CN104392165A - Identity authorization controlling method and system - Google Patents
Identity authorization controlling method and system Download PDFInfo
- Publication number
- CN104392165A CN104392165A CN201410631724.6A CN201410631724A CN104392165A CN 104392165 A CN104392165 A CN 104392165A CN 201410631724 A CN201410631724 A CN 201410631724A CN 104392165 A CN104392165 A CN 104392165A
- Authority
- CN
- China
- Prior art keywords
- terminal
- authorization
- authorization data
- encryption
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an identity authorization controlling method and an identity authorization controlling system. The method comprises the following steps that a first terminal encrypts authorization data according to a preset encryption algorithm, acquires encryption authorization data and transmits the encryption authorization data to a second terminal; the second terminal receives the encryption authorization data and transmits the encryption authorization data to a non-contact card reader in a near-distance wireless communication way; when sensing the second terminal in the near-distance wireless communication way, the non-contact card reader acquires the encryption authorization data, decrypts the encryption authorization data according to a decryption algorithm corresponding to the encryption algorithm to acquire the authorization data, performs identity authorization for the second terminal according to the authorization data, and releases the limits of authority of a controlled target. By the scheme, the identity authorization efficiency of the second terminal is greatly improved, the efficiency of releasing the limits of authority of the controlled target is improved, meanwhile, the cost caused by manufacturing an IC (integrated circuit) card is avoided, and the cost is saved.
Description
Technical field
The present invention relates to control technology field, particularly relate to a kind of identification authorization control method and system.
Background technology
In order to realize the function such as safety, registration, often need the authority that control object is set.The control authority etc. be such as provided with gate inhibition in the porch in office building hall, being provided with gate inhibition on company doorway, being provided with gate inhibition at residential building, being provided with elevator panel in stair system.
At present can by arranging authorization data in IC-card, then IC-card is handed down to user, IC-card is swiped the card by user on Non-contact Media Reader, and Non-contact Media Reader removes limiting operation accordingly according to the authorization data read.
But adopt said method, every user must could remove the authority, particularly some provisional users of control object by IC-card, IC-card quantity can be caused more, cause cost high.Because user needs foreground or the card drawing of property place, just can perform the authority removing control object, reduce the efficiency that identification authorization controls.
Summary of the invention
Based on this, be necessary, for inefficient problem during execution releasing control object authority, to provide a kind of identification authorization control method and system.
A kind of identification authorization control method, comprising:
Authorization data is encrypted according to the cryptographic algorithm preset by first terminal, obtains encryption authorization data, and described encryption authorization data are sent to the second terminal;
Described second terminal receives described encryption authorization data, and by close range wireless communication modes, described encryption authorization data is sent to Non-contact Media Reader;
When described Non-contact Media Reader senses described second terminal by close range wireless communication modes, obtain described encryption authorization data, and according to decipherment algorithm corresponding to described cryptographic algorithm by described encryption authorization decrypt data, to obtain the authorization data, according to described authorization data, identification authorization is carried out to the second terminal, and remove the authority of control object;
Wherein, described authorization data is that Non-contact Media Reader performs data corresponding to releasing limiting operation, described first terminal and described second terminal are by remote-wireless communication, and described second terminal and described Non-contact Media Reader are by wireless near field communication network service.
A kind of identification authorization control system, for performing the identification authorization control method described in above-mentioned any one, this system comprises: first terminal, the second terminal, Non-contact Media Reader, and described Non-contact Media Reader is located within the scope of the predeterminable range of control object;
Described first terminal and described second terminal are by remote-wireless communication, and described second terminal and described Non-contact Media Reader are by wireless near field communication network service.
Above-mentioned identification authorization control method and system, authorization data is encrypted according to the cryptographic algorithm preset by first terminal, obtains encryption authorization data, and utilizes remote-wireless communication network that described encryption authorization data are sent to the second terminal; Described second terminal receives and described encryption authorization data is sent to Non-contact Media Reader, when Non-contact Media Reader senses described second terminal by wireless near field communication network, obtain described encryption authorization data, and according to decipherment algorithm corresponding to described cryptographic algorithm by described encryption authorization decrypt data, to obtain the authorization data, according to described authorization data, identification authorization is carried out to the second terminal, and remove the authority of control object.The user realizing holding the second terminal gets IC-card without the need to going to the appointed place such as foreground or property, directly when receiving encryption authorization data, by the second terminal near Non-contact Media Reader, can realize removing control object, improve the second terminal identity mandate efficiency greatly, and then improve the efficiency removing control object authority, avoid the cost making IC-card and cause simultaneously, and then save cost.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of identification authorization control method embodiment of the present invention;
Fig. 2 is the structural representation of identification authorization control system embodiment of the present invention;
Fig. 3 is the structural representation of identification authorization control system example of the present invention.
Embodiment
Below in conjunction with embodiment and accompanying drawing, the present invention is described in further detail, but embodiments of the present invention are not limited thereto.
As shown in Figure 1, be the schematic flow sheet of identification authorization control method embodiment of the present invention, comprise step:
Step S101: authorization data is encrypted according to the cryptographic algorithm preset by first terminal, obtains encryption authorization data, and described encryption authorization data is sent to the second terminal;
Authorization data is that Non-contact Media Reader performs data corresponding to releasing limiting operation, and further, Non-contact Media Reader according to authorization data, can judge that whether authorization data is correct, thus judge whether to perform the operation removing control object authority.Cryptographic algorithm is that first terminal pre-sets, and object is to be encrypted authorization data, and by the corresponding relation of cryptographic algorithm and decipherment algorithm, sets up the corresponding relation of first terminal and Non-contact Media Reader.Non-contact Media Reader can to encryption authorization decrypt data, successful decryption, then identify the data that encryption authorization data are first terminal transmissions that Non-contact Media Reader is corresponding, otherwise be not.
Encryption authorization data are sent to the second terminal by remote-wireless communication network by first terminal.Remote-wireless communication network can be GPRS network, wifi network etc.
Step S102: described second terminal receives described encryption authorization data, and by close range wireless communication modes, described encryption authorization data are sent to Non-contact Media Reader;
Second terminal receives encryption authorization data by remote-wireless communication network, then by the second terminal near Non-contact Media Reader, realization sends data to Non-contact Media Reader, gets IC-card the second terminal control Non-contact Media Reader can be utilized to remove the authority of control object without the need to user to appointed place.
Step S103: when described Non-contact Media Reader senses described second terminal by close range wireless communication modes, obtain described encryption authorization data, and according to decipherment algorithm corresponding to described cryptographic algorithm by described encryption authorization decrypt data, to obtain the authorization data, according to described authorization data, identification authorization is carried out to the second terminal, and remove the authority of control object;
Wherein, described authorization data is that Non-contact Media Reader performs data corresponding to releasing limiting operation, described first terminal and described second terminal are by remote-wireless communication, and described second terminal and described Non-contact Media Reader are by wireless near field communication network service.
Non-contact Media Reader responds to the second terminal by wireless near field communication network, thus obtains encryption authorization data, is decrypted, and removes the authority of control object.Further, Non-contact Media Reader can generate steering order according to authorization data, and steering order is sent to control object, removes authority by control object.Control object is a kind of equipment with control of authority, and he may be used for the instruction sent according to Non-contact Media Reader, removes the authority of self.Such as, control object can be gate inhibition, can be the device etc. of control authority in elevator device.
Authorization data is encrypted according to the cryptographic algorithm preset by the first terminal of the present embodiment, obtains encryption authorization data, and utilizes remote-wireless communication network that described encryption authorization data are sent to the second terminal; Described second terminal receives and described encryption authorization data is sent to Non-contact Media Reader, when Non-contact Media Reader senses described second terminal by wireless near field communication network, obtain described encryption authorization data, and according to decipherment algorithm corresponding to described cryptographic algorithm by described encryption authorization decrypt data, to obtain the authorization data, according to described authorization data, identification authorization is carried out to the second terminal, and remove the authority of control object.The user realizing holding the second terminal gets IC-card without the need to going to the appointed place such as foreground or property, directly when receiving encryption authorization data, by the second terminal near Non-contact Media Reader, the authority removing control object can be realized, improve the second terminal identity mandate efficiency greatly, and then improve the efficiency removing control object authority, avoid the cost making IC-card and cause simultaneously, and then save cost.And provide convenience to the user holding the second terminal, without the need to getting IC-card to appointed place.
Wherein in an embodiment, authorization data comprises but is not limited to the positional information of control object, mandate number of times, the effective time of mandate, check code.Namely authorization data can be control object positional information, to authorize in number of times, effective time of mandate, check code one or more, be not limited to the positional information of control object simultaneously, authorize number of times, the effective time of mandate, check code.The positional information of control object can comprise specific address information, such as, and XX city, XX district, cell id, generic term for a building, e. g. Apartment, store, a movie theater, etc., floor, room number etc.
Further, describedly according to described authorization data, identification authorization is carried out to the second terminal, and removes the authority step of control object, comprising:
Judge whether authorization data mates with the authorization data prestored, if so, then identification authorization is carried out to the second terminal, and remove the authority of control object.
Such as, in a specific embodiment, describedly according to described authorization data, identification authorization is carried out to the second terminal, and removes the authority step of control object, comprising:
The positional information judging described control object whether correct, current operation whether authorizing in number of times, current time whether within the effective time of authorizing, whether check code correct;
If all meet, then identification authorization is carried out to the second terminal, and remove the authority of control object.
Only correct in the positional information of control object, and current operation is in mandate number of times, and current time is within the effective time of authorizing, and when check code is correct, just performs the authority removing control object.
Authorization data often needs to upgrade, and wherein in an embodiment, this programme also provides one update method easily.Namely also comprise:
When first terminal receives update instruction, according to update instruction, authorization data is upgraded, obtain and upgrade authorization data, described renewal authorization data is encrypted according to the cryptographic algorithm preset, obtain and upgrade encryption authorization data, and described renewal encryption authorization data are sent to described second terminal;
Described second terminal receives described renewal encryption authorization data, and described renewal encryption authorization data are sent to described Non-contact Media Reader;
When described Non-contact Media Reader senses described second terminal by close range wireless communication modes, obtain described renewal encryption authorization data, and according to described decipherment algorithm by described renewal encryption authorization decrypt data, obtain and upgrade authorization data, according to described renewal authorization data, identification authorization is carried out to the second terminal, and remove the authority of control object.
Update instruction can be that user issues, and also can be that director server issues.The present embodiment achieves when authorization data needs to upgrade, and upgrades to appointed place without the need to user, only needs to receive to upgrade encryption authorization data, improves Consumer's Experience, and has saved user to remove the time of control object authority.
Wherein in an embodiment, first terminal also comprises before being encrypted according to the cryptographic algorithm preset by authorization data:
Described first terminal judges whether the authorization requests receiving the second terminal transmission, if so, then performs first terminal and authorization data is encrypted step according to the cryptographic algorithm preset.
The present embodiment achieve first terminal can when receiving authorization requests direct encrypting and transmitting encryption authorization data.
Cryptographic algorithm and decipherment algorithm have a variety of, wherein in an embodiment, described cryptographic algorithm is the cryptographic algorithm of Advanced Encryption Standard (Advanced Encryption Standard, AES), and described decipherment algorithm is the decipherment algorithm of Advanced Encryption Standard.Thus the reliability of encryption can be improved.
Second terminal is the terminal with the short distance wireless communication technology, can be mobile terminal wherein in an embodiment.Such as, the second terminal can be NFC (Near Field Communication, the short distance wireless communication technology) mobile phone.Non-contact Media Reader is the Non-contact Media Reader with the short distance wireless communication technology, such as, can be NFC card reader.
Various technical characteristics in above embodiment can combine arbitrarily, as long as there is not conflict or contradiction in the combination between feature, but as space is limited, describe one by one, the carrying out arbitrarily combining of the various technical characteristics therefore in above-mentioned embodiment also belongs to this instructions scope of disclosure.
This programme is enumerated several application example and is described.
Doorway, each community is often provided with gate inhibition, and user needs to remove gate inhibition just can enter community.When visitor needs calling party A, visitor utilizes NFC mobile phone directly can send the Mobile data transmitting terminal of an authorization requests to user A, after Mobile data transmitting terminal receives request, the authorization data of " cell id+generic term for a building, e. g. Apartment, store, a movie theater, etc.+room number+hall number+effective degree+effective time section+control word " is encrypted and is sent to NFC mobile phone by having, after NFC mobile phone receives encryption authorization data, be directly adjacent to the NFC card reader be located near gate inhibition, can by encrypted data transmission to NFC card reader, NFC card reader is to encryption authorization decrypt data, and judge that whether the data after deciphering are correct, thus judge whether will to NFC mobile phone mandate, whether to perform and remove gate inhibition's operation, thus improve the efficiency removing gate inhibition's operation greatly.
And for example, the gate inhibition in hotel.The equipment on foreground is as first terminal, the effective time of authorization data can be ordered hotel according to dweller and be set to many days time the time, also effective time can be set to 1 day, closing time is at point at second day noon 12, then when dweller needs to continue to live, dweller utilizes NFC mobile phone to send authorization requests to first terminal, and first terminal resends encryption authorization data again to NFC mobile phone, thus realizes dweller and can remove gate inhibition.
And for example, the authority in elevator, when apparatus for controlling elevator does not receive releasing authority instruction, any button of this elevator panel all lost efficacy, when apparatus for controlling elevator receives releasing authority instruction, carry out releasing authority, the specified right button of this elevator panel is effective.The property place equipment in this building can as first terminal, authorization data can be sent to the NFC mobile phone of owner, the NFC mobile phone of owner is when the NFC card reader be located in elevator, and NFC card reader sends removes authority instruction to apparatus for controlling elevator, carries out releasing authority.Owner can press elevator floor button, takes elevator.Can also comprise in some authorization data owner fixing arrive floor, such as 39th floors.While then NFC card reader sends and removes authority instruction to apparatus for controlling elevator, the instruction that Jiang Dao is 39th floors together issues apparatus for controlling elevator, and apparatus for controlling elevator controls elevator and reaches 39th floors after receiving instruction.
Based on said method, the present invention also provides a kind of identification authorization control system, as shown in Figure 2, for the structural representation of identification authorization control system embodiment of the present invention, for performing the identification authorization control method described in above-mentioned any one, this system comprises: first terminal 210, second terminal 220, Non-contact Media Reader 230, and described Non-contact Media Reader 230 is located within the scope of the predeterminable range of control object;
Described first terminal 210 and described second terminal 220 are by remote-wireless communication, and described second terminal 220 and described Non-contact Media Reader 230 are by wireless near field communication network service.
Wherein in an embodiment, described second terminal comprises mobile phone, panel computer.
Wherein in an embodiment, described first terminal comprises mobile phone, panel computer or personal computer.
Such as Fig. 3 is the structural representation of identification authorization control system example of the present invention.Identification authorization control system comprises ipad310, NFC mobile phone 320 and NFC card reader 330.Visitor utilizes NFC mobile phone 320 directly can send the ipad310 of an authorization requests to user A, after ipad310 receives request, the authorization data of " cell id+generic term for a building, e. g. Apartment, store, a movie theater, etc.+room number+hall number+effective degree+effective time section+control word " is encrypted and is sent to NFC mobile phone 320 by having, after NFC mobile phone 320 receives encryption authorization data, be directly adjacent to the NFC card reader 330 be located near control object, can by encrypted data transmission to NFC card reader 330, NFC card reader 330 pairs of encryption authorization decrypt data, and judge that whether the data after deciphering are correct, thus judge whether to perform releasing gate inhibition operation, thus improve the efficiency removing gate inhibition's operation greatly.
The above embodiment only have expressed several embodiment of the present invention, and it describes comparatively concrete and detailed, but therefore can not be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be as the criterion with claims.
Claims (9)
1. an identification authorization control method, is characterized in that, comprising:
Authorization data is encrypted according to the cryptographic algorithm preset by first terminal, obtains encryption authorization data, and described encryption authorization data are sent to the second terminal;
Described second terminal receives described encryption authorization data, and by close range wireless communication modes, described encryption authorization data is sent to Non-contact Media Reader;
When described Non-contact Media Reader senses described second terminal by close range wireless communication modes, obtain described encryption authorization data, and according to decipherment algorithm corresponding to described cryptographic algorithm by described encryption authorization decrypt data, to obtain the authorization data, according to described authorization data, identification authorization is carried out to the second terminal, and remove the authority of control object;
Wherein, described authorization data is that Non-contact Media Reader performs data corresponding to releasing limiting operation, described first terminal and described second terminal are by remote-wireless communication, and described second terminal and described Non-contact Media Reader are by wireless near field communication network service.
2. identification authorization control method according to claim 1, is characterized in that, described authorization data comprises but is not limited to the positional information of control object, mandate number of times, the effective time of mandate, check code.
3. identification authorization control method according to claim 2, is characterized in that, describedly carries out identification authorization according to described authorization data to the second terminal, and removes the authority step of control object, comprising:
The positional information judging described control object whether correct, current operation whether authorizing in number of times, current time whether within the effective time of authorizing, whether check code correct;
If all meet, then identification authorization is carried out to the second terminal, and remove the authority of control object.
4. identification authorization control method according to claim 1, is characterized in that, also comprise:
When first terminal receives update instruction, according to update instruction, authorization data is upgraded, obtain and upgrade authorization data, described renewal authorization data is encrypted according to the cryptographic algorithm preset, obtain and upgrade encryption authorization data, and described renewal encryption authorization data are sent to described second terminal;
Described second terminal receives described renewal encryption authorization data, and described renewal encryption authorization data are sent to described Non-contact Media Reader;
When described Non-contact Media Reader senses described second terminal by close range wireless communication modes, obtain described renewal encryption authorization data, and according to described decipherment algorithm by described renewal encryption authorization decrypt data, obtain and upgrade authorization data, according to described renewal authorization data, identification authorization is carried out to the second terminal, and remove the authority of control object.
5. the identification authorization control method according to Claims 1-4 any one, is characterized in that, first terminal also comprises before being encrypted according to the cryptographic algorithm preset by authorization data:
Described first terminal judges whether the authorization requests receiving the second terminal transmission, if so, then performs first terminal and authorization data is encrypted step according to the cryptographic algorithm preset.
6. the identification authorization control method according to Claims 1-4 any one, is characterized in that, described cryptographic algorithm is the cryptographic algorithm of Advanced Encryption Standard, and described decipherment algorithm is the decipherment algorithm of Advanced Encryption Standard.
7. an identification authorization control system, it is characterized in that, the identification authorization control method described in any one of 1 to claim 6 is required for enforcement of rights, this system comprises: first terminal, the second terminal, Non-contact Media Reader, and described Non-contact Media Reader is located within the scope of the predeterminable range of control object;
Described first terminal and described second terminal are by remote-wireless communication, and described second terminal and described Non-contact Media Reader are by wireless near field communication network service.
8. identification authorization control system according to claim 7, is characterized in that, described second terminal comprises mobile phone, panel computer.
9. the identification authorization control system according to claim 7 or 8, is characterized in that, described first terminal comprises mobile phone, panel computer or personal computer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410631724.6A CN104392165A (en) | 2014-11-10 | 2014-11-10 | Identity authorization controlling method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410631724.6A CN104392165A (en) | 2014-11-10 | 2014-11-10 | Identity authorization controlling method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104392165A true CN104392165A (en) | 2015-03-04 |
Family
ID=52610067
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410631724.6A Pending CN104392165A (en) | 2014-11-10 | 2014-11-10 | Identity authorization controlling method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104392165A (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104732134A (en) * | 2015-04-10 | 2015-06-24 | 北京深思数盾科技有限公司 | Information safety device with software protection function and authentication method thereof |
CN104916017A (en) * | 2015-05-28 | 2015-09-16 | 江苏苏南万科物业服务有限公司 | Exit intelligent access control system |
CN104916016A (en) * | 2015-05-28 | 2015-09-16 | 江苏苏南万科物业服务有限公司 | Entrance Intelligent Access Control System |
CN104916018A (en) * | 2015-05-28 | 2015-09-16 | 江苏苏南万科物业服务有限公司 | Intelligent barrier gate system |
CN104933788A (en) * | 2015-05-28 | 2015-09-23 | 江苏苏南万科物业服务有限公司 | Entrance intelligent access control method |
CN104933790A (en) * | 2015-05-28 | 2015-09-23 | 江苏苏南万科物业服务有限公司 | Exit intelligent access control method |
CN105187442A (en) * | 2015-09-28 | 2015-12-23 | 宇龙计算机通信科技(深圳)有限公司 | Vehicle authorization method, device, vehicle-mounted terminal, terminal and system |
CN105187419A (en) * | 2015-08-26 | 2015-12-23 | 宇龙计算机通信科技(深圳)有限公司 | Authentication method, device, terminal and system |
CN105282148A (en) * | 2015-09-17 | 2016-01-27 | 褚维戈 | Data remote authentication system and method |
CN105551118A (en) * | 2015-10-31 | 2016-05-04 | 东莞酷派软件技术有限公司 | Electronic key opening access control method, and apparatus and system thereof |
CN105635951A (en) * | 2016-01-19 | 2016-06-01 | 广州市云剑电子技术有限公司 | Data transmission control method based on Bluetooth |
CN105701896A (en) * | 2016-02-29 | 2016-06-22 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint authorization unlocking method and device and terminals |
CN105871689A (en) * | 2016-03-31 | 2016-08-17 | 湖南光海教育科技有限公司 | Micro school communication interaction system and primary and secondary school student management method based on wechat public platform |
CN106006241A (en) * | 2016-07-05 | 2016-10-12 | 深圳市西克智能技术有限公司 | Method and system of granting privilege to elevator pass |
CN106315320A (en) * | 2016-10-10 | 2017-01-11 | 永大电梯设备(中国)有限公司 | Intelligent ID recognition elevator control system and control method |
CN106408674A (en) * | 2016-11-24 | 2017-02-15 | 广州华工信息软件有限公司 | Non-stop charging lane system and control method and control device thereof |
CN106408689A (en) * | 2015-07-29 | 2017-02-15 | 北京千丁互联科技有限公司 | Visitor reservation management method and visitor reservation management system |
CN106485824A (en) * | 2016-11-18 | 2017-03-08 | 成都雅骏新能源汽车科技股份有限公司 | A kind of method and system of electric automobile remotely control car door lock |
CN106600774A (en) * | 2016-12-07 | 2017-04-26 | 深圳市万睿智能科技有限公司 | Face identification gate inhibition control method provided with door opening detection area and system thereof |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201801252U (en) * | 2010-08-23 | 2011-04-20 | 深圳市旺龙智能科技有限公司 | Smart card elevator control system |
CN102831686A (en) * | 2012-09-03 | 2012-12-19 | 深圳达实信息技术有限公司 | Access control system and control method for visitor access permission |
EP2421217B1 (en) * | 2010-08-16 | 2013-10-02 | BlackBerry Limited | Communication system providing wireless authentication for private data access and related method |
CN103606211A (en) * | 2013-10-30 | 2014-02-26 | 小米科技有限责任公司 | Method, equipment and system used for realization of intelligent entrance guard |
-
2014
- 2014-11-10 CN CN201410631724.6A patent/CN104392165A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2421217B1 (en) * | 2010-08-16 | 2013-10-02 | BlackBerry Limited | Communication system providing wireless authentication for private data access and related method |
CN201801252U (en) * | 2010-08-23 | 2011-04-20 | 深圳市旺龙智能科技有限公司 | Smart card elevator control system |
CN102831686A (en) * | 2012-09-03 | 2012-12-19 | 深圳达实信息技术有限公司 | Access control system and control method for visitor access permission |
CN103606211A (en) * | 2013-10-30 | 2014-02-26 | 小米科技有限责任公司 | Method, equipment and system used for realization of intelligent entrance guard |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104732134A (en) * | 2015-04-10 | 2015-06-24 | 北京深思数盾科技有限公司 | Information safety device with software protection function and authentication method thereof |
CN104916017A (en) * | 2015-05-28 | 2015-09-16 | 江苏苏南万科物业服务有限公司 | Exit intelligent access control system |
CN104916016A (en) * | 2015-05-28 | 2015-09-16 | 江苏苏南万科物业服务有限公司 | Entrance Intelligent Access Control System |
CN104916018A (en) * | 2015-05-28 | 2015-09-16 | 江苏苏南万科物业服务有限公司 | Intelligent barrier gate system |
CN104933788A (en) * | 2015-05-28 | 2015-09-23 | 江苏苏南万科物业服务有限公司 | Entrance intelligent access control method |
CN104933790A (en) * | 2015-05-28 | 2015-09-23 | 江苏苏南万科物业服务有限公司 | Exit intelligent access control method |
CN106408689A (en) * | 2015-07-29 | 2017-02-15 | 北京千丁互联科技有限公司 | Visitor reservation management method and visitor reservation management system |
CN105187419A (en) * | 2015-08-26 | 2015-12-23 | 宇龙计算机通信科技(深圳)有限公司 | Authentication method, device, terminal and system |
CN105187419B (en) * | 2015-08-26 | 2019-01-11 | 宇龙计算机通信科技(深圳)有限公司 | A kind of authorization method, device, terminal and system |
CN105282148A (en) * | 2015-09-17 | 2016-01-27 | 褚维戈 | Data remote authentication system and method |
CN105187442A (en) * | 2015-09-28 | 2015-12-23 | 宇龙计算机通信科技(深圳)有限公司 | Vehicle authorization method, device, vehicle-mounted terminal, terminal and system |
CN105551118A (en) * | 2015-10-31 | 2016-05-04 | 东莞酷派软件技术有限公司 | Electronic key opening access control method, and apparatus and system thereof |
CN105635951A (en) * | 2016-01-19 | 2016-06-01 | 广州市云剑电子技术有限公司 | Data transmission control method based on Bluetooth |
CN105635951B (en) * | 2016-01-19 | 2019-03-15 | 广州市云剑电子技术有限公司 | A kind of data transfer control method based on bluetooth |
CN105701896B (en) * | 2016-02-29 | 2018-06-15 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method, apparatus and terminal of fingerprint authorization unlocking |
CN105701896A (en) * | 2016-02-29 | 2016-06-22 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint authorization unlocking method and device and terminals |
CN105871689A (en) * | 2016-03-31 | 2016-08-17 | 湖南光海教育科技有限公司 | Micro school communication interaction system and primary and secondary school student management method based on wechat public platform |
CN106006241A (en) * | 2016-07-05 | 2016-10-12 | 深圳市西克智能技术有限公司 | Method and system of granting privilege to elevator pass |
CN106315320A (en) * | 2016-10-10 | 2017-01-11 | 永大电梯设备(中国)有限公司 | Intelligent ID recognition elevator control system and control method |
CN106485824A (en) * | 2016-11-18 | 2017-03-08 | 成都雅骏新能源汽车科技股份有限公司 | A kind of method and system of electric automobile remotely control car door lock |
CN106408674A (en) * | 2016-11-24 | 2017-02-15 | 广州华工信息软件有限公司 | Non-stop charging lane system and control method and control device thereof |
CN106408674B (en) * | 2016-11-24 | 2019-03-08 | 广州华工信息软件有限公司 | Non-parking charge lane system and its control method and control device |
CN106600774A (en) * | 2016-12-07 | 2017-04-26 | 深圳市万睿智能科技有限公司 | Face identification gate inhibition control method provided with door opening detection area and system thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104392165A (en) | Identity authorization controlling method and system | |
US10333929B2 (en) | Access control for internet of things devices | |
US11663867B2 (en) | Digital certificate and reservation | |
CN105516103B (en) | Method, device and system for binding intelligent household electrical appliance | |
KR101727414B1 (en) | Communication cotrol device, authentication device, central control device and communication system | |
EP3062295B1 (en) | Systems and methods for updating a mobile device | |
US20140219447A1 (en) | Method for managing profile of embedded uicc, and embedded uicc, embedded uicc-equipped terminal, provision method, and method for changing mno using same | |
CN103886661B (en) | Access control management method and system | |
US9325507B2 (en) | System and method for managing mobile device using device-to-device communication | |
CN104778773A (en) | System and method for controlling entrance guard by mobile phone | |
CN104050742A (en) | Intelligent door and control method and system thereof | |
JP2017500798A (en) | Security control method for EUICC and EUICC | |
EP2848569A1 (en) | Electric lock arrangement | |
WO2018107718A1 (en) | Method and device for assigning number to intelligent card over air | |
CN102460454A (en) | Service binding method and system | |
US20160328714A1 (en) | Method and apparatus for authenticating payment related information in mobile communication system | |
KR20120046376A (en) | System and method for providing payment means management sertvice, apparatus and device for payment means management service | |
US20240121112A1 (en) | Mutual authentication with pseudo random numbers | |
KR20180109039A (en) | Controlling System And Method For An Door of Study Cafe | |
KR20120022452A (en) | Method and apparatus for providing payment sertvice, client device and smart card for payment service | |
CN115669022A (en) | Method for providing ranging-based service by electronic equipment and electronic equipment | |
CN112514323B (en) | Electronic device for processing digital keys and method of operating the same | |
KR101638585B1 (en) | entrance system exploiting smart phone | |
KR20150006099A (en) | Methods and apparatuses of controlling interphone | |
KR101934785B1 (en) | Entrance control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150304 |
|
RJ01 | Rejection of invention patent application after publication |