CN107146303A - Device, method and the gate control system opened the door using dynamic password - Google Patents

Device, method and the gate control system opened the door using dynamic password Download PDF

Info

Publication number
CN107146303A
CN107146303A CN201710278372.4A CN201710278372A CN107146303A CN 107146303 A CN107146303 A CN 107146303A CN 201710278372 A CN201710278372 A CN 201710278372A CN 107146303 A CN107146303 A CN 107146303A
Authority
CN
China
Prior art keywords
dynamic password
door
access times
gate
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710278372.4A
Other languages
Chinese (zh)
Inventor
陈林花
张建波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Wanrui Intelligent Technology Co Ltd
Original Assignee
Shenzhen Wanrui Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Wanrui Intelligent Technology Co Ltd filed Critical Shenzhen Wanrui Intelligent Technology Co Ltd
Priority to CN201710278372.4A priority Critical patent/CN107146303A/en
Publication of CN107146303A publication Critical patent/CN107146303A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/33Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/08With time considerations, e.g. temporary activation, valid time window or time limitations

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention discloses device, method and the gate control system that a kind of use dynamic password opens the door, wherein, the method opened the door using dynamic password is comprised the following steps:The dynamic password of input is obtained, the dynamic password is preset with effective access times;Verification matching is carried out to the dynamic password of acquisition according to correspondence generation dynamic password algorithm;After the match is successful in dynamic password verification, continue to judge whether effective access times of dynamic password exceed access times;And when the access times of dynamic password are without departing from effective access times, open the gate inhibition of the gate in building where owner, cell gate or ground storehouse door.Technical scheme can realize that off line dynamic password is decrypted, and realize and share dynamic password to the visitor into public domain is needed, allow visitor is self-service to open the door, it is to avoid need to ensure public security and examine, or need mandate artificial its enabling, convenient use.

Description

Device, method and the gate control system opened the door using dynamic password
Technical field
The present invention relates to gate inhibition's technical field, more particularly to device, method and the gate inhibition that a kind of use dynamic password opens the door System.
Background technology
The public domain gate inhibitions such as current cell, office building, are all based on gate control system of swiping the card, and easily occur what card was replicated Phenomenon.And when there is visitor into public domain gate inhibition, it is necessary to wait identity to be confirmed.In addition, above-mentioned access control equipment, is needed Network, power, track laying it is complicated, swipe the card or secret number, function is single.User's number of cards is excessive, not portable Band, visiting if any visitor, it is impossible to conveniently to allow visitor self-service current, increase garden estate management, the current difficulty of visitor.
In view of this, it is necessary to which current gate control system is further improved for proposition.
The content of the invention
To solve an above-mentioned at least technical problem, the main object of the present invention is to provide what a kind of use dynamic password opened the door Method.
To achieve the above object, one aspect of the present invention is:There is provided what a kind of use dynamic password opened the door Method, comprises the following steps:
The dynamic password of input is obtained, the dynamic password is preset with effective access times;
Verification matching is carried out to the dynamic password of acquisition according to correspondence generation dynamic password algorithm;
After the match is successful in dynamic password verification, continue to judge whether effective access times of dynamic password exceed using secondary Number limitation;And
When effective access times of dynamic password are limited without departing from access times, open owner where building it is big The gate inhibition of door, cell gate or ground storehouse door.
In a specific embodiment, the gate inhibition at the gate in building opened where owner, cell gate or ground storehouse door The step of after, in addition to effective access times of dynamic password are carried out from subtracting, and effective access times of dynamic password are entered The step of row is counted again.
In a specific embodiment, the gate inhibition at the gate in building opened where owner, cell gate or ground storehouse door The step of after, in addition to perform speech play enabling result the step of.
To achieve the above object, another technical solution used in the present invention is:One kind is provided to open the door using dynamic password Device, including acquisition module, matching module, judge module and processing module,
The acquisition module, the dynamic password for obtaining input, the dynamic password is preset with effective access times;
The matching module, for carrying out verification to the dynamic password of acquisition according to correspondence generation dynamic password algorithm Match somebody with somebody;
The judge module, after in dynamic password verification, the match is successful, continues to judge effectively using for dynamic password Whether number of times limits beyond access times, and
The processing module, for when effective access times of dynamic password are limited without departing from access times, opening industry The gate inhibition at the gate in the building at main place, cell gate or ground storehouse door.
In a specific embodiment, handled module is additionally operable to, and effective access times of dynamic password subtract certainly, And effective access times of dynamic password are counted again.
In a specific embodiment, the device that the dynamic password opens the door also includes voice module, for passing through voice Play enabling result.
To achieve the above object, one aspect of the present invention is:A kind of gate control system, including client are provided End, the high in the clouds being connected with user client communication, and door control terminal;
The client, for sending door-opening password request to high in the clouds, the door-opening password request bag is containing small where owner Area building authority information, and receive the dynamic password that high in the clouds is returned;
The high in the clouds, for generating dynamic password according to door request signal and current time;
The door control terminal is the device that above-mentioned use dynamic password opens the door.
In a specific embodiment, the high in the clouds specifically for:
The first data source generated according to plaintext create-rule, and according to the second data source of time encoding rule generation The primary ciphertext of synthesis;
Selection agreement key;And
Secondary ciphertext is obtained with agreement key encryption according to actual ciphertext;
Judge whether the history ciphertext of secondary ciphertext and the batch repeats, when secondary ciphertext and the batch history ciphertext not When repeating, secondary ciphertext will be updated and be converted to decimal system pass code.
In a specific embodiment, the high in the clouds is additionally operable to:
When the history ciphertext of secondary ciphertext and the batch is repeated, the secondary ciphertext is taken out and using two grades of spare key weights Newly calculate and obtain updating secondary ciphertext, and update secondary ciphertext and be converted to decimal system pass code.
In a specific embodiment, first data source includes seven cipher keys, bit check position and 12 Device numbering is indexed, and second data source is 20 keys daily calculated;The agreement key includes 11 keys Position and bit check position.
Technical scheme, which is used, carries out offline verification matching to dynamic password, and by judging dynamic password When effective access times are in the range of access times limitation, corresponding gate inhibition is opened, can realize that off line dynamic password is decrypted, it is real Now share dynamic password to the visitor into public domain is needed, allow visitor is self-service to open the door, examined without security personnel, or need to award Power artificial its enabling, convenient use;, can be in the premise based on cryptosecurity by the limitation to dynamic password access times Under, lift security performance.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Structure according to these accompanying drawings obtains other accompanying drawings.
The flow chart for the method that Fig. 1 opens the door for the use dynamic password of one embodiment of the invention;
Fig. 2 is the block diagram for the device that one embodiment of the invention is opened the door using dynamic password;
Fig. 3 is the block diagram of the gate control system of one embodiment of the invention;
The flow chart that Fig. 4 encrypts for head in the present invention.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.Base Embodiment in the present invention, those of ordinary skill in the art obtained under the premise of creative work is not made it is all its His embodiment, belongs to the scope of protection of the invention.
It is to be appreciated that the description for being related to " first ", " second " etc. in the present invention be only used for describe purpose, and it is not intended that Indicate or imply its relative importance or the implicit quantity for indicating indicated technical characteristic.Thus, define " first ", At least one this feature can be expressed or be implicitly included to the feature of " second ".In addition, the technical side between each embodiment Case can be combined with each other, but must can be implemented as basis with those of ordinary skill in the art, when the combination of technical scheme It will be understood that the combination of this technical scheme is not present, also not in the guarantor of application claims when appearance is conflicting or can not realize Within the scope of shield.
Fig. 1 is refer to, in embodiments of the present invention, this uses the method that dynamic password opens the door, and comprises the following steps:
Step S10, the dynamic password for obtaining input, the dynamic password are preset with effective access times;
Step S20, the dynamic password progress verification matching according to correspondence generation dynamic password algorithm to acquisition;
Step S30, in dynamic password verification after the match is successful, continuation judges whether effective access times of dynamic password surpass Go out access times limitation;And
Step S40, when effective access times of dynamic password are limited without departing from access times, open owner where building Gate, cell gate or ground storehouse door gate inhibition.
In the present embodiment, effective access times of dynamic password can be set according to actual requirement, and this programme is preferred For 3-5 times, gate, cell gate, Di Kumen are corresponded to respectively, certain number of times can go out indegree and set to set according to actual It is fixed.In view of coming and going problem, even-times is preferably positioned to, odd-times can be arranged to during for specific requirement;Coming and going gate needs Want 2 times, cell gate 1 time, 3 times etc. altogether.Dynamic password is generated by backstage or high in the clouds, terminal can using correspondence backstage or The generation dynamic password algorithm in person high in the clouds, specially decipherment algorithm is verified offline;After offline verification passes through, in addition it is also necessary to enter The effective access times verification of Mobile state password, in this way, realizing self-service enabling, and can improve security performance.
Technical scheme, which is used, carries out offline verification matching to dynamic password, and by judging dynamic password When effective access times are in the range of access times limitation, corresponding gate inhibition is opened, can be according to realizing off line dynamic password solution It is close, realize and share dynamic password to the visitor into public domain is needed, allow visitor is self-service to open the door, no needs, which are ensured public security, to be examined, or Person is without authorizing artificial its enabling, convenient use;, can be based on cryptosecurity by the limitation to dynamic password access times On the premise of, improve security performance.
In a specific embodiment, the gate inhibition at the gate in building opened where owner, cell gate or ground storehouse door The step of after, in addition to effective access times of dynamic password are carried out from subtracting, and effective access times of dynamic password are entered The step of row is counted again.
In the present embodiment, dynamic password successfully opens the door per effectively using once, has dynamic password is default using secondary First number is corresponding can to reduce the times of acquisition of dynamic password from subtracting, and second prevent dynamic password from abusing problem, in this way, energy It is enough to improve the security performance opened the door.
In a specific embodiment, the gate inhibition at the gate in building opened where owner, cell gate or ground storehouse door The step of after, in addition to perform speech play enabling result the step of.
In the present embodiment, after opening the door successfully, the successful voice messaging of enabling can be also played, to remind the attention of user. When opening the door failure, the information for failure of opening the door can be returned.
Refer to Fig. 2, in an embodiment of the present invention, this use dynamic password open the door device, including acquisition module, With module, judge module and processing module,
The acquisition module 10, the dynamic password for obtaining input, the dynamic password is preset with effective access times;
The matching module 20, for carrying out verification to the dynamic password of input according to correspondence generation dynamic password algorithm Match somebody with somebody;
The judge module 30, after in dynamic password verification, the match is successful, continues to judge effectively making for dynamic password Whether limited with number of times beyond access times;And
The processing module 40, for when effective access times of dynamic password are limited without departing from access times, opening The gate inhibition at the gate in the building where owner, cell gate or ground storehouse door.
Embodiments of the invention can obtain the encrypted message that visitor inputs immediately using acquisition module, then by dynamic State password carries out offline verification matching and effective access times of dynamic password judge, after both meeting, can open industry The gate inhibition at the gate in the building at main place, cell gate or ground storehouse door, so, it is possible to achieve share dynamic password and enter public affairs to needs The visitor in region, convenient use, are examined without security personnel altogether, or without authorizing its artificial enabling;By using dynamic password The limitation of number of times, can lift security performance on the premise of based on cryptosecurity.
In a specific embodiment, handled module 40 is additionally operable to, and effective access times of dynamic password are carried out certainly Subtract, and effective access times of dynamic password are counted again.
In the present embodiment, the processing module 40, in dynamic password per effectively using once, i.e., when successfully opening the door, by dynamic Password is default to have access times corresponding from subtracting, and first can reduce the times of acquisition of dynamic password, second anti-dynamic is close Code abuse problem, so, it is possible to improve the security performance opened the door.
In a specific embodiment, the device that the dynamic password opens the door also includes voice module 50, for passing through language Sound plays enabling result.
In the present embodiment, after opening the door successfully, the voice module 50 can also play the successful voice messaging of enabling, to remind The attention of user.When opening the door failure, the information for failure of opening the door can be returned.
Refer to Fig. 3, in an embodiment of the present invention, the gate control system, including client 1, with client 1 communication be connected High in the clouds 2, and door control terminal 3;
The client 1, for sending door request signal to high in the clouds 2, the door request signal is comprising where owner Cell building authority information, and receive the dynamic password that high in the clouds 2 is returned;
The high in the clouds 2, for generating dynamic password according to door request signal and current time;
The door control terminal 3 is the device that above-mentioned use dynamic password opens the door.
In the present embodiment, client can be the portable intelligent equipment such as mobile phone terminal, IPAD terminals.Specifically, client 1 Door request signal is initiated to high in the clouds 2, high in the clouds 2 is (close according to gate inhibition's machine information, current time one 6 decimal system password of generation The configurable term of validity used of code and access times), and mobile phone terminal 1 is returned to, opened to the input of door control terminal 3 password request Behind the door, door control terminal 3 is according to cryptographic algorithm (with the same set of algorithm in high in the clouds 2), and whether verification input password matches and effectively make Whether limited, then opened the door when matching and being limited without departing from access times beyond access times with number of times, on the contrary failure of opening the door;Open Door state intuitively informs visitor's enabling result by voice mode.Enabling authority:The dynamic password that visitor uses is according to owner Houseclearing control enabling authority, i.e. visitor go out to visit with certain owner, can use dynamic password open periphery gate and industry The cell gate in main place building, storehouse door etc., using the dynamic password the building cell gate where non-owner, storehouse door should not Can open corresponding gate inhibition, visitor open the gate for possessing enabling authority, cell gate, storehouse door same 6 ten should be used to enter Dynamic secret number.
Refer to Fig. 4, in a specific embodiment, the high in the clouds 2 specifically for:
The first data source generated according to plaintext create-rule, and according to the second data source of time encoding rule generation The primary ciphertext of synthesis;
Selection agreement key;And
Secondary ciphertext is obtained with agreement key encryption according to actual ciphertext;
Judge whether the history ciphertext of secondary ciphertext and the batch repeats, take out the secondary ciphertext and standby close using two grades Key, which is recalculated, to be obtained updating secondary ciphertext, will be updated secondary ciphertext and is converted to decimal system pass code;
When the history ciphertext of secondary ciphertext and the batch is repeated, take out the secondary ciphertext and with next batch key again Calculating obtains updating secondary ciphertext, and updates secondary ciphertext and be converted to decimal system pass code.
In the present embodiment, dynamic password enabling encryption principle is encrypted by using the time value with plaintext equal length Temporal information has been attached in the primary encrypted cipher text arrived, secondary ciphertext now;With primary ciphertext with being obtained after agreement key encryption To current ciphertext.Now, exceed to avoid during identical ciphertext appearance, the about identical ciphertext of settled appearance, or after encryption 999999 phenomenons, take next batch key to recalculate and draw the secondary ciphertext of renewal, and the secondary ciphertext of the renewal is switched to lead to Row code;Decrypting process is completed in door control terminal, and it is the inverse process of this cipher mode.Specifically, the first original number in this programme It is 20 (bit) according to position, specific constitute refer to table 1.
Table 1
As can be seen that D0-D6 is cipher key from above-mentioned table 1, D7 is significance bit, and D8-D19 is that device numbering index can To include 4096 equipment.
The second data source is specially the one-level key calculated by number of days in this programme, refer to table 2.
Table 2
As can be seen that D1-D20 is the random eight-digit number of a ciphertext from above-mentioned table 2;The length of the ciphertext is at least 90 Byte, article size is more than 365*20/8=90Byte, is taken according to a byte 8bit, often takes a byte as key, Every 8 data are used as the key (one-level key) of one day.
It is secondary key (secondary key) to arrange key in the present embodiment, and the agreement key includes 11 (bit) keys Position and (bit) check bit, refer to table 3.
Table 3
In table 3, (bit) check bit is removed in D0-D11, it is secret key bits to be left 11 (bit), has 2048 kinds Combination.The generating principle of secondary key:The secondary key table for producing a 0-255 in every 5 minutes, one day total produce 288, it is necessary to For 256, high in the clouds and door control terminal are changed using same rule.After the cipher key table of server has been used, Just using the 2nd key list.Specifically, when number of days monthly be odd number when, sequentially in time and start bit incremental order give birth to Into secondary key table, and the part start bit decreasing order generation secondary key table exceeded;When number of days monthly is even number, press Successively decrease according to time sequencing and start bit and be sequentially generated secondary key table, and the part order exceeded incrementally generates secondary key table.
According to table 1 to table 3, the second data source can randomly choose an article for being more than 90 bytes, daily according to individual character Section is chosen, and often takes a byte as one-level key, every 8 data are given birth to for the one-level key of one day with the plaintext after upsetting Into primary key, the secondary key in table 3 and rear 12 (bit) XOR generation time again of ciphertext are then selected according to concordance list Level ciphertext, the secondary ciphertext is metric pass code.
The gate control system of this programme, at least specific advantages below:
1st, 2 kinds of quasi-modes of off line (offline) and networking are supported, online, old cell is needed compared to traditional access control equipment Project reconstruction, network infrastructure disposes the problem of difficulty is big, with obvious advantage;
2nd, own key algorithm, can accomplish that equipment end and the side of service end two are seamlessly connected, key algorithm has safety, height The characteristics of effect;
3rd, gate inhibition's quantity that the key algorithm used is supported is more, and horizontal expansion is strong, can accomplish that same cell is propped up simultaneously The access control equipment 5000+ held quantity;
4th, the numerical ciphers repetitive rate of key algorithm generation is low, and high in the clouds generation key can guarantee that the unique of same day generation password Property;
5th, other numerical ciphers algorithms are compared to, the key algorithm trial and error probability of this programme is low;
6th, the dynamic password of this algorithm generation, can be shared, it is to avoid visitor needs to examine identity;
7th, configuration change, and the operations such as record upload that will open the door can be carried out by managing app.
8th, front end access control equipment, without complex network or signal routing, it is only necessary to which the source of energization can work.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the scope of the invention, it is every at this Under the inventive concept of invention, the equivalent structure transformation made using description of the invention and accompanying drawing content, or directly/use indirectly It is included in other related technical fields in the scope of patent protection of the present invention.

Claims (10)

1. a kind of method that use dynamic password opens the door, it is characterised in that the method that the use dynamic password opens the door is included such as Lower step:
The dynamic password of input is obtained, the dynamic password is preset with effective access times;
Verification matching is carried out to the dynamic password of acquisition according to correspondence generation dynamic password algorithm;
After in dynamic password verification, the match is successful, continue to judge effective access times of dynamic password whether beyond access times limit System;And
When effective access times of dynamic password are limited without departing from access times, gate, the list in the building where opening owner The gate inhibition of first door or ground storehouse door.
2. the method that dynamic password as claimed in claim 1 opens the door, it is characterised in that building where the opening owner After the step of gate inhibition at gate, cell gate or ground storehouse door, in addition to effective access times of dynamic password certainly subtract, and it is right The step of effective access times of dynamic password are counted again.
3. the method that dynamic password as claimed in claim 1 opens the door, it is characterised in that building where the opening owner After the step of gate inhibition at gate, cell gate or ground storehouse door, in addition to the step of execution speech play enabling result.
4. the device that a kind of use dynamic password opens the door, it is characterised in that the device that the use dynamic password opens the door includes obtaining Modulus block, matching module, judge module and processing module,
The acquisition module, the dynamic password for obtaining input, the dynamic password is preset with effective access times;
The matching module, for carrying out verification matching to the dynamic password of acquisition according to correspondence generation dynamic password algorithm;
The judge module, after in dynamic password verification, the match is successful, continues to judge effective access times of dynamic password Whether beyond access times limitation;And
The processing module, for when effective access times of dynamic password are limited without departing from access times, opening owner institute The gate in building, cell gate or ground storehouse door gate inhibition.
5. the device opened the door as claimed in claim 4 using dynamic password, it is characterised in that handled module is additionally operable to, right Effective access times of dynamic password subtract certainly, and effective access times of dynamic password are counted again.
6. the device opened the door as claimed in claim 4 using dynamic password, it is characterised in that the use dynamic password opens the door Device also include voice module, for being opened the door result by speech play.
7. a kind of gate control system, it is characterised in that the high in the clouds that the gate control system includes client, is connected with user client communication, And door control terminal;
The client, for sending door request signal to high in the clouds, the door request signal includes cell building where owner Authority information, and receive the dynamic password that high in the clouds is returned;
The high in the clouds, for generating dynamic password according to door request signal and current time;
The door control terminal is the device that the use dynamic password described in any one of claim 4 to 6 opens the door.
8. gate control system as claimed in claim 7, it is characterised in that the high in the clouds specifically for:
The first data source generated according to plaintext create-rule, and synthesized according to the second data source of time encoding rule generation Primary ciphertext;
Selection agreement key;And
Secondary ciphertext is obtained with agreement key encryption according to actual ciphertext;
Judge whether the history ciphertext of secondary ciphertext and the batch repeats, when the history ciphertext of secondary ciphertext and the batch is not repeated When, secondary ciphertext is converted into decimal system pass code.
9. gate control system as claimed in claim 8, it is characterised in that the high in the clouds is additionally operable to:
When the history ciphertext of secondary ciphertext and the batch is repeated, take out the secondary ciphertext and counted again using two grades of spare keys Calculation is obtained updating secondary ciphertext, and the secondary ciphertext of renewal is converted into decimal system pass code.
10. gate control system as claimed in claim 9, it is characterised in that first data source includes seven cipher keys, one Bit check code and 12 device numbering indexes, second data source is 20 keys daily calculated;The agreement is close Key includes 11 keys and bit check code.
CN201710278372.4A 2017-04-25 2017-04-25 Device, method and the gate control system opened the door using dynamic password Pending CN107146303A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710278372.4A CN107146303A (en) 2017-04-25 2017-04-25 Device, method and the gate control system opened the door using dynamic password

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710278372.4A CN107146303A (en) 2017-04-25 2017-04-25 Device, method and the gate control system opened the door using dynamic password

Publications (1)

Publication Number Publication Date
CN107146303A true CN107146303A (en) 2017-09-08

Family

ID=59773975

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710278372.4A Pending CN107146303A (en) 2017-04-25 2017-04-25 Device, method and the gate control system opened the door using dynamic password

Country Status (1)

Country Link
CN (1) CN107146303A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107833317A (en) * 2017-10-20 2018-03-23 珠海华发新科技投资控股有限公司 Control of bluetooth access control system and method
CN107893583A (en) * 2017-10-16 2018-04-10 杭州软库科技有限公司 A kind of intelligent door lock system and control method
CN107958513A (en) * 2017-12-05 2018-04-24 广东亚太天能科技股份有限公司 A kind of offline authorization method and system of electronic lock
CN108989051A (en) * 2018-08-27 2018-12-11 浙江瑞客佳科技有限公司 A kind of dynamic password and its generating mode
CN108986278A (en) * 2018-07-13 2018-12-11 深圳市欧瑞博科技有限公司 A kind of intelligent door lock off-line cipher authorization method and authoring system
CN109615742A (en) * 2018-12-11 2019-04-12 深圳市万物云科技有限公司 A kind of wireless entrance guard control method and device based on LoRaWAN
CN109741500A (en) * 2018-12-29 2019-05-10 北京方正数码有限公司 A kind of setting of the temporary password of smart lock and its verification method
CN113611031A (en) * 2021-07-29 2021-11-05 国网江苏省电力有限公司连云港市赣榆区供电分公司 Networking-free intelligent access control method and system for power distribution room
CN113689603A (en) * 2021-08-20 2021-11-23 青岛海信智慧生活科技股份有限公司 Access control authority management method and device
CN113763615A (en) * 2021-10-28 2021-12-07 李金波 Intelligent property access control management method and system
CN114973483A (en) * 2021-02-25 2022-08-30 星络社区云物联科技有限公司 Entrance guard password verification method, entrance guard equipment and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043326A (en) * 2006-03-22 2007-09-26 赵兴 Dynamic information encrypting system and method
US20140266590A1 (en) * 2013-03-14 2014-09-18 Nagraid Security, Inc. Reconfigurable Smart Identification Badges
CN104517338A (en) * 2015-01-20 2015-04-15 蹇晓梅 Remote door access control system based on wireless network and realization method of remote door access control system
CN106131179A (en) * 2016-07-05 2016-11-16 林哲敏 The password Rights Management System of a kind of intelligent door lock and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043326A (en) * 2006-03-22 2007-09-26 赵兴 Dynamic information encrypting system and method
US20140266590A1 (en) * 2013-03-14 2014-09-18 Nagraid Security, Inc. Reconfigurable Smart Identification Badges
CN104517338A (en) * 2015-01-20 2015-04-15 蹇晓梅 Remote door access control system based on wireless network and realization method of remote door access control system
CN106131179A (en) * 2016-07-05 2016-11-16 林哲敏 The password Rights Management System of a kind of intelligent door lock and method

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107893583A (en) * 2017-10-16 2018-04-10 杭州软库科技有限公司 A kind of intelligent door lock system and control method
CN107833317A (en) * 2017-10-20 2018-03-23 珠海华发新科技投资控股有限公司 Control of bluetooth access control system and method
CN107958513A (en) * 2017-12-05 2018-04-24 广东亚太天能科技股份有限公司 A kind of offline authorization method and system of electronic lock
CN108986278A (en) * 2018-07-13 2018-12-11 深圳市欧瑞博科技有限公司 A kind of intelligent door lock off-line cipher authorization method and authoring system
CN108989051A (en) * 2018-08-27 2018-12-11 浙江瑞客佳科技有限公司 A kind of dynamic password and its generating mode
CN109615742A (en) * 2018-12-11 2019-04-12 深圳市万物云科技有限公司 A kind of wireless entrance guard control method and device based on LoRaWAN
CN109741500A (en) * 2018-12-29 2019-05-10 北京方正数码有限公司 A kind of setting of the temporary password of smart lock and its verification method
CN114973483A (en) * 2021-02-25 2022-08-30 星络社区云物联科技有限公司 Entrance guard password verification method, entrance guard equipment and computer readable storage medium
CN113611031A (en) * 2021-07-29 2021-11-05 国网江苏省电力有限公司连云港市赣榆区供电分公司 Networking-free intelligent access control method and system for power distribution room
CN113689603A (en) * 2021-08-20 2021-11-23 青岛海信智慧生活科技股份有限公司 Access control authority management method and device
CN113763615A (en) * 2021-10-28 2021-12-07 李金波 Intelligent property access control management method and system

Similar Documents

Publication Publication Date Title
CN107146303A (en) Device, method and the gate control system opened the door using dynamic password
CN108270571B (en) Internet of Things identity authorization system and its method based on block chain
CN109286497B (en) Anonymous voting and multi-condition vote counting method based on block chain
CN111787530B (en) Block chain digital identity management method based on SIM card
CN106789047A (en) A kind of block chain identification system
CN101527633B (en) Method for intelligent key devices to obtain digital certificates
CN107231351A (en) The management method and relevant device of electronic certificate
CN108881160A (en) Medical treatment & health data managing method and system based on block chain intelligence contract
CN207409010U (en) The newer temporary password access control system of encryption parameter dynamic
CN109948367A (en) A kind of medical data authorization method based on block chain technology
CN107274532A (en) The temporary password gate control system that encryption parameter dynamically updates
CN108234456A (en) A kind of energy internet trusted service management system and method based on block chain
US20070130463A1 (en) Single one-time password token with single PIN for access to multiple providers
CN1831865B (en) Electronic bank safety authorization system and method based on CPK
CN109409884A (en) A kind of block chain secret protection scheme and system based on SM9 algorithm
CN109617675B (en) Method and system for authenticating identifiers of both sides between charge and discharge facility and user terminal
CN102571357B (en) Signature realization method and signature realization device
CN109756893A (en) A kind of intelligent perception Internet of Things anonymous authentication method based on chaotic maps
CA2273859A1 (en) Authenticating system with microcircuit card
CN107070660A (en) A kind of design Storage method of block chain encrypted radio-frequency chip
CN108055129B (en) A kind of method, equipment and system for realizing the unified management of cellphone shield key
CN108964892A (en) Generation method, application method, management system and the application system of trusted application mark
CN104580246B (en) Dynamic and intelligent safe key is produced and managing and control system and method under WiFi environment
CN110266653A (en) A kind of method for authenticating, system and terminal device
CN108665268A (en) Fingerprint IRLRD feature encryptions method and the payment system based on this method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170908