CN115862207B - Intelligent access control authorization method and system - Google Patents

Intelligent access control authorization method and system Download PDF

Info

Publication number
CN115862207B
CN115862207B CN202310124059.0A CN202310124059A CN115862207B CN 115862207 B CN115862207 B CN 115862207B CN 202310124059 A CN202310124059 A CN 202310124059A CN 115862207 B CN115862207 B CN 115862207B
Authority
CN
China
Prior art keywords
visitor
authorization
mobile phone
access control
phone number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310124059.0A
Other languages
Chinese (zh)
Other versions
CN115862207A (en
Inventor
谢照
薛雪
龙照凯
李俊
欧阳增军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Langhe Technology Co ltd
Original Assignee
Hunan Mast Light Robot Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Mast Light Robot Co ltd filed Critical Hunan Mast Light Robot Co ltd
Priority to CN202310124059.0A priority Critical patent/CN115862207B/en
Publication of CN115862207A publication Critical patent/CN115862207A/en
Application granted granted Critical
Publication of CN115862207B publication Critical patent/CN115862207B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an intelligent access control authorization method and system, wherein the intelligent access control authorization method comprises the following steps: receiving authorization request information sent by a user terminal; acquiring the mobile phone number of a visitor; obtaining a subdirectory and a pass verification code of an authorized link address through an encryption algorithm according to the application time of the authorization request information and the mobile phone numbers of visiting personnel and user terminals; transmitting the authorization verification information to an access control system, and transmitting the authorization link address to a mobile phone terminal of a visitor; and receiving the link point opening information sent by the visitor terminal, starting timing, and sending authorization unbinding information to the access control system if the time length exceeds the preset time length. The invention generates the authorization address link and the authorization verification information by using the encryption algorithm, and timeliness limitation is carried out on the authorization verification information, so that the situation that the authorization verification information is multiplexed by multiple persons for a long time is avoided. The actual requirements of high-frequency, short-time, safe and convenient visit are well met.

Description

Intelligent access control authorization method and system
Technical Field
The invention relates to the technical field of access control, in particular to an intelligent access control authorization method and system.
Background
In a conventional access control system, a physical entity card (i.e., an IC access control card) is generally required, or an IC access control card owner copies the IC access control card to a mobile phone by using the NFC function of the mobile phone. The physical entity IC access card generally needs to perform identity verification and authorized registration under the main line of industry at a property management center, and has complex procedures and more time consumption. This physical card mode is not applicable for residential cell guests.
Compared with the traditional physical access card, the traditional electronic access system is improved in terms of temporary access ranges of visitors, owners or tenants with access rights of existing communities or buildings conduct visitor information registration in advance on a software system (such as a mobile phone APP end or a WeChat access applet), a pass code (a number or a character string) is generated or a two-dimensional code is issued to the visitors in advance through a short message or other modes, and the visitors can access the access ranges by means of the pass code or the two-dimensional code. In addition to the relatively complicated registration and issuing steps, the timeliness of the pass code or the two-dimensional code is not strictly limited (usually 1 day), and once issued, the pass code or the two-dimensional code can be multiplexed by multiple persons within an authorized time period, so that potential safety hazards exist.
Disclosure of Invention
The present invention aims to solve at least one of the technical problems existing in the prior art. Therefore, the intelligent access control authorization method provided by the invention has the advantages that the authorization verification information is limited in timeliness, and the situation that the authorization verification information is multiplexed by multiple persons for a long time is avoided.
In order to achieve the above purpose, the technical scheme adopted by the invention is as follows:
an intelligent access control authorization method is used in a first server and comprises the following steps:
receiving authorization request information sent by a user terminal;
acquiring the mobile phone number of a visitor;
obtaining a final sequence D through an encryption algorithm according to the application time of receiving authorization request information sent by a user terminal, the mobile phone number of a visitor and the mobile phone number of the user terminal web The final sequence D web Comprises a plurality of numbers D web The partial number of the authorized link address is used as a subdirectory of the authorized link address, D web The other part number of the authorization verification information is used as a pass verification code, the authorization verification information comprises a pass verification code, and the page with the authorized link address being clicked contains the authorization verification information;
transmitting the authorization verification information to an access control system, and transmitting the authorization link address to a visitor terminal corresponding to the mobile phone number of the visitor;
receiving link point opening information sent by a visitor terminal, starting timing, and sending authorization unbinding information to an access control system if the time length exceeds a preset time length;
the link point opening information is triggered when the terminal point of the visitor opens the authorized link address; the access control system is used for comparing verification information presented by the visitor with authorization verification information and determining whether the visitor is authorized to pass according to a comparison result; the authorization unbinding information is used for triggering the access control system to invalidate the corresponding authorization verification information.
Further, the visitor is an order sending person, and the obtaining the mobile phone number of the visitor specifically includes: carrying out data docking with a third party e-commerce platform APP background to obtain the mobile phone number of a sender of the current unfinished order; and the third-party e-commerce platform APP is opened by a user terminal entering a WeChat access control applet in a jumping way.
Further, the terminal sequence D is obtained by an encryption algorithm according to the application time of the authorization request information sent by the receiving user terminal, the mobile phone number of the visitor and the mobile phone number of the user terminal web The method specifically comprises the following steps:
obtaining a time sequence A according to the application time of the authorization request information sent by the receiving user terminal time
A time ={Y 1 ,Y 2 ,Y 3 ,Y 4 ,M 1 ,M 2 ,D 1 ,D 2 ,H 1 ,H 2 ,F 1 ,F 2 ,S 1 ,S 2 }
Obtaining a user number sequence A according to the mobile phone number of the user terminal user
A user ={0,0,0,N u1 ,N u2 ,N u3 ,N ui ,……,N u11 };
Obtaining visitor number sequence A according to mobile phone number of visitor visitor
A visitor ={0,0,0,N v1 ,N v2 ,N v3 ,N vj ,……N v11 } ;
Wherein Y is 1 ,Y 2 ,Y 3 ,Y 4 The thousand digits, the hundred digits, the ten digits and the ones digits of the year corresponding to the application time are respectively represented;M 1 ,M 2 ten digits and unit digits of months corresponding to the application time are respectively represented; d (D) 1 ,D 2 Ten digits and one digits of the date corresponding to the application time are respectively represented; h 1 ,H 2 Respectively representing tens and units of a clock corresponding to the application time; f (F) 1 ,F 2 Ten digits and one digits of minutes corresponding to the application time are respectively represented; s is S 1 ,S 2 Ten digits and one digits of seconds corresponding to the application time are respectively represented; n (N) u1 ,N u2 ,N u3 ,N ui ,……,N u11 Respectively representing 11 digits of the mobile phone number of the user terminal; n (N) v1 ,N v2 ,N v3 ,N vj ,……N v11 11 digits representing the mobile phone number of the visitor respectively;
pair A user And A visitor And (3) performing encryption calculation to obtain a final sequence:
D web ={D web1 ,D web2 ,D web3 ,D webk ,……,D web14 -a }; will D web Is used as a subdirectory of the authorized link address, D web As a pass verification code, the authorization verification information including the pass verification code.
Further, the pair A user And A visitor The encryption calculation is carried out to obtain a final sequence, which concretely comprises the following steps:
pair A user And A visitor Performing non-zero calculation to obtain a first non-zero sequence B user And a second non-zero sequence B visitor
B user =A user +1
={0+1,0+1,0+1,N u1 +1,N u2 +1,N u3 +1,N ui +1,……,N u11 +1}
B visitor =A visitor +1
={0+1,0+1,0+1,N v1 +1,N v2 +1,N v3 +1,N vj +1,……,N v11 +1};
Pair B user And B visitor Performing product calculation to obtain product sequenceColumn C num
C num =B user x B visitor
={1,1,1,(N u1 +1)(N v1 +1),(N u2 +1)(N v2 +1),(N u3 +1)(N v3 +1),(N ui +1)(N vj +1),……,(N u11 +1)(N v11 +1)} ;
Will A time And C num Performing difference calculation to obtain a final sequence D web
D web =|A time -C num |={D web1 ,D web2 ,D web3 ,D webk ,……,D web14 }
={|Y 1 -1|,|Y 2 -1|,|Y 3 -1|,|Y 4 -(N u1 +1)(N v1 +1)|,|M 1 -(N u2 +1)(N v2 +1)|,|M 2 -(N u3 +1)(N v3 +1)|,|D 1 -(N u4 +1)(N v4 +1)|,|D 2 -(N u5 +1)(N v5 +1)|,|H 1 -(N u6 +1)(N v6 +1)|,|H 2 -(N u7 +1)(N v7 +1)|,|F 1 -(N u8 +1)(N v8 +1)|,|F 2 -(N u9 +1)(N v9 +1)|,|S 1 -(N u10 +1)(N v10 +1)|,|S 2 -(N u11 +1)(N v11 +1)|}。
Further, the method further comprises the following steps:
setting verification times for authorization verification information;
and when the passing information sent by the access control system is received, the verification times are reduced once, and when the verification times are zero, authorization unbinding information is sent to the access control system.
Further, the authorization request information includes visitor terminal position information and a mobile phone number of the user terminal.
Further, the preset duration is obtained by the first server through analysis according to the terminal position information of the visitor.
Further, the authorization verification information includes a two-dimensional code.
The invention also provides an intelligent access control authorization system, which comprises:
the receiving module is used for receiving the authorization request information sent by the user terminal;
the number acquisition module is used for acquiring the mobile phone number of the visitor;
the encryption module is used for obtaining an authorization link address and a pass verification code through an encryption algorithm according to the application time of receiving authorization request information sent by the user terminal, the mobile phone number of a visitor and the mobile phone number of the user terminal, wherein the authorization verification information comprises the pass verification code;
the transmitting module is used for transmitting the authorization verification information to the access control system and transmitting the authorization link address to the mobile phone terminal corresponding to the mobile phone number of the visitor;
the timing module is used for starting timing when receiving the link point opening information sent by the visitor terminal, and triggering the sending module to send the authorization unbinding information to the access control system when the time length exceeds the preset time length.
The invention has the following beneficial effects: the invention generates the authorized address link by utilizing the encryption algorithm, and sends the authorized link address to the visitor instead of directly displaying the authorized verification information (such as the two-dimensional code and the verification code), so that when the visitor needs to obtain the authorized verification information to verify with the access control system, the authorized link address needs to be opened first, and when the authorized link address is opened, the timing is started, the authorized verification information is valid within the preset time period, and after the timeout, the authorized verification information is invalid, the timeliness of the authorized verification information is limited, and the condition that the authorized verification information is multiplexed by a plurality of persons for a long time is avoided. The actual requirements of high-frequency, short-time, safe and convenient strangers (such as couriers and takers) visiting residential communities or other building types are well met, the security of community properties and households and the convenience of express taker-out receiving and sending are guaranteed, great passing convenience is brought to temporary visitors, and precious time is saved; moreover, the time, the mobile phone number of the visitor and the mobile phone number of the user terminal are used as calculated amounts, and the three amounts belong to variables in different authorization requests, so that the uniqueness and uniqueness of the obtained final sequence are ensured, namely the uniqueness and uniqueness of the authorization link address and the pass verification code are ensured, and the condition of repeated codes can be basically avoided.
In addition to the objects, features and advantages described above, the present invention has other objects, features and advantages. The present invention will be described in further detail with reference to the drawings.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention. In the drawings:
fig. 1 is a flow chart of the intelligent entrance guard authorization method of the invention.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that all directional indicators (such as up, down, left, right, front, and rear … …) in the embodiments of the present invention are merely used to explain the relative positional relationship, movement, etc. between the components in a particular posture (as shown in the drawings), and if the particular posture is changed, the directional indicator is changed accordingly.
Furthermore, the description of "first," "second," etc. in this disclosure is for descriptive purposes only and is not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be considered to be absent and not within the scope of protection claimed in the present invention.
The intelligent access control authorization method in the preferred embodiment provided by the invention is used in the first server and comprises the following steps:
the method comprises the steps that a first server receives authorization request information sent by a user terminal;
the method comprises the steps that a first server obtains mobile phone numbers of visiting persons;
the first server obtains a final sequence D through an encryption algorithm according to the application time of receiving authorization request information sent by the user terminal, the mobile phone number of a visitor and the mobile phone number of the user terminal web The final sequence D web Comprises a plurality of numbers D web The partial number of the authorized link address is used as a subdirectory of the authorized link address, D web The other part number of the authorization verification information is used as a pass verification code, the authorization verification information comprises a pass verification code, and the page with the authorized link address being clicked contains the authorization verification information;
the first server sends the authorization verification information to the access control system, and sends the authorization link address to a visitor terminal corresponding to the mobile phone number of the visitor; thus, the authorization verification information is not directly displayed to the visitor, but is encrypted in a layer, so that the authorization verification information is prevented from being directly displayed and repeatedly used for a plurality of times. When the first server acquires the mobile phone number of the visitor, the mobile phone number of the visitor and the mobile phone number of the user terminal can be bound, so that the user terminal can receive information conveniently, and the position of the visitor can be acquired.
The method comprises the steps that a first server receives link point opening information sent by a visitor terminal and starts timing, and when the time length exceeds a preset time length, authorization unbinding information is sent to an access control system; the authorization unbinding information is used for triggering the access control system to invalidate the corresponding authorization verification information. After the access control system receives the authorization unbinding information, the corresponding authorization verification information is invalidated, the user information and the visitor information are unbinding, and the corresponding authorization verification information is invalidated, so that the authorization verification information cannot pass through the verification of the access control system.
The link point opening information is triggered when the terminal point of the visitor opens the authorized link address; when the terminal of the visitor opens the authorized link address and enters the page corresponding to the authorized link, the page displays authorized verification information to the visitor for verification by the visitor and the access control system, and meanwhile, the terminal of the visitor sends the link opening information to the first server to tell the first server that the authorized link address has been opened, so that the first server starts timing. The access control system is used for comparing verification information presented by the visitor with authorization verification information and determining whether the visitor is authorized to pass or not according to a comparison result. If the verification information presented by the visitor is obtained by clicking the authorized link address and is not overtime, the verification information can be corresponding to the authorized verification information received by the access control system, the verification is successful, and the visitor is authorized to pass.
The first server may be a cloud server; the user opens access control software installed in the cloud server data center through a user terminal (mobile phone), the access control software can be used in the forms of WeChat access control applet and the like at the mobile phone end of the user, the mobile phone number registration and binding are needed to be carried out on the access control software through the user terminal, the access control software is compared through the mobile phone numbers stored in the user list, and if the registered mobile phone numbers are in the existing user list, the registration is successful. After the user terminal enters the access control software, the authorization request information can be sent to the first server by clicking. The cloud butt joint or the on-site single industrial personal computer hardware deployment is adopted, so that the deployment is simple and the operation is convenient.
The server of the access control system of the cell may be a cloud server to interface with the first server cloud, or a server of a small access control system may be locally provided in the cell to interface with the first server. The access control system of the district comprises at least one of an entrance access control, a building hall access control and a building elevator access control system of the district.
The invention generates the authorized address link and the authorized verification information by utilizing the encryption algorithm, and sends the authorized address link to the visitor to display the authorized verification information (such as two-dimensional code and verification code) instead of directly displaying the authorized link address; when the access personnel need to obtain the authorization verification information and the access control system to verify, the authorization link address needs to be clicked, and when the authorization link address is clicked, the timing is started, the authorization verification information is valid within the preset time period, and after the time is overtime, the authorization verification information is invalid, the timeliness limitation is carried out on the authorization verification information, and the situation that the authorization verification information is multiplexed by multiple persons for a long time is avoided.
In addition, if the authorized link address is sent to the terminal of the visitor, timing is started, and the visiting time of the visitor is indefinite, so that the visitor can possibly exceed the time when using, the authorization fails, or a longer preset time length is set to avoid the situation, but the aging accuracy is reduced. When a visitor arrives at an access control system and needs to verify, the authorized link address is started to start timing, so that the timeliness accuracy is high, and the situation can be avoided.
The intelligent access control authorization method well meets the actual requirements of high-frequency, short-time, safe and convenient strangers (such as couriers and takers) visiting in real residential communities or other building types, ensures the community property, the safety of households and the convenience of express takeout and receiving, brings great traffic convenience to temporary visitors, and saves precious time.
In some embodiments of the present invention, the visitor is an order sending person, and the mobile phone number of the visitor is obtained by:
after the user terminal enters the WeChat access control applet to jump and open the third-party e-commerce platform APP, the first server and the third-party e-commerce platform APP are subjected to data docking in the background, and the mobile phone number of the sending person of the current unfinished order is obtained. And the micro-message applet and the mobile phone short message are adopted as a system user and visitor use entrance, so that the APP does not need to be additionally downloaded.
Of course, in other embodiments, when the visitor is a friend of a family, the user terminal may also enter a WeChat access control applet to fill in the mobile phone number of the visitor, so as to send the mobile phone number of the visitor to the first server.
The pass verification code of the authorization verification information is generated by an encryption algorithm, so that the uniqueness of the authorization verification information can be ensured, and the occurrence probability of repeated codes is greatly avoided.
In some embodiments of the present invention, the terminal sequence D is obtained by an encryption algorithm according to the application time of the authorization request information sent by the receiving user terminal, the mobile phone number of the visitor, and the mobile phone number of the user terminal web The method specifically comprises the following steps:
obtaining a time sequence A according to the application time of the authorization request information sent by the receiving user terminal time
A time ={Y 1 ,Y 2 ,Y 3 ,Y 4 ,M 1 ,M 2 ,D 1 ,D 2 ,H 1 ,H 2 ,F 1 ,F 2 ,S 1 ,S 2 } ;
Obtaining a user number sequence A according to the mobile phone number of the user terminal user
A user ={0,0,0,N u1 ,N u2 ,N u3 ,N ui ,……,N u11 };
Obtaining visitor number sequence A according to mobile phone number of visitor visitor
A visitor ={0,0,0,N v1 ,N v2 ,N v3 ,N vj ,……N v11 } ;
Wherein Y is 1 ,Y 2 ,Y 3 ,Y 4 Representing thousands, hundreds, tens and units of the year corresponding to the application time, M 1 ,M 2 Ten digits and unit digits of months corresponding to the application time are respectively represented; d (D) 1 ,D 2 Ten digits and one digits of the date corresponding to the application time are respectively represented; h 1 ,H 2 Respectively representing tens and units of a clock corresponding to the application time; f (F) 1 ,F 2 Ten digits and one digits of minutes corresponding to the application time are respectively represented; s is S 1 ,S 2 The ten digits and the ones digits of the seconds corresponding to the application time are respectively expressed.
The application time is as follows: 12 minutes and 30 seconds at 15/11/2010, Y 1 ,Y 2 ,Y 3 ,Y 4 ,M 1 ,M 2 ,D 1 ,D 2 ,H 1 ,H 2 ,F 1 ,F 2 ,S 1 ,S 2 2, 0, 1, 2, 1, 5, 1, 2, 3, 0, respectively.
N u1 ,N u2 ,N u3 ,N ui ,……,N u11 Respectively representing 11 digits of the mobile phone number of the user terminal; n (N) ui Representative of
The ith digit of the mobile phone number of the user terminal. For example, if the mobile phone number of the user terminal is 12345678912, then N u1 ,N u2 ,N u3 ,N u4 ,N u5 ,N u6 ,N u7 ,N u8 ,N u9 ,N u10 ,N u11 1, 2, 3, 4, 5, 6, 7, 8, 9, 1, 2, respectively. i is a positive integer not greater than 11.
N v1 ,N v2 ,N v3 ,N vj ,……N v11 11 digits, N, respectively representing the mobile phone number of visiting person vj Representative of
The j-th number of the mobile phone number of the visitor; for example, the mobile phone number of the visitor is 98765432112, N v1 ,N v2 ,N v3 ,N v4 ,N v5 ,N v6 ,N v7 ,N v8 ,N v9 ,N v10 ,N v11 9, 8, 7, 6, 5, 4, 3, 2, 1, 2, respectively. j is a positive integer not greater than 11.
Pair A user And A visitor And (3) performing encryption calculation to obtain a final sequence:
D web ={D web1 ,D web2 ,D web3 ,D webk ,……,D web14 };D webk for D web The Kth number of sequences, K being a positive integer not greater than 14, i.e. the final sequence D web Comprises 14 numbers, D web= {D web1 ,D web2 ,D web3 ,D web4 ,D web5 ,D web6 ,D web7 ,D web8 ,D web9 ,D web10 ,D web11 ,D web12 ,D web13 ,D web14 }。
Final sequence D web The sequence number of a certain section is used as a subdirectory of the authorized link address, the other section is used as a pass verification code, and the two sections do not contain each other.
In the present embodiment, D is web Is used as a subdirectory of the authorized link address, D web As a pass verification code, the authorization verification information including the pass verification code. Specifically, D web The first ten numbers of (D) are arranged in sequence to form a subdirectory of authorized link addresses web The latter four numbers of (2) are arranged in sequence order to form the pass verification code.
Specifically, the final sequence D web The first ten numbers of the directory are used as the authorized link addresses to form a complete authorized link address by combining a domain name. If the domain name is www.xxx.com, then the final sequence D is combined web The authority link address of the subdirectory with the first ten numbers as the authority link address is www.xxx.com/D web1 D web2 D web3 D web4 D web5 D web6 D web7 D web 8 D web9 D web10
It will be appreciated that the first server is the server storing the www.xxx.com data, and upon generating the authorized link address, the first server will transmit the passcode (D web11 D web12 D web13 D web14 ) And two-dimension code are placed in www.xxx.com/D web1 D web2 D web3 D web4 D web5 D web6 D web7 D web8 D web9 D web10 In the corresponding page, the two-dimensional codes are generated by the first server and correspond to the authorized link addresses one by one, and different authorized link addresses correspond to different two-dimensional codes.
The time, the mobile phone number of the visitor and the mobile phone number of the user terminal are used as calculated amounts, and the three amounts belong to variables in different authorization requests. The uniqueness and uniqueness of the obtained final sequence are ensured by three variables, and the situation of repeated codes can be basically avoided.
In a further embodiment of the invention, for A user And A visitor The final sequence is obtained by encryption calculation, and is specifically calculated by the following method:
pair A user And A visitor Performing non-zero calculation to obtain a first non-zero sequence B user And a second non-zero sequence B visitor
B user =A user +1
={0+1,0+1,0+1,N u1 +1,N u2 +1,N u3 +1,N ui +1,……,N u11 +1}
B visitor =A visitor +1
={0+1,0+1,0+1,N v1 +1,N v2 +1,N v3 +1,N vj +1,……,N v11 +1};
Pair B user And B visitor Performing product calculation to obtain a product sequence C num
C num =B user x B visitor
={1,1,1,(N u1 +1)(N v1 +1),(N u2 +1)(N v2 +1),(N u3 +1)(N v3 +1),(N ui +1)(N vj +1),……,(N u11 +1)(N v11 +1)} ;
Will A time And C num Performing difference calculation to obtain a final sequence D web
D web =|A time -C num |={D web1 ,D web2 ,D web3 ,D webk ,……,D web14 }
={|Y 1 -1|,|Y 2 -1|,|Y 3 -1|,|Y 4 -(N u1 +1)(N v1 +1)|,|M 1 -(N u2 +1)(N v2 +1)|,|M 2 -(N u3 +1)(N v3 +1)|,|D 1 -(N u4 +1)(N v4 +1)|,|D 2 -(N u5 +1)(N v5 +1)|,|H 1 -(N u6 +1)(N v6 +1)|,|H 2 -(N u7 +1)(N v7 +1)|,|F 1 -(N u8 +1)(N v8 +1)|,|F 2 -(N u9 +1)(N v9 +1)|,|S 1 -(N u10 +1)(N v10 +1)|,|S 2 -(N u11 +1)(N v11 +1)|}。
B user ,B visitor Represented at A user ,A visitor On the basis of the non-zero calculation of adding 1, zero in the subsequent product calculation is avoided, and repeated codes are avoided. C (C) num Then at B user ,B visitor Product calculation is performed to substantially reduce duplicate results and as an intermediate encryption measure. D (D) web Then it is real time A time And C num The uniqueness of the operation result is ensured, and the operation result is further encrypted.
Through the calculation process, the calculation result is encrypted, repeated results are reduced, repeated codes are avoided, in addition, time, the mobile phone number of the visitor and the mobile phone number of the user terminal are used as three variables for calculation, at least one of the time corresponding to each authorization request, the mobile phone number of the visitor and the mobile phone number of the user terminal is theoretically different, the final calculation result is different in maximum probability, and the uniqueness of the result is greatly improved. The generated temporary and disposable pass verification code and the two-dimensional code have high timeliness and uniqueness and are invalid after being used up. Meanwhile, encryption measures are adopted in the generation process of the pass verification code and the two-dimensional code and the result, so that the privacy information of the user is well protected.
In some embodiments of the present invention, the intelligent access authorization method further comprises:
setting verification times for authorization verification information; when the first server receives the traffic information sent by the access control system, the verification times are reduced once, and when the verification times are zero, authorization unbinding information is sent to the access control system. When the access control system determines that the visitor is authorized to pass through according to the comparison result, the access control system can immediately send the pass information to the first server, so that the corresponding authorization verification information is verified once, when the verification number is zero, the use number of the authorization verification information is used up, the first server sends authorization unbinding information to the access control system, and after the access control system receives the authorization unbinding information, the corresponding authorization verification information is subjected to invalid processing, so that the corresponding authorization verification information cannot pass through the verification of the access control system, and the authorization verification information is ensured not to be repeatedly used for a plurality of times.
In some embodiments of the present invention, the authorization request information includes visitor terminal location information and a mobile phone number of the user terminal. Thereby providing the mobile phone number of the user terminal for the encryption algorithm.
Preferably, the first server sends the authorization verification information to the access control system and simultaneously sends the authorization access point information to the access control system; the first server analyzes and generates the authorized access point information according to the terminal position information of the visitor, the authorized access point information is access point data which is required to pass through when the visitor enters the terminal position, and the verification times are the number of access points which are required to pass through.
If the visitor terminal position is in nine communities, and the entrance guard point 1, the entrance guard point 3 and the entrance guard point 4 need to be passed through from outside the communities, the first server generates authorized entrance guard point information according to the analysis of visitor terminal position information: access point 1, access point 3 and access point 4, and also sends corresponding authorization verification information to the access system. After the access control system obtains the authorized access point information, when the visitor verifies the two-dimensional code or the pass verification code in the corresponding authorized verification information at the three access points, the authentication is successful, and the pass is authorized. The authorized access point information is access point information which the access control system needs to authorize to pass through, so that potential safety hazards caused by the fact that visiting personnel enter other buildings in disorder are avoided. Meanwhile, the number of access points required to pass through is set to be 3 according to the setting, and the verification times are set to be 3.
In a further embodiment of the present invention, the preset time period is obtained by the first server through analysis according to the terminal position information of the visitor. If the terminal position information of the visitor is the nine 8 th building of the cell, the first server gives a preset time length of 20 minutes, namely, within 20 minutes, according to the position of the nine 8 th building of the cell, the visitor can enter the nine 8 th building of the cell from the gate of the cell, and when the terminal position information of the visitor is the 1 st 1 th building of the cell, the preset time length is correspondingly adjusted to 15 minutes due to the fact that the terminal position information of the visitor is close to the gate of the cell. A rule of a preset duration can be set in the first server, and a corresponding preset duration can be set for each floor of each building.
Of course, the preset time period can be set to be relatively loose, for example, only 10 minutes is needed when people arrive at the nine building 8 in the district, and in order to avoid sudden accidental conditions, such as crowding time period, the elevator needs to wait, and the preset time period can be set to be 20 minutes.
In a further embodiment of the present invention, the authorization verification information includes a two-dimensional code, that is, after the authorization link address is clicked, the pass verification code and the two-dimensional code generated by the first server may be obtained from the page, and may be verified through password verification or two-dimensional code scanning verification.
The invention also provides an intelligent access control authorization system, which comprises a receiving module, a number acquisition module, an encryption module, a sending module and a timing module.
The receiving module is used for receiving the authorization request information sent by the user terminal; the number acquisition module is used for acquiring the mobile phone number of the visitor; the encryption module is used for obtaining an authorization link address and a pass verification code through an encryption algorithm according to the application time of receiving authorization request information sent by the user terminal, the mobile phone number of a visitor and the mobile phone number of the user terminal, wherein the authorization verification information comprises the pass verification code; specifically, the encryption module first calculates the final sequence D by an encryption algorithm web From the final sequence D web The extraction part number is used as a subdirectory of the authorized link address, and the extraction part number is used for the otherThe partial number is used as a pass verification code. The transmitting module is used for transmitting the authorization verification information to the access control system and transmitting the authorization link address to the mobile phone terminal corresponding to the mobile phone number of the visitor; the timing module is used for starting timing when receiving the link point opening information sent by the visitor terminal, and when the time length exceeds the preset time length, triggering the sending module to send the authorization unbinding information to the access control system, namely when the timing module judges that the time is out, triggering the sending module to send the authorization unbinding information to the access control system, and the access control system fails to process the corresponding authorization verification information, so that the corresponding authorization verification information cannot pass through the access control system for verification, and timeliness is ensured. Specifically, the authorization verification information comprises a two-dimensional code and a pass verification code, the two-dimensional code is obtained through a two-dimensional code generation module of the first server, and the pass verification code is obtained through an encryption algorithm by an encryption module.
The intelligent access control authorization system enables authorization verification information to have high timeliness through the timing module, long-time repeated multiple use is avoided, encryption measures are taken by the encryption module in the process of generating the authorization link address, and user privacy information is well protected.
The above is only a preferred embodiment of the present invention, and is not intended to limit the present invention, but various modifications and variations can be made to the present invention by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (9)

1. An intelligent access control authorization method is used in a first server and is characterized by comprising the following steps:
receiving authorization request information sent by a user terminal;
acquiring the mobile phone number of a visitor;
obtaining a final sequence D through an encryption algorithm according to the application time of receiving authorization request information sent by a user terminal, the mobile phone number of a visitor and the mobile phone number of the user terminal web The final sequence D web Comprises a plurality of numbers D web The partial number of the authorized link address is used as a subdirectory of the authorized link address, D web The other part number of the (a) is used as a pass verification code, the page after the authorized link address is clicked contains authorized verification information, and the authorized verification information comprises the pass verification code;
transmitting the authorization verification information to an access control system, and transmitting the authorization link address to a visitor terminal corresponding to the mobile phone number of the visitor;
receiving the link point opening information sent by the visitor terminal, starting timing, and sending authorization unbinding information to an access control system when the time length exceeds a preset time length; the authorization unbinding information is used for triggering the access control system to disable the corresponding authorization verification information;
wherein the link point opening information is triggered when the visitor terminal opens the authorized link address;
the access control system is used for comparing verification information presented by the visitor with the authorization verification information and determining whether the visitor is authorized to pass or not according to a comparison result.
2. The intelligent access authorization method according to claim 1, wherein the visitor is an order dispatch person,
the step of obtaining the mobile phone number of the visitor specifically comprises the following steps:
carrying out data docking with a third party e-commerce platform APP background to obtain the mobile phone number of a sender of the current unfinished order;
and the third-party e-commerce platform APP is opened by a user terminal entering a WeChat access control applet in a jumping way.
3. The intelligent entrance guard authorization method according to claim 1, wherein the terminal sequence D is obtained by an encryption algorithm according to the application time of receiving the authorization request information sent by the user terminal, the mobile phone number of the visitor, and the mobile phone number of the user terminal web The method specifically comprises the following steps:
according to the application time of receiving the authorization request information sent by the user terminalBetween, obtain time series A time
A time ={Y 1 ,Y 2 ,Y 3 ,Y 4 ,M 1 ,M 2 ,D 1 ,D 2 ,H 1 ,H 2 ,F 1 ,F 2 ,S 1 ,S 2 }
Obtaining a user number sequence A according to the mobile phone number of the user terminal user
A user ={0,0,0,N u1 ,N u2 ,N u3 ,N ui ,……,N u11 };
Obtaining visitor number sequence A according to mobile phone number of visitor visitor
A visitor ={0,0,0,N v1 ,N v2 ,N v3 ,N vj ,……N v11 } ;
Wherein Y is 1 ,Y 2 ,Y 3 ,Y 4 The thousand digits, the hundred digits, the ten digits and the ones digits of the year corresponding to the application time are respectively represented; m is M 1 ,M 2 Ten digits and unit digits of months corresponding to the application time are respectively represented; d (D) 1 ,D 2 Ten digits and one digits of the date corresponding to the application time are respectively represented; h 1 ,H 2 Respectively representing tens and units of a clock corresponding to the application time; f (F) 1 ,F 2 Ten digits and one digits of minutes corresponding to the application time are respectively represented; s is S 1 ,S 2 Ten digits and one digits of seconds corresponding to the application time are respectively represented; n (N) u1 ,N u2 ,N u3 ,N ui ,……,N u11 Respectively representing 11 digits of the mobile phone number of the user terminal; n (N) v1 ,N v2 ,N v3 ,N vj ,……N v11 11 digits representing the mobile phone number of the visitor respectively;
pair A user And A visitor And (3) performing encryption calculation to obtain a final sequence:
D web ={D web1 ,D web2 ,D web3 ,D webk ,……,D web14 };
will D web Is the first ten of (2)Number is used as subdirectory of authorized link address, D web As a pass verification code.
4. A method of intelligent access authorization according to claim 3 wherein the pair a user And A visitor The encryption calculation is carried out to obtain a final sequence, which concretely comprises the following steps:
pair A user And A visitor Performing non-zero calculation to obtain a first non-zero sequence B user And a second non-zero sequence B visitor
B user =A user +1
={0+1,0+1,0+1,N u1 +1,N u2 +1,N u3 +1,N ui +1,……,N u11 +1}
B visitor =A visitor +1
={0+1,0+1,0+1,N v1 +1,N v2 +1,N v3 +1,N vj +1,……,N v11 +1};
Pair B user And B visitor Performing product calculation to obtain a product sequence C num
C num =B user x B visitor
={1,1,1,(N u1 +1)(N v1 +1),(N u2 +1)(N v2 +1),(N u3 +1)(N v3 +1),(N ui +1)(N vj +1),……,(N u11 +1)(N v11 +1)};
Will A time And C num Performing difference calculation to obtain a final sequence D web
D web =|A time -C num |={D web1 ,D web2 ,D web3 ,D webk ,……,D web14 }
={|Y 1 -1|,|Y 2 -1|,|Y 3 -1|,|Y 4 -(N u1 +1)(N v1 +1)|,|M 1 -(N u2 +1)(N v2 +1)|,|M 2 -(N u3 +1)(N v3 +1)|,|D 1 -(N u4 +1)(N v4 +1)|,|D 2 -(N u5 +1)(N v5 +1)|,|H 1 -(N u6 +1)(N v6 +1)|,|H 2 -(N u7 +1)(N v7 +1)|,|F 1 -(N u8 +1)(N v8 +1)|,|F 2 -(N u9 +1)(N v9 +1)|,|S 1 -(N u10 +1)(N v10 +1)|,|S 2 -(N u11 +1)(N v11 +1)|}。
5. The intelligent access authorization method according to claim 1, further comprising:
setting verification times for authorization verification information;
and when the passing information sent by the access control system is received, the verification times are reduced once, and when the verification times are zero, authorization unbinding information is sent to the access control system.
6. The intelligent entrance guard authorization method according to claim 5, wherein the authorization request information includes visitor terminal position information and a mobile phone number of the user terminal.
7. The intelligent access control authorization method according to claim 6, wherein the preset duration is obtained by the first server through analysis according to the visitor terminal position information.
8. The intelligent access control authorization method according to claim 1, wherein the authorization verification information comprises a two-dimensional code.
9. An intelligent access authorization system, comprising:
the receiving module is used for receiving the authorization request information sent by the user terminal;
the number acquisition module is used for acquiring the mobile phone number of the visitor;
an encryption module for receiving the application time of the authorization request information sent by the user terminal, the mobile phone number of the visitor and the mobile phone number of the user terminal,obtaining an authorized link address and a pass verification code through an encryption algorithm, wherein the authorized verification information comprises the pass verification code; calculation of the final sequence D by means of an encryption algorithm web The final sequence D web Comprises a plurality of numbers, and the final sequence D web The partial number of the authorized link address is used as a subdirectory of the authorized link address, and the final sequence D web The other part number of the authorization link address is used as a pass verification code, and the page after the authorization link address is clicked contains authorization verification information;
the transmitting module is used for transmitting the authorization verification information to the access control system and transmitting the authorization link address to the mobile phone terminal corresponding to the mobile phone number of the visitor;
the timing module is used for starting timing when receiving the link point opening information sent by the visitor terminal, and triggering the sending module to send the authorization unbinding information to the access control system when the time length exceeds the preset time length.
CN202310124059.0A 2023-02-16 2023-02-16 Intelligent access control authorization method and system Active CN115862207B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310124059.0A CN115862207B (en) 2023-02-16 2023-02-16 Intelligent access control authorization method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310124059.0A CN115862207B (en) 2023-02-16 2023-02-16 Intelligent access control authorization method and system

Publications (2)

Publication Number Publication Date
CN115862207A CN115862207A (en) 2023-03-28
CN115862207B true CN115862207B (en) 2023-04-28

Family

ID=85658240

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310124059.0A Active CN115862207B (en) 2023-02-16 2023-02-16 Intelligent access control authorization method and system

Country Status (1)

Country Link
CN (1) CN115862207B (en)

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101335619B (en) * 2007-06-27 2010-10-13 刘建军 Authorized using method of disposal dynamic cipher telephone or short message
CN103262474A (en) * 2010-11-09 2013-08-21 赞普劳科斯有限公司 Method and system for remote operation of an installation
CA3049637A1 (en) * 2017-01-09 2018-07-12 Carrier Corporation Access control system with messaging
CN108734814B (en) * 2017-04-19 2022-04-12 腾讯科技(深圳)有限公司 Visitor information processing method and device
WO2019021048A1 (en) * 2017-07-24 2019-01-31 Yogesh Chunilal Rathod Ephemeral content sharing and connecting users based on sharing unique link from 3r parties' applications and storing and relating unique identity or code of link sharing user with link accessing user
EP3584769A1 (en) * 2018-06-20 2019-12-25 Detec AS Improved access control system and a method thereof controlling access of persons into restricted areas
GB2589492B (en) * 2018-07-10 2022-05-25 Cirrus Logic Int Semiconductor Ltd A system and method for performing biometric authentication
CN208888868U (en) * 2018-10-16 2019-05-21 珠海数图信息技术有限公司 A kind of intelligent visitor system based on two dimensional code reservation type
CN110322602A (en) * 2019-06-18 2019-10-11 特斯联(北京)科技有限公司 A kind of visitor reserves passing method, system and equipment
CN110728782A (en) * 2019-08-21 2020-01-24 杭州享钥科技有限公司 Management system suitable for place entrance guard and power
CN111179484B (en) * 2019-10-30 2021-11-16 腾讯科技(深圳)有限公司 Visitor management method, device, system and storage medium
KR102500602B1 (en) * 2020-09-18 2023-02-17 파킹클라우드 주식회사 Building entrance control system and operating method thereof
CN112416207B (en) * 2020-12-04 2024-02-13 腾讯科技(深圳)有限公司 Information content display method, device, equipment and medium

Also Published As

Publication number Publication date
CN115862207A (en) 2023-03-28

Similar Documents

Publication Publication Date Title
CN103403728B (en) Dispose the information after coding
CN106097223B (en) Certificate declaration management system and certificate declaration management method
JP2007164449A (en) Personal information management device, personal information providing method using personal information management device, program for personal information management device and personal information providing system
EP2281386A1 (en) Systems and methods for authenticating a user of a computer application, network, or device using a wireless device
JP2006331048A (en) Personal identification method and system by position information
CN102271041A (en) Root service system for personal identity authentication
US11263558B2 (en) Method for monitoring access to electronically controllable devices
KR101350342B1 (en) Method and system for site visitor authentication
JP2002502186A (en) One-way authentication communication system
JP2012144899A (en) Electronic key management device, locking/unlocking system, electronic key management method and program
EP1445917A2 (en) Identification system for admission into protected area by means of an additional password
CN113487321A (en) Identity identification and verification method and system based on block chain wallet
CN111652781A (en) Service processing method, device, equipment and storage medium based on community codes
CN116012991A (en) Method, device and related equipment for site access management
CN115862207B (en) Intelligent access control authorization method and system
CN110598469A (en) Information processing method and device and computer storage medium
CN107196965B (en) Secure network real name registration method
CN103428698A (en) Identity strong authentication method of mobile interconnection participants
CN103701612B (en) Method for obtaining and issuing identity private key
KR100862134B1 (en) System and method for verifying personal identity by using on-line
CN112329004A (en) Method and device for face recognition and face password
CN105262747A (en) Polymorphic terminal identity verification system and method based on biological characteristic recognition
JP4463497B2 (en) Point management system
CN114863597B (en) Access management method, system and device based on trusted bar code
AU2003244089A1 (en) Connection service providing system and connection service providing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 410000 Room 3105, Block A, Building 14, Jinyue Yayuan Phase II Business, No. 268, Luyun Road, Tianding Street, Yuelu District, Changsha City, Hunan Province

Patentee after: Hunan Langhe Technology Co.,Ltd.

Address before: 410000 Room 3105, Block A, Building 14, Jinyue Yayuan Phase II Business, No. 268, Luyun Road, Tianding Street, Yuelu District, Changsha City, Hunan Province

Patentee before: Hunan Mast Light Robot Co.,Ltd.

CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 410000 Room 3105, Block A, Building 14, Jinyue Yayuan Phase II Business, No. 268, Luyun Road, Tianding Street, Yuelu District, Changsha City, Hunan Province

Patentee after: Hunan Langhe Technology Co.,Ltd.

Address before: 410000 Room 3105, Block A, Building 14, Jinyue Yayuan Phase II Business, No. 268, Luyun Road, Tianding Street, Yuelu District, Changsha City, Hunan Province

Patentee before: Hunan Langhe Technology Co.,Ltd.

CP01 Change in the name or title of a patent holder