CN103955982A - Method and device for identifying time-varying dynamic two-dimensional code entrance guard - Google Patents
Method and device for identifying time-varying dynamic two-dimensional code entrance guard Download PDFInfo
- Publication number
- CN103955982A CN103955982A CN201410219488.7A CN201410219488A CN103955982A CN 103955982 A CN103955982 A CN 103955982A CN 201410219488 A CN201410219488 A CN 201410219488A CN 103955982 A CN103955982 A CN 103955982A
- Authority
- CN
- China
- Prior art keywords
- information
- current time
- algorithm
- code
- personally identifiable
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention discloses a method and a device for identifying a time-varying dynamic two-dimensional code entrance guard, which belong to the technical field of identifying two-dimensional code entrance guards, and aim at solving the problem of the existence of potential safety hazards in the presently-used method for identifying a static two-dimensional code entrance guard. The method comprises the following steps that the prestored personal identification information and the current time information are encrypted by a smart phone by virtue of a public key, and then the encrypted result is displayed in a two-dimensional code manner; a two-dimensional code identification device reads the displayed two-dimensional code, decrypts the read encryption information by virtue of a private key, the personal identification information and the current time information are separated, the separated information is compared with the information stored in a database and the current time respectively, and if the two parts of information is matched, then an entrance guard controller is controlled to carry out door-opening operation; and the public key and the private key are generated by the two-dimensional code identification device by an asymmetrical secret key algorithm. The method and the device are used for entrance guard identification.
Description
Technical field
The invention belongs to Quick Response Code gate inhibition recognition technology field.
Background technology
Current gate identification system mainly contains bio-identification (fingerprint, palmmprint, retina etc.), rfid card and several modes of input password.These several modes are relatively static, are easy to be stolen and copy.The rubber finger print, the rfid card copying that for example copy, snatch password etc.Universal along with smart mobile phone, Quick Response Code also becomes a kind of new recognition method gradually, but static Quick Response Code is also easy to copy by the mode such as take pictures.These have all formed certain hidden danger to the security of gate control system.
Summary of the invention
The object of the invention is the problem that gate inhibition's recognition methods in order to solve the static Quick Response Code of current employing exists potential safety hazard, the invention provides a kind of time dependent Dynamic Two-dimensional code gate inhibition's recognition methods and device.
The time dependent Dynamic Two-dimensional code of one of the present invention gate inhibition recognition methods,
Described method is to realize based on smart mobile phone and two-dimension code recognition device, and smart mobile phone is embedded in ciphering two-dimension code generation module, and the course of work of described ciphering two-dimension code generation module comprises the steps:
For inputting personally identifiable information's step;
Be used for the personally identifiable information's who stores input step;
For obtaining the step of current time information;
For receiving the step of PKI;
For the step of utilizing PKI to be encrypted personally identifiable information and current time information;
Be used for the Information generation Quick Response Code of encrypting, and the step showing;
Two-dimension code recognition device is embedded in Quick Response Code identification module, and the course of work of described Quick Response Code identification module comprises the steps: that described a pair of secret key comprises PKI and private key for utilizing asymmetric key algorithm to generate the step of a pair of secret key;
The step of continual outside transmission PKI;
For reading the step of 2 D code information;
For the 2 D code information reading being decrypted according to the private key obtaining, and isolate personally identifiable information and current time information, also match and send the step of the signal opening the door to access controller for the personal information of storing with database respectively when isolated personally identifiable information and current time information and current time.
A kind of time dependent Dynamic Two-dimensional code entrance guard recognition device,
Described device is to realize based on smart mobile phone and two-dimension code recognition device, and smart mobile phone is embedded in ciphering two-dimension code generation module, and described ciphering two-dimension code generation module comprises:
For inputting personally identifiable information's unit;
Be used for the personally identifiable information's who stores input unit;
For obtaining the unit of current time information;
For the unit that utilizes PKI to adopt asymmetric key algorithm to be encrypted personally identifiable information and current time information;
Be used for the Information generation Quick Response Code of encrypting, and the unit showing;
Two-dimension code recognition device is embedded in Quick Response Code identification module, and described Quick Response Code identification module comprises:
For utilizing asymmetric key algorithm to generate the unit of pair of secret keys, described pair of secret keys comprises PKI and private key;
For the unit of continual outside transmission PKI;
Quick Response Code reading unit, for reading 2 D code information;
Authentication service unit, for the 2 D code information reading being decrypted according to the private key obtaining, and isolate personally identifiable information and current time information, also match and send to access controller the signal opening the door for the personal information of storing with database respectively when isolated personally identifiable information and current time information and current time.
Beneficial effect of the present invention is, owing to having used asymmetric key algorithm, private key only rests on two-dimension code recognition device, and all users can only be encrypted operation, and can not be decrypted operation.Owing to having comprised current time information in authentication information, different time generate Quick Response Code not identical, copy even if 2 D code information is stolen, after the short time lost efficacy and cannot reuse.In this way, can effectively prevent that gate inhibition's authentication information is stolen or copies, improve the security of gate control system.
Brief description of the drawings
Fig. 1 is the principle schematic of a kind of time dependent Dynamic Two-dimensional code entrance guard recognition device described in embodiment four.
Embodiment
Embodiment one: the time dependent Dynamic Two-dimensional code of the one gate inhibition recognition methods described in present embodiment, described method is to realize based on smart mobile phone and two-dimension code recognition device, smart mobile phone is embedded in ciphering two-dimension code generation module, and the course of work of described ciphering two-dimension code generation module comprises the steps:
For inputting personally identifiable information's step;
Be used for the personally identifiable information's who stores input step;
For obtaining the step of current time information;
For receiving the step of PKI;
For the step of utilizing PKI to be encrypted personally identifiable information and current time information;
Be used for the Information generation Quick Response Code of encrypting, and the step showing;
Two-dimension code recognition device is embedded in Quick Response Code identification module, and the course of work of described Quick Response Code identification module comprises the steps:
For utilizing asymmetric key algorithm to generate the step of pair of secret keys, described pair of secret keys comprises PKI and private key;
The step of continual outside transmission PKI;
For reading the step of 2 D code information;
For the 2 D code information reading being decrypted according to the private key obtaining, and isolate personally identifiable information and current time information, also match and send the step of the signal opening the door to access controller for the personal information of storing with database respectively when isolated personally identifiable information and current time information and current time.
Present embodiment, by asymmetric key algorithm, is encrypted the numerical value after personally identifiable information and current time merging, the information after encrypting is formed to Quick Response Code and be presented on screen, for the identification of gate control system.Can guarantee so each Quick Response Code dynamic change forming, after 1 minute, cease to be in force automatically.Thereby effectively prevent that identifying information is stolen and copies, and can improve gate control system security.
Embodiment two: present embodiment is the further restriction to a kind of time dependent Dynamic Two-dimensional code gate inhibition recognition methods described in embodiment one, and described personally identifiable information is finger print information, palmmprint information, retinal information or face information.
Embodiment three: present embodiment is the further restriction to a kind of time dependent Dynamic Two-dimensional code gate inhibition recognition methods described in embodiment one, and described asymmetric key algorithm is any one in RSA Algorithm, ElGamal algorithm, knapsack algorithm, Rabin algorithm, elliptic curve encryption algorithm.
Embodiment four: present embodiment is described in conjunction with Fig. 1, the time dependent Dynamic Two-dimensional code of one entrance guard recognition device described in present embodiment, described device is to realize based on smart mobile phone and two-dimension code recognition device, smart mobile phone is embedded in ciphering two-dimension code generation module, and described ciphering two-dimension code generation module comprises:
For inputting personally identifiable information's unit;
Be used for the personally identifiable information's who stores input unit;
For obtaining the unit of current time information;
For receiving the unit of PKI;
For the unit that utilizes PKI to be encrypted personally identifiable information and current time information;
Be used for the Information generation Quick Response Code of encrypting, and the unit showing;
Two-dimension code recognition device is embedded in Quick Response Code identification module, and described Quick Response Code identification module comprises:
For utilizing asymmetric key algorithm to generate the unit of pair of secret keys, described pair of secret keys comprises PKI and private key;
For the unit of continual outside transmission PKI;
Quick Response Code reading unit, for reading 2 D code information;
Authentication service unit, for the 2 D code information reading being decrypted according to the private key obtaining, and isolate personally identifiable information and current time information, also match and send to access controller the signal opening the door for the personal information of storing with database respectively when isolated personally identifiable information and current time information and current time.
Present embodiment is to realize based on personally identifiable information, current time information, PKI, private key, smart mobile phone, Quick Response Code fetch equipment, certificate server, access controller and electric control door lock.While entering, user moves the specific program on smart mobile phone, utilizes PKI to be encrypted pre-stored personally identifiable information and current time information in the middle of smart mobile phone, then the result after encrypting is presented on smart mobile phone screen in Quick Response Code mode.Smart mobile phone screen is aimed to Quick Response Code fetch equipment, and the enciphered message of reading is returned to certificate server by Quick Response Code fetch equipment.Certificate server utilizes the private key of himself storing to be decrypted information, isolates personally identifiable information and current time information.Certificate server is compared isolated information respectively with canned data in database and current time, if two parts information is all mated, access control controller carries out opening door operation.If there is any one not mate, refusal carries out opening door operation.
Embodiment five: present embodiment is the further restriction to a kind of time dependent Dynamic Two-dimensional code entrance guard recognition device described in embodiment four, and described personally identifiable information is finger print information, palmmprint information, retinal information or face information.
Embodiment six: present embodiment is the further restriction to a kind of time dependent Dynamic Two-dimensional code entrance guard recognition device described in embodiment four, and described asymmetric key algorithm is any one in RSA Algorithm, ElGamal algorithm, knapsack algorithm, Rabin algorithm, elliptic curve encryption algorithm.
Smart mobile phone uses common Android system or IOS system on market all can.Asymmetric key algorithm can adopt common RSA, ElGamal, knapsack algorithm, Rabin, elliptic curve encryption algorithm etc. any one.Use asymmetric key algorithm to generate a pair of PKI and private key.PKI is distributed to each user's smart mobile phone.Private key is stored on certificate server.Quick Response Code fetch equipment, certificate server, access controller and electric control door lock are all matured product general on market, select reliable and stable product and are connected to together.
Claims (6)
1. a time dependent Dynamic Two-dimensional code gate inhibition recognition methods, is characterized in that being,
Described method is to realize based on smart mobile phone and two-dimension code recognition device, and smart mobile phone is embedded in ciphering two-dimension code generation module, and the course of work of described ciphering two-dimension code generation module comprises the steps:
For inputting personally identifiable information's step;
Be used for the personally identifiable information's who stores input step;
For obtaining the step of current time information;
For receiving the step of PKI;
For the step of utilizing PKI to be encrypted personally identifiable information and current time information;
Be used for the Information generation Quick Response Code of encrypting, and the step showing;
Two-dimension code recognition device is embedded in Quick Response Code identification module, and the course of work of described Quick Response Code identification module comprises the steps:
For utilizing asymmetric key algorithm to generate the step of pair of secret keys, described pair of secret keys comprises PKI and private key;
The step of continual outside transmission PKI;
For reading the step of 2 D code information;
For the 2 D code information reading being decrypted according to the private key obtaining, and isolate personally identifiable information and current time information, also match and send the step of the signal opening the door to access controller for the personal information of storing with database respectively when isolated personally identifiable information and current time information and current time.
2. the time dependent Dynamic Two-dimensional code of one according to claim 1 gate inhibition recognition methods, is characterized in that,
Described personally identifiable information is finger print information, palmmprint information, retinal information or face information.
3. the time dependent Dynamic Two-dimensional code of one according to claim 1 gate inhibition recognition methods, is characterized in that,
Described asymmetric key algorithm is any one in RSA Algorithm, ElGamal algorithm, knapsack algorithm, Rabin algorithm, elliptic curve encryption algorithm.
4. a time dependent Dynamic Two-dimensional code entrance guard recognition device, is characterized in that being,
Described device is to realize based on smart mobile phone and two-dimension code recognition device, and smart mobile phone is embedded in ciphering two-dimension code generation module, and described ciphering two-dimension code generation module comprises:
For inputting personally identifiable information's unit;
Be used for the personally identifiable information's who stores input unit;
For obtaining the unit of current time information;
For receiving the unit of PKI;
For the unit that utilizes PKI to be encrypted personally identifiable information and current time information;
Be used for the Information generation Quick Response Code of encrypting, and the unit showing;
Two-dimension code recognition device is embedded in Quick Response Code identification module, and described Quick Response Code identification module comprises:
For utilizing asymmetric key algorithm to generate the unit of pair of secret keys, described pair of secret keys comprises PKI and private key;
For the unit of continual outside transmission PKI;
Quick Response Code reading unit, for reading 2 D code information;
Authentication service unit, for the 2 D code information reading being decrypted according to the private key obtaining, and isolate personally identifiable information and current time information, also match and send to access controller the signal opening the door for the personal information of storing with database respectively when isolated personally identifiable information and current time information and current time.
5. the time dependent Dynamic Two-dimensional code of one according to claim 4 entrance guard recognition device, is characterized in that,
Described personally identifiable information is finger print information, palmmprint information, retinal information or face information.
6. the time dependent Dynamic Two-dimensional code of one according to claim 4 entrance guard recognition device, is characterized in that,
Described asymmetric key algorithm is any one in RSA Algorithm, ElGamal algorithm, knapsack algorithm, Rabin algorithm, elliptic curve encryption algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410219488.7A CN103955982A (en) | 2014-05-22 | 2014-05-22 | Method and device for identifying time-varying dynamic two-dimensional code entrance guard |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410219488.7A CN103955982A (en) | 2014-05-22 | 2014-05-22 | Method and device for identifying time-varying dynamic two-dimensional code entrance guard |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103955982A true CN103955982A (en) | 2014-07-30 |
Family
ID=51333251
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410219488.7A Pending CN103955982A (en) | 2014-05-22 | 2014-05-22 | Method and device for identifying time-varying dynamic two-dimensional code entrance guard |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103955982A (en) |
Cited By (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104282058A (en) * | 2014-08-08 | 2015-01-14 | 厦门华数电力科技有限公司 | Unlocking method of Bluetooth-based safety intelligent lock system with video monitoring function |
CN104318647A (en) * | 2014-10-13 | 2015-01-28 | 长安大学 | Access control system based on intelligent terminal and control method of access control system |
CN104537737A (en) * | 2014-12-23 | 2015-04-22 | 韶关市英诺维科技设备有限公司 | Picture lock and application of picture key |
CN104618334A (en) * | 2014-12-29 | 2015-05-13 | 通邮(中国)科技有限公司 | Method and system for generating and verifying dynamic two-dimensional code |
CN104820855A (en) * | 2015-03-26 | 2015-08-05 | 北京大学 | Generation and identification method of dynamic two-dimensional codes based on mobile environment perception technology |
CN104933793A (en) * | 2015-06-11 | 2015-09-23 | 宁波飞拓电器有限公司 | Two-dimension code electronic key implementation method based on digital signature |
CN105069868A (en) * | 2015-07-21 | 2015-11-18 | 杭州晟元数据安全技术股份有限公司 | Intelligent district cloud system base on mobile phone dynamic safety two dimension code recognition |
CN105139491A (en) * | 2015-08-10 | 2015-12-09 | 闻泰通讯股份有限公司 | Mobile phone access control system based on encrypted two-dimensional code |
CN105205894A (en) * | 2015-10-13 | 2015-12-30 | 广东聚光电子科技有限公司 | Audio frequency recognition method based on access control and access control system adopting audio frequency recognition |
CN105225314A (en) * | 2015-09-18 | 2016-01-06 | 张福伟 | A kind of dynamic two-dimension code door control system based on pseudo-random sequence |
CN105262752A (en) * | 2015-10-26 | 2016-01-20 | 广州畅联信息科技有限公司 | Data processing method and device of virtual key, mobile terminal and server |
CN105261105A (en) * | 2015-11-26 | 2016-01-20 | 熊桂荣 | Safety access control method |
CN105426765A (en) * | 2015-07-09 | 2016-03-23 | 深圳百云信息技术有限公司 | Two-dimensional code dynamic encryption and decryption algorithm |
CN105551117A (en) * | 2014-11-04 | 2016-05-04 | 广东中星电子有限公司 | Two-dimension code generation/verification method used in access control environment, and apparatus thereof |
CN105844758A (en) * | 2016-05-20 | 2016-08-10 | 广州邻礼信息科技有限公司 | Real estate resident user and visitor access management and implementation method |
CN105959785A (en) * | 2016-06-29 | 2016-09-21 | 微鲸科技有限公司 | Multi-screen interaction method and equipment |
CN106157009A (en) * | 2015-04-10 | 2016-11-23 | 中华国际通讯网路股份有限公司 | A kind of bar code to change is as the implementation of the system of identity identification |
CN106331073A (en) * | 2016-08-17 | 2017-01-11 | 北京小米移动软件有限公司 | Method and apparatus for sharing intelligent device |
CN106898065A (en) * | 2017-01-21 | 2017-06-27 | 云丁网络技术(北京)有限公司 | A kind of method for unlocking of intelligent door lock |
CN107067557A (en) * | 2016-11-16 | 2017-08-18 | 国网山东省电力公司日照供电公司 | A kind of two-dimentional key of intelligent charging spot is from lock administration system |
CN107092821A (en) * | 2017-04-10 | 2017-08-25 | 成都元息科技有限公司 | A kind of distributed face authentication information generating method, authentication method and device |
CN107172041A (en) * | 2017-05-12 | 2017-09-15 | 刘兴丹 | One kind exempts from registration gate inhibition and smart lock registration, unlocking method, device, system |
CN107274532A (en) * | 2017-07-11 | 2017-10-20 | 广东能兴科技发展有限公司 | The temporary password gate control system that encryption parameter dynamically updates |
CN107331001A (en) * | 2017-05-17 | 2017-11-07 | 成都川通达科技有限公司 | A kind of gate control system based on Quick Response Code |
CN107451643A (en) * | 2017-08-15 | 2017-12-08 | 北京航空航天大学 | Generation, recognition methods and the device of dynamic two-dimension code |
CN107492162A (en) * | 2017-06-01 | 2017-12-19 | 景德镇学院 | Intelligent access control system based on ciphering type Quick Response Code and WiFi technology |
CN107516362A (en) * | 2017-08-18 | 2017-12-26 | 广州供电局有限公司 | Unlocking method, apparatus and system |
CN108010174A (en) * | 2018-01-08 | 2018-05-08 | 江门市奕钊科技有限公司 | Access control system control method based on Quick Response Code, apparatus and system |
CN108001067A (en) * | 2017-12-06 | 2018-05-08 | 上海格尔安全科技有限公司 | A kind of electronics pass and its awarding method and verification method based on PKI technologies |
CN108596302A (en) * | 2018-05-07 | 2018-09-28 | 南京佳普科技有限公司 | A kind of Quick Response Code cycle registration recognition system and method |
CN108650082A (en) * | 2018-05-08 | 2018-10-12 | 腾讯科技(深圳)有限公司 | The encryption and verification method of information to be verified, relevant apparatus and storage medium |
CN108830364A (en) * | 2018-05-10 | 2018-11-16 | 广州市贺氏办公设备有限公司 | A kind of Dynamic Two-dimensional code generating method and system |
CN109410396A (en) * | 2018-10-14 | 2019-03-01 | 浙江鸿利锁业有限公司 | A kind of smart lock data encryption and transmission method and the leased equipment using it |
CN109993248A (en) * | 2019-03-29 | 2019-07-09 | 成都章鱼侠科技股份有限公司 | Procurement, sales, inventory business management system based on bar code |
CN110247879A (en) * | 2018-03-09 | 2019-09-17 | 日立楼宇技术(广州)有限公司 | It calls the generation method of terraced authentication code together and generation system, calls terraced authentication method and system together |
CN110247880A (en) * | 2018-03-09 | 2019-09-17 | 日立楼宇技术(广州)有限公司 | It calls the generation method of terraced authentication code together and generation system, calls terraced authentication method and system together |
CN110443925A (en) * | 2019-08-06 | 2019-11-12 | 深圳市沃特沃德股份有限公司 | Generation method, device, storage medium and the computer equipment of temporary password |
CN111028398A (en) * | 2020-01-12 | 2020-04-17 | 杭州复杂美科技有限公司 | Configuration method and control method of intelligent lock, equipment and storage medium |
CN111047750A (en) * | 2018-10-12 | 2020-04-21 | 杭州海康威视数字技术股份有限公司 | Method, device and system for controlling offline access control device |
CN112446988A (en) * | 2020-04-08 | 2021-03-05 | 杭州左链科技有限公司 | Access control application method, device and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090300362A1 (en) * | 2008-05-29 | 2009-12-03 | Cheman Shaik | Password self encryption method and system and encryption by keys generated from personal secret information |
CN102999770A (en) * | 2011-09-14 | 2013-03-27 | 尤星 | Dynamic two-dimensional code system and dynamic two-dimensional code method |
CN103136819A (en) * | 2011-12-01 | 2013-06-05 | 联想(北京)有限公司 | Unlocking method for door control system based on mobile terminal and mobile terminal |
CN203025807U (en) * | 2012-12-18 | 2013-06-26 | 咏动科技股份有限公司 | QR (Quick Response) code door control system |
CN103544746A (en) * | 2012-07-08 | 2014-01-29 | 上海博路信息技术有限公司 | Electronic access control system of dynamic bar code |
CN103646455A (en) * | 2013-12-24 | 2014-03-19 | 杨密凯 | Intelligent lock device and usage method thereof as well as configuration method for electronic keys |
-
2014
- 2014-05-22 CN CN201410219488.7A patent/CN103955982A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090300362A1 (en) * | 2008-05-29 | 2009-12-03 | Cheman Shaik | Password self encryption method and system and encryption by keys generated from personal secret information |
CN102999770A (en) * | 2011-09-14 | 2013-03-27 | 尤星 | Dynamic two-dimensional code system and dynamic two-dimensional code method |
CN103136819A (en) * | 2011-12-01 | 2013-06-05 | 联想(北京)有限公司 | Unlocking method for door control system based on mobile terminal and mobile terminal |
CN103544746A (en) * | 2012-07-08 | 2014-01-29 | 上海博路信息技术有限公司 | Electronic access control system of dynamic bar code |
CN203025807U (en) * | 2012-12-18 | 2013-06-26 | 咏动科技股份有限公司 | QR (Quick Response) code door control system |
CN103646455A (en) * | 2013-12-24 | 2014-03-19 | 杨密凯 | Intelligent lock device and usage method thereof as well as configuration method for electronic keys |
Cited By (51)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104282058A (en) * | 2014-08-08 | 2015-01-14 | 厦门华数电力科技有限公司 | Unlocking method of Bluetooth-based safety intelligent lock system with video monitoring function |
CN104282058B (en) * | 2014-08-08 | 2016-08-24 | 厦门华数电力科技有限公司 | The method for unlocking of the safety intelligent lock system of band video monitoring based on bluetooth |
CN104318647A (en) * | 2014-10-13 | 2015-01-28 | 长安大学 | Access control system based on intelligent terminal and control method of access control system |
CN105551117A (en) * | 2014-11-04 | 2016-05-04 | 广东中星电子有限公司 | Two-dimension code generation/verification method used in access control environment, and apparatus thereof |
CN104537737A (en) * | 2014-12-23 | 2015-04-22 | 韶关市英诺维科技设备有限公司 | Picture lock and application of picture key |
CN104618334A (en) * | 2014-12-29 | 2015-05-13 | 通邮(中国)科技有限公司 | Method and system for generating and verifying dynamic two-dimensional code |
CN104820855A (en) * | 2015-03-26 | 2015-08-05 | 北京大学 | Generation and identification method of dynamic two-dimensional codes based on mobile environment perception technology |
CN106157009A (en) * | 2015-04-10 | 2016-11-23 | 中华国际通讯网路股份有限公司 | A kind of bar code to change is as the implementation of the system of identity identification |
CN104933793A (en) * | 2015-06-11 | 2015-09-23 | 宁波飞拓电器有限公司 | Two-dimension code electronic key implementation method based on digital signature |
CN105426765A (en) * | 2015-07-09 | 2016-03-23 | 深圳百云信息技术有限公司 | Two-dimensional code dynamic encryption and decryption algorithm |
CN105069868A (en) * | 2015-07-21 | 2015-11-18 | 杭州晟元数据安全技术股份有限公司 | Intelligent district cloud system base on mobile phone dynamic safety two dimension code recognition |
CN105069868B (en) * | 2015-07-21 | 2018-04-20 | 杭州晟元数据安全技术股份有限公司 | One kind is based on mobile phone dynamic security Quick Response Code identification intelligent cell cloud system |
CN105139491B (en) * | 2015-08-10 | 2017-11-28 | 闻泰通讯股份有限公司 | A kind of cell phone access control based on ciphering type Quick Response Code |
CN105139491A (en) * | 2015-08-10 | 2015-12-09 | 闻泰通讯股份有限公司 | Mobile phone access control system based on encrypted two-dimensional code |
CN105225314A (en) * | 2015-09-18 | 2016-01-06 | 张福伟 | A kind of dynamic two-dimension code door control system based on pseudo-random sequence |
CN105205894A (en) * | 2015-10-13 | 2015-12-30 | 广东聚光电子科技有限公司 | Audio frequency recognition method based on access control and access control system adopting audio frequency recognition |
CN105262752A (en) * | 2015-10-26 | 2016-01-20 | 广州畅联信息科技有限公司 | Data processing method and device of virtual key, mobile terminal and server |
CN105261105A (en) * | 2015-11-26 | 2016-01-20 | 熊桂荣 | Safety access control method |
CN105844758A (en) * | 2016-05-20 | 2016-08-10 | 广州邻礼信息科技有限公司 | Real estate resident user and visitor access management and implementation method |
CN105959785A (en) * | 2016-06-29 | 2016-09-21 | 微鲸科技有限公司 | Multi-screen interaction method and equipment |
CN106331073A (en) * | 2016-08-17 | 2017-01-11 | 北京小米移动软件有限公司 | Method and apparatus for sharing intelligent device |
CN107067557A (en) * | 2016-11-16 | 2017-08-18 | 国网山东省电力公司日照供电公司 | A kind of two-dimentional key of intelligent charging spot is from lock administration system |
CN106898065A (en) * | 2017-01-21 | 2017-06-27 | 云丁网络技术(北京)有限公司 | A kind of method for unlocking of intelligent door lock |
US11335144B2 (en) | 2017-01-21 | 2022-05-17 | Yunding Network Technology (Beijing) Co., Ltd. | Method for unlocking intelligent lock, mobile terminal, intelligent lock and server |
CN107092821A (en) * | 2017-04-10 | 2017-08-25 | 成都元息科技有限公司 | A kind of distributed face authentication information generating method, authentication method and device |
CN107172041A (en) * | 2017-05-12 | 2017-09-15 | 刘兴丹 | One kind exempts from registration gate inhibition and smart lock registration, unlocking method, device, system |
CN107331001A (en) * | 2017-05-17 | 2017-11-07 | 成都川通达科技有限公司 | A kind of gate control system based on Quick Response Code |
CN107492162A (en) * | 2017-06-01 | 2017-12-19 | 景德镇学院 | Intelligent access control system based on ciphering type Quick Response Code and WiFi technology |
CN107274532A (en) * | 2017-07-11 | 2017-10-20 | 广东能兴科技发展有限公司 | The temporary password gate control system that encryption parameter dynamically updates |
CN107451643A (en) * | 2017-08-15 | 2017-12-08 | 北京航空航天大学 | Generation, recognition methods and the device of dynamic two-dimension code |
CN107451643B (en) * | 2017-08-15 | 2019-08-20 | 北京航空航天大学 | Generation, recognition methods and the device of dynamic two-dimension code |
CN107516362A (en) * | 2017-08-18 | 2017-12-26 | 广州供电局有限公司 | Unlocking method, apparatus and system |
CN108001067A (en) * | 2017-12-06 | 2018-05-08 | 上海格尔安全科技有限公司 | A kind of electronics pass and its awarding method and verification method based on PKI technologies |
CN108010174A (en) * | 2018-01-08 | 2018-05-08 | 江门市奕钊科技有限公司 | Access control system control method based on Quick Response Code, apparatus and system |
CN110247880A (en) * | 2018-03-09 | 2019-09-17 | 日立楼宇技术(广州)有限公司 | It calls the generation method of terraced authentication code together and generation system, calls terraced authentication method and system together |
CN110247879B (en) * | 2018-03-09 | 2021-10-01 | 日立楼宇技术(广州)有限公司 | Generation method and generation system of elevator calling authentication code, and elevator calling authentication method and system |
CN110247880B (en) * | 2018-03-09 | 2021-08-03 | 日立楼宇技术(广州)有限公司 | Generation method and generation system of elevator calling authentication code, and elevator calling authentication method and system |
CN110247879A (en) * | 2018-03-09 | 2019-09-17 | 日立楼宇技术(广州)有限公司 | It calls the generation method of terraced authentication code together and generation system, calls terraced authentication method and system together |
CN108596302A (en) * | 2018-05-07 | 2018-09-28 | 南京佳普科技有限公司 | A kind of Quick Response Code cycle registration recognition system and method |
CN108650082A (en) * | 2018-05-08 | 2018-10-12 | 腾讯科技(深圳)有限公司 | The encryption and verification method of information to be verified, relevant apparatus and storage medium |
CN108830364B (en) * | 2018-05-10 | 2021-02-26 | 广州市贺氏办公设备有限公司 | Dynamic two-dimensional code generation method and system |
CN108830364A (en) * | 2018-05-10 | 2018-11-16 | 广州市贺氏办公设备有限公司 | A kind of Dynamic Two-dimensional code generating method and system |
CN111047750A (en) * | 2018-10-12 | 2020-04-21 | 杭州海康威视数字技术股份有限公司 | Method, device and system for controlling offline access control device |
CN109410396B (en) * | 2018-10-14 | 2021-01-01 | 浙江鸿利锁业有限公司 | Intelligent lock data encryption transmission method and leasing equipment applying same |
CN109410396A (en) * | 2018-10-14 | 2019-03-01 | 浙江鸿利锁业有限公司 | A kind of smart lock data encryption and transmission method and the leased equipment using it |
CN109993248A (en) * | 2019-03-29 | 2019-07-09 | 成都章鱼侠科技股份有限公司 | Procurement, sales, inventory business management system based on bar code |
CN109993248B (en) * | 2019-03-29 | 2022-05-03 | 成都章鱼侠科技股份有限公司 | Purchase-sales-stock business management system based on bar code |
CN110443925A (en) * | 2019-08-06 | 2019-11-12 | 深圳市沃特沃德股份有限公司 | Generation method, device, storage medium and the computer equipment of temporary password |
CN111028398A (en) * | 2020-01-12 | 2020-04-17 | 杭州复杂美科技有限公司 | Configuration method and control method of intelligent lock, equipment and storage medium |
CN111028398B (en) * | 2020-01-12 | 2021-08-06 | 杭州复杂美科技有限公司 | Configuration method and control method of intelligent lock, equipment and storage medium |
CN112446988A (en) * | 2020-04-08 | 2021-03-05 | 杭州左链科技有限公司 | Access control application method, device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103955982A (en) | Method and device for identifying time-varying dynamic two-dimensional code entrance guard | |
US10680808B2 (en) | 1:N biometric authentication, encryption, signature system | |
US10146983B2 (en) | Fingerprint decryption method and device | |
RU2718226C2 (en) | Biometric data safe handling systems and methods | |
CN201181472Y (en) | Hardware key device and movable memory system | |
US10469253B2 (en) | Methods and apparatus for migrating keys | |
EP3183680A1 (en) | Methods for digitally signing an electronic file, and authenticating method | |
CN104239815A (en) | Electronic document encryption and decryption method and method based on iris identification | |
CN105450419B (en) | Improve the methods, devices and systems of biometric identification security | |
RU2013140418A (en) | SAFE ACCESS TO PERSONAL HEALTH RECORDS IN EMERGENCIES | |
CN103560892A (en) | Secret key generation method and secret key generation device | |
CN113282944B (en) | Intelligent lock unlocking method and device, electronic equipment and storage medium | |
KR20180129475A (en) | Method, user terminal and authentication service server for authentication | |
CN112039665A (en) | Key management method and device | |
CN104537313B (en) | A kind of data guard method, terminal and server | |
CN105337742A (en) | LFSR (Linear Feedback Shift Register) file encryption and decryption methods based on human face image features and GPS (Global Position System) information | |
CN111768523B (en) | CTID-based NFC intelligent door lock unlocking method, system, equipment and medium | |
US11469899B2 (en) | System and a method for user authentication and/or authorization | |
CN110826038B (en) | Data encryption and decryption method and device | |
CA3010225A1 (en) | A method for verifying the identity of a person | |
KR101666591B1 (en) | One time password certifacation system and method | |
WO2020121458A1 (en) | Collation system, client, and server | |
KR20200013494A (en) | System and Method for Identification Based on Finanace Card Possessed by User | |
CN107392039B (en) | Computer hard disk data encryption method and device | |
KR101885733B1 (en) | Biometric authentication apparatus and user authentication method using biometric authentication apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20140730 |