CN105069876A - Intelligent access control method and system - Google Patents

Intelligent access control method and system Download PDF

Info

Publication number
CN105069876A
CN105069876A CN201510471107.9A CN201510471107A CN105069876A CN 105069876 A CN105069876 A CN 105069876A CN 201510471107 A CN201510471107 A CN 201510471107A CN 105069876 A CN105069876 A CN 105069876A
Authority
CN
China
Prior art keywords
user
app
code
electronic key
opening gate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510471107.9A
Other languages
Chinese (zh)
Other versions
CN105069876B (en
Inventor
罗宏波
魏辉
蔡伟星
吴洪双
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201510471107.9A priority Critical patent/CN105069876B/en
Publication of CN105069876A publication Critical patent/CN105069876A/en
Application granted granted Critical
Publication of CN105069876B publication Critical patent/CN105069876B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Lock And Its Accessories (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

The invention provides a method and a system for controlling an intelligent access control. The method comprises the steps of generating or acquiring an electronic key to form a two-dimensional code image which can be scanned, identified and encrypted to be used as a soft key based on the use authorization obtained by identity authentication; decrypting the soft key identified by scanning to obtain user information for verification; and determining whether to open the access control based on a verification result obtained by verifying the user information for verification. And, also provide the system of the corresponding intelligent entrance guard control of this method. Therefore, the problem of realizing intelligent identification control of the soft key entrance guard by utilizing two-dimension code formation and two-dimension code scanning is solved, and the reliability, the safety and the convenience of opening the intelligent entrance guard are improved.

