自门禁读头读取的第一数据,其中,所述第一数据包括以下至少之一:IC卡的数据、二维码数据;将所述门禁读头读取的第一数据转换为RS485协议的第二数据;对所述第二数据进行解析,其中,将所述第二数据中的IC卡的数据通过韦根协议输出,并将所述第二数据中的二维码数据通过以太网接口透传给二维码解析服务器;根据通过所述韦根洗衣输出的IC卡数据或者二维码解析服务器解析出的二维码确定是否打开门禁。通过本申请解决了现有技术中老式门禁无法同时支持二维码和IC卡的问题,从而能够使用老式门禁系统的信号线同时支持二维码和IC卡。

Figure 202111067773

The present application discloses an access control data transmission processing method and system based on the RS485 protocol. The method includes: receiving first data read from an access control reading head, wherein the first data includes at least one of the following: IC card data, two-dimensional code data; convert the first data read by the access control reading head into the second data of the RS485 protocol; analyze the second data, wherein the IC card data in the second data is passed through Wiegand protocol output, and transparently transmit the two-dimensional code data in the second data to the two-dimensional code analysis server through the Ethernet interface; analyze according to the IC card data or the two-dimensional code analysis server output through the Wiegand laundry The issued QR code determines whether to open the door. The present application solves the problem that the old-fashioned access control in the prior art cannot support two-dimensional codes and IC cards at the same time, so that the signal lines of the old-fashioned access control system can be used to support two-dimensional codes and IC cards at the same time.

Figure 202111067773

Description

RS485 protocol-based access control data transmission processing method and system
Technical Field
The application relates to the field of entrance guard, in particular to an entrance guard data transmission processing method and system based on an RS485 protocol.
Background
In older access control systems, a wiegand signal is generally used, and it is difficult for such access control systems to add a two-dimensional code function.
For example, in a typical visitor modification project, a 4-core signal wire 2 is arranged at the beginning of the project, two cores are used as a power supply, and 2 cores are used as a Wiegand signal, because the circuit of an entrance guard reading head in a visitor channel gate machine is already arranged. When the door access system is modified, new wiring cannot be conducted, and therefore the old door access systems cannot support the two-dimensional codes.
Disclosure of Invention
The embodiment of the application provides an access control data transmission processing method and system based on an RS485 protocol, and aims to at least solve the problem that an old-fashioned access control in the prior art cannot support a two-dimensional code and an IC card simultaneously.
According to one aspect of the application, an access control data transmission processing method based on an RS485 protocol is provided, and comprises the following steps: receiving first data read by an entrance guard reading head, wherein the first data comprises at least one of the following data: data of IC card, two-dimensional code data; converting the first data read by the entrance guard reading head into second data of an RS485 protocol; analyzing the second data, wherein the data of the IC card in the second data is output through a Wiegand protocol, and the two-dimensional code data in the second data is transmitted to a two-dimensional code analyzing server through an Ethernet interface; and determining whether to open the access control according to the IC card data output by the Wagner washing machine or the two-dimensional code analyzed by the two-dimensional code analysis server.
Further, receiving the first data read from the access control read head comprises: and receiving the first data read by the entrance guard reading head through a Wiegand protocol.
Further, converting the first data read by the access control reading head into second data of an RS485 protocol includes: packaging the first data in a predetermined number of bytes in the case that the first data is data of an IC card; converting a protocol identification and a preset number of bytes which are packaged with the first data into second data, wherein the protocol identification is used for indicating that the second data carries the data of the IC card received by using the Wiegand protocol.
Further, the predetermined number of bytes is 4 bytes.
Further, converting the first data read by the access control reading head into second data of an RS485 protocol includes: and converting an indication identifier and the data of the two-dimensional code into the second data under the condition that the first data is the data of the two-dimensional code, wherein the indication identifier is used for indicating that the two-dimensional code data is carried in the second data.
Still provide an entrance guard data transmission processing system based on RS485 agreement in this embodiment, include: the system comprises a converter and a host, wherein the converter is used for receiving first data read by an entrance guard reading head, and the first data comprises at least one of the following data: data of IC card, two-dimensional code data; the converter is also used for converting the first data read by the entrance guard reading head into second data of an RS485 protocol; the host is used for analyzing the second data, wherein the data of the IC card in the second data is output through a Wiegand protocol, and the two-dimensional code data in the second data is transmitted to a two-dimensional code analysis server through an Ethernet interface; the host is used for determining whether to open the access control according to the IC card data output by the Wagner washing machine or the two-dimensional code analyzed by the two-dimensional code analysis server.
Further, the converter is configured to: and receiving the first data read by the entrance guard reading head through a Wiegand protocol.
Further, the host is configured to: packaging the first data in a predetermined number of bytes in the case that the first data is data of an IC card; converting a protocol identification and a preset number of bytes which are packaged with the first data into second data, wherein the protocol identification is used for indicating that the second data carries the data of the IC card received by using the Wiegand protocol.
Further, the predetermined number of bytes is 4 bytes.
Further, the host is configured to: and converting an indication identifier and the data of the two-dimensional code into the second data under the condition that the first data is the data of the two-dimensional code, wherein the indication identifier is used for indicating that the two-dimensional code data is carried in the second data.
In the embodiment of the present application, receiving first data read by an entrance guard reading head is adopted, where the first data includes at least one of: data of IC card, two-dimensional code data; converting the first data read by the entrance guard reading head into second data of an RS485 protocol; analyzing the second data, wherein the data of the IC card in the second data is output through a Wiegand protocol, and the two-dimensional code data in the second data is transmitted to a two-dimensional code analyzing server through an Ethernet interface; and determining whether to open the access control according to the IC card data output by the Wagner washing machine or the two-dimensional code analyzed by the two-dimensional code analysis server. Through the application, the problem that the old-fashioned entrance guard cannot support the two-dimensional code and the IC card simultaneously in the prior art is solved, so that the signal line of the old-fashioned entrance guard system can be used for supporting the two-dimensional code and the IC card simultaneously.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate embodiments of the application and, together with the description, serve to explain the application and are not intended to limit the application. In the drawings:
fig. 1 is a flowchart of an access control data transmission processing method based on an RS485 protocol according to an embodiment of the present application;
fig. 2 is a schematic diagram of 485 protocol connections according to an embodiment of the application.
Detailed Description
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
In this embodiment, an access control data transmission processing method based on an RS485 protocol is provided, and fig. 1 is a flowchart of the access control data transmission processing method based on the RS485 protocol according to the embodiment of the present application, and as shown in fig. 1, the flowchart includes the following steps:
step S102, receiving first data read by an entrance guard reading head, wherein the first data comprises at least one of the following data: data of IC card, two-dimensional code data;
for example, the first data read by the entrance guard reading head may be received through a wiegand protocol.
Step S104, converting the first data read by the entrance guard reading head into second data of an RS485 protocol;
for example, in the case where the first data is data of an IC card, the first data is packaged in a predetermined number of bytes (for example, four bytes); converting a protocol identification and a preset number of bytes which are packaged with the first data into second data, wherein the protocol identification is used for indicating that the second data carries the data of the IC card received by using the Wiegand protocol.
For another example, converting the first data read by the entrance guard reading head into the second data of the RS485 protocol includes: and converting an indication identifier and the data of the two-dimensional code into the second data under the condition that the first data is the data of the two-dimensional code, wherein the indication identifier is used for indicating that the two-dimensional code data is carried in the second data.
Step S106, analyzing the second data, wherein the data of the IC card in the second data is output through a Wiegand protocol, and the two-dimensional code data in the second data is transmitted to a two-dimensional code analyzing server through an Ethernet interface;
and S108, determining whether to open the door access according to the IC card data output by the Wagner washing machine or the two-dimensional code analyzed by the two-dimensional code analysis server.
The problem that an old-fashioned access control system cannot support a two-dimensional code and an IC card simultaneously in the prior art is solved through the steps, so that the signal line of the old-fashioned access control system can support the two-dimensional code and the IC card simultaneously.
Still provide an entrance guard data transmission processing system based on RS485 agreement in this embodiment, include: the system comprises a converter and a host, wherein the converter is used for receiving first data read by an entrance guard reading head, and the first data comprises at least one of the following data: data of IC card, two-dimensional code data; the converter is also used for converting the first data read by the entrance guard reading head into second data of an RS485 protocol; the host is used for analyzing the second data, wherein the data of the IC card in the second data is output through a Wiegand protocol, and the two-dimensional code data in the second data is transmitted to a two-dimensional code analysis server through an Ethernet interface; the host is used for determining whether to open the access control according to the IC card data output by the Wiegand washing machine or the two-dimensional code analyzed by the two-dimensional code analysis server (or called as a two-dimensional code identification server).
The system corresponds to the above method steps, and the description thereof is omitted here. For example, the converter is used for: and receiving the first data read by the entrance guard reading head through a Wiegand protocol.
Optionally, the host is configured to: packaging the first data in a predetermined number of bytes in the case that the first data is data of an IC card; converting a protocol identification and a preset number of bytes which are packaged with the first data into second data, wherein the protocol identification is used for indicating that the second data carries the data of the IC card received by using the Wiegand protocol. Optionally, the host is configured to: and converting an indication identifier and the data of the two-dimensional code into the second data under the condition that the first data is the data of the two-dimensional code, wherein the indication identifier is used for indicating that the two-dimensional code data is carried in the second data.
As an optional added embodiment, if the first data is the two-dimensional code data, the converter sends the two-dimensional code data to the host twice, in order to prevent errors in transmission and conversion of the two-dimensional code data, the host compares the two received two-dimensional code data, and if the two-dimensional code data are the same, the two-dimensional code data in the first data is transmitted to the two-dimensional code identification server. If the two-dimensional code data are different, the data are directly fed back wrongly, and the entrance guard cannot be opened.
As another optional implementation manner, when the host transmits the two-dimensional code data to the two-dimensional code recognition server, a check code is added at the end of the two-dimensional code data, wherein the check code is generated according to the two-dimensional code data and is used for checking the two-dimensional code data. After the two-dimension code recognition server receives the two-dimension code data and the check code, the check code is used for checking the two-dimension code, the two-dimension code data are analyzed under the condition that the check is passed, and the door control cannot be opened due to the fact that data are fed back wrongly under the condition that the check is different.
As another optional mode, when the two-dimensional code recognition server recognizes that the two-dimensional code is a two-dimensional code with door opening authority, the two-dimensional code data is fed back to the host as the two-dimensional code with door opening authority. And the host stores the two-dimensional code data in a white list, and the white list is stored in a memory of the host. When the host receives the two-dimensional code data again, the two-dimensional code data are matched in the white list, if the matching is successful, the two-dimensional code data are confirmed to have door opening authority, and if the matching is failed, the two-dimensional code data are sent to the two-dimensional code identification server, so that the door opening speed can be increased.
As another optional mode, when the two-dimensional code identification server identifies that the two-dimensional code is a two-dimensional code without a door opening authority, the two-dimensional code is fed back to the host as two-dimensional code data without a door opening authority. The host talks the two-dimensional code data and stores the two-dimensional code data in a blacklist, the blacklist is stored in a hard disk of the host, the host firstly matches the two-dimensional code data in the blacklist when receiving the two-dimensional code data, and if the matching is successful, the data is fed back wrongly, and the access control cannot be opened. And if the matching is not successful in the blacklist, matching is carried out in the white list, if the matching is successful, the two-dimensional code data is confirmed to have the door opening authority, and if the matching is failed, the two-dimensional code data is sent to the two-dimensional code identification server.
The two-dimensional code data stored on the hard disk is not easy to delete, if the preset two-dimensional code data needs to be deleted from a blacklist stored on a hard disk of a host, the two-dimensional code data to be deleted can be generated through identity information to be deleted by a two-dimensional code recognition server, then a deletion command is sent to the host, the two-dimensional code data (the two-dimensional code data can be understood as a number formed by 01, and the two-dimensional code can be data for identifying the identity information) are carried in the deletion command, and the host deletes the two-dimensional code data from the blacklist of the hard disk after receiving the deletion command.
An alternative embodiment of the present application is described below with reference to the drawings. In order to simultaneously transmit two-dimensional code data (Ethernet-4 to 8 lines) and IC card swiping data (Wiegand-two lines) by the two-dimensional code of the gate and the devices of the IC card two and the IC card one, the two-dimensional code and the IC card swiping data of the gate must be transmitted by using an original 2-core signal line.
Fig. 2 is a schematic diagram of 485 protocol connection according to an embodiment of the present application, and as shown in fig. 2, in this optional embodiment, a multifunctional controller is used to transmit a two-dimensional code, a two-dimensional code of an IC card two and a two-dimensional code of an IC card one device, and IC card data on a 485 data line through a 485 device, and then data is converted into ethernet data through a host in a weak current (the device in the weak current is called as a host) and transmitted to a two-dimensional code server, and the IC card data is transmitted to an access control panel through a wiegand protocol. Data separation is performed. Meanwhile, the switch of the gate can be controlled or the switch state of the gate can be acquired through IO input and output.
The converter protocol in the present embodiment will be explained. In this embodiment, a baud rate of 9600n81 is used. The converter protocol in this embodiment is as follows.
1. Converter IO port changes and converter 485 sends "< bof >" + "IO number:" + ON/OFF + "< eof >".
ON is low and OFF is high.
For example, < bof > IO1: ON < eof >, < bof > IO1: OFF < eof >.
2. The host sends a command to the converter via 485 in the format of "< bof > ic 34:" +4 byte card number + "< eof >".
'IC' stands for Wiegand IC card, '34': representing the wiegand protocol type,' ic34: ' represents the WG34 protocol, the converter outputs a WG34 signal.
3. The two-dimensional code reading head sends an instruction to the converter through 485 to the host computer, and the sending format is as follows: "< bof > ic 34:" +4 byte card number + "< eof >".
After the host receives the data, the IC card number is analyzed into protocol data of WG34, the protocol data are output through a Wiegand interface of the host, and meanwhile, the data are transmitted to a two-dimensional code server through an Ethernet interface.
4. The host sends an instruction to the converter through 485, and the sending format is as follows: "< bof >" + "IO number:" + ON/OFF + "< eof >".
The converter sets the IO port level, note: the electrical level is normally open and normally closed.
5. The host sends an IO inching instruction to the converter through 485, and the sending format is as follows: "< bof >" + "IO number:" + "500" + "< eof >".
The converter sets the IO port low level for 500ms and then restores the high level, for example, < bof > IO1:500< eof >.
6. The two-dimensional code reading head sends an instruction to the converter through 485 to the host computer, and the sending format is as follows: "< bof > RQ:" + two-dimensional code content + "< eof >".
And after receiving the two-dimension code, the host transparently transmits the two-dimension code to the Ethernet interface, and the two-dimension code server processes the two-dimension code content.
In this embodiment, an electronic device is provided, comprising a memory in which a computer program is stored and a processor configured to run the computer program to perform the method in the above embodiments.
These computer programs may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks, and corresponding steps may be implemented by different modules.
The programs described above may be run on a processor or may also be stored in memory (or referred to as computer-readable media), which includes both non-transitory and non-transitory, removable and non-removable media, that implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include transitory computer readable media (transmyedia) such as modulated data signals and carrier waves.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. An entrance guard data transmission processing method based on an RS485 protocol is characterized by comprising the following steps:
receiving first data read by an entrance guard reading head, wherein the first data comprises at least one of the following data: data of IC card, two-dimensional code data;
converting the first data read by the entrance guard reading head into second data of an RS485 protocol;
analyzing the second data, wherein the data of the IC card in the second data is output through a Wiegand protocol, and the two-dimensional code data in the second data is transmitted to a two-dimensional code analyzing server through an Ethernet interface;
and determining whether to open the access control according to the IC card data output by the Wagner washing machine or the two-dimensional code analyzed by the two-dimensional code analysis server.
2. The method of claim 1, wherein receiving the first data from the entrance guard reading head comprises:
and receiving the first data read by the entrance guard reading head through a Wiegand protocol.
3. The method of claim 1, wherein converting the first data read by the entrance guard reading head into second data of an RS485 protocol comprises:
packaging the first data in a predetermined number of bytes in the case that the first data is data of an IC card;
converting a protocol identification and a preset number of bytes which are packaged with the first data into second data, wherein the protocol identification is used for indicating that the second data carries the data of the IC card received by using the Wiegand protocol.
4. The method of claim 3, wherein the predetermined number of bytes is 4 bytes.
5. The method of claim 1, wherein converting the first data read by the entrance guard reading head into second data of an RS485 protocol comprises:
and converting an indication identifier and the data of the two-dimensional code into the second data under the condition that the first data is the data of the two-dimensional code, wherein the indication identifier is used for indicating that the two-dimensional code data is carried in the second data.
6. The utility model provides an entrance guard data transmission processing system based on RS485 agreement which characterized in that includes: a converter and a host, wherein,
the converter is used for receiving first data read by the entrance guard reading head, wherein the first data comprises at least one of the following data: data of IC card, two-dimensional code data;
the converter is also used for converting the first data read by the entrance guard reading head into second data of an RS485 protocol;
the host is used for analyzing the second data, wherein the data of the IC card in the second data is output through a Wiegand protocol, and the two-dimensional code data in the second data is transmitted to a two-dimensional code analysis server through an Ethernet interface;
the host is used for determining whether to open the access control according to the IC card data output by the Wagner washing machine or the two-dimensional code analyzed by the two-dimensional code analysis server.
7. The method of claim 6, wherein the converter is configured to:
and receiving the first data read by the entrance guard reading head through a Wiegand protocol.
8. The system of claim 6, wherein the host is configured to:
packaging the first data in a predetermined number of bytes in the case that the first data is data of an IC card;
converting a protocol identification and a preset number of bytes which are packaged with the first data into second data, wherein the protocol identification is used for indicating that the second data carries the data of the IC card received by using the Wiegand protocol.
9. The system of claim 8, wherein the predetermined number of bytes is 4 bytes.
10. The system of claim 6, wherein the host is configured to:
and converting an indication identifier and the data of the two-dimensional code into the second data under the condition that the first data is the data of the two-dimensional code, wherein the indication identifier is used for indicating that the two-dimensional code data is carried in the second data.
CN202111067773.8A2021-09-132021-09-13 Access control data transmission processing method and system based on RS485 protocolPendingCN113810157A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202111067773.8ACN113810157A (en)2021-09-132021-09-13 Access control data transmission processing method and system based on RS485 protocol

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202111067773.8ACN113810157A (en)2021-09-132021-09-13 Access control data transmission processing method and system based on RS485 protocol

Publications (1)

Publication NumberPublication Date
CN113810157Atrue CN113810157A (en)2021-12-17

Family

ID=78895164

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202111067773.8APendingCN113810157A (en)2021-09-132021-09-13 Access control data transmission processing method and system based on RS485 protocol

Country Status (1)

CountryLink
CN (1)CN113810157A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
AU7248787A (en)*1986-05-071987-11-12Personal Computer Card CorporationIc card system
JP2002236885A (en)*2001-02-092002-08-23Shinko Electric Ind Co LtdIc card reader/writer and data transmission method therefor
CN206788945U (en)*2017-04-252017-12-22杭州远昊科技有限公司A kind of gate inhibition's host device of 86 boxes of multi-functional identification
CN206892955U (en)*2017-05-172018-01-16深圳市塞伯罗斯科技有限公司Multi-functional formula Quick Response Code entrance guard device
CN108230491A (en)*2017-07-202018-06-29深圳市商汤科技有限公司Access control method and device, system, electronic equipment, program and medium
CN109544748A (en)*2018-11-212019-03-29深圳市商汤科技有限公司Access control management method and access control terminal, system
CN109714374A (en)*2017-10-252019-05-03朱铭赫Building talkback method, apparatus and system
CN110222543A (en)*2019-06-102019-09-10北京意锐新创科技有限公司Support the access control equipment reading method and device of Wiegand protocol
CN111145402A (en)*2018-11-052020-05-12珠海精讯知识产权管理有限公司Intelligent access control system for identification of identity card, two-dimensional code and WeChat card package
CN112820007A (en)*2020-12-302021-05-18广东赛诺科技股份有限公司Method and system for distinguishing two-dimensional code and IC card signal based on Wiegand protocol

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
AU7248787A (en)*1986-05-071987-11-12Personal Computer Card CorporationIc card system
JP2002236885A (en)*2001-02-092002-08-23Shinko Electric Ind Co LtdIc card reader/writer and data transmission method therefor
CN206788945U (en)*2017-04-252017-12-22杭州远昊科技有限公司A kind of gate inhibition's host device of 86 boxes of multi-functional identification
CN206892955U (en)*2017-05-172018-01-16深圳市塞伯罗斯科技有限公司Multi-functional formula Quick Response Code entrance guard device
CN108230491A (en)*2017-07-202018-06-29深圳市商汤科技有限公司Access control method and device, system, electronic equipment, program and medium
CN109714374A (en)*2017-10-252019-05-03朱铭赫Building talkback method, apparatus and system
CN111145402A (en)*2018-11-052020-05-12珠海精讯知识产权管理有限公司Intelligent access control system for identification of identity card, two-dimensional code and WeChat card package
CN109544748A (en)*2018-11-212019-03-29深圳市商汤科技有限公司Access control management method and access control terminal, system
CN110222543A (en)*2019-06-102019-09-10北京意锐新创科技有限公司Support the access control equipment reading method and device of Wiegand protocol
CN112820007A (en)*2020-12-302021-05-18广东赛诺科技股份有限公司Method and system for distinguishing two-dimensional code and IC card signal based on Wiegand protocol

Similar Documents

PublicationPublication DateTitle
CN112214366B (en) Test method, device, system, equipment and medium
CN113259155B (en)Access method, device, gateway, medium and electronic equipment of Internet of things equipment
US20030163628A1 (en)Method and related apparatus for controlling transmission interface between an external device and a computer system
CN107480086A (en)Support circuit, terminal and its control method of OTG functions
CN107145383B (en) Dual-system process management method and dual-system terminal
CN107153858A (en)A kind of intelligent substation optical cable tag system based on NFC technique
CN101523420B (en) Method for accelerating the detection and activation of a communication interface between a terminal and a UICC
US20200260277A1 (en)Method for wireless access authentication
CN114912153A (en)Scientific research data informatization management platform based on cloud computing
CN113810157A (en) Access control data transmission processing method and system based on RS485 protocol
CN117528519B (en)Method and device for realizing expansion of smart card
CN110531991B (en)Method and system for realizing universal burning platform
US20060206343A1 (en)Information storage device and information processing device
CN117134948A (en)Method, storage medium and device for realizing application firewall of embedded device
CN115460161B (en)Optical module code changing method, device, equipment and storage medium
CN115589301A (en) Remote control method, device, electronic device and storage medium
CN113534691A (en)Control system and method of terminal equipment
TWI459305B (en)Method and system for simulating tetminal machine
CN220085381U (en)Device for remote reading and writing of serial port equipment
CN116645751B (en)IC card information changing method and system
CN212906277U (en)Embedded software testing device based on TFTP protocol
TWM586390U (en)A system for performing identity verification according to the service instruction to execute the corresponding service
CN120371357B (en)Firmware upgrading system, method, computing device and electronic device
US20230030967A1 (en)Storage device and method for controlling storage device
CN113312067B (en)Butt joint method and device for law enforcement recorder and acquisition station

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication

Application publication date:20211217

RJ01Rejection of invention patent application after publication

[8]ページ先頭

©2009-2025 Movatter.jp