CN105139491A - Mobile phone access control system based on encrypted two-dimensional code - Google Patents

Mobile phone access control system based on encrypted two-dimensional code Download PDF

Info

Publication number
CN105139491A
CN105139491A CN201510486990.9A CN201510486990A CN105139491A CN 105139491 A CN105139491 A CN 105139491A CN 201510486990 A CN201510486990 A CN 201510486990A CN 105139491 A CN105139491 A CN 105139491A
Authority
CN
China
Prior art keywords
image
soft key
mobile phone
quick response
gate inhibition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510486990.9A
Other languages
Chinese (zh)
Other versions
CN105139491B (en
Inventor
李保印
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wingtech Communication Co Ltd
Original Assignee
Wingtech Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wingtech Communication Co Ltd filed Critical Wingtech Communication Co Ltd
Priority to CN201510486990.9A priority Critical patent/CN105139491B/en
Publication of CN105139491A publication Critical patent/CN105139491A/en
Application granted granted Critical
Publication of CN105139491B publication Critical patent/CN105139491B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a mobile phone access control system based on an encrypted two-dimensional code. The system comprises: a mobile phone terminal, an access control terminal and a management server. The mobile phone terminal generates a soft key and displays it on the mobile phone screen, the access control terminal drives a camera to acquire the soft key image on the mobile phone screen, and performs decryption verification on the soft key through an authentication module integrated to the access control terminal, after passing authentication, an electric control switch is driven to open the access lock. The mobile phone access control system provided by the invention can effectively reduce the cost, and improve management convenience and safety.

Description

A kind of cell phone access control based on ciphering type Quick Response Code
Technical field
The invention belongs to electronic information technical field, relate to a kind of gate control system, particularly relate to a kind of cell phone access control based on ciphering type Quick Response Code.
Background technology
In recent years, smart mobile phone technology obtained develop rapidly, and mobile phone permeates from traditional single voice call function to every field; The present invention mainly discusses the application of mobile phone in access control.Gate control system is in the market mainly based on the gate inhibition that swipes the card, and this mode cost is higher, and it is also not too convenient to manage, and security is poor.
The communication mode being realized gate inhibition's certification by cell phone software has multiple, and as WiFi, Infrared, Bluetooth etc., the data layout of authentication also has multiple, as ciphertext, Quick Response Code etc.
In view of this, nowadays in the urgent need to designing a kind of new gate control system, to overcome the above-mentioned defect of existing gate control system.
Summary of the invention
Technical matters to be solved by this invention is: provide a kind of cell phone access control based on ciphering type Quick Response Code, can effectively reduce costs, and improves convenience and the security of management.
For solving the problems of the technologies described above, the present invention adopts following technical scheme:
Based on a cell phone access control for ciphering type Quick Response Code, described system is formed primarily of mobile phone terminal, gate inhibition's end and management server three part;
Described mobile phone terminal mainly comprises a software, is responsible for generating or obtaining the soft key image comprising ciphering two-dimension code image from server;
Described gate inhibition end is primarily of access controller, gate inhibition's power supply and electromagnetic lock composition, and gate inhibition's end gathers soft key image by image recognition apparatus and determines whether opening door lock according to the result;
Described management server is responsible for key granting and rights management, realizes the distributed management of key, user, door lock;
User downloads and installs mobile phone terminal software by management server, and obtains use authority by registration; User generates image in 2 D code by cell phone software---soft key; By this image in 2 D code of image recognition apparatus identification of gate inhibition's end, then decipher and carry out the identification of door opener, finally judging whether opening door lock;
In this system, the soft key carrying identity information by mobile phone terminal Software Create, and has timeliness and number of times restriction with Quick Response Code form; During use, first mobile phone terminal software generate soft key and be presented on mobile phone screen, gate inhibition holds software-driven camera obtain the soft key image on mobile phone screen and be decrypted checking by the authentication module being integrated in gate inhibition's end to soft key, opens door lock by authentication rear drive electric control switch;
Described system is based on the multiple security strategy of employing: the ageing restriction of (a) soft key, and for preventing soft key stolen or copy, soft key can auto-destruct after setting-up time; (b) soft key access times restriction, the soft key that mobile phone terminal generates can only use once, destroys immediately, so also can prevent soft key from maliciously being usurped after use; C the licensing scheme of the soft key of () mobile phone terminal, cracks or illegal download for preventing user, system adopts application for registration licensing mode, and namely user could use after must applying for obtaining keyed feature code; D () prevents unauthorized use software; Mobile phone terminal can arrange software startup password, prevents mobile phone from losing the illegal use caused, and mobile phone can also by management end to sending short message by mobile phone " destruction " mobile phone terminal software after losing;
Described system comprises soft key generation module, and the generation of soft key is completed by mobile phone terminal software, or is completed by server software; The algorithm of mobile phone terminal Software Create ciphering two-dimension code image is by authentication information generation unit, Base64 transcoder unit and soft key generation unit;
Comprise authentication information in soft key, identity information comprises mobile phone IMEI code, address name, post information, and IMEI code is mainly used in binding mobile phone; Essential information can be presented on door lock screen when door-lock opening; Authentication information also comprises timestamp information, for the ageing judgement of gate inhibition's end to soft key;
Authentication information generation unit adopts DES algorithm for encryption authentication information or adopts triple des or AES encryption algorithm; Concrete steps are: the 1st step, and software startup password user inputted, as secret key, obtains 16 cover sub-keys after expansion, displacement, grouping, displacement, iterative processing; 2nd step, expressly generates on the basis of secret key above to identity information, and carry out dividing into groups displacement and iteration obtain the identity information of encryption;
Base64 transcoder unit is in order to carry out code conversion; Base64 coding is adopted the authentication information of encryption to be converted to the ascii character sequence that can be used for generating Quick Response Code.The ultimate principle of conversion 3 octets is converted into the byte of 46, and benefit two 0 each 6 before, forms 8 afterwards; Replace with specific coding schedule according to the value of each byte, the corresponding character in coding schedule is made up of English character, numeral and conventional sign again, just in time in the acceptable character range of Quick Response Code; By this conversion, just the identity information of encryption is converted to and can represents at character information with Quick Response Code, but this information is still encryption;
Soft key generation unit adopts the coding form of widely used QRCode Quick Response Code, its ultimate principle is to input character (C1C2 ... Cn) numerical value (D1D2 is converted into according to coding schedule ... Dn) sequence, and complete cataloged procedure add mode indicators and character number before sequence after, finally adopt image generating technologies, generate ciphering two-dimension code image---the i.e. soft key of native system, this image is by the image recognition apparatus identification of being held by gate inhibition and judge whether should opening door lock;
Described system also comprises door lock and opens control module, and the door opening process of soft key holds realization gate inhibition; The image in 2 D code that gate inhibition holds camera to take mobile phone screen to generate, and to take the correct image process, Quick Response Code identification, authentication and the door lock that obtain open three processing stage; Door lock is opened control module and is comprised image correction unit, Quick Response Code recognition unit, door lock unlatching unit;
Image correction unit is corrected in order to carry out gray proces, denoising and rotation to the image of shooting; Image correction unit comprises gray proces subelement, denoising subelement, rotation correction subelement;
Gray proces subelement is colored in order to obtain image acquiescence from camera, and data volume is huge, is not easy to identifying processing, needs first to be converted into gray level image; Gray processing process formula is:
W=a×R+b×G+c×B,a+b+c=1.0
Wherein, W is gray level image pixel value, and R, G, B represent the color component value of original color image respectively, and a, b, c are respectively the coefficient of three color components; In order to obtain higher Quick Response Code discrimination, setting a=0.3, b=0.11, c=0.59;
Denoising subelement removes in order to adopt the medium filtering of the rectangular window of suitable size the salt grain noise meeting Poisson distribution; The algorithm removing noise is:
f ( k ; λ ) = Pr ( X = k ) = λ k e - λ k ! , Wherein, λ is the average of Poisson distribution;
Rotation correction subelement is in order to will image rotation to horizontal direction before identification; First want the X deflection angle of detected image, could according to angle image rotating; Detected image X deflection angle needs, through image binaryzation, edge extracting and Hough transform 3 steps, to be finally rotated counterclockwise image according to deflection angle; Rotation correction subelement comprises image binaryzation processing unit, edge detection unit, Hough transform unit, rotation correction unit;
Image binaryzation processing unit, in order to image is converted to black white image, conveniently carries out Quick Response Code identification.Ultimate principle is when keeping characteristics of image, gives up the redundant information in image; Realize principle be selection threshold value and change, make image information only comprise black and white two kinds of colouring informations;
Edge detection unit is in order to detect the edge of black white image; Use the horizontal operator in Sobel operator to carry out convolution to image, and obtain image border by threshold process.In algorithm realization process, do Convolution sums computing by 3 × 3 templates as each pixel in core and image, then in image, high-high brightness and the minimum average measured are edge;
Hough transform unit is in order to obtain deflection angle by the image after rim detection by Hough transform; Algorithm principle is, straight line L polar form for x-y plane represents, by setting straight line inclination angle theta value and picture altitude ρ, (θ is set, ρ) matrix, chooses each black pixel point in image, calculates ρ value to each θ value, in (θ, ρ) matrix, respective value accumulated value adds 1.Finding the place that accumulated value is maximum, is namely a horizontal edge line of QR code, and now corresponding angle of inclination is 90 ° of-θ, therefore, thus judges that image needs to be rotated counterclockwise 90 ° of-θ;
Rotation correction unit in order to bring the θ obtained before value into following formula, if around reference point be rotated counterclockwise on the occasion of, clockwise turn to negative value; Postrotational image has a little distortion usually, and reason is that the new coordinate figure obtained differs and is decided to be integer, also needs to use grey scale interpolation computing to correct the new value drawn;
x 1 y 1 = c o s θ sin θ - sin θ cos θ x 0 y 0
X 0, y 0for rotating the coordinate figure of preceding pixel, x 1, y 1for postrotational coordinate figure;
Quick Response Code recognition unit, in order to identify the image in 2 D code through transforming, therefrom obtains the soft key information of encryption, and obtains expressly key information through deciphering;
Door lock opens unit in order to after the identity information that obtains soft key case and contain, holds module the authorization message that identity information and server end are preserved to be analyzed, and determine whether opening gate according to result by gate inhibition; In order to ensure the ageing restriction of key, once key uses once, remove from server, next time uses and must regenerate at once; If authentication failure, then gate inhibition's end is pointed out.
Based on a cell phone access control for ciphering type Quick Response Code, described system comprises: mobile phone terminal, gate inhibition's end and management server;
Mobile phone terminal generates soft key and is presented on mobile phone screen, gate inhibition holds the soft key image driven on camera acquisition mobile phone screen, and by the authentication module being integrated in gate inhibition's end, checking is decrypted to soft key, open door lock by authentication rear drive electric control switch.
As a preferred embodiment of the present invention, described mobile phone terminal mainly comprises a software, is responsible for generating or obtaining the soft key image comprising ciphering two-dimension code image from server;
Described gate inhibition end is primarily of access controller, gate inhibition's power supply and electromagnetic lock composition, and gate inhibition's end gathers soft key image by image recognition apparatus and determines whether opening door lock according to the result;
Described management server is responsible for key granting and rights management, realizes the distributed management of key, user, door lock.
As a preferred embodiment of the present invention, user downloads and installs mobile phone terminal software by management server, and obtains use authority by registration; User generates image in 2 D code by cell phone software---soft key; By this image in 2 D code of image recognition apparatus identification of gate inhibition's end, then decipher and carry out the identification of door opener, finally judging whether opening door lock;
In this system, the soft key carrying identity information by mobile phone terminal Software Create, and has timeliness and number of times restriction with Quick Response Code form; During use, first mobile phone terminal software generate soft key and be presented on mobile phone screen, gate inhibition holds software-driven camera obtain the soft key image on mobile phone screen and be decrypted checking by the authentication module being integrated in gate inhibition's end to soft key, opens door lock by authentication rear drive electric control switch.
As a preferred embodiment of the present invention, described system is based on the multiple security strategy of employing: the ageing restriction of (a) soft key, and for preventing soft key stolen or copy, soft key can auto-destruct after setting-up time; (b) soft key access times restriction, the soft key that mobile phone terminal generates can only use once, destroys immediately, so also can prevent soft key from maliciously being usurped after use; C the licensing scheme of the soft key of () mobile phone terminal, cracks or illegal download for preventing user, system adopts application for registration licensing mode, and namely user could use after must applying for obtaining keyed feature code; D () prevents unauthorized use software; Mobile phone terminal can arrange software startup password, prevents mobile phone from losing the illegal use caused, and mobile phone can also by management end to sending short message by mobile phone " destruction " mobile phone terminal software after losing.
As a preferred embodiment of the present invention, described system comprises soft key generation module, and the generation of soft key is completed by mobile phone terminal software, or is completed by server software; The algorithm of mobile phone terminal Software Create ciphering two-dimension code image is by authentication information generation unit, Base64 transcoder unit and soft key generation unit;
Comprise authentication information in soft key, identity information comprises mobile phone IMEI code, address name, post information, and IMEI code is mainly used in binding mobile phone; Essential information can be presented on door lock screen when door-lock opening; Authentication information also comprises timestamp information, for the ageing judgement of gate inhibition's end to soft key;
Authentication information generation unit adopts DES algorithm for encryption authentication information or adopts triple des or AES encryption algorithm; Concrete steps are: the 1st step, and software startup password user inputted, as secret key, obtains 16 cover sub-keys after expansion, displacement, grouping, displacement, iterative processing; 2nd step, expressly generates on the basis of secret key above to identity information, and carry out dividing into groups displacement and iteration obtain the identity information of encryption;
Base64 transcoder unit is in order to carry out code conversion; Base64 coding is adopted the authentication information of encryption to be converted to the ascii character sequence that can be used for generating Quick Response Code.The ultimate principle of conversion 3 octets is converted into the byte of 46, and benefit two 0 each 6 before, forms 8 afterwards; Replace with specific coding schedule according to the value of each byte, the corresponding character in coding schedule is made up of English character, numeral and conventional sign again, just in time in the acceptable character range of Quick Response Code; By this conversion, just the identity information of encryption is converted to and can represents at character information with Quick Response Code, but this information is still encryption;
Soft key generation unit adopts the coding form of widely used QRCode Quick Response Code, its ultimate principle is to input character (C1C2 ... Cn) numerical value (D1D2 is converted into according to coding schedule ... Dn) sequence, and complete cataloged procedure add mode indicators and character number before sequence after, finally adopt image generating technologies, generate ciphering two-dimension code image---the i.e. soft key of native system, this image is by the image recognition apparatus identification of being held by gate inhibition and judge whether should opening door lock.
As a preferred embodiment of the present invention, described system also comprises door lock and opens control module, and the door opening process of soft key holds realization gate inhibition; The image in 2 D code that gate inhibition holds camera to take mobile phone screen to generate, and open taking the correct image process, Quick Response Code identification, authentication and the door lock that obtain.
As a preferred embodiment of the present invention, described door lock is opened control module and is comprised image correction unit, