CN113066215B - Two-dimensional code access control management method, system and storage medium - Google Patents

Two-dimensional code access control management method, system and storage medium Download PDF

Info

Publication number
CN113066215B
CN113066215B CN202110274936.3A CN202110274936A CN113066215B CN 113066215 B CN113066215 B CN 113066215B CN 202110274936 A CN202110274936 A CN 202110274936A CN 113066215 B CN113066215 B CN 113066215B
Authority
CN
China
Prior art keywords
dimensional code
user
login password
access control
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110274936.3A
Other languages
Chinese (zh)
Other versions
CN113066215A (en
Inventor
柳建兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changsha Guangyuan Property Management Co ltd
Original Assignee
Changsha Guangyuan Property Management Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changsha Guangyuan Property Management Co ltd filed Critical Changsha Guangyuan Property Management Co ltd
Priority to CN202110274936.3A priority Critical patent/CN113066215B/en
Publication of CN113066215A publication Critical patent/CN113066215A/en
Application granted granted Critical
Publication of CN113066215B publication Critical patent/CN113066215B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/33Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Abstract

The application relates to a two-dimension code access control management method, a system and a storage medium, which relate to the technical field of access control, and solve the problem that once a static two-dimension code is taken a picture for an outsider and the outsider can open the access control through the acquired static two-dimension code, the safety factor of an access control system is low, and the access control system comprises: if the digital login password and the verification two-dimensional code are correctly identified and the identification sequence is the same as the confirmed sequence, controlling the access control system to open the door; on the contrary, if the first digital login password and the verification two-dimensional code are identified incorrectly and/or the identification sequence is inconsistent with the confirmed sequence, the first correct digital login password is changed to be the second correct digital login password based on the error reason. This application combines digit login password and two-dimensional code, has improved access control system's factor of safety, avoids the outsider to open the door through acquireing static two-dimensional code control access control system.

Description

Two-dimensional code access control management method, system and storage medium
Technical Field
The application relates to the technical field of entrance guard, in particular to a two-dimensional code entrance guard management method, a two-dimensional code entrance guard management system and a storage medium.
Background
Two-dimensional code entrance guard is a novel entrance guard application technology which is formed by following the development of a smart phone terminal, a computer network technology and an internet of things technology. Two-dimensional Code, namely QR Code (Quick Response Code), is a very widely used encoding method on mobile devices in recent years, and it can store more information and represent more data types than traditional Bar Code (Bar Code), for example: characters, numbers, Chinese, etc. Due to the generation of the two-dimensional code, the method is low in manufacturing cost and good in convenience, and is gradually widely applied to the access control system.
At present, in a system for opening an access control system based on a two-dimension code, a static two-dimension code is mainly and singly used for controlling an access control system to open a door, namely, whether a user has the door opening permission or not is determined by identifying the static two-dimension code on a mobile terminal.
With respect to the related art in the above, the inventors consider that there are the following drawbacks: in case static two-dimensional code is taken a picture for the other person and is obtained, the other person also can open the entrance guard through the static two-dimensional code that obtains so, leads to access control system's factor of safety lower.
Disclosure of Invention
In order to improve the safety factor of the access control system and prevent outsiders from controlling the access control system to open the door by acquiring the static two-dimensional code, the application provides a two-dimensional code access control management method, a system and a storage medium.
In a first aspect, the present application provides a two-dimensional code access control management method, which adopts the following technical scheme:
a two-dimension code access control management method comprises the following steps:
acquiring user identity information, wherein the user information comprises a user name and a user identity card number;
if the user identity information is matched with the pre-stored legal user entering information, sending a random verification two-dimensional code to a terminal held by the user;
constructing a correct digital login password of the user based on the date of the day, the name of the user and the identity card number of the user, and confirming the identification sequence of the digital login password and the verification two-dimensional code based on the date of the day;
acquiring a digital login password, a verification two-dimensional code and an input sequence which are input by a user;
if the digital login password and the verification two-dimensional code are correctly identified and the identification sequence is the same as the confirmed sequence, controlling the access control system to open the door;
if the first digital login password and the verification two-dimensional code are identified incorrectly and/or the identification sequence is inconsistent with the confirmed sequence, changing the first correct digital login password as a second correct digital login password based on the error reason;
acquiring the digital login password and the verification two-dimensional code input by the user again and the input sequence;
if the digital login password and the verification two-dimensional code are correctly identified and the identification sequence is the same as the confirmed sequence, controlling the access control system to open the door;
otherwise, if the identification error of the second digital login password and the verification two-dimensional code occurs, and/or the identification sequence is inconsistent with the confirmed sequence, the access control system is controlled to be closed, and the property responsible person is informed;
and if the user identity information is not matched with the pre-stored legal user entering information, no notice is given.
By adopting the technical scheme, the user identity information can be identified, the random verification two-dimensional code is sent to the terminal held by the user on the premise that the user identity is correctly identified, the digital login password is constructed by combining the user identity information and the current date, and the sequence of the digital login password and the verification two-dimensional code verification is confirmed on the basis of the current date, so that the safety of the user information is guaranteed to the greatest extent, and login and decryption of outsiders are avoided.
Optionally, the step of obtaining the user identity information is as follows:
acquiring head portrait information of a user;
and inquiring the user identity information by taking the head portrait information of the user as an inquiry object from a preset first database in which the head portrait information of the user and the user identity information matched with the head portrait information of the corresponding user are stored.
By adopting the technical scheme, the head portrait information of the user can be acquired in time, and the identity information of the user can be effectively confirmed based on the head portrait information of the user and the first database.
Optionally, the construction steps of the correct digital login password of the user are as follows:
acquiring the date of the day, the name of the user and the identity card number of the user;
determining the number of strokes of a user name based on the user name, determining the sum of the number of months and the number of characters of the day based on the date of the day, taking the number of strokes of the user name as a dividend, taking the sum of the number of months and the number of characters of the day as a divisor, and taking the obtained remainder as a first password;
comparing the number of months of the current day with the number of days, if the number of months is more than or equal to the number of days, selecting the first 9 bits of the user identity card number as a second password, and if the number of days is larger, selecting the second 9 bits of the user identity card number as the second password;
the first password is arranged before the second password to be used as a correct digital login password of the user.
By adopting the technical scheme, the date of the day, the name of the user and the identity card number of the user are fully utilized, and the first password and the second password are flexibly constructed, so that the digital login password is more flexible, and the difficulty of cracking by outsiders is reduced to a greater extent.
Optionally, the step of confirming the identification sequence of the digital login password and the verification two-dimensional code is as follows:
multiplying the number of months of the day's date by the number of days;
if the product of the month number and the number of the days is an odd number, sequencing the digital login password before verifying the two-dimensional code for identification; on the contrary, if the product of the month number of the current day and the number of the day is an even number, the digital login password is sorted behind the two-dimensional code for identification.
By adopting the technical scheme, the product of the number of the month and the number of the day is introduced, and whether the digital login password needs to be sequenced behind the two-dimensional code or not is effectively judged based on the parity of the product of the number of the month and the number of the day, so that the difficulty of cracking by outsiders is further improved, and the safety of information is improved.
Optionally, the step of changing the first correct digital login password as the second correct digital login password based on the cause of the error is as follows:
if the first digital login password and the verification two-dimensional code are identified wrongly independently, adding 1 to the mantissa of the first correct digital login password to be used as a second correct digital login password;
if the sequence of the first digital login password is not consistent with the sequence of the two-dimensional code identification, adding 2 to the first correct digital password mantissa to obtain a second correct digital login password;
if the first digital login password and the verification two-dimensional code are identified incorrectly at the same time and the first digital login password and the verification two-dimensional code are identified in different orders, adding 3 to the first correct digital password mantissa to be used as a second correct digital login password.
By adopting the technical scheme, the situation that the digital login password is changed for the first time based on several wrong reasons is specifically disclosed, the difficulty of the outsider in trying to crack the digital login password is further improved, and the possibility of the outsider trying to crack the password is reduced.
Optionally, the step of notifying the property leader is as follows:
acquiring a property responsible person contact way associated with the corresponding two-dimensional code access control by taking the currently identified failed two-dimensional code access control as an inquiry object from a preset second database in which the property associated with the two-dimensional code access control and the corresponding property responsible person contact way are stored;
and sending the information to the terminal equipment held by the property manager.
By adopting the technical scheme, the corresponding property responsible person can be timely notified on the premise of continuous password error transmission for several times.
In a second aspect, the present application provides a two-dimensional code access control system, which adopts the following technical solution:
a two-dimensional code access control system, comprising a memory, a processor and a program stored in the memory and capable of running on the processor, wherein the program can be loaded and executed by the processor to implement a two-dimensional code access control method according to any one of the preceding claims.
By adopting the technical scheme, the user identity information can be identified by calling the program, the random verification two-dimensional code is sent to the terminal held by the user on the premise of correct identification of the user identity, the digital login password is constructed by combining the user identity information and the current date, and the sequence of the digital login password and the verification of the verification two-dimensional code is confirmed based on the current date, so that the safety of the user information is guaranteed to the greatest extent, and the login and the decryption of outsiders are avoided.
In a third aspect, the present application provides a computer storage medium, which adopts the following technical solutions:
a computer storage medium comprising a program capable of being loaded and executed by a processor to implement a two-dimensional code access control method according to any one of the preceding claims.
By adopting the technical scheme, the user identity information can be identified by calling the program, the random verification two-dimensional code is sent to the terminal held by the user on the premise of correct identification of the user identity, the digital login password is constructed by combining the user identity information and the current date, and the sequence of the digital login password and the verification of the verification two-dimensional code is confirmed based on the current date, so that the safety of the user information is guaranteed to the greatest extent, and the login and the decryption of outsiders are avoided. .
To sum up, the beneficial technical effect of this application does:
1. the requirement for user identity identification is improved by combining the digital login password and the random verification two-dimensional code, and the safety of the entrance guard is guaranteed.
2. Under the condition that the user makes mistakes for the first time, the digital login password can be changed, the user meeting the identity requirement can be effectively ensured to pass through the entrance guard, and the possibility that outsiders try to crack the password is reduced.
Drawings
Fig. 1 is a schematic diagram illustrating specific steps of a two-dimensional code access control management method according to an embodiment of the present application.
Fig. 2 is a detailed step diagram of step S100 in fig. 1.
Fig. 3 is a schematic diagram of the steps of constructing the correct digital login password mentioned by the user in step S300 in fig. 1.
Fig. 4 is a schematic diagram of the step of confirming the identification sequence of the digital login password and the verification two-dimensional code based on the current day date in step S300 in fig. 1.
Fig. 5 is a schematic diagram of the step of notifying the property manager mentioned in step SD00 in fig. 1.
Detailed Description
The present application is described in further detail below with reference to the attached drawings.
Referring to fig. 1, the two-dimensional code access control method disclosed in the present application includes step S100, step S200, step SA00, step S300, step S400, step SB00, step S500, step S600, step SC00, and step SD00, where step S200 and step SA00 are parallel steps, step SB00 and step S500 are parallel steps, and step SC00 and step SD00 are parallel steps.
In step S100, user identity information is obtained, where the user information includes a user name and a user identification number.
Referring to fig. 2, the step of acquiring the user identity information mentioned in step S100 can be divided into step S110 to step S120.
In step S110, avatar information of the user is acquired.
Specifically, the step S110 of acquiring the head portrait information of the user may acquire the head of the user by shooting through a camera, and identify and acquire the head portrait information of the user through an image recognition system.
In step S120, the user identity information is queried from a preset first database in which the user avatar information and the user identity information matched with the corresponding user avatar information are stored, with the user avatar information as a query object.
Specifically, the user identification information mentioned in step S120 includes the name and identification card information of the user.
In step S200, if the user identity information matches with the pre-stored information of the legal user, the random verification two-dimensional code is sent to the terminal held by the user.
In step SA00, if the user identification information does not match the pre-stored information of the legal user, no notification is made.
In step S300, a correct digital login password is constructed based on the current date, the user name and the user id card number, and the identification sequence of the digital login password and the verification two-dimensional code is confirmed based on the current date.
Referring to fig. 3, the steps of constructing the correct digital login password for the user mentioned in step S300 can be divided into steps S3a0 to S3d 0.
In step S3a0, the date of the day, the user 'S name, and the user' S identification number are acquired.
In step S3b0, the number of strokes of the user name is determined based on the user name, while the sum of the number of months and the number of letters of the day is determined based on the day date, the number of strokes of the user name is taken as a dividend, the sum of the number of months and the number of letters of the day is taken as a divisor, and the remainder obtained is taken as a first password.
In step S3c0, the number of months of the current day is compared with the number of days, if the number of months is greater than or equal to the number of days, the first 9 digits of the user id number are selected as the second password, and if the number of days is greater, the second 9 digits of the user id number are selected as the second password.
In step S3d0, the first password is arranged before the second password as the correct digital login password for the user.
For example, assuming that the current date is 12 months and 5 days, the sum of the number of months and the number of days of the current date is 17, assuming that the user name is wanei, the number of strokes of the user name is 19, the remainder is 2, and thus the first password is 2.
And (4) taking the first 9 bits of the user identity card number as a second password as the number of the current month exceeds the number of the current date, and assuming that the first 9 bits of the user identity card number are 0311111111, the second password is 0311111111, and finally, after the step S3d0, the digital login password is 20311111111.
Referring to fig. 4, the step of confirming the identification order of the digital login password and the verification two-dimensional code based on the current day date in step S300 may be divided into step S3a0 to step S3B 0.
In step S3a0, the number of months of the day date and the number of characters are multiplied.
In step S3B0, if the product of the number of months of the day date multiplied by the number of days is an odd number, the digital login password is ordered and identified before the two-dimensional code is verified; on the contrary, if the product of the month number of the current day and the number of the day is an even number, the digital login password is sorted behind the two-dimensional code for identification.
For example, if the day date is 12 months and 5 days, the product of the number of months and the number of days of the day date is 60, and the numerical code sequence is identified after the two-dimensional code.
In step S400, a digital login password input by a user, a verification two-dimensional code, and an input order are acquired.
In step SB00, if the digital login password and the verification two-dimensional code are both correctly recognized and the recognition sequence is the same as the confirmed sequence, the door access system is controlled to open.
In step S500, if the first digital login password and the verification two-dimensional code are identified incorrectly and/or the identification sequence does not match the confirmed sequence, the first correct digital login password is changed to be the second correct digital login password based on the error.
The step S500 of changing the first correct digital login password based on the error reason as the second correct digital login password is specifically as follows: if the first digital login password and the verification two-dimensional code are identified wrongly, adding 1 to the mantissa of the first correct digital login password to be used as a second correct digital login password; if the sequence of the first digital login password is not consistent with the sequence of the two-dimensional code identification, adding 2 to the first correct digital password mantissa to obtain a second correct digital login password; and if the first digital login password and the verification two-dimensional code are identified incorrectly at the same time and the identification sequence of the first digital login password and the verification two-dimensional code is inconsistent, adding 3 to the mantissa of the first correct digital password to obtain the second correct digital login password.
For example, assuming the first digital login password is 20311111111, if the first digital login password and the verification two-dimensional code are identified incorrectly separately, then the second digital login password is 20311111112; if the sequence of the first-time digital login password is not consistent with the sequence of the two-dimensional code identification, the second-time digital login password is 20311111113; if the first digital login password and the verification two-dimensional code are identified incorrectly at the same time and the first digital login password and the verification two-dimensional code are identified in different orders, the second digital login password is 20311111114.
In step S600, the digital login password input by the user, the authentication two-dimensional code, and the input order are acquired again.
In step SC00, if the digital login password and the two-dimensional verification code are both correctly identified and the identification sequence is the same as the confirmed sequence, the door access system is controlled to open.
In step SD00, if the second digital login password and the verification two-dimensional code are identified incorrectly and/or the identification sequence is inconsistent with the confirmed sequence, the access control system is controlled to close and the property manager is notified.
Referring to fig. 5, the step of notifying the property manager in step SD00 may be divided into steps SD10 to SD 20.
In step SD10, the contact information of the property person in charge associated with the corresponding two-dimensional code access control is obtained from the second database in which the property associated with the two-dimensional code access control and the contact information of the corresponding property person in charge are stored.
In step SD20, the information is sent to the terminal device held by the property manager.
Specifically, the terminal device mentioned in step SD20 may be a mobile phone, a notebook computer, or other devices capable of receiving information.
An embodiment of the present invention provides a computer-readable storage medium, which includes a program capable of being loaded and executed by a processor to implement any one of the methods shown in fig. 1-5.
The computer-readable storage medium includes, for example: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, an optical disk, or other various media capable of storing program codes.
Based on the same inventive concept, the embodiment of the invention provides a two-dimensional code access control management system, which comprises a memory and a processor, wherein the memory stores a program which can run on the processor to realize the method shown in any one of fig. 1 to fig. 5.
It will be clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to perform all or part of the above described functions. For the specific working processes of the system, the apparatus and the unit described above, reference may be made to the corresponding processes in the foregoing method embodiments, and details are not described here again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, a module or a unit may be divided into only one logical function, and may be implemented in other ways, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) or a processor (processor) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: u disk, removable hard disk, read only memory, random access memory, magnetic or optical disk, etc. for storing program codes.
The embodiments of the present invention are all preferred embodiments of the present invention, and the scope of the present invention is not limited thereby, so: all equivalent changes made according to the structure, shape and principle of the invention are covered by the protection scope of the invention.

Claims (6)

1. A two-dimension code access control management method is characterized by comprising the following steps:
acquiring user identity information, wherein the user information comprises a user name and a user identity card number;
if the user identity information is matched with the pre-stored legal user entering information, sending a random verification two-dimensional code to a terminal held by the user;
constructing a correct digital login password of the user based on the date of the day, the name of the user and the identity card number of the user, and confirming the identification sequence of the digital login password and the verification two-dimensional code based on the date of the day;
acquiring a digital login password, a verification two-dimensional code and an input sequence which are input by a user;
if the digital login password and the verification two-dimensional code are correctly identified and the identification sequence is the same as the confirmed sequence, controlling the access control system to open the door;
otherwise, if the first digital login password is identified incorrectly with the verification two-dimensional code, and/or the identification sequence is inconsistent with the confirmed sequence, changing the first correct digital login password as the second correct digital login password based on the reason of the error;
acquiring the digital login password, the verification two-dimensional code and the input sequence input by the user again;
if the digital login password and the verification two-dimensional code are correctly identified and the identification sequence is the same as the confirmed sequence, controlling the access control system to open the door;
otherwise, if the identification error of the second digital login password and the verification two-dimensional code occurs, and/or the identification sequence is inconsistent with the confirmed sequence, the access control system is controlled to be closed, and the property responsible person is informed;
if the user identity information is not matched with the pre-stored legal user entering information, no notice is given;
the construction steps of the correct digital login password of the user are as follows:
acquiring the date of the day, the name of the user and the identity card number of the user;
determining the number of strokes of a user name based on the user name, determining the sum of the number of months and the number of characters of the day based on the date of the day, taking the number of strokes of the user name as a dividend, taking the sum of the number of months and the number of characters of the day as a divisor, and taking the obtained remainder as a first password;
comparing the number of months of the current day with the number of days, if the number of months is more than or equal to the number of days, selecting the first 9 bits of the user identity card number as a second password, and if the number of days is larger, selecting the second 9 bits of the user identity card number as the second password;
arranging the first password before the second password to be used as a correct digital login password of the user;
the confirmation steps of the identification sequence of the digital login password and the verification two-dimensional code are as follows:
multiplying the number of months of the day's date by the number of days;
if the product of the month number and the number of the days is an odd number, sequencing the digital login password before verifying the two-dimensional code for identification; on the contrary, if the product of the month number of the current day and the number of the day is an even number, the digital login password is sorted behind the two-dimensional code for identification.
2. The two-dimensional code access control management method according to claim 1, characterized in that: the user identity information acquisition steps are as follows:
acquiring head portrait information of a user;
and inquiring the user identity information by taking the head portrait information of the user as an inquiry object from a preset first database in which the head portrait information of the user and the user identity information matched with the corresponding head portrait information of the user are stored.
3. The two-dimensional code access control management method according to claim 1, characterized in that: the steps of changing the first correct digital login password as the second correct digital login password based on the cause of the error are as follows:
if the first digital login password and the verification two-dimensional code are identified wrongly independently, adding 1 to the mantissa of the first correct digital login password;
if the sequence of the first digital login password is not consistent with the sequence of the two-dimensional code identification, adding 2 to the first correct digital password mantissa;
and if the first digital login password and the verification two-dimensional code are identified wrongly and the first digital login password and the verification two-dimensional code are identified in different orders, adding 3 to the first correct digital password mantissa.
4. The two-dimensional code access control management method according to claim 1, characterized in that: the steps of notifying the property leader are as follows:
acquiring a property responsible person contact way associated with the corresponding two-dimensional code access control by taking the currently identified failed two-dimensional code access control as an inquiry object from a preset second database storing the property associated with the two-dimensional code access control and the corresponding property responsible person contact way;
and sending the information to the terminal equipment held by the property leader.
5. The utility model provides a two-dimensional code access control system which characterized in that: the two-dimensional code access control management system comprises a memory, a processor and a program which is stored on the memory and can run on the processor, wherein the program can be loaded and executed by the processor to realize the two-dimensional code access control management method according to any one of claims 1 to 4.
6. A computer storage medium, characterized in that: the two-dimensional code access control management system comprises a program which can be loaded and executed by a processor to realize the two-dimensional code access control management method according to any one of claims 1 to 4.
CN202110274936.3A 2021-03-15 2021-03-15 Two-dimensional code access control management method, system and storage medium Active CN113066215B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110274936.3A CN113066215B (en) 2021-03-15 2021-03-15 Two-dimensional code access control management method, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110274936.3A CN113066215B (en) 2021-03-15 2021-03-15 Two-dimensional code access control management method, system and storage medium

Publications (2)

Publication Number Publication Date
CN113066215A CN113066215A (en) 2021-07-02
CN113066215B true CN113066215B (en) 2022-09-13

Family

ID=76560573

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110274936.3A Active CN113066215B (en) 2021-03-15 2021-03-15 Two-dimensional code access control management method, system and storage medium

Country Status (1)

Country Link
CN (1) CN113066215B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114117368B (en) * 2021-10-11 2023-06-23 福州克拉电气自动化有限公司 Electric power instrument data information acquisition energy consumption management system based on internet of things cloud platform

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007058633A (en) * 2005-08-25 2007-03-08 Kddi Corp User authentication system, authentication device, terminal device and computer program
CN107770053A (en) * 2017-10-30 2018-03-06 商客通尚景科技江苏有限公司 Instant messages reminding method under a kind of off-line state
CN109086600A (en) * 2018-07-23 2018-12-25 江苏恒宝智能系统技术有限公司 Password generates and Verification System

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DK0706697T3 (en) * 1994-01-27 1997-05-26 Sc Info & Inno Technologie Inf Method of authentication
CN102609646A (en) * 2012-01-20 2012-07-25 华为终端有限公司 Information protection method, information protection device and terminal equipment
CN106453802A (en) * 2016-11-30 2017-02-22 努比亚技术有限公司 Cipher verification method and device, and terminal
CN206773785U (en) * 2017-05-18 2017-12-19 哈尔滨工业大学(威海) A kind of authentication gate control system
CN107705130B (en) * 2017-10-30 2021-07-20 商客通尚景科技江苏有限公司 Online payment method
CN109922067A (en) * 2019-03-12 2019-06-21 深圳华盟工程再担保有限公司 A kind of big data Intelligent processing system based on guarantee circle
CN110705860B (en) * 2019-09-25 2023-06-23 长沙乐源土地规划设计有限责任公司 Land utilization evaluation method
CN111881426B (en) * 2020-06-17 2023-09-01 福建图宇燎原信息技术有限公司 Urban management method, system and storage medium integrating earth-edge space and Internet of things technology

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007058633A (en) * 2005-08-25 2007-03-08 Kddi Corp User authentication system, authentication device, terminal device and computer program
CN107770053A (en) * 2017-10-30 2018-03-06 商客通尚景科技江苏有限公司 Instant messages reminding method under a kind of off-line state
CN109086600A (en) * 2018-07-23 2018-12-25 江苏恒宝智能系统技术有限公司 Password generates and Verification System

Also Published As

Publication number Publication date
CN113066215A (en) 2021-07-02

Similar Documents

Publication Publication Date Title
US8776213B2 (en) Mobile application security system and method
US5841970A (en) Authentication method for networks
US5706427A (en) Authentication method for networks
CN108768929B (en) Electronic device, credit investigation feedback message analysis method and storage medium
EP3905174A1 (en) Method and device for authenticating near-field information, electronic apparatus, and computer storage medium
CN109447297A (en) Reserve access method, system, computer equipment and storage medium
CN110619206A (en) Operation and maintenance risk control method, system, equipment and computer readable storage medium
CN113066215B (en) Two-dimensional code access control management method, system and storage medium
CN105447927A (en) A control method for opening access control electric locks, access controllers and an access control system
US20030154382A1 (en) User authentication method and system
JP4057501B2 (en) Authentication system and computer-readable storage medium
CN107196971A (en) Information processing method, device, electronic equipment and server
CN114187673A (en) Mobile attendance system based on block chain and method thereof
CN109816543A (en) A kind of image lookup method and device
CN107656959A (en) A kind of message leaving method, device and message equipment
CN105830079A (en) Authentication information management system, authentication information management device, program, recording medium, and authentication information management method
CN109815669A (en) Authentication method and server based on recognition of face
CN117275138A (en) Identity authentication method, device, equipment and storage medium based on automatic teller machine
CN116720824B (en) Electronic license library management system and method based on blockchain
CN109446778A (en) Immovable Property Registration information acquisition method, computer installation and computer readable storage medium based on recognition of face
CN105897708A (en) Information protection method and mobile terminal
CN111478875A (en) Block chain-based biological sign mixed mode authentication method and system
EP3217593A1 (en) Two-factor authentication method for increasing the security of transactions between a user and a transaction point or system
CN109165490A (en) A kind of data inputting method and device
CN106470106B (en) Terminal information display method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant