CN107146303A - Device, method and the gate control system opened the door using dynamic password - Google Patents
Device, method and the gate control system opened the door using dynamic password Download PDFInfo
- Publication number
- CN107146303A CN107146303A CN201710278372.4A CN201710278372A CN107146303A CN 107146303 A CN107146303 A CN 107146303A CN 201710278372 A CN201710278372 A CN 201710278372A CN 107146303 A CN107146303 A CN 107146303A
- Authority
- CN
- China
- Prior art keywords
- dynamic password
- door
- access times
- gate
- ciphertext
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/33—Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/08—With time considerations, e.g. temporary activation, valid time window or time limitations
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention discloses device, method and the gate control system that a kind of use dynamic password opens the door, wherein, the method opened the door using dynamic password is comprised the following steps:The dynamic password of input is obtained, the dynamic password is preset with effective access times;Verification matching is carried out to the dynamic password of acquisition according to correspondence generation dynamic password algorithm;After the match is successful in dynamic password verification, continue to judge whether effective access times of dynamic password exceed access times;And when the access times of dynamic password are without departing from effective access times, open the gate inhibition of the gate in building where owner, cell gate or ground storehouse door.Technical scheme can realize that off line dynamic password is decrypted, and realize and share dynamic password to the visitor into public domain is needed, allow visitor is self-service to open the door, it is to avoid need to ensure public security and examine, or need mandate artificial its enabling, convenient use.
Description
Technical field
The present invention relates to gate inhibition's technical field, more particularly to device, method and the gate inhibition that a kind of use dynamic password opens the door
System.
Background technology
The public domain gate inhibitions such as current cell, office building, are all based on gate control system of swiping the card, and easily occur what card was replicated
Phenomenon.And when there is visitor into public domain gate inhibition, it is necessary to wait identity to be confirmed.In addition, above-mentioned access control equipment, is needed
Network, power, track laying it is complicated, swipe the card or secret number, function is single.User's number of cards is excessive, not portable
Band, visiting if any visitor, it is impossible to conveniently to allow visitor self-service current, increase garden estate management, the current difficulty of visitor.
In view of this, it is necessary to which current gate control system is further improved for proposition.
The content of the invention
To solve an above-mentioned at least technical problem, the main object of the present invention is to provide what a kind of use dynamic password opened the door
Method.
To achieve the above object, one aspect of the present invention is:There is provided what a kind of use dynamic password opened the door
Method, comprises the following steps:
The dynamic password of input is obtained, the dynamic password is preset with effective access times;
Verification matching is carried out to the dynamic password of acquisition according to correspondence generation dynamic password algorithm;
After the match is successful in dynamic password verification, continue to judge whether effective access times of dynamic password exceed using secondary
Number limitation;And
When effective access times of dynamic password are limited without departing from access times, open owner where building it is big
The gate inhibition of door, cell gate or ground storehouse door.
In a specific embodiment, the gate inhibition at the gate in building opened where owner, cell gate or ground storehouse door
The step of after, in addition to effective access times of dynamic password are carried out from subtracting, and effective access times of dynamic password are entered
The step of row is counted again.
In a specific embodiment, the gate inhibition at the gate in building opened where owner, cell gate or ground storehouse door
The step of after, in addition to perform speech play enabling result the step of.
To achieve the above object, another technical solution used in the present invention is:One kind is provided to open the door using dynamic password
Device, including acquisition module, matching module, judge module and processing module,
The acquisition module, the dynamic password for obtaining input, the dynamic password is preset with effective access times;
The matching module, for carrying out verification to the dynamic password of acquisition according to correspondence generation dynamic password algorithm
Match somebody with somebody;
The judge module, after in dynamic password verification, the match is successful, continues to judge effectively using for dynamic password
Whether number of times limits beyond access times, and
The processing module, for when effective access times of dynamic password are limited without departing from access times, opening industry
The gate inhibition at the gate in the building at main place, cell gate or ground storehouse door.
In a specific embodiment, handled module is additionally operable to, and effective access times of dynamic password subtract certainly,
And effective access times of dynamic password are counted again.
In a specific embodiment, the device that the dynamic password opens the door also includes voice module, for passing through voice
Play enabling result.
To achieve the above object, one aspect of the present invention is:A kind of gate control system, including client are provided
End, the high in the clouds being connected with user client communication, and door control terminal;
The client, for sending door-opening password request to high in the clouds, the door-opening password request bag is containing small where owner
Area building authority information, and receive the dynamic password that high in the clouds is returned;
The high in the clouds, for generating dynamic password according to door request signal and current time;
The door control terminal is the device that above-mentioned use dynamic password opens the door.
In a specific embodiment, the high in the clouds specifically for:
The first data source generated according to plaintext create-rule, and according to the second data source of time encoding rule generation
The primary ciphertext of synthesis;
Selection agreement key;And
Secondary ciphertext is obtained with agreement key encryption according to actual ciphertext;
Judge whether the history ciphertext of secondary ciphertext and the batch repeats, when secondary ciphertext and the batch history ciphertext not
When repeating, secondary ciphertext will be updated and be converted to decimal system pass code.
In a specific embodiment, the high in the clouds is additionally operable to:
When the history ciphertext of secondary ciphertext and the batch is repeated, the secondary ciphertext is taken out and using two grades of spare key weights
Newly calculate and obtain updating secondary ciphertext, and update secondary ciphertext and be converted to decimal system pass code.
In a specific embodiment, first data source includes seven cipher keys, bit check position and 12
Device numbering is indexed, and second data source is 20 keys daily calculated;The agreement key includes 11 keys
Position and bit check position.
Technical scheme, which is used, carries out offline verification matching to dynamic password, and by judging dynamic password
When effective access times are in the range of access times limitation, corresponding gate inhibition is opened, can realize that off line dynamic password is decrypted, it is real
Now share dynamic password to the visitor into public domain is needed, allow visitor is self-service to open the door, examined without security personnel, or need to award
Power artificial its enabling, convenient use;, can be in the premise based on cryptosecurity by the limitation to dynamic password access times
Under, lift security performance.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with
Structure according to these accompanying drawings obtains other accompanying drawings.
The flow chart for the method that Fig. 1 opens the door for the use dynamic password of one embodiment of the invention;
Fig. 2 is the block diagram for the device that one embodiment of the invention is opened the door using dynamic password;
Fig. 3 is the block diagram of the gate control system of one embodiment of the invention;
The flow chart that Fig. 4 encrypts for head in the present invention.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.Base
Embodiment in the present invention, those of ordinary skill in the art obtained under the premise of creative work is not made it is all its
His embodiment, belongs to the scope of protection of the invention.
It is to be appreciated that the description for being related to " first ", " second " etc. in the present invention be only used for describe purpose, and it is not intended that
Indicate or imply its relative importance or the implicit quantity for indicating indicated technical characteristic.Thus, define " first ",
At least one this feature can be expressed or be implicitly included to the feature of " second ".In addition, the technical side between each embodiment
Case can be combined with each other, but must can be implemented as basis with those of ordinary skill in the art, when the combination of technical scheme
It will be understood that the combination of this technical scheme is not present, also not in the guarantor of application claims when appearance is conflicting or can not realize
Within the scope of shield.
Fig. 1 is refer to, in embodiments of the present invention, this uses the method that dynamic password opens the door, and comprises the following steps:
Step S10, the dynamic password for obtaining input, the dynamic password are preset with effective access times;
Step S20, the dynamic password progress verification matching according to correspondence generation dynamic password algorithm to acquisition;
Step S30, in dynamic password verification after the match is successful, continuation judges whether effective access times of dynamic password surpass
Go out access times limitation;And
Step S40, when effective access times of dynamic password are limited without departing from access times, open owner where building
Gate, cell gate or ground storehouse door gate inhibition.
In the present embodiment, effective access times of dynamic password can be set according to actual requirement, and this programme is preferred
For 3-5 times, gate, cell gate, Di Kumen are corresponded to respectively, certain number of times can go out indegree and set to set according to actual
It is fixed.In view of coming and going problem, even-times is preferably positioned to, odd-times can be arranged to during for specific requirement;Coming and going gate needs
Want 2 times, cell gate 1 time, 3 times etc. altogether.Dynamic password is generated by backstage or high in the clouds, terminal can using correspondence backstage or
The generation dynamic password algorithm in person high in the clouds, specially decipherment algorithm is verified offline;After offline verification passes through, in addition it is also necessary to enter
The effective access times verification of Mobile state password, in this way, realizing self-service enabling, and can improve security performance.
Technical scheme, which is used, carries out offline verification matching to dynamic password, and by judging dynamic password
When effective access times are in the range of access times limitation, corresponding gate inhibition is opened, can be according to realizing off line dynamic password solution
It is close, realize and share dynamic password to the visitor into public domain is needed, allow visitor is self-service to open the door, no needs, which are ensured public security, to be examined, or
Person is without authorizing artificial its enabling, convenient use;, can be based on cryptosecurity by the limitation to dynamic password access times
On the premise of, improve security performance.
In a specific embodiment, the gate inhibition at the gate in building opened where owner, cell gate or ground storehouse door
The step of after, in addition to effective access times of dynamic password are carried out from subtracting, and effective access times of dynamic password are entered
The step of row is counted again.
In the present embodiment, dynamic password successfully opens the door per effectively using once, has dynamic password is default using secondary
First number is corresponding can to reduce the times of acquisition of dynamic password from subtracting, and second prevent dynamic password from abusing problem, in this way, energy
It is enough to improve the security performance opened the door.
In a specific embodiment, the gate inhibition at the gate in building opened where owner, cell gate or ground storehouse door
The step of after, in addition to perform speech play enabling result the step of.
In the present embodiment, after opening the door successfully, the successful voice messaging of enabling can be also played, to remind the attention of user.
When opening the door failure, the information for failure of opening the door can be returned.
Refer to Fig. 2, in an embodiment of the present invention, this use dynamic password open the door device, including acquisition module,
With module, judge module and processing module,
The acquisition module 10, the dynamic password for obtaining input, the dynamic password is preset with effective access times;
The matching module 20, for carrying out verification to the dynamic password of input according to correspondence generation dynamic password algorithm
Match somebody with somebody;
The judge module 30, after in dynamic password verification, the match is successful, continues to judge effectively making for dynamic password
Whether limited with number of times beyond access times;And
The processing module 40, for when effective access times of dynamic password are limited without departing from access times, opening
The gate inhibition at the gate in the building where owner, cell gate or ground storehouse door.
Embodiments of the invention can obtain the encrypted message that visitor inputs immediately using acquisition module, then by dynamic
State password carries out offline verification matching and effective access times of dynamic password judge, after both meeting, can open industry
The gate inhibition at the gate in the building at main place, cell gate or ground storehouse door, so, it is possible to achieve share dynamic password and enter public affairs to needs
The visitor in region, convenient use, are examined without security personnel altogether, or without authorizing its artificial enabling;By using dynamic password
The limitation of number of times, can lift security performance on the premise of based on cryptosecurity.
In a specific embodiment, handled module 40 is additionally operable to, and effective access times of dynamic password are carried out certainly
Subtract, and effective access times of dynamic password are counted again.
In the present embodiment, the processing module 40, in dynamic password per effectively using once, i.e., when successfully opening the door, by dynamic
Password is default to have access times corresponding from subtracting, and first can reduce the times of acquisition of dynamic password, second anti-dynamic is close
Code abuse problem, so, it is possible to improve the security performance opened the door.
In a specific embodiment, the device that the dynamic password opens the door also includes voice module 50, for passing through language
Sound plays enabling result.
In the present embodiment, after opening the door successfully, the voice module 50 can also play the successful voice messaging of enabling, to remind
The attention of user.When opening the door failure, the information for failure of opening the door can be returned.
Refer to Fig. 3, in an embodiment of the present invention, the gate control system, including client 1, with client 1 communication be connected
High in the clouds 2, and door control terminal 3;
The client 1, for sending door request signal to high in the clouds 2, the door request signal is comprising where owner
Cell building authority information, and receive the dynamic password that high in the clouds 2 is returned;
The high in the clouds 2, for generating dynamic password according to door request signal and current time;
The door control terminal 3 is the device that above-mentioned use dynamic password opens the door.
In the present embodiment, client can be the portable intelligent equipment such as mobile phone terminal, IPAD terminals.Specifically, client 1
Door request signal is initiated to high in the clouds 2, high in the clouds 2 is (close according to gate inhibition's machine information, current time one 6 decimal system password of generation
The configurable term of validity used of code and access times), and mobile phone terminal 1 is returned to, opened to the input of door control terminal 3 password request
Behind the door, door control terminal 3 is according to cryptographic algorithm (with the same set of algorithm in high in the clouds 2), and whether verification input password matches and effectively make
Whether limited, then opened the door when matching and being limited without departing from access times beyond access times with number of times, on the contrary failure of opening the door;Open
Door state intuitively informs visitor's enabling result by voice mode.Enabling authority:The dynamic password that visitor uses is according to owner
Houseclearing control enabling authority, i.e. visitor go out to visit with certain owner, can use dynamic password open periphery gate and industry
The cell gate in main place building, storehouse door etc., using the dynamic password the building cell gate where non-owner, storehouse door should not
Can open corresponding gate inhibition, visitor open the gate for possessing enabling authority, cell gate, storehouse door same 6 ten should be used to enter
Dynamic secret number.
Refer to Fig. 4, in a specific embodiment, the high in the clouds 2 specifically for:
The first data source generated according to plaintext create-rule, and according to the second data source of time encoding rule generation
The primary ciphertext of synthesis;
Selection agreement key;And
Secondary ciphertext is obtained with agreement key encryption according to actual ciphertext;
Judge whether the history ciphertext of secondary ciphertext and the batch repeats, take out the secondary ciphertext and standby close using two grades
Key, which is recalculated, to be obtained updating secondary ciphertext, will be updated secondary ciphertext and is converted to decimal system pass code;
When the history ciphertext of secondary ciphertext and the batch is repeated, take out the secondary ciphertext and with next batch key again
Calculating obtains updating secondary ciphertext, and updates secondary ciphertext and be converted to decimal system pass code.
In the present embodiment, dynamic password enabling encryption principle is encrypted by using the time value with plaintext equal length
Temporal information has been attached in the primary encrypted cipher text arrived, secondary ciphertext now;With primary ciphertext with being obtained after agreement key encryption
To current ciphertext.Now, exceed to avoid during identical ciphertext appearance, the about identical ciphertext of settled appearance, or after encryption
999999 phenomenons, take next batch key to recalculate and draw the secondary ciphertext of renewal, and the secondary ciphertext of the renewal is switched to lead to
Row code;Decrypting process is completed in door control terminal, and it is the inverse process of this cipher mode.Specifically, the first original number in this programme
It is 20 (bit) according to position, specific constitute refer to table 1.
Table 1
As can be seen that D0-D6 is cipher key from above-mentioned table 1, D7 is significance bit, and D8-D19 is that device numbering index can
To include 4096 equipment.
The second data source is specially the one-level key calculated by number of days in this programme, refer to table 2.
Table 2
As can be seen that D1-D20 is the random eight-digit number of a ciphertext from above-mentioned table 2;The length of the ciphertext is at least 90
Byte, article size is more than 365*20/8=90Byte, is taken according to a byte 8bit, often takes a byte as key,
Every 8 data are used as the key (one-level key) of one day.
It is secondary key (secondary key) to arrange key in the present embodiment, and the agreement key includes 11 (bit) keys
Position and (bit) check bit, refer to table 3.
Table 3
In table 3, (bit) check bit is removed in D0-D11, it is secret key bits to be left 11 (bit), has 2048 kinds
Combination.The generating principle of secondary key:The secondary key table for producing a 0-255 in every 5 minutes, one day total produce 288, it is necessary to
For 256, high in the clouds and door control terminal are changed using same rule.After the cipher key table of server has been used,
Just using the 2nd key list.Specifically, when number of days monthly be odd number when, sequentially in time and start bit incremental order give birth to
Into secondary key table, and the part start bit decreasing order generation secondary key table exceeded;When number of days monthly is even number, press
Successively decrease according to time sequencing and start bit and be sequentially generated secondary key table, and the part order exceeded incrementally generates secondary key table.
According to table 1 to table 3, the second data source can randomly choose an article for being more than 90 bytes, daily according to individual character
Section is chosen, and often takes a byte as one-level key, every 8 data are given birth to for the one-level key of one day with the plaintext after upsetting
Into primary key, the secondary key in table 3 and rear 12 (bit) XOR generation time again of ciphertext are then selected according to concordance list
Level ciphertext, the secondary ciphertext is metric pass code.
The gate control system of this programme, at least specific advantages below:
1st, 2 kinds of quasi-modes of off line (offline) and networking are supported, online, old cell is needed compared to traditional access control equipment
Project reconstruction, network infrastructure disposes the problem of difficulty is big, with obvious advantage;
2nd, own key algorithm, can accomplish that equipment end and the side of service end two are seamlessly connected, key algorithm has safety, height
The characteristics of effect;
3rd, gate inhibition's quantity that the key algorithm used is supported is more, and horizontal expansion is strong, can accomplish that same cell is propped up simultaneously
The access control equipment 5000+ held quantity;
4th, the numerical ciphers repetitive rate of key algorithm generation is low, and high in the clouds generation key can guarantee that the unique of same day generation password
Property;
5th, other numerical ciphers algorithms are compared to, the key algorithm trial and error probability of this programme is low;
6th, the dynamic password of this algorithm generation, can be shared, it is to avoid visitor needs to examine identity;
7th, configuration change, and the operations such as record upload that will open the door can be carried out by managing app.
8th, front end access control equipment, without complex network or signal routing, it is only necessary to which the source of energization can work.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the scope of the invention, it is every at this
Under the inventive concept of invention, the equivalent structure transformation made using description of the invention and accompanying drawing content, or directly/use indirectly
It is included in other related technical fields in the scope of patent protection of the present invention.
Claims (10)
1. a kind of method that use dynamic password opens the door, it is characterised in that the method that the use dynamic password opens the door is included such as
Lower step:
The dynamic password of input is obtained, the dynamic password is preset with effective access times;
Verification matching is carried out to the dynamic password of acquisition according to correspondence generation dynamic password algorithm;
After in dynamic password verification, the match is successful, continue to judge effective access times of dynamic password whether beyond access times limit
System;And
When effective access times of dynamic password are limited without departing from access times, gate, the list in the building where opening owner
The gate inhibition of first door or ground storehouse door.
2. the method that dynamic password as claimed in claim 1 opens the door, it is characterised in that building where the opening owner
After the step of gate inhibition at gate, cell gate or ground storehouse door, in addition to effective access times of dynamic password certainly subtract, and it is right
The step of effective access times of dynamic password are counted again.
3. the method that dynamic password as claimed in claim 1 opens the door, it is characterised in that building where the opening owner
After the step of gate inhibition at gate, cell gate or ground storehouse door, in addition to the step of execution speech play enabling result.
4. the device that a kind of use dynamic password opens the door, it is characterised in that the device that the use dynamic password opens the door includes obtaining
Modulus block, matching module, judge module and processing module,
The acquisition module, the dynamic password for obtaining input, the dynamic password is preset with effective access times;
The matching module, for carrying out verification matching to the dynamic password of acquisition according to correspondence generation dynamic password algorithm;
The judge module, after in dynamic password verification, the match is successful, continues to judge effective access times of dynamic password
Whether beyond access times limitation;And
The processing module, for when effective access times of dynamic password are limited without departing from access times, opening owner institute
The gate in building, cell gate or ground storehouse door gate inhibition.
5. the device opened the door as claimed in claim 4 using dynamic password, it is characterised in that handled module is additionally operable to, right
Effective access times of dynamic password subtract certainly, and effective access times of dynamic password are counted again.
6. the device opened the door as claimed in claim 4 using dynamic password, it is characterised in that the use dynamic password opens the door
Device also include voice module, for being opened the door result by speech play.
7. a kind of gate control system, it is characterised in that the high in the clouds that the gate control system includes client, is connected with user client communication,
And door control terminal;
The client, for sending door request signal to high in the clouds, the door request signal includes cell building where owner
Authority information, and receive the dynamic password that high in the clouds is returned;
The high in the clouds, for generating dynamic password according to door request signal and current time;
The door control terminal is the device that the use dynamic password described in any one of claim 4 to 6 opens the door.
8. gate control system as claimed in claim 7, it is characterised in that the high in the clouds specifically for:
The first data source generated according to plaintext create-rule, and synthesized according to the second data source of time encoding rule generation
Primary ciphertext;
Selection agreement key;And
Secondary ciphertext is obtained with agreement key encryption according to actual ciphertext;
Judge whether the history ciphertext of secondary ciphertext and the batch repeats, when the history ciphertext of secondary ciphertext and the batch is not repeated
When, secondary ciphertext is converted into decimal system pass code.
9. gate control system as claimed in claim 8, it is characterised in that the high in the clouds is additionally operable to:
When the history ciphertext of secondary ciphertext and the batch is repeated, take out the secondary ciphertext and counted again using two grades of spare keys
Calculation is obtained updating secondary ciphertext, and the secondary ciphertext of renewal is converted into decimal system pass code.
10. gate control system as claimed in claim 9, it is characterised in that first data source includes seven cipher keys, one
Bit check code and 12 device numbering indexes, second data source is 20 keys daily calculated;The agreement is close
Key includes 11 keys and bit check code.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710278372.4A CN107146303A (en) | 2017-04-25 | 2017-04-25 | Device, method and the gate control system opened the door using dynamic password |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710278372.4A CN107146303A (en) | 2017-04-25 | 2017-04-25 | Device, method and the gate control system opened the door using dynamic password |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107146303A true CN107146303A (en) | 2017-09-08 |
Family
ID=59773975
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710278372.4A Pending CN107146303A (en) | 2017-04-25 | 2017-04-25 | Device, method and the gate control system opened the door using dynamic password |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107146303A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107833317A (en) * | 2017-10-20 | 2018-03-23 | 珠海华发新科技投资控股有限公司 | Control of bluetooth access control system and method |
CN107893583A (en) * | 2017-10-16 | 2018-04-10 | 杭州软库科技有限公司 | A kind of intelligent door lock system and control method |
CN107958513A (en) * | 2017-12-05 | 2018-04-24 | 广东亚太天能科技股份有限公司 | A kind of offline authorization method and system of electronic lock |
CN108989051A (en) * | 2018-08-27 | 2018-12-11 | 浙江瑞客佳科技有限公司 | A kind of dynamic password and its generating mode |
CN108986278A (en) * | 2018-07-13 | 2018-12-11 | 深圳市欧瑞博科技有限公司 | A kind of intelligent door lock off-line cipher authorization method and authoring system |
CN109615742A (en) * | 2018-12-11 | 2019-04-12 | 深圳市万物云科技有限公司 | A kind of wireless entrance guard control method and device based on LoRaWAN |
CN109741500A (en) * | 2018-12-29 | 2019-05-10 | 北京方正数码有限公司 | A kind of setting of the temporary password of smart lock and its verification method |
CN113611031A (en) * | 2021-07-29 | 2021-11-05 | 国网江苏省电力有限公司连云港市赣榆区供电分公司 | Networking-free intelligent access control method and system for power distribution room |
CN113689603A (en) * | 2021-08-20 | 2021-11-23 | 青岛海信智慧生活科技股份有限公司 | Access control authority management method and device |
CN113763615A (en) * | 2021-10-28 | 2021-12-07 | 李金波 | Intelligent property access control management method and system |
CN114973483A (en) * | 2021-02-25 | 2022-08-30 | 星络社区云物联科技有限公司 | Entrance guard password verification method, entrance guard equipment and computer readable storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101043326A (en) * | 2006-03-22 | 2007-09-26 | 赵兴 | Dynamic information encrypting system and method |
US20140266590A1 (en) * | 2013-03-14 | 2014-09-18 | Nagraid Security, Inc. | Reconfigurable Smart Identification Badges |
CN104517338A (en) * | 2015-01-20 | 2015-04-15 | 蹇晓梅 | Remote door access control system based on wireless network and realization method of remote door access control system |
CN106131179A (en) * | 2016-07-05 | 2016-11-16 | 林哲敏 | The password Rights Management System of a kind of intelligent door lock and method |
-
2017
- 2017-04-25 CN CN201710278372.4A patent/CN107146303A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101043326A (en) * | 2006-03-22 | 2007-09-26 | 赵兴 | Dynamic information encrypting system and method |
US20140266590A1 (en) * | 2013-03-14 | 2014-09-18 | Nagraid Security, Inc. | Reconfigurable Smart Identification Badges |
CN104517338A (en) * | 2015-01-20 | 2015-04-15 | 蹇晓梅 | Remote door access control system based on wireless network and realization method of remote door access control system |
CN106131179A (en) * | 2016-07-05 | 2016-11-16 | 林哲敏 | The password Rights Management System of a kind of intelligent door lock and method |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107893583A (en) * | 2017-10-16 | 2018-04-10 | 杭州软库科技有限公司 | A kind of intelligent door lock system and control method |
CN107833317A (en) * | 2017-10-20 | 2018-03-23 | 珠海华发新科技投资控股有限公司 | Control of bluetooth access control system and method |
CN107958513A (en) * | 2017-12-05 | 2018-04-24 | 广东亚太天能科技股份有限公司 | A kind of offline authorization method and system of electronic lock |
CN108986278A (en) * | 2018-07-13 | 2018-12-11 | 深圳市欧瑞博科技有限公司 | A kind of intelligent door lock off-line cipher authorization method and authoring system |
CN108989051A (en) * | 2018-08-27 | 2018-12-11 | 浙江瑞客佳科技有限公司 | A kind of dynamic password and its generating mode |
CN109615742A (en) * | 2018-12-11 | 2019-04-12 | 深圳市万物云科技有限公司 | A kind of wireless entrance guard control method and device based on LoRaWAN |
CN109741500A (en) * | 2018-12-29 | 2019-05-10 | 北京方正数码有限公司 | A kind of setting of the temporary password of smart lock and its verification method |
CN114973483A (en) * | 2021-02-25 | 2022-08-30 | 星络社区云物联科技有限公司 | Entrance guard password verification method, entrance guard equipment and computer readable storage medium |
CN113611031A (en) * | 2021-07-29 | 2021-11-05 | 国网江苏省电力有限公司连云港市赣榆区供电分公司 | Networking-free intelligent access control method and system for power distribution room |
CN113689603A (en) * | 2021-08-20 | 2021-11-23 | 青岛海信智慧生活科技股份有限公司 | Access control authority management method and device |
CN113763615A (en) * | 2021-10-28 | 2021-12-07 | 李金波 | Intelligent property access control management method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107146303A (en) | Device, method and the gate control system opened the door using dynamic password | |
CN108270571B (en) | Internet of Things identity authorization system and its method based on block chain | |
CN109286497B (en) | Anonymous voting and multi-condition vote counting method based on block chain | |
CN111787530B (en) | Block chain digital identity management method based on SIM card | |
CN106789047A (en) | A kind of block chain identification system | |
CN101527633B (en) | Method for intelligent key devices to obtain digital certificates | |
CN107231351A (en) | The management method and relevant device of electronic certificate | |
CN108881160A (en) | Medical treatment & health data managing method and system based on block chain intelligence contract | |
CN207409010U (en) | The newer temporary password access control system of encryption parameter dynamic | |
CN109948367A (en) | A kind of medical data authorization method based on block chain technology | |
CN107274532A (en) | The temporary password gate control system that encryption parameter dynamically updates | |
CN108234456A (en) | A kind of energy internet trusted service management system and method based on block chain | |
US20070130463A1 (en) | Single one-time password token with single PIN for access to multiple providers | |
CN1831865B (en) | Electronic bank safety authorization system and method based on CPK | |
CN109409884A (en) | A kind of block chain secret protection scheme and system based on SM9 algorithm | |
CN109617675B (en) | Method and system for authenticating identifiers of both sides between charge and discharge facility and user terminal | |
CN102571357B (en) | Signature realization method and signature realization device | |
CN109756893A (en) | A kind of intelligent perception Internet of Things anonymous authentication method based on chaotic maps | |
CA2273859A1 (en) | Authenticating system with microcircuit card | |
CN107070660A (en) | A kind of design Storage method of block chain encrypted radio-frequency chip | |
CN108055129B (en) | A kind of method, equipment and system for realizing the unified management of cellphone shield key | |
CN108964892A (en) | Generation method, application method, management system and the application system of trusted application mark | |
CN104580246B (en) | Dynamic and intelligent safe key is produced and managing and control system and method under WiFi environment | |
CN110266653A (en) | A kind of method for authenticating, system and terminal device | |
CN108665268A (en) | Fingerprint IRLRD feature encryptions method and the payment system based on this method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170908 |