Disclosure of Invention
The present invention aims to solve at least one of the technical problems existing in the prior art. Therefore, the intelligent access control authorization method provided by the invention has the advantages that the authorization verification information is limited in timeliness, and the situation that the authorization verification information is multiplexed by multiple persons for a long time is avoided.
In order to achieve the above purpose, the technical scheme adopted by the invention is as follows:
an intelligent access control authorization method is used in a first server and comprises the following steps:
receiving authorization request information sent by a user terminal;
acquiring the mobile phone number of a visitor;
obtaining a final sequence D through an encryption algorithm according to the application time of receiving authorization request information sent by a user terminal, the mobile phone number of a visitor and the mobile phone number of the user terminal web The final sequence D web Comprises a plurality of numbers D web The partial number of the authorized link address is used as a subdirectory of the authorized link address, D web The other part number of the authorization verification information is used as a pass verification code, the authorization verification information comprises a pass verification code, and the page with the authorized link address being clicked contains the authorization verification information;
transmitting the authorization verification information to an access control system, and transmitting the authorization link address to a visitor terminal corresponding to the mobile phone number of the visitor;
receiving link point opening information sent by a visitor terminal, starting timing, and sending authorization unbinding information to an access control system if the time length exceeds a preset time length;
the link point opening information is triggered when the terminal point of the visitor opens the authorized link address; the access control system is used for comparing verification information presented by the visitor with authorization verification information and determining whether the visitor is authorized to pass according to a comparison result; the authorization unbinding information is used for triggering the access control system to invalidate the corresponding authorization verification information.
Further, the visitor is an order sending person, and the obtaining the mobile phone number of the visitor specifically includes: carrying out data docking with a third party e-commerce platform APP background to obtain the mobile phone number of a sender of the current unfinished order; and the third-party e-commerce platform APP is opened by a user terminal entering a WeChat access control applet in a jumping way.
Further, the terminal sequence D is obtained by an encryption algorithm according to the application time of the authorization request information sent by the receiving user terminal, the mobile phone number of the visitor and the mobile phone number of the user terminal web The method specifically comprises the following steps:
obtaining a time sequence A according to the application time of the authorization request information sent by the receiving user terminal time :
A time ={Y 1 ,Y 2 ,Y 3 ,Y 4 ,M 1 ,M 2 ,D 1 ,D 2 ,H 1 ,H 2 ,F 1 ,F 2 ,S 1 ,S 2 }
Obtaining a user number sequence A according to the mobile phone number of the user terminal user :
A user ={0,0,0,N u1 ,N u2 ,N u3 ,N ui ,……,N u11 };
Obtaining visitor number sequence A according to mobile phone number of visitor visitor :
A visitor ={0,0,0,N v1 ,N v2 ,N v3 ,N vj ,……N v11 } ;
Wherein Y is 1 ,Y 2 ,Y 3 ,Y 4 The thousand digits, the hundred digits, the ten digits and the ones digits of the year corresponding to the application time are respectively represented;M 1 ,M 2 ten digits and unit digits of months corresponding to the application time are respectively represented; d (D) 1 ,D 2 Ten digits and one digits of the date corresponding to the application time are respectively represented; h 1 ,H 2 Respectively representing tens and units of a clock corresponding to the application time; f (F) 1 ,F 2 Ten digits and one digits of minutes corresponding to the application time are respectively represented; s is S 1 ,S 2 Ten digits and one digits of seconds corresponding to the application time are respectively represented; n (N) u1 ,N u2 ,N u3 ,N ui ,……,N u11 Respectively representing 11 digits of the mobile phone number of the user terminal; n (N) v1 ,N v2 ,N v3 ,N vj ,……N v11 11 digits representing the mobile phone number of the visitor respectively;
pair A user And A visitor And (3) performing encryption calculation to obtain a final sequence:
D web ={D web1 ,D web2 ,D web3 ,D webk ,……,D web14 -a }; will D web Is used as a subdirectory of the authorized link address, D web As a pass verification code, the authorization verification information including the pass verification code.
Further, the pair A user And A visitor The encryption calculation is carried out to obtain a final sequence, which concretely comprises the following steps:
pair A user And A visitor Performing non-zero calculation to obtain a first non-zero sequence B user And a second non-zero sequence B visitor :
B user =A user +1
={0+1,0+1,0+1,N u1 +1,N u2 +1,N u3 +1,N ui +1,……,N u11 +1}
B visitor =A visitor +1
={0+1,0+1,0+1,N v1 +1,N v2 +1,N v3 +1,N vj +1,……,N v11 +1};
Pair B user And B visitor Performing product calculation to obtain product sequenceColumn C num :
C num =B user x B visitor
={1,1,1,(N u1 +1)(N v1 +1),(N u2 +1)(N v2 +1),(N u3 +1)(N v3 +1),(N ui +1)(N vj +1),……,(N u11 +1)(N v11 +1)} ;
Will A time And C num Performing difference calculation to obtain a final sequence D web :
D web =|A time -C num |={D web1 ,D web2 ,D web3 ,D webk ,……,D web14 }
={|Y 1 -1|,|Y 2 -1|,|Y 3 -1|,|Y 4 -(N u1 +1)(N v1 +1)|,|M 1 -(N u2 +1)(N v2 +1)|,|M 2 -(N u3 +1)(N v3 +1)|,|D 1 -(N u4 +1)(N v4 +1)|,|D 2 -(N u5 +1)(N v5 +1)|,|H 1 -(N u6 +1)(N v6 +1)|,|H 2 -(N u7 +1)(N v7 +1)|,|F 1 -(N u8 +1)(N v8 +1)|,|F 2 -(N u9 +1)(N v9 +1)|,|S 1 -(N u10 +1)(N v10 +1)|,|S 2 -(N u11 +1)(N v11 +1)|}。
Further, the method further comprises the following steps:
setting verification times for authorization verification information;
and when the passing information sent by the access control system is received, the verification times are reduced once, and when the verification times are zero, authorization unbinding information is sent to the access control system.
Further, the authorization request information includes visitor terminal position information and a mobile phone number of the user terminal.
Further, the preset duration is obtained by the first server through analysis according to the terminal position information of the visitor.
Further, the authorization verification information includes a two-dimensional code.
The invention also provides an intelligent access control authorization system, which comprises:
the receiving module is used for receiving the authorization request information sent by the user terminal;
the number acquisition module is used for acquiring the mobile phone number of the visitor;
the encryption module is used for obtaining an authorization link address and a pass verification code through an encryption algorithm according to the application time of receiving authorization request information sent by the user terminal, the mobile phone number of a visitor and the mobile phone number of the user terminal, wherein the authorization verification information comprises the pass verification code;
the transmitting module is used for transmitting the authorization verification information to the access control system and transmitting the authorization link address to the mobile phone terminal corresponding to the mobile phone number of the visitor;
the timing module is used for starting timing when receiving the link point opening information sent by the visitor terminal, and triggering the sending module to send the authorization unbinding information to the access control system when the time length exceeds the preset time length.
The invention has the following beneficial effects: the invention generates the authorized address link by utilizing the encryption algorithm, and sends the authorized link address to the visitor instead of directly displaying the authorized verification information (such as the two-dimensional code and the verification code), so that when the visitor needs to obtain the authorized verification information to verify with the access control system, the authorized link address needs to be opened first, and when the authorized link address is opened, the timing is started, the authorized verification information is valid within the preset time period, and after the timeout, the authorized verification information is invalid, the timeliness of the authorized verification information is limited, and the condition that the authorized verification information is multiplexed by a plurality of persons for a long time is avoided. The actual requirements of high-frequency, short-time, safe and convenient strangers (such as couriers and takers) visiting residential communities or other building types are well met, the security of community properties and households and the convenience of express taker-out receiving and sending are guaranteed, great passing convenience is brought to temporary visitors, and precious time is saved; moreover, the time, the mobile phone number of the visitor and the mobile phone number of the user terminal are used as calculated amounts, and the three amounts belong to variables in different authorization requests, so that the uniqueness and uniqueness of the obtained final sequence are ensured, namely the uniqueness and uniqueness of the authorization link address and the pass verification code are ensured, and the condition of repeated codes can be basically avoided.
In addition to the objects, features and advantages described above, the present invention has other objects, features and advantages. The present invention will be described in further detail with reference to the drawings.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that all directional indicators (such as up, down, left, right, front, and rear … …) in the embodiments of the present invention are merely used to explain the relative positional relationship, movement, etc. between the components in a particular posture (as shown in the drawings), and if the particular posture is changed, the directional indicator is changed accordingly.
Furthermore, the description of "first," "second," etc. in this disclosure is for descriptive purposes only and is not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be considered to be absent and not within the scope of protection claimed in the present invention.
The intelligent access control authorization method in the preferred embodiment provided by the invention is used in the first server and comprises the following steps:
the method comprises the steps that a first server receives authorization request information sent by a user terminal;
the method comprises the steps that a first server obtains mobile phone numbers of visiting persons;
the first server obtains a final sequence D through an encryption algorithm according to the application time of receiving authorization request information sent by the user terminal, the mobile phone number of a visitor and the mobile phone number of the user terminal web The final sequence D web Comprises a plurality of numbers D web The partial number of the authorized link address is used as a subdirectory of the authorized link address, D web The other part number of the authorization verification information is used as a pass verification code, the authorization verification information comprises a pass verification code, and the page with the authorized link address being clicked contains the authorization verification information;
the first server sends the authorization verification information to the access control system, and sends the authorization link address to a visitor terminal corresponding to the mobile phone number of the visitor; thus, the authorization verification information is not directly displayed to the visitor, but is encrypted in a layer, so that the authorization verification information is prevented from being directly displayed and repeatedly used for a plurality of times. When the first server acquires the mobile phone number of the visitor, the mobile phone number of the visitor and the mobile phone number of the user terminal can be bound, so that the user terminal can receive information conveniently, and the position of the visitor can be acquired.
The method comprises the steps that a first server receives link point opening information sent by a visitor terminal and starts timing, and when the time length exceeds a preset time length, authorization unbinding information is sent to an access control system; the authorization unbinding information is used for triggering the access control system to invalidate the corresponding authorization verification information. After the access control system receives the authorization unbinding information, the corresponding authorization verification information is invalidated, the user information and the visitor information are unbinding, and the corresponding authorization verification information is invalidated, so that the authorization verification information cannot pass through the verification of the access control system.
The link point opening information is triggered when the terminal point of the visitor opens the authorized link address; when the terminal of the visitor opens the authorized link address and enters the page corresponding to the authorized link, the page displays authorized verification information to the visitor for verification by the visitor and the access control system, and meanwhile, the terminal of the visitor sends the link opening information to the first server to tell the first server that the authorized link address has been opened, so that the first server starts timing. The access control system is used for comparing verification information presented by the visitor with authorization verification information and determining whether the visitor is authorized to pass or not according to a comparison result. If the verification information presented by the visitor is obtained by clicking the authorized link address and is not overtime, the verification information can be corresponding to the authorized verification information received by the access control system, the verification is successful, and the visitor is authorized to pass.
The first server may be a cloud server; the user opens access control software installed in the cloud server data center through a user terminal (mobile phone), the access control software can be used in the forms of WeChat access control applet and the like at the mobile phone end of the user, the mobile phone number registration and binding are needed to be carried out on the access control software through the user terminal, the access control software is compared through the mobile phone numbers stored in the user list, and if the registered mobile phone numbers are in the existing user list, the registration is successful. After the user terminal enters the access control software, the authorization request information can be sent to the first server by clicking. The cloud butt joint or the on-site single industrial personal computer hardware deployment is adopted, so that the deployment is simple and the operation is convenient.
The server of the access control system of the cell may be a cloud server to interface with the first server cloud, or a server of a small access control system may be locally provided in the cell to interface with the first server. The access control system of the district comprises at least one of an entrance access control, a building hall access control and a building elevator access control system of the district.
The invention generates the authorized address link and the authorized verification information by utilizing the encryption algorithm, and sends the authorized address link to the visitor to display the authorized verification information (such as two-dimensional code and verification code) instead of directly displaying the authorized link address; when the access personnel need to obtain the authorization verification information and the access control system to verify, the authorization link address needs to be clicked, and when the authorization link address is clicked, the timing is started, the authorization verification information is valid within the preset time period, and after the time is overtime, the authorization verification information is invalid, the timeliness limitation is carried out on the authorization verification information, and the situation that the authorization verification information is multiplexed by multiple persons for a long time is avoided.
In addition, if the authorized link address is sent to the terminal of the visitor, timing is started, and the visiting time of the visitor is indefinite, so that the visitor can possibly exceed the time when using, the authorization fails, or a longer preset time length is set to avoid the situation, but the aging accuracy is reduced. When a visitor arrives at an access control system and needs to verify, the authorized link address is started to start timing, so that the timeliness accuracy is high, and the situation can be avoided.
The intelligent access control authorization method well meets the actual requirements of high-frequency, short-time, safe and convenient strangers (such as couriers and takers) visiting in real residential communities or other building types, ensures the community property, the safety of households and the convenience of express takeout and receiving, brings great traffic convenience to temporary visitors, and saves precious time.
In some embodiments of the present invention, the visitor is an order sending person, and the mobile phone number of the visitor is obtained by:
after the user terminal enters the WeChat access control applet to jump and open the third-party e-commerce platform APP, the first server and the third-party e-commerce platform APP are subjected to data docking in the background, and the mobile phone number of the sending person of the current unfinished order is obtained. And the micro-message applet and the mobile phone short message are adopted as a system user and visitor use entrance, so that the APP does not need to be additionally downloaded.
Of course, in other embodiments, when the visitor is a friend of a family, the user terminal may also enter a WeChat access control applet to fill in the mobile phone number of the visitor, so as to send the mobile phone number of the visitor to the first server.
The pass verification code of the authorization verification information is generated by an encryption algorithm, so that the uniqueness of the authorization verification information can be ensured, and the occurrence probability of repeated codes is greatly avoided.
In some embodiments of the present invention, the terminal sequence D is obtained by an encryption algorithm according to the application time of the authorization request information sent by the receiving user terminal, the mobile phone number of the visitor, and the mobile phone number of the user terminal web The method specifically comprises the following steps:
obtaining a time sequence A according to the application time of the authorization request information sent by the receiving user terminal time :
A time ={Y 1 ,Y 2 ,Y 3 ,Y 4 ,M 1 ,M 2 ,D 1 ,D 2 ,H 1 ,H 2 ,F 1 ,F 2 ,S 1 ,S 2 } ;
Obtaining a user number sequence A according to the mobile phone number of the user terminal user :
A user ={0,0,0,N u1 ,N u2 ,N u3 ,N ui ,……,N u11 };
Obtaining visitor number sequence A according to mobile phone number of visitor visitor :
A visitor ={0,0,0,N v1 ,N v2 ,N v3 ,N vj ,……N v11 } ;
Wherein Y is 1 ,Y 2 ,Y 3 ,Y 4 Representing thousands, hundreds, tens and units of the year corresponding to the application time, M 1 ,M 2 Ten digits and unit digits of months corresponding to the application time are respectively represented; d (D) 1 ,D 2 Ten digits and one digits of the date corresponding to the application time are respectively represented; h 1 ,H 2 Respectively representing tens and units of a clock corresponding to the application time; f (F) 1 ,F 2 Ten digits and one digits of minutes corresponding to the application time are respectively represented; s is S 1 ,S 2 The ten digits and the ones digits of the seconds corresponding to the application time are respectively expressed.
The application time is as follows: 12 minutes and 30 seconds at 15/11/2010, Y 1 ,Y 2 ,Y 3 ,Y 4 ,M 1 ,M 2 ,D 1 ,D 2 ,H 1 ,H 2 ,F 1 ,F 2 ,S 1 ,S 2 2, 0, 1, 2, 1, 5, 1, 2, 3, 0, respectively.
N u1 ,N u2 ,N u3 ,N ui ,……,N u11 Respectively representing 11 digits of the mobile phone number of the user terminal; n (N) ui Representative of
The ith digit of the mobile phone number of the user terminal. For example, if the mobile phone number of the user terminal is 12345678912, then N u1 ,N u2 ,N u3 ,N u4 ,N u5 ,N u6 ,N u7 ,N u8 ,N u9 ,N u10 ,N u11 1, 2, 3, 4, 5, 6, 7, 8, 9, 1, 2, respectively. i is a positive integer not greater than 11.
N v1 ,N v2 ,N v3 ,N vj ,……N v11 11 digits, N, respectively representing the mobile phone number of visiting person vj Representative of
The j-th number of the mobile phone number of the visitor; for example, the mobile phone number of the visitor is 98765432112, N v1 ,N v2 ,N v3 ,N v4 ,N v5 ,N v6 ,N v7 ,N v8 ,N v9 ,N v10 ,N v11 9, 8, 7, 6, 5, 4, 3, 2, 1, 2, respectively. j is a positive integer not greater than 11.
Pair A user And A visitor And (3) performing encryption calculation to obtain a final sequence:
D web ={D web1 ,D web2 ,D web3 ,D webk ,……,D web14 };D webk for D web The Kth number of sequences, K being a positive integer not greater than 14, i.e. the final sequence D web Comprises 14 numbers, D web= {D web1 ,D web2 ,D web3 ,D web4 ,D web5 ,D web6 ,D web7 ,D web8 ,D web9 ,D web10 ,D web11 ,D web12 ,D web13 ,D web14 }。
Final sequence D web The sequence number of a certain section is used as a subdirectory of the authorized link address, the other section is used as a pass verification code, and the two sections do not contain each other.
In the present embodiment, D is web Is used as a subdirectory of the authorized link address, D web As a pass verification code, the authorization verification information including the pass verification code. Specifically, D web The first ten numbers of (D) are arranged in sequence to form a subdirectory of authorized link addresses web The latter four numbers of (2) are arranged in sequence order to form the pass verification code.
Specifically, the final sequence D web The first ten numbers of the directory are used as the authorized link addresses to form a complete authorized link address by combining a domain name. If the domain name is www.xxx.com, then the final sequence D is combined web The authority link address of the subdirectory with the first ten numbers as the authority link address is www.xxx.com/D web1 D web2 D web3 D web4 D web5 D web6 D web7 D web 8 D web9 D web10 。
It will be appreciated that the first server is the server storing the www.xxx.com data, and upon generating the authorized link address, the first server will transmit the passcode (D web11 D web12 D web13 D web14 ) And two-dimension code are placed in www.xxx.com/D web1 D web2 D web3 D web4 D web5 D web6 D web7 D web8 D web9 D web10 In the corresponding page, the two-dimensional codes are generated by the first server and correspond to the authorized link addresses one by one, and different authorized link addresses correspond to different two-dimensional codes.
The time, the mobile phone number of the visitor and the mobile phone number of the user terminal are used as calculated amounts, and the three amounts belong to variables in different authorization requests. The uniqueness and uniqueness of the obtained final sequence are ensured by three variables, and the situation of repeated codes can be basically avoided.
In a further embodiment of the invention, for A user And A visitor The final sequence is obtained by encryption calculation, and is specifically calculated by the following method:
pair A user And A visitor Performing non-zero calculation to obtain a first non-zero sequence B user And a second non-zero sequence B visitor :
B user =A user +1
={0+1,0+1,0+1,N u1 +1,N u2 +1,N u3 +1,N ui +1,……,N u11 +1}
B visitor =A visitor +1
={0+1,0+1,0+1,N v1 +1,N v2 +1,N v3 +1,N vj +1,……,N v11 +1};
Pair B user And B visitor Performing product calculation to obtain a product sequence C num :
C num =B user x B visitor
={1,1,1,(N u1 +1)(N v1 +1),(N u2 +1)(N v2 +1),(N u3 +1)(N v3 +1),(N ui +1)(N vj +1),……,(N u11 +1)(N v11 +1)} ;
Will A time And C num Performing difference calculation to obtain a final sequence D web :
D web =|A time -C num |={D web1 ,D web2 ,D web3 ,D webk ,……,D web14 }
={|Y 1 -1|,|Y 2 -1|,|Y 3 -1|,|Y 4 -(N u1 +1)(N v1 +1)|,|M 1 -(N u2 +1)(N v2 +1)|,|M 2 -(N u3 +1)(N v3 +1)|,|D 1 -(N u4 +1)(N v4 +1)|,|D 2 -(N u5 +1)(N v5 +1)|,|H 1 -(N u6 +1)(N v6 +1)|,|H 2 -(N u7 +1)(N v7 +1)|,|F 1 -(N u8 +1)(N v8 +1)|,|F 2 -(N u9 +1)(N v9 +1)|,|S 1 -(N u10 +1)(N v10 +1)|,|S 2 -(N u11 +1)(N v11 +1)|}。
B user ,B visitor Represented at A user ,A visitor On the basis of the non-zero calculation of adding 1, zero in the subsequent product calculation is avoided, and repeated codes are avoided. C (C) num Then at B user ,B visitor Product calculation is performed to substantially reduce duplicate results and as an intermediate encryption measure. D (D) web Then it is real time A time And C num The uniqueness of the operation result is ensured, and the operation result is further encrypted.
Through the calculation process, the calculation result is encrypted, repeated results are reduced, repeated codes are avoided, in addition, time, the mobile phone number of the visitor and the mobile phone number of the user terminal are used as three variables for calculation, at least one of the time corresponding to each authorization request, the mobile phone number of the visitor and the mobile phone number of the user terminal is theoretically different, the final calculation result is different in maximum probability, and the uniqueness of the result is greatly improved. The generated temporary and disposable pass verification code and the two-dimensional code have high timeliness and uniqueness and are invalid after being used up. Meanwhile, encryption measures are adopted in the generation process of the pass verification code and the two-dimensional code and the result, so that the privacy information of the user is well protected.
In some embodiments of the present invention, the intelligent access authorization method further comprises:
setting verification times for authorization verification information; when the first server receives the traffic information sent by the access control system, the verification times are reduced once, and when the verification times are zero, authorization unbinding information is sent to the access control system. When the access control system determines that the visitor is authorized to pass through according to the comparison result, the access control system can immediately send the pass information to the first server, so that the corresponding authorization verification information is verified once, when the verification number is zero, the use number of the authorization verification information is used up, the first server sends authorization unbinding information to the access control system, and after the access control system receives the authorization unbinding information, the corresponding authorization verification information is subjected to invalid processing, so that the corresponding authorization verification information cannot pass through the verification of the access control system, and the authorization verification information is ensured not to be repeatedly used for a plurality of times.
In some embodiments of the present invention, the authorization request information includes visitor terminal location information and a mobile phone number of the user terminal. Thereby providing the mobile phone number of the user terminal for the encryption algorithm.
Preferably, the first server sends the authorization verification information to the access control system and simultaneously sends the authorization access point information to the access control system; the first server analyzes and generates the authorized access point information according to the terminal position information of the visitor, the authorized access point information is access point data which is required to pass through when the visitor enters the terminal position, and the verification times are the number of access points which are required to pass through.
If the visitor terminal position is in nine communities, and the entrance guard point 1, the entrance guard point 3 and the entrance guard point 4 need to be passed through from outside the communities, the first server generates authorized entrance guard point information according to the analysis of visitor terminal position information: access point 1, access point 3 and access point 4, and also sends corresponding authorization verification information to the access system. After the access control system obtains the authorized access point information, when the visitor verifies the two-dimensional code or the pass verification code in the corresponding authorized verification information at the three access points, the authentication is successful, and the pass is authorized. The authorized access point information is access point information which the access control system needs to authorize to pass through, so that potential safety hazards caused by the fact that visiting personnel enter other buildings in disorder are avoided. Meanwhile, the number of access points required to pass through is set to be 3 according to the setting, and the verification times are set to be 3.
In a further embodiment of the present invention, the preset time period is obtained by the first server through analysis according to the terminal position information of the visitor. If the terminal position information of the visitor is the nine 8 th building of the cell, the first server gives a preset time length of 20 minutes, namely, within 20 minutes, according to the position of the nine 8 th building of the cell, the visitor can enter the nine 8 th building of the cell from the gate of the cell, and when the terminal position information of the visitor is the 1 st 1 th building of the cell, the preset time length is correspondingly adjusted to 15 minutes due to the fact that the terminal position information of the visitor is close to the gate of the cell. A rule of a preset duration can be set in the first server, and a corresponding preset duration can be set for each floor of each building.
Of course, the preset time period can be set to be relatively loose, for example, only 10 minutes is needed when people arrive at the nine building 8 in the district, and in order to avoid sudden accidental conditions, such as crowding time period, the elevator needs to wait, and the preset time period can be set to be 20 minutes.
In a further embodiment of the present invention, the authorization verification information includes a two-dimensional code, that is, after the authorization link address is clicked, the pass verification code and the two-dimensional code generated by the first server may be obtained from the page, and may be verified through password verification or two-dimensional code scanning verification.
The invention also provides an intelligent access control authorization system, which comprises a receiving module, a number acquisition module, an encryption module, a sending module and a timing module.
The receiving module is used for receiving the authorization request information sent by the user terminal; the number acquisition module is used for acquiring the mobile phone number of the visitor; the encryption module is used for obtaining an authorization link address and a pass verification code through an encryption algorithm according to the application time of receiving authorization request information sent by the user terminal, the mobile phone number of a visitor and the mobile phone number of the user terminal, wherein the authorization verification information comprises the pass verification code; specifically, the encryption module first calculates the final sequence D by an encryption algorithm web From the final sequence D web The extraction part number is used as a subdirectory of the authorized link address, and the extraction part number is used for the otherThe partial number is used as a pass verification code. The transmitting module is used for transmitting the authorization verification information to the access control system and transmitting the authorization link address to the mobile phone terminal corresponding to the mobile phone number of the visitor; the timing module is used for starting timing when receiving the link point opening information sent by the visitor terminal, and when the time length exceeds the preset time length, triggering the sending module to send the authorization unbinding information to the access control system, namely when the timing module judges that the time is out, triggering the sending module to send the authorization unbinding information to the access control system, and the access control system fails to process the corresponding authorization verification information, so that the corresponding authorization verification information cannot pass through the access control system for verification, and timeliness is ensured. Specifically, the authorization verification information comprises a two-dimensional code and a pass verification code, the two-dimensional code is obtained through a two-dimensional code generation module of the first server, and the pass verification code is obtained through an encryption algorithm by an encryption module.
The intelligent access control authorization system enables authorization verification information to have high timeliness through the timing module, long-time repeated multiple use is avoided, encryption measures are taken by the encryption module in the process of generating the authorization link address, and user privacy information is well protected.
The above is only a preferred embodiment of the present invention, and is not intended to limit the present invention, but various modifications and variations can be made to the present invention by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.