Description

The method and system that intelligent entrance guard controls
Technical field
The present invention relates to intelligent and safe field, particularly relate to the method and system that intelligent entrance guard controls.
Background technology
The development course of Household door access control system experienced by pure mechanical hook-up (key), contact intellective IC card, Non-contact Intelligent IC Card, fingerprint, sound, iris, face recognition etc., and its security and reliability etc. are all progressively greatly improved.
And in the process of development of Mobile Internet technology development, the safety technique of various new Intelligent Recognition have also been obtained lifting.Such as, Quick Response Code just has the characteristics such as memory space is large, confidentiality is high, traceability is high, its can be widely used in trace to its source, the field such as certificate information.Meanwhile, Quick Response Code is also the upstart in electronic certificate field, and the Quick Response Code after encryption can transmit security information as electronic key.Thus, the appearance of Quick Response Code, has very large market outlook, just at present, the camera cell phone user that China realizes recognition function every year with 50% speed increment.Further, compared with the data storage method that the storage mode of Quick Response Code is common with magnetic card, IC-card, light-card etc., in coercive force, antistatic, fax property, capacity, cost etc., relatively more outstanding advantage is had.
These equipment such as the above-mentioned key that nowadays Household door access control system generally adopts and IC smart card, its compact volume and convenience is carried, but loses than being easier to or leaving behind, and is also easy to be replicated; And adopt the identification equipment such as fingerprint, iris, face recognition costly, and be not easy to promote in domestic consumer.Thus, need a kind of can the higher Intelligent Recognition mode of application security reliability and be easy to carry, not easily lose, household gate inhibition control technology that cost is low.
Summary of the invention
Fundamental purpose of the present invention is the method and system providing a kind of intelligent entrance guard to control, to solve the problem utilizing Quick Response Code formation and Quick Response Code scanning to realize the control of soft key gate inhibition Intelligent Recognition, the problem that gate inhibition's Intelligent Recognition that can also solve remote assistance further controls.
A kind of method that one aspect of the present invention provides intelligent entrance guard to control, comprises the use authority acquired by identity-based checking, and generating or obtain electronic key can by the soft key of scanning recognition to be formed; Be decrypted according to the described soft key of scanning recognition, obtain the user profile of checking; Verify obtained the result based on to the user profile of described checking, determine whether opening gate.
Wherein, the use authority acquired by identity-based checking, generates or obtains electronic key and by the soft key of scanning recognition, can comprise to be formed: the user profile of the user of request opening gate is carried out DES algorithm for encryption, generate or obtain electronic key; Based on the bar code generating process to described electronic key, formed and by the image in 2 D code of scanning recognition as soft key, and described soft key can be exported.
Wherein, being decrypted according to the described soft key of scanning recognition, obtaining the user profile of checking, comprising: according to scanning the Quick Response Code obtained as the image in 2 D code of soft key, carrying out bar-code identification process, to obtain corresponding electronic key; Described electronic key is carried out the deciphering of DES inverse algorithm, obtain the user profile of corresponding checking.
Wherein, described electronic key comprises the user profile of the user of request opening gate; The described image in 2 D code formed comprises described electronic key, and when forming described image in 2 D code, be set using number of times restriction and time restriction to this Quick Response Code, when exceeding access times or overtime time limit, then this Quick Response Code ceases to be in force automatically.
Wherein, described use authority comprises: user registration success becomes validated user and obtains the use authority carrying out the client software APP of intelligent entrance guard control, and, user asks to run described APP during opening gate, and this APP of energy Successful login is local and/or log in remote server one end that this APP accesses intelligent entrance guard control; Generate or obtain electronic key to comprise: user asks to run described APP during opening gate, logged according to user by this APP when this APP of Successful login is local and the user profile of input generates this electronic key, or, log in remote server one end of this APP access intelligent entrance guard control and the user profile of input generates this electronic key and is sent to this APP this locality according to user's login by this server side; This APP is according to the electronic key generated or obtain, and being formed can by the soft key of the image in 2 D code of scanning recognition as opening gate, and soft key described in printout or display translation; Be set using number of times restriction and time restriction comprises: access times for only to use once, when image in 2 D code use was once lost efficacy after successful opening gate immediately; Time restriction is 10 minutes, does not use or unsuccessful use was then lost efficacy immediately after image in 2 D code is formed more than 10 minutes.
Wherein, obtained the result is verified based on to the user profile of described checking, determine whether opening gate, comprise: the user profile of checking and the user profile of the validated user of registration and preservation are in advance compared, comparison is that unanimously namely the result is by checking, and comparison is non-uniform i.e. the result is not by verifying; The result is by then indicating opening gate, otherwise forbids opening gate; Wherein, the user profile of the validated user of registration and preservation obtains from server side in advance in intelligent entrance guard one end and leaves this locality in or be connected to server side acquisition in real time by intelligent entrance guard one end in advance.
Wherein, described user obtains client software APP through network registry to server side for mobile phone, and uses mobile phone to run this APP request opening gate; Wherein, server side is home control centres, receives the access from intelligent entrance guard one end and mobile phone and data transmission, provides electronic key, the management user right of opening gate and the information of supervisory user opening gate and abnormal information of opening the door; Wherein, intelligent entrance guard controls one end and accesses home control centres through network, and the information of the user right of the opening gate that upgrades in time and user's opening gate.
Wherein, user is one or more user; The mobile phone that user uses is one or more; A user correspondingly can open one or more gate inhibition.9、
The system that the present invention provides a kind of intelligent entrance guard to control on the other hand, comprising: forming apparatus 710, and for the use authority acquired by identity-based checking, generating or obtain electronic key can by the soft key of scanning recognition to be formed; Acquisition device 720, for according to being decrypted the described soft key of scanning recognition, obtains the user profile of checking; Checking opening device 730, for verifying obtained the result based on to the user profile of described checking, determines whether opening gate.
Wherein, forming apparatus comprises: encryption device, and the user profile for the user by request opening gate carries out DES algorithm for encryption, generates or obtains electronic key; And sub-forming apparatus, for based on the bar code generating process to described electronic key, is formed and by the image in 2 D code of scanning recognition as soft key, and can export described soft key.
Wherein, acquisition device comprises: sub-acquisition device, for according to scanning the Quick Response Code obtained as the image in 2 D code of soft key, carries out bar-code identification process, to obtain corresponding electronic key; And decryption device, for described electronic key is carried out the deciphering of DES inverse algorithm, obtains the user profile of corresponding checking.
Wherein, described electronic key comprises the user profile of the user of request opening gate; The described image in 2 D code formed comprises described electronic key, and when forming described image in 2 D code, be set using number of times restriction and time restriction to this Quick Response Code, when exceeding access times or overtime time limit, then this Quick Response Code ceases to be in force automatically.
Wherein, described use authority comprises: user registration success becomes validated user and obtains the use authority carrying out the client software APP of intelligent entrance guard control, and, user asks to run described APP during opening gate, and this APP of energy Successful login is local and/or log in remote server one end that this APP accesses intelligent entrance guard control; Generate or obtain electronic key to comprise: user asks to run described APP during opening gate, logged according to user by this APP when this APP of Successful login is local and the user profile of input generates this electronic key, or, log in remote server one end of this APP access intelligent entrance guard control and the user profile of input generates this electronic key and is sent to this APP this locality according to user's login by this server side; This APP is according to the electronic key generated or obtain, and being formed can by the soft key of the image in 2 D code of scanning recognition as opening gate, and soft key described in printout or display translation; Be set using number of times restriction and time restriction comprises: access times for only to use once, when image in 2 D code use was once lost efficacy after successful opening gate immediately; Time restriction is 10 minutes, does not use or unsuccessful use was then lost efficacy immediately after image in 2 D code is formed more than 10 minutes.
Wherein, checking opening device, also comprises: the user profile of checking and the user profile of the validated user of registration and preservation are in advance compared, and comparison be consistent i.e. the result for by checking, and comparison is non-uniform i.e. the result for not by verifying; The result is by then indicating opening gate, otherwise forbids opening gate; Wherein, the user profile of the validated user of registration and preservation obtains from server side in advance in intelligent entrance guard one end and leaves this locality in or be connected to server side acquisition in real time by intelligent entrance guard one end in advance.
Wherein, described user uses mobile phone to obtain client software APP through network registry to server side, and uses mobile phone to run this APP to ask opening gate; Wherein, server side is home control centres, receives the access from intelligent entrance guard one end and mobile phone and data transmission, provides electronic key, the management user right of opening gate and the information of supervisory user opening gate and abnormal information of opening the door; Wherein, intelligent entrance guard controls one end and accesses home control centres through network, and the information of the user right of the opening gate that upgrades in time and user's opening gate.
Wherein, user is one or more user; The mobile phone that user uses is one or more; A user correspondingly can open one or more gate inhibition.
The solution of the present invention is the solution of Smart Home gate inhibition.Its Quick Response Code that can realize Intelligent Recognition is as " soft key ", this " soft key " carrying legitimate authorized user (owner gate inhibition/key owner) identity information is with the mobile phone terminal Software Create of Quick Response Code form by this user, and this Quick Response Code has timeliness and number of times restriction.In use, the mobile phone terminal software of user can connect household operation center and obtain authority, then generate and be somebody's turn to do " soft key " and be presented on this mobile phone screen, gathered as " soft key " image in 2 D code on camera scanning cell phone screen by gate inhibition again, this " soft key " is decrypted to the identity verifying opening gate person by the authentication module being integrated in gate inhibition's end, if by after authentication, drives electric control switch (as access controller, electromagnetic lock etc.) to open door lock.In addition, remote assistance can also be realized further open the door.
Thus, the solution of the present invention, is incorporated in gate control system by Quick Response Code scanning technique popular now, to reach " Based Intelligent Control, flexible management, telemanagement ", effectively can save use cost, more intelligent, hommization.And utilize portable telephone to be connected with telecommunication network, without the need to the article such as carrying keys, magnetic card, can also unblank by remote assistance, contribute to the convenience and the remote assistance ability that increase use.And, adopt Quick Response Code scanning technique, and Quick Response Code is limited, generate Quick Response Code and there is ageing (such as: 10 minutes expired) and number of times restriction, namely expired invalid and only can use once then to use and lost efficacy etc. at once, effectively can strengthen the security of Intelligent Recognition, prevent from stealing image opening gate.Further, Quick Response Code generates needs key to generate in the lump, the acquisition of this key needs just can obtain mobile phone mandate after home control centres authentication, obtain key, more strengthening has ensured the security of Quick Response Code, contributes to the further lifting of the safety and reliability that intelligent entrance guard controls.In addition, the solution of the present invention as Smart Home gate inhibition's one ingredient, can also can also link with other modules, and such as each abnormal time opens the door, and can call camera check enabling sight etc. by home control centres, convenient and with low cost.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, forms a part of the present invention, and schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the process flow diagram of an embodiment of the method that intelligent entrance guard of the present invention controls;
Fig. 2 is the theory of constitution figure of the embodiment in embody rule scene of the overall plan that intelligent entrance guard of the present invention controls;
Fig. 3 is the fundamental diagram of the embodiment in embody rule scene of the overall plan that intelligent entrance guard of the present invention controls;
Fig. 4 is that in method of the present invention, formation can by an embodiment process flow diagram of the soft key of scanning recognition;
Fig. 5 is the schematic diagram of an embodiment that the soft key of Quick Response Code in overall plan of the present invention is formed and identifies;
Fig. 6 is an embodiment process flow diagram of the user profile obtaining checking in method of the present invention;
Fig. 7 is the structured flowchart of an embodiment of the system that intelligent entrance guard of the present invention controls.
Embodiment
For making the object, technical solutions and advantages of the present invention clearly, below in conjunction with the specific embodiment of the invention and corresponding accompanying drawing, technical solution of the present invention is clearly and completely described.Obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
According to inventive embodiment, provide a kind of method that intelligent entrance guard controls.
Be described below in conjunction with Fig. 1,2,3, the process flow diagram that Figure 1 shows that an embodiment of the method that intelligent entrance guard of the present invention controls, Figure 2 shows that the overall plan that intelligent entrance guard of the present invention controls the embodiment in embody rule scene theory of constitution figure, Figure 3 shows that the fundamental diagram of the embodiment in embody rule scene of the overall plan that intelligent entrance guard of the present invention controls.
In step S110, the use authority acquired by identity-based checking, generating or obtain electronic key can by the soft key of scanning recognition to be formed.
Wherein, authentication is the identity information (or claiming user profile/subscriber identity information) of the user of checking request opening gate, determines whether this user is legal user's (validated user) that can open corresponding gate inhibition.
Wherein, obtain use authority, comprise the intelligent entrance guard control APP that provides legal and become validated user.Particularly, the portable terminal that this user uses is as mobile phone etc., and after being successfully registered to user the server carrying out intelligent entrance guard control, the intelligent entrance guard provided by server side controls relevant APP; Further, when user runs this APP to ask opening gate, authentication of users logs in APP or is verified the identity information (information of unique identification user identity) logging in APP access services device one end, determines this user whether validated user; And then, if namely validated user obtains use authority.
Further, when being verified as validated user by identity information, then can generate electronic key by this APP based on the identity information (user profile) of this user and formed can by " the soft key " of scanning recognition (such as: the image in 2 D code after encryption, Deng), or, obtain this electronic key by this APP access services device one end and obtain can use by scanning recognition, open the soft key of intelligent entrance guard.But, if do not obtain this APP namely to fail registration, use authority cannot be obtained, or, log in this APP and do not verified by identity information that is local or server side and can not assert that it is that namely validated user can not obtain use authority, then refusal generates or obtains electronic key, can not obtain soft key.
Wherein, in soft key (as: the scanning image in 2 D code of encryption), comprise the user profile of the user obtained the authorization by authentication, the corresponding user profile of validated user (such as: the information/subscriber identity information/identity information of unique identification user identity, etc.) in other words.
Such as: user uses the portable terminals such as oneself mobile phone by access services devices (as shown in Figure 1, 2 home control centres) such as networks first, carry out the information about the registration the corresponding upper corresponding one or more intelligent entrance guard of this user that uniquely can identify the identity information of this user, the information etc. of these identity informations, corresponding relation, gate inhibition is all kept at server side, even can be delivered to each corresponding intelligent entrance guard.And whether these information of preserving are using can sign-on access server, APP that server provides, the foundation of even opening its corresponding gate inhibition as judging when authentication whether user is legal.
Further, the portable terminals such as the mobile phone of user, can after registration first, obtain from server side and accordingly open relevant APP with intelligent entrance guard and install, so that being used for generating or obtaining asks the electronic key of opening gate to form soft key (as: image in 2 D code etc. after encryption).User can log in this APP identity verification or by logging in APP access services device one end identity verification, if namely obtain use authority by being verified as validated user, then being generated by this APP or obtaining corresponding soft key from server side.
Further, about the image in 2 D code of the encryption as soft key, be for Quick Response Code information loaded online and other physical spaces are transmitted time, the shortcoming being easily decrypted and copying, use Cryptography Principles, the private key of key or public-key mechanism are worked out with Quick Response Code and combines.Such as, can utilize fairly simple DES algorithm: it is by circulation and iteration, by simple calculations and the nonlinear transformation converting composition data stream, the design core of its algorithm allows all secrets reside among key exactly.Perform cryptographic algorithm (such as corresponding encryption software) key to be directly encapsulated further, automatically to identify key and the algorithm of encryption when deciphering, thus key is played a protective role.Moreover the cryptographic algorithm encryption software in other words of execution, known to developer, all other men are knowledge of secret keys never, cannot decipher, thus ensures the security of the cryptographic algorithm encryption software in other words performed.
Below, being formed in method of the present invention shown in composition graphs 4 can by an embodiment process flow diagram of the soft key of scanning recognition, and the schematic diagram of an embodiment that the soft key of the Quick Response Code of method of the present invention shown in Fig. 5 is formed and identifies, the example of the production process of the image in 2 D code generated or after such as being encrypted by the soft key of scanning recognition of acquisition is described.
Step S410, carries out DES algorithm for encryption by the user profile of the user of request opening gate, generates or obtains electronic key.
In one embodiment, can be ask the user of opening gate to run its portable terminal as this APP that mobile phone 3 obtains, log in user profile that this user of obtaining inputs by this APP by this APP as information expressly 510, carry out DES algorithm for encryption 520, information generated ciphertext 530 i.e. electronic key; Or, after logging in this APP, access services device one end is as home control centres 4, by server side using to the user profile of calling party expressly as information 510 should carry out DES algorithm for encryption 520 information generated ciphertext 530 and be delivered to the APP of this mobile phone 3, namely this APP obtains this information ciphertext 530 (electronic key).
Further, this server side can have the encryption software of this cryptographic algorithm, or this APP has been integrated with the encryption software of this cryptographic algorithm.
Step S420, based on the bar code generating process to described electronic key, is formed and by the image in 2 D code of scanning recognition as soft key, and can export described soft key.
In one embodiment, bar code generating process 540 can adopt existing bar code generate software in other words bar code generator complete, such as: the softwares such as two-dimension code generator (image in 2 D code maker), by this kind of Integrated Simulation in this APP.Wherein, this electronic key obtained is carried out bar code generating process by this APP, form corresponding Quick Response Code (image in 2 D code) 550.Wherein, the image in 2 D code 550 formed is can by the soft key of scanning recognition 560, owing to generating according to electronic key, the user profile of information this electronic key representative in other words of this electronic key will be comprised in information representated by its image, and then, obtain this user profile after image in 2 D code can be used to decipher, utilize this user profile to carry out the checking of the user identity of opening gate.
Wherein, number of times restriction and time restriction can also be set to this soft key, such as: this soft key (image in 2 D code) is set and lost efficacy immediately after scanning recognition is used for opening gate namely only with once losing efficacy or (ceasing to be in force automatically after such as 10 minutes) the i.e. expire that ceases to be in force automatically after a period of time.
Wherein, export described soft key, can be printout or display translation this can by the image in 2 D code of scanning recognition.
Thus, from reliability, adopt Quick Response Code scan mode, and the restriction (ageing i.e. time restriction, even number of times restriction) of Quick Response Code validity is set, as: expired invalid (10 minutes are expired) and/or only can use once namely to use and lost efficacy at once, can prevent from stealing image opening gate.
In step S120, be decrypted according to the described soft key of scanning recognition, obtain the user profile of checking.
Wherein, the soft key of scanning recognition can be the image in 2 D code of the encryption that scanning recognition exports.Particularly, it can be intelligent entrance guard (the known access control equipment etc. with image acquisition and/or recognition device) this one end, scan this image in 2 D code and namely obtain this Quick Response Code, such as: by image collecting device (or pattern recognition device or image acquisition recognition device etc.), common specifically has: first-class scanning image in 2 D code of making a video recording; Then identify that this Quick Response Code obtains the information (electronic key) of encrypting, such as: identified by pattern recognition device (or image collecting device or image acquisition recognition device etc.); Deciphering this electronic key, such as: deciphered by DES algorithm, obtaining the information (comprising the user profile for verifying) of deciphering.
Below, an embodiment process flow diagram of the user profile of checking is obtained in method of the present invention shown in composition graphs 6, and the soft key of the Quick Response Code of method of the present invention shown in Fig. 5 is formed and the schematic diagram of an embodiment of identification, illustrates that intelligent entrance guard obtains the example of the process of the user profile of checking according to soft key.
Step S610, according to scanning the Quick Response Code obtained as the image in 2 D code of soft key, carries out bar-code identification process, to obtain corresponding electronic key.
Wherein, scanning can be utilize the first-class image acquisition/recognition device of the shooting on all gate inhibitions, takes this image in 2 D code, extracts this Quick Response Code, be i.e. scanning barcode 570, obtain Quick Response Code 580.
Wherein, bar-code identification process can be the bar-code identification software 590 etc. being integrated in intelligent entrance guard one end, the image in 2 D code that scanning comes is reduced into the information ciphertext (electronic key) 600 of encryption, decodes so that follow-up.
Step S620, carries out the deciphering of DES inverse algorithm by described electronic key, obtain the user profile of corresponding checking.
Wherein, the information ciphertext 600 represented by this electronic key deciphers the i.e. user profile of 610 one-tenth information plaintexts 620 by DES algorithm, and deciphering can be the corresponding decryption software being integrated in gate inhibition one end.If can not correctly be reduced into expressly, so scanning recognition to Quick Response Code must not be formed by this APP and integrated corresponding software thereof, can two-dimension code anti-counterfeit be realized.And to forge such Quick Response Code, Quick Response Code coding rule and cryptographic algorithm not only to be understood, also need the key encrypted, thereby increase the difficulty of forgery, ensured the security of the soft key of gate inhibition.
In step S130, verify obtained the result based on to the user profile of described checking, determine whether opening gate.
Wherein, checking can be the user profile (namely uniquely identify the information of the identity of this user or be called identity information, user profile etc.) of the user profile of this checking and server side (as home control centres 4) registration and preservation in advance compared (coupling), comparison is consistent (comparison success), namely the result is by checking, comparison is non-uniform (comparison is unsuccessful), and namely the result is not by checking.And then the result is by then indicating gate inhibition one end to open the door (as: access control equipment of gate inhibition one end drives electric control switch to open door lock/electromagnetic lock 9 by access controller, etc.), otherwise forbids opening the door.
Further, after opening the door, Quick Response Code lost efficacy immediately, or this Quick Response Code ceases to be in force automatically (can arrange effective restriction of Quick Response Code as described in Figure 4: number of times restriction or time restriction) after 10 minutes.
Wherein, the user profile of this preservation can shift to an earlier date in local gate inhibition one end from server side obtain and leave local gate inhibition one end in, also can be connected to server side Real-time Obtaining by local gate inhibition one end in real time.
Realize example by according in embody rule scene one of the method below, further the solution of the present invention is described.
The ingredient that the solution of the present invention is main as shown in Figure 2, comprising: portable terminal one end 3 (example: mobile phone terminal), gate inhibition one end 12 (access control equipment), server side 4 (home control centres) three parts.
Particularly, each door can have multiple validated user 13, as: kinsfolk A, kinsfolk B, kinsfolk C, kinsfolk D (validated user as keeper) etc., in addition, each validated user can also by the unlatching authority 14 of multiple.And then the APP authorized from home control centres 4 is installed in registration on the mobile phone 3 of each member, be responsible for generating or obtaining electronic key to form the image in 2 D code of encryption as soft key from home control centres 4.And the access control equipment of gate inhibition one end 12, can be responsible for gathering (as camera takes pictures 15) soft key, pattern recognition device by such as its image collecting device be responsible for decipher and verify soft key (image acquisition and identification can be known gate inhibition's image processing apparatus or gate inhibition's scanning recognition device etc.), determine whether opening door lock according to the result.Gate inhibition one end 12 can by network as WLAN etc. connects home control centres 4, is responsible for the granting of electronic key and rights management etc., namely realizes the flexible management to household gate inhibition by home control centres 4.
Further, see principle of work shown in Fig. 2 theory of constitution and Fig. 1, this intelligent entrance guard controls the course of work and relates to: portable terminal is if mobile phone 3, the server that is connected with portable terminal are as home control centres 4, and the access control equipment to be connected as home control centres 4 with server (example: this access control equipment except access controller also has gate inhibition's power supply 8, electromagnetic lock 9, installs gate inhibition's wall 10, button 11 etc. of going out of access controller etc.).
Principle of work according to Fig. 1, such as: user uses mobile phone 3 to connect home control centres 4 and downloads and the software APP installing mobile phone 3 end, by such as name, identification card numbers etc. uniquely can identify information (the i.e. identity information of identity, user profile), use authority is obtained from this home control centres 4, namely the validated user using this software is become, the access control equipment being tied to subscriber identity information corresponding to this validated user and can open, then, user profile to be generated electronic key by this APP or obtains the electronic key generated according to user profile by this APP from home services center 4 by user, and then the image in 2 D code of formation encryption is as soft key, by access control equipment collection (camera scanning) this image in 2 D code, decipher this image in 2 D code and carry out authentication, whether opened the door by access control equipment Intelligent Recognition.
Particularly, in one embodiment, mobile phone 3 can carry out alternately with home control centres 4, and such as C/S model registration obtains, and mobile phone client software 1, B/S mode access managing web obtain electronic key 2, etc., access control equipment is from mobile phone 3 obtaining information, the image recognition apparatus (camera as on access controller) of such as this soft key access control equipment of mobile phone 3 two-dimensional code display gather image in 2 D code and and then decipher this Quick Response Code, namely identify and decipher Quick Response Code, this Quick Response Code as electronic key 5, the user profile etc. that namely relevant identity information in Quick Response Code after deciphering is verified by access control equipment, user profile corresponding to local (as user list etc.) that is stored in obtained in advance from home control centres 4 with this access control equipment is compared and is verified, or the user profile of immediately access (as the user list etc.) correspondence obtained from home control centres 4 is compared checking, namely, verify the user identity of this request opening gate, then, controlled whether to open the door by the access controller of access control equipment again, as comparison is then opened the door, otherwise do not open the door etc., concrete example as: the subscriber identity information in the Quick Response Code after this deciphering of comparison even comparison comprise in the whether corresponding home control centres 4 of gate inhibition's information or home control centres 4 is supplied to gate inhibition that the one_to_one corresponding in access control equipment stores number and user profile (as validated user identity information in table 1), simultaneously, access control equipment upgrades in time validated user list, upload user enabling information 7 is to home control centres 4, home control centres 4 and mobile phone 3, access control equipment can carry out alternately, the user that can upload according to the information of the registration of user before, access control equipment opens the door information, manages, namely to user right and user's information of opening the door, user authority management, user open the door information management 6, etc.
Wherein, mobile phone terminal (or other portable terminals), for mobile phone 3 (or other portable terminals) this kind of client (C of the user of legal authorization, client), this user is then the owner of this gate inhibition or the key opening this gate inhibition, be that Login Register is crossed, by the validated user of its gate inhibition of correspondence of system (as home control centres 4) Certificate Authority.User carries with this mobile phone, and by modes such as the various known network access mode such as wireless or wired or short distances (as bluetooth, infrared), connect, access home control centres 4 (i.e. server end, S, sever).Because mobile phone 3 can utilize above-mentioned various connected mode, by internet, mobile Internet etc., access services device end, as home control centres 4, and then, this mobile phone 3 can utilize C/S model register and obtain mobile phone client software 1, namely by C/S model, user (APP etc. that the household access information that can open that can also comprise its correspondence needs as gate inhibition number, opening gate) is registered to home control centres 4, and by downloading to this mobile phone 3 by the software APP that controls of user's intelligent entrance guard.
This software APP can be that a class specifically controls with intelligent entrance guard that corresponding security is high, unblanked by the registered Intelligent Recognition of legal authorization APP, etc.Further, the APP that opening gate needs can be unified also can be specific, such as: everyone can download micro-letter or the QQ of a unification on mobile phone, by the account number of oneself during login; Or micro-letter that everyone downloads after registration or QQ are different, direct and oneself account number binding, etc.
An example: two users A, A of one family ' utilize mobile phone phone1, phone2 to log in home control centres 4 respectively, register and register oneself can by the household access information a of the subscriber identity information of unique authentication identification and correspondence, home control centres 4 can by the information corresponding stored of the two, and corresponding household gate inhibition control software design APPa is provided, downloaded to separately on mobile phone 3 by mobile phone phone1, phone2.Can also pass through list, database or other mode one_to_one corresponding in the storage of home control centres 4 to store, a mode the simplest, can see example shown in table 1.
Table 1:
Wherein, after mobile phone 3 obtains this software APP, when needs open the door taboo, run this APP.Be responsible for generating or obtaining from home control centres 4 comprising user profile (i.e. subscriber identity information) electronic key by this APP, and then form encrypted image in 2 D code, as " the soft key " that open the door.The image in 2 D code of the encryption that this APP is formed, such as: can be utilize to use the user of this mobile phone 3 behind mobile phone 3 one end or typing, to access the user profile of home control centres 4 in the information of real-time typing of opening the door, and be formed again after being encrypted to electronic key.Soft key with the form printout of image in 2 D code or directly display translation on the screen of mobile phone 3, be supplied to access control equipment and carry out scanning recognition use.
Wherein, access control equipment (comprises power supply 8, electromagnetic lock 9, gate inhibition's wall 10, to go out button 11, access controller etc.) gate inhibition one end, place, also can by wired or wireless mode, or it is long-range, short range (bluetooth, infrared etc.) mode is connected to home control centres 4, (example: access control equipment one end upgrades validated user list is carried out alternately with this home control centres 4 place server side, upload user enabling information 7, home control centres 4 one end user authority management, user opens the door information management 6, Deng), thus the information of carrying out needed for validated user authentication can be prestored to this locality by home control centres 4, or the information that real-time (immediately) goes home control centres 4 acquisition can carry out verifying when user asks opening gate by mobile phone 3 and legal subscriber identity information, with to scan during opening gate request and the user profile of checking in the Quick Response Code deciphered is verified, according to the result (both comparisons are consistent or inconsistent), whether opening gate is controlled by access controller.Image collecting device on access control equipment, gather this soft key, such as camera is taken, is scanned this image in 2 D code, obtain this image, pattern recognition device on access control equipment, receive this image and decoding obtains the legitimate verification that corresponding information carries out user identity, determined to control to open according to this result by access controller or not opening gate.Meanwhile, access control equipment also upgrades in time user right, upload user enabling information.
Wherein, home control centres 4 is responsible for the granting of electronic key and user authority management, subscriber information management (comprising supervisory user enabling information), find the enabling information of some exceptions, such as scan image in 2 D code repeatedly all can not successfully, enabling suddenly etc. under sleep in evening pattern, keeper can be notified in time, thus can flexible management Smart Home gate inhibition.
Thus, from security, present invention employs multiple security strategy, wherein, the application of Quick Response Code scanning technique, includes generation-identification-inefficacy three major part, and Quick Response Code generates needs key to generate in the lump, the acquisition of key needs after home control centres authentication, just can obtain mobile phone use authority (obtaining APP) and then generate or obtain key, ensured the security of Quick Response Code; Further, two-dimensional code recognition mode and setting of losing efficacy also have ensured the safety of soft key further, such as: it is (ageing: within ten minutes, to lose efficacy that Quick Response Code inefficacy is arranged; Number of times: only can use once).Equally, mobile phone terminal software APP is in order to prevent from being cracked or illegal download also must be licensed by being arranged on specific mobile phone after home control centres place server authentication identity information.Further, if the mobile phone of obtaining the authorization is lost, can be freezed by home control centres.
In addition, from convenience, user, without the need to additionally carrying mechanical key again, decrease the demand of contact and/or untouchable magnetic card etc. simultaneously, contributes to the convenience of user's door lock, and, reduce cost of products.Meanwhile, if during certain kinsfolk's lost mobile phone, other kinsfolks can unblank by remote assistance, such as: the Quick Response Code of encryption is passed to this kinsfolk in the active state, remote assistance opens the door.
Fig. 7 schematically shows the structured flowchart of an embodiment of the system that intelligent entrance guard according to the present invention controls.According to one embodiment of present invention, this system can comprise:
Forming apparatus 710, for the use authority acquired by identity-based checking, generating or obtain electronic key can by the soft key of scanning recognition to be formed.The concrete function of this device and process are see step S110.
Further, this forming apparatus 710 also comprises: encryption device 7101, and the user profile for the user by request opening gate carries out DES algorithm for encryption, generates or obtains electronic key, and the concrete function of this device and process are see step S410; And, this forming apparatus 710 also comprises sub-forming apparatus 7102, and for based on the bar code generating process to described electronic key, being formed can by the image in 2 D code of scanning recognition as soft key, and exporting described soft key, the concrete function of this device and process are see step S420.
Acquisition device 720, for according to being decrypted the described soft key of scanning recognition, obtains the user profile of checking.The concrete function of this device and process are see step S120.
Further, this acquisition device 720 also comprises: sub-acquisition device 7201, for according to scanning the Quick Response Code obtained as the image in 2 D code of soft key, carries out bar-code identification process, to obtain corresponding electronic key, the concrete function of this device and process are see step S610; And decryption device 7202, carries out the deciphering of DES inverse algorithm by described electronic key, obtain the user profile of corresponding checking, the concrete function of this device and process are see step S620.
Checking opening device 730, for verifying obtained the result based on to the user profile of described checking, determines whether opening gate.The concrete function of this device and process are see step S130.
Further, the example that realize principle (composition, working principle of design etc.) of this system in embody rule scene, comprises the particular content of the description as shown in Fig. 2 to 6, is also the process and function that complete under each device of this system coordinates.
The process realized due to the system of the present embodiment and function are substantially corresponding to the embodiment of method shown in earlier figures 1 to Fig. 6 and the principle example of application scenarios, therefore not detailed part in the description of the present embodiment, see the related description in previous embodiment, can not repeat at this.
The solution of the present invention is using Quick Response Code as " soft key ", and the soft key carrying identity information is formed by mobile phone terminal software with Quick Response Code form, and has timeliness and number of times restriction.During use, the cell phone software of user connects household operation center and obtains authority.Then form soft key and be presented on mobile phone screen, soft key image in 2 D code on gate inhibition's camera scanning cell phone screen is also decrypted checking by the authentication module being integrated in gate inhibition's end to soft key, opens door lock by authentication rear drive electric control switch.Safe and reliable, and significantly reduce cost, safeguarding more convenient, and then can also open the door by remote assistance, for intelligent entrance guard and remote door access technology propose a kind of method of feasible use, is the solution of effective Smart Home gate inhibition.
In one typically configuration, computing equipment comprises one or more processor (CPU), input/output interface, network interface and internal memory.
Internal memory may comprise the volatile memory in computer-readable medium, and the forms such as random access memory (RAM) and/or Nonvolatile memory, as ROM (read-only memory) (ROM) or flash memory (flashRAM).Internal memory is the example of computer-readable medium.
Computer-readable medium comprises permanent and impermanency, removable and non-removable media can be stored to realize information by any method or technology.Information can be computer-readable instruction, data structure, the module of program or other data.The example of the storage medium of computing machine comprises, but be not limited to phase transition internal memory (PRAM), static RAM (SRAM), dynamic RAM (DRAM), the random access memory (RAM) of other types, ROM (read-only memory) (ROM), Electrically Erasable Read Only Memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc ROM (read-only memory) (CD-ROM), digital versatile disc (DVD) or other optical memory, magnetic magnetic tape cassette, tape magnetic rigid disk stores or other magnetic storage apparatus or any other non-transmitting medium, can be used for storing the information can accessed by computing equipment.According to defining herein, computer-readable medium does not comprise non-temporary computer readable media (transitorymedia), as data-signal and the carrier wave of modulation.
Also it should be noted that, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, commodity or equipment and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, commodity or equipment.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, commodity or the equipment comprising described key element and also there is other identical element.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the present invention can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disk memory, CD-ROM, optical memory etc.) of computer usable program code.
The foregoing is only embodiments of the invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within right of the present invention.

Claims (16)

1. a method for intelligent entrance guard control, is characterized in that, comprising:
Use authority acquired by identity-based checking, generating or obtain electronic key can by the soft key of scanning recognition to be formed;
Be decrypted according to the described soft key of scanning recognition, obtain the user profile of checking;
Verify obtained the result based on to the user profile of described checking, determine whether opening gate.
2. the method for claim 1, is characterized in that, the use authority acquired by identity-based checking, generates or obtains electronic key and by the soft key of scanning recognition, can comprise to be formed:
The user profile of the user of request opening gate is carried out DES algorithm for encryption, generates or obtain electronic key;
Based on the bar code generating process to described electronic key, formed and by the image in 2 D code of scanning recognition as soft key, and described soft key can be exported.
3. method as claimed in claim 2, is characterized in that, be decrypted according to the described soft key of scanning recognition, obtains the user profile of checking, comprising:
According to scanning the Quick Response Code obtained as the image in 2 D code of soft key, carry out bar-code identification process, to obtain corresponding electronic key;
Described electronic key is carried out the deciphering of DES inverse algorithm, obtain the user profile of corresponding checking.
4. method as claimed in claim 2 or claim 3, is characterized in that, comprising:
Described electronic key comprises the user profile of the user of request opening gate;
The described image in 2 D code formed comprises described electronic key, and when forming described image in 2 D code, be set using number of times restriction and time restriction to this Quick Response Code, when exceeding access times or overtime time limit, then this Quick Response Code ceases to be in force automatically.
5. the method as described in one of claim 1-4, is characterized in that, comprising:
Described use authority comprises: user registration success becomes validated user and obtains the use authority carrying out the client software APP of intelligent entrance guard control, and, user asks to run described APP during opening gate, and this APP of energy Successful login is local and/or log in remote server one end that this APP accesses intelligent entrance guard control;
Generate or obtain electronic key to comprise:
User asks to run described APP during opening gate, logged according to user by this APP when this APP of Successful login is local and the user profile of input generates this electronic key, or, log in remote server one end of this APP access intelligent entrance guard control and the user profile of input generates this electronic key and is sent to this APP this locality according to user's login by this server side;
This APP is according to the electronic key generated or obtain, and being formed can by the soft key of the image in 2 D code of scanning recognition as opening gate, and soft key described in printout or display translation;
Be set using number of times restriction and time restriction comprises: access times for only to use once, when image in 2 D code use was once lost efficacy after successful opening gate immediately; Time restriction is 10 minutes, does not use or unsuccessful use was then lost efficacy immediately after image in 2 D code is formed more than 10 minutes.
6. the method as described in one of claim 1-5, is characterized in that, verifies obtained the result, determines whether opening gate, comprising based on to the user profile of described checking:
The user profile of checking and the user profile of the validated user of registration and preservation are in advance compared, comparison be consistent i.e. the result for by checking, and comparison is non-uniform i.e. the result for not by verifying;
The result passes through, then indicate opening gate, otherwise forbid opening gate; Wherein,
The user profile of the validated user of registration and preservation obtains from server side in advance in intelligent entrance guard one end and leaves this locality in or be connected to server side acquisition in real time by intelligent entrance guard one end in advance.
7. the method as described in one of claim 1-6, is characterized in that, also comprises:
Described user obtains client software APP through network registry to server side for mobile phone, and uses mobile phone to run this APP request opening gate;
Wherein, server side is home control centres, receives the access from intelligent entrance guard one end and mobile phone and data transmission, provides electronic key, the management user right of opening gate and the information of supervisory user opening gate and abnormal information of opening the door;
Wherein, intelligent entrance guard controls one end and accesses home control centres through network, and the information of the user right of the opening gate that upgrades in time and user's opening gate.
8. method as claimed in claim 7, is characterized in that, also comprise:
User is one or more user;
The mobile phone that user uses is one or more;
A user correspondingly can open one or more gate inhibition.
9. a system for intelligent entrance guard control, is characterized in that, comprising:
Forming apparatus 710, for the use authority acquired by identity-based checking, generating or obtain electronic key can by the soft key of scanning recognition to be formed;
Acquisition device 720, for according to being decrypted the described soft key of scanning recognition, obtains the user profile of checking;
Checking opening device 730, for verifying obtained the result based on to the user profile of described checking, determines whether opening gate.
10. system as claimed in claim 9, it is characterized in that, forming apparatus comprises:
Encryption device, the user profile for the user by request opening gate carries out DES algorithm for encryption, generates or obtains electronic key; And,
Sub-forming apparatus, for based on the bar code generating process to described electronic key, is formed and by the image in 2 D code of scanning recognition as soft key, and can export described soft key.
11. systems as claimed in claim 10, it is characterized in that, acquisition device comprises:
Sub-acquisition device, for according to scanning the Quick Response Code obtained as the image in 2 D code of soft key, carries out bar-code identification process, to obtain corresponding electronic key; And,
Decryption device, for described electronic key is carried out the deciphering of DES inverse algorithm, obtains the user profile of corresponding checking.
12. systems as described in claim 10 or 11, is characterized in that, comprising:
Described electronic key comprises the user profile of the user of request opening gate;
The described image in 2 D code formed comprises described electronic key, and when forming described image in 2 D code, be set using number of times restriction and time restriction to this Quick Response Code, when exceeding access times or overtime time limit, then this Quick Response Code ceases to be in force automatically.
13. systems as described in one of claim 9-12, is characterized in that, comprising:
Described use authority comprises: user registration success becomes validated user and obtains the use authority carrying out the client software APP of intelligent entrance guard control, and, user asks to run described APP during opening gate, and this APP of energy Successful login is local and/or log in remote server one end that this APP accesses intelligent entrance guard control;
Generate or obtain electronic key to comprise:
User asks to run described APP during opening gate, logged according to user by this APP when this APP of Successful login is local and the user profile of input generates this electronic key, or, log in remote server one end of this APP access intelligent entrance guard control and the user profile of input generates this electronic key and is sent to this APP this locality according to user's login by this server side;
This APP is according to the electronic key generated or obtain, and being formed can by the soft key of the image in 2 D code of scanning recognition as opening gate, and soft key described in printout or display translation;
Be set using number of times restriction and time restriction comprises: access times for only to use once, when image in 2 D code use was once lost efficacy after successful opening gate immediately; Time restriction is 10 minutes, does not use or unsuccessful use was then lost efficacy immediately after image in 2 D code is formed more than 10 minutes.
14. systems as described in one of claim 9-13, is characterized in that, checking opening device, also comprises:
The user profile of checking and the user profile of the validated user of registration and preservation are in advance compared, comparison be consistent i.e. the result for by checking, and comparison is non-uniform i.e. the result for not by verifying;
The result passes through, then indicate opening gate, otherwise forbid opening gate; Wherein,
The user profile of the validated user of registration and preservation obtains from server side in advance in intelligent entrance guard one end and leaves this locality in or be connected to server side acquisition in real time by intelligent entrance guard one end in advance.
15. systems as described in one of claim 9-14, is characterized in that, also comprise:
Described user uses mobile phone to obtain client software APP through network registry to server side, and uses mobile phone to run this APP to ask opening gate;
Wherein, server side is home control centres, receives the access from intelligent entrance guard one end and mobile phone and data transmission, provides electronic key, the management user right of opening gate and the information of supervisory user opening gate and abnormal information of opening the door;
Wherein, intelligent entrance guard controls one end and accesses home control centres through network, and the information of the user right of the opening gate that upgrades in time and user's opening gate.
16. systems as claimed in claim 15, is characterized in that, also comprise:
User is one or more user;
The mobile phone that user uses is one or more;
A user correspondingly can open one or more gate inhibition.
CN201510471107.9A 2015-08-04 2015-08-04 Intelligent access control method and system Active CN105069876B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510471107.9A CN105069876B (en) 2015-08-04 2015-08-04 Intelligent access control method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510471107.9A CN105069876B (en) 2015-08-04 2015-08-04 Intelligent access control method and system

Publications (2)

Publication Number Publication Date
CN105069876A true CN105069876A (en) 2015-11-18
CN105069876B CN105069876B (en) 2018-06-22

Family

ID=54499232

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510471107.9A Active CN105069876B (en) 2015-08-04 2015-08-04 Intelligent access control method and system

Country Status (1)

Country Link
CN (1) CN105069876B (en)

Cited By (55)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105336031A (en) * 2015-12-02 2016-02-17 腾讯科技(深圳)有限公司 Electronic lock device and corresponding control method
CN105513178A (en) * 2015-12-07 2016-04-20 天津博威动力设备有限公司 Intelligent access control
CN105629754A (en) * 2016-01-21 2016-06-01 南安普敦咨询服务有限公司 Intelligent electricity use method based on Internet
CN105701899A (en) * 2016-04-07 2016-06-22 上海斐讯数据通信技术有限公司 Intelligent access control method and system
CN105723429A (en) * 2016-01-17 2016-06-29 衣佳鑫 Method and system for managing community based on internet of things
CN105844747A (en) * 2016-03-25 2016-08-10 国网福建省电力有限公司 Station entrance identity authentication method based on two-dimensional code
CN106056720A (en) * 2016-06-29 2016-10-26 上海救要救信息科技有限公司 Method and system for unloading emergency supplies storage apparatus
CN106127906A (en) * 2016-07-13 2016-11-16 尹博实 The unlocking method of a kind of door-control lock, Apparatus and system
CN106204843A (en) * 2016-07-13 2016-12-07 尹博实 A kind of door-control lock and gate control system
CN106228645A (en) * 2016-07-21 2016-12-14 柳州龙辉科技有限公司 A kind of enterprise personnel based on Bluetooth communication management system
CN106228644A (en) * 2016-07-21 2016-12-14 柳州龙辉科技有限公司 A kind of method authorizing cell phone intelligent lock key
CN106296926A (en) * 2016-08-16 2017-01-04 北京智优加网络科技有限公司 A kind of based on the Intelligent entrance guard control system authorized in limited time and method
CN106652129A (en) * 2016-11-29 2017-05-10 宁波飞拓电器有限公司 Door control system design method based on mobile phone APP (application)
CN106846655A (en) * 2017-01-23 2017-06-13 湖南晶威科技有限公司 A kind of key management cabinet and control method based on internet
CN106878300A (en) * 2017-02-13 2017-06-20 北京微赛时代体育科技有限公司 Dynamic cipher authentication method, device and ticket-check equipment
CN106980941A (en) * 2017-04-05 2017-07-25 国网黑龙江省电力有限公司信息通信公司 Live patrol monitoring module and method
CN107154847A (en) * 2016-03-06 2017-09-12 北京火河科技有限公司 Towards the method for generating cipher code, verification method and its smart machine of offline environment
CN107172041A (en) * 2017-05-12 2017-09-15 刘兴丹 One kind exempts from registration gate inhibition and smart lock registration, unlocking method, device, system
CN107341876A (en) * 2017-06-08 2017-11-10 太仓市智威智能科技有限公司 A kind of corridor is come to visit system
CN107342854A (en) * 2017-06-20 2017-11-10 杭州高锦科技有限公司 The encrypting and decrypting method and intelligent access control system of gate inhibition's Quick Response Code authority information
WO2018006337A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Intelligent entrance guard management method and system based on optical communication
WO2018006322A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Mobile terminal-based alarm method and system
WO2018006350A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Image password-based access grant acquisition method and system for intelligent access control
CN107730677A (en) * 2017-09-29 2018-02-23 广东旭龙物联科技股份有限公司 A kind of bar code method for unlocking and system
CN107734158A (en) * 2017-09-29 2018-02-23 孟庆国 The method and system of remote management is carried out using intelligent hand-held terminal Lock device with two same action member
CN107786512A (en) * 2016-08-26 2018-03-09 黄晓丹 A kind of apparatus control system and method based on wechat
CN107945331A (en) * 2017-11-21 2018-04-20 广州思加特科技有限公司 A kind of access control method, apparatus and system
CN108010160A (en) * 2016-11-02 2018-05-08 天津太卡科技发展有限公司 A kind of intelligent access control system
CN108062651A (en) * 2018-01-30 2018-05-22 厦门壹码通科技有限责任公司 Validation-cross system and method close to terminal device and based on mobile phone
CN108062466A (en) * 2017-04-24 2018-05-22 孟庆国 The system and method for the anti-tamper anti-counterfeiting of ID card information in the Internet, applications
CN108460875A (en) * 2018-03-20 2018-08-28 深圳市西克智能技术有限公司 A kind of entrance guard authentication method and device based on dynamic two-dimension code
CN108492480A (en) * 2018-04-26 2018-09-04 上海德必创新科技发展有限公司 The communal space manages system
CN108548271A (en) * 2018-04-17 2018-09-18 奥克斯空调股份有限公司 Air conditioning monitoring and the method and system of debugging software mandate
CN108921988A (en) * 2018-06-25 2018-11-30 西安石油大学 A kind of door-locking system and control method
CN109246054A (en) * 2017-07-10 2019-01-18 中兴通讯股份有限公司 A kind of electronically validating method, verifying end and client
CN109300211A (en) * 2018-09-21 2019-02-01 腾讯科技(深圳)有限公司 A kind of access control method, apparatus and system
WO2019037412A1 (en) * 2017-08-22 2019-02-28 深圳光启智能光子技术有限公司 Data transmission method, terminal, storage medium, and processor
CN109410373A (en) * 2017-08-18 2019-03-01 深圳光启智能光子技术有限公司 Access control system and its control method, storage medium, processor
CN109584421A (en) * 2018-12-07 2019-04-05 郭瑞东 A kind of intelligent door lock authentication administrative system based on domestic safety chip
CN109753773A (en) * 2019-01-08 2019-05-14 浙江汉默生链商科技有限公司 A kind of quick auth method and device based on terminal
CN110164009A (en) * 2019-05-29 2019-08-23 华翔翔能电气股份有限公司 A kind of two dimensional code access control system
CN110169031A (en) * 2017-01-09 2019-08-23 开利公司 Access control system with the distribution of local mobile cryptographic key
CN110298950A (en) * 2019-07-09 2019-10-01 江苏万贝科技有限公司 A kind of Fingerprint Lock work system and its method based on two dimensional code
CN110473319A (en) * 2019-07-30 2019-11-19 武汉慧联无限科技有限公司 A kind of door opening method of access control system, device, equipment and readable medium
EP3624575A4 (en) * 2017-05-11 2020-04-15 Fuji Corporation Mounting machine management system
CN111160505A (en) * 2020-03-24 2020-05-15 绿漫科技有限公司 Method for realizing universal two-dimension code of smart community
CN111478917A (en) * 2016-10-25 2020-07-31 雷飏 Background system for providing network service for access control device and user terminal
CN111540093A (en) * 2020-04-29 2020-08-14 三仟(杭州)数字科技有限公司 Access control system and control method thereof
CN112053477A (en) * 2020-09-15 2020-12-08 公牛集团股份有限公司 Control system, method and device of intelligent door lock and readable storage medium
WO2021073163A1 (en) * 2019-10-17 2021-04-22 平安科技(深圳)有限公司 Method and system for controlling validity of qr code, and computer device and storage medium
CN112735007A (en) * 2020-12-25 2021-04-30 熵基科技股份有限公司 Access control method, software platform and access control system
CN112990398A (en) * 2021-03-23 2021-06-18 济南大学 Identity magnetic card, and data transmission system and method based on identity magnetic card
CN113808305A (en) * 2021-09-02 2021-12-17 广州广电运通金融电子股份有限公司 Coded lock system, coded lock opening and closing method and storage medium
CN115359595A (en) * 2022-07-15 2022-11-18 广东城启科技有限公司 Guangdong residential code access control method based on two-dimensional code as carrier
US11921842B2 (en) 2021-06-14 2024-03-05 Kyndryl, Inc. Multifactor authorization on accessing hardware resources

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE202012002312U1 (en) * 2012-03-09 2012-04-12 Frank Industrie Gmbh Access control to protected areas by reading and evaluating an encrypted 1D or 2D barcode with the built-in camera of a mobile phone or tablet PC
CN103544746A (en) * 2012-07-08 2014-01-29 上海博路信息技术有限公司 Electronic access control system of dynamic bar code
CN103606211A (en) * 2013-10-30 2014-02-26 小米科技有限责任公司 Method, equipment and system used for realization of intelligent entrance guard
CN104217473A (en) * 2013-06-03 2014-12-17 李万君 Intelligent access control system and apparatus based on plane code and NFC

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE202012002312U1 (en) * 2012-03-09 2012-04-12 Frank Industrie Gmbh Access control to protected areas by reading and evaluating an encrypted 1D or 2D barcode with the built-in camera of a mobile phone or tablet PC
CN103544746A (en) * 2012-07-08 2014-01-29 上海博路信息技术有限公司 Electronic access control system of dynamic bar code
CN104217473A (en) * 2013-06-03 2014-12-17 李万君 Intelligent access control system and apparatus based on plane code and NFC
CN103606211A (en) * 2013-10-30 2014-02-26 小米科技有限责任公司 Method, equipment and system used for realization of intelligent entrance guard

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
孙永道,王勇,张岚: "一种基于加密型二维码的手机门禁系统的设计与实现", 《科技通报》 *

Cited By (65)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105336031A (en) * 2015-12-02 2016-02-17 腾讯科技(深圳)有限公司 Electronic lock device and corresponding control method
CN105513178A (en) * 2015-12-07 2016-04-20 天津博威动力设备有限公司 Intelligent access control
WO2017120967A1 (en) * 2016-01-17 2017-07-20 衣佳鑫 Internet of things-based community management method and system
CN105723429A (en) * 2016-01-17 2016-06-29 衣佳鑫 Method and system for managing community based on internet of things
CN105629754A (en) * 2016-01-21 2016-06-01 南安普敦咨询服务有限公司 Intelligent electricity use method based on Internet
CN107154847A (en) * 2016-03-06 2017-09-12 北京火河科技有限公司 Towards the method for generating cipher code, verification method and its smart machine of offline environment
CN105844747A (en) * 2016-03-25 2016-08-10 国网福建省电力有限公司 Station entrance identity authentication method based on two-dimensional code
CN105701899A (en) * 2016-04-07 2016-06-22 上海斐讯数据通信技术有限公司 Intelligent access control method and system
CN106056720A (en) * 2016-06-29 2016-10-26 上海救要救信息科技有限公司 Method and system for unloading emergency supplies storage apparatus
WO2018006350A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Image password-based access grant acquisition method and system for intelligent access control
WO2018006322A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Mobile terminal-based alarm method and system
WO2018006337A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Intelligent entrance guard management method and system based on optical communication
CN106127906A (en) * 2016-07-13 2016-11-16 尹博实 The unlocking method of a kind of door-control lock, Apparatus and system
CN106204843A (en) * 2016-07-13 2016-12-07 尹博实 A kind of door-control lock and gate control system
CN106228644A (en) * 2016-07-21 2016-12-14 柳州龙辉科技有限公司 A kind of method authorizing cell phone intelligent lock key
CN106228645A (en) * 2016-07-21 2016-12-14 柳州龙辉科技有限公司 A kind of enterprise personnel based on Bluetooth communication management system
CN106296926A (en) * 2016-08-16 2017-01-04 北京智优加网络科技有限公司 A kind of based on the Intelligent entrance guard control system authorized in limited time and method
CN106296926B (en) * 2016-08-16 2018-07-20 北京智优加网络科技有限公司 A kind of intelligent entrance guard control system and method based on mandate in limited time
CN107786512A (en) * 2016-08-26 2018-03-09 黄晓丹 A kind of apparatus control system and method based on wechat
CN111478917A (en) * 2016-10-25 2020-07-31 雷飏 Background system for providing network service for access control device and user terminal
CN108010160A (en) * 2016-11-02 2018-05-08 天津太卡科技发展有限公司 A kind of intelligent access control system
CN106652129A (en) * 2016-11-29 2017-05-10 宁波飞拓电器有限公司 Door control system design method based on mobile phone APP (application)
US11238681B2 (en) 2017-01-09 2022-02-01 Carrier Corporation Access control system with local mobile key distribution
CN110169031B (en) * 2017-01-09 2023-09-19 开利公司 Access control system with local mobile key distribution
US11798333B2 (en) 2017-01-09 2023-10-24 Carrier Corporation Access control system with local mobile key distribution
CN110169031A (en) * 2017-01-09 2019-08-23 开利公司 Access control system with the distribution of local mobile cryptographic key
CN106846655A (en) * 2017-01-23 2017-06-13 湖南晶威科技有限公司 A kind of key management cabinet and control method based on internet
CN106878300A (en) * 2017-02-13 2017-06-20 北京微赛时代体育科技有限公司 Dynamic cipher authentication method, device and ticket-check equipment
CN106980941A (en) * 2017-04-05 2017-07-25 国网黑龙江省电力有限公司信息通信公司 Live patrol monitoring module and method
CN108062466A (en) * 2017-04-24 2018-05-22 孟庆国 The system and method for the anti-tamper anti-counterfeiting of ID card information in the Internet, applications
EP3624575A4 (en) * 2017-05-11 2020-04-15 Fuji Corporation Mounting machine management system
US11477210B2 (en) 2017-05-11 2022-10-18 Fuji Corporation Mounting machine management system
CN107172041A (en) * 2017-05-12 2017-09-15 刘兴丹 One kind exempts from registration gate inhibition and smart lock registration, unlocking method, device, system
CN107341876A (en) * 2017-06-08 2017-11-10 太仓市智威智能科技有限公司 A kind of corridor is come to visit system
CN107342854A (en) * 2017-06-20 2017-11-10 杭州高锦科技有限公司 The encrypting and decrypting method and intelligent access control system of gate inhibition's Quick Response Code authority information
CN109246054A (en) * 2017-07-10 2019-01-18 中兴通讯股份有限公司 A kind of electronically validating method, verifying end and client
CN109410373B (en) * 2017-08-18 2024-06-04 深圳光启智能光子技术有限公司 Access control system, control method thereof, storage medium and processor
CN109410373A (en) * 2017-08-18 2019-03-01 深圳光启智能光子技术有限公司 Access control system and its control method, storage medium, processor
WO2019037412A1 (en) * 2017-08-22 2019-02-28 深圳光启智能光子技术有限公司 Data transmission method, terminal, storage medium, and processor
CN107730677A (en) * 2017-09-29 2018-02-23 广东旭龙物联科技股份有限公司 A kind of bar code method for unlocking and system
CN107734158A (en) * 2017-09-29 2018-02-23 孟庆国 The method and system of remote management is carried out using intelligent hand-held terminal Lock device with two same action member
CN107945331A (en) * 2017-11-21 2018-04-20 广州思加特科技有限公司 A kind of access control method, apparatus and system
CN108062651A (en) * 2018-01-30 2018-05-22 厦门壹码通科技有限责任公司 Validation-cross system and method close to terminal device and based on mobile phone
CN108460875A (en) * 2018-03-20 2018-08-28 深圳市西克智能技术有限公司 A kind of entrance guard authentication method and device based on dynamic two-dimension code
CN108548271A (en) * 2018-04-17 2018-09-18 奥克斯空调股份有限公司 Air conditioning monitoring and the method and system of debugging software mandate
CN108548271B (en) * 2018-04-17 2020-04-21 奥克斯空调股份有限公司 Method and system for air conditioner monitoring and debugging software authorization
CN108492480A (en) * 2018-04-26 2018-09-04 上海德必创新科技发展有限公司 The communal space manages system
CN108921988A (en) * 2018-06-25 2018-11-30 西安石油大学 A kind of door-locking system and control method
CN109300211A (en) * 2018-09-21 2019-02-01 腾讯科技(深圳)有限公司 A kind of access control method, apparatus and system
CN109584421A (en) * 2018-12-07 2019-04-05 郭瑞东 A kind of intelligent door lock authentication administrative system based on domestic safety chip
CN109753773A (en) * 2019-01-08 2019-05-14 浙江汉默生链商科技有限公司 A kind of quick auth method and device based on terminal
CN110164009A (en) * 2019-05-29 2019-08-23 华翔翔能电气股份有限公司 A kind of two dimensional code access control system
CN110298950A (en) * 2019-07-09 2019-10-01 江苏万贝科技有限公司 A kind of Fingerprint Lock work system and its method based on two dimensional code
CN110298950B (en) * 2019-07-09 2021-04-30 江苏万贝科技有限公司 Fingerprint lock working system based on two-dimensional code and method thereof
CN110473319A (en) * 2019-07-30 2019-11-19 武汉慧联无限科技有限公司 A kind of door opening method of access control system, device, equipment and readable medium
WO2021073163A1 (en) * 2019-10-17 2021-04-22 平安科技(深圳)有限公司 Method and system for controlling validity of qr code, and computer device and storage medium
CN111160505A (en) * 2020-03-24 2020-05-15 绿漫科技有限公司 Method for realizing universal two-dimension code of smart community
CN111540093A (en) * 2020-04-29 2020-08-14 三仟(杭州)数字科技有限公司 Access control system and control method thereof
CN112053477A (en) * 2020-09-15 2020-12-08 公牛集团股份有限公司 Control system, method and device of intelligent door lock and readable storage medium
CN112735007A (en) * 2020-12-25 2021-04-30 熵基科技股份有限公司 Access control method, software platform and access control system
CN112990398B (en) * 2021-03-23 2022-02-18 济南大学 Identity magnetic card, and data transmission system and method based on identity magnetic card
CN112990398A (en) * 2021-03-23 2021-06-18 济南大学 Identity magnetic card, and data transmission system and method based on identity magnetic card
US11921842B2 (en) 2021-06-14 2024-03-05 Kyndryl, Inc. Multifactor authorization on accessing hardware resources
CN113808305A (en) * 2021-09-02 2021-12-17 广州广电运通金融电子股份有限公司 Coded lock system, coded lock opening and closing method and storage medium
CN115359595A (en) * 2022-07-15 2022-11-18 广东城启科技有限公司 Guangdong residential code access control method based on two-dimensional code as carrier

Also Published As

Publication number Publication date
CN105069876B (en) 2018-06-22

Similar Documents

Publication Publication Date Title
CN105069876A (en) Intelligent access control method and system
CN104662864B (en) The convenient authentication method of user and device that mobile authentication is applied are used
CN101222488B (en) Method and network authentication server for controlling client terminal access to network appliance
US9117324B2 (en) System and method for binding a smartcard and a smartcard reader
KR101284481B1 (en) Authentication method and device using OTP including biometric data
JP4954628B2 (en) Authentication device, authenticator and authentication method using true random number generator or pseudorandom number generator
CN100533459C (en) Data safety reading method and safety storage apparatus thereof
TW201741922A (en) Biological feature based safety certification method and device
CN109040067A (en) A kind of user authentication device and authentication method based on the unclonable technology PUF of physics
CN105282179B (en) A method of family's Internet of Things security control based on CPK
CN106789024B (en) A kind of remote de-locking method, device and system
CN108712389B (en) Intelligent lock system
CN109145628B (en) Data acquisition method and system based on trusted execution environment
CN103036681B (en) A kind of password safety keyboard device and system
CN101652782B (en) Communication terminal device, communication device, electronic card, method for a communication terminal device and method for a communication device for providing a verification
CN104125064B (en) A kind of dynamic cipher authentication method, client and Verification System
Cheng et al. A secure and practical key management mechanism for NFC read-write mode
CN108768941B (en) Method and device for remotely unlocking safety equipment
CN101944216A (en) Two-factor online transaction safety authentication method and system
Hassan et al. An improved time-based one time password authentication framework for electronic payments
KR20120037314A (en) Online credit card issue system and method using user identity authentication device
CN105119716A (en) Secret key negotiation method based on SD cards
CA2756981A1 (en) Method and device for digitally attesting the authenticity of binding interactions
KR100720738B1 (en) A method for providing secrecy, authentication and integrity of information to RFID tag
CN108235807B (en) Software encryption terminal, payment terminal, software package encryption and decryption method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant