Font Size: a A A

The Research And Design Of Access Control Technology Based On SQLite

Posted on:2014-12-16Degree:MasterType:Thesis
Country:ChinaCandidate:Z C YangFull Text:PDF
GTID:2268330422463237Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the advent of the information age, technology can help people better managelife.Smart Lab is a comprehensive and complex environment, including access control,temperature and humidity monitoring, infrared monitoring. Intelligent laboratory researchto better help people manage the laboratory. Based access control technology in thiscontext is necessary. Intelligent desktop-based database access control system powerful,but relatively complex to maintain. Embedded database SQLite is an open source free andeasy to maintain a database of management,whitch study smart laboratory environmentaccess control technology plays a very important role. This article provides a solution forfurther research access control technology in smart laboratory environment.The design of access control technology based on SQLite is researched witharm9,which uses the linux software system.This thesis researches the related technologiesabout access control security and the current popular embedded database SQLite.According to the characteristics of the access control system, the whole system is dividedinto a front-end part of the background processing and peripheral control of three parts.The front end portion includes a card reader reads the access information. This articleanalyzes the transmission Wiegand protocol access control information, according toWiegand Transfer Protocol developed linux character driver. Background processingsection includes transplant SQLite embedded database system,and develops a databaseSQLite Access Registration System based on the needs analysis.The access registrationdatabase allows the access cardholders legally authorized and read the registration cardinformation through the card reader, registers cardholder information to ic card, legallyauthorizes the cardholder. In the background section, Users can according to the scene tointelligently manage access card,and authorized to operate through analyzing databasedata in the background, and can also manage the registration card for more safe.The system has been tested and verified in laboratory environment,and the overallsystem is running well,reader can properly transmite the card information to the controllerby wiegand protocol, and wiegand device linux character driver is operating normally. TheSQLite database run normal,and can effectively control the Access Control by SQLitedatabase information registered system. The entire system is operating normally andfunctional needs.
Keywords/Search Tags:Access control technology, arm embedded, character-driven, SQLite database, Wiegand protocol, information register
PDF Full Text Request
Related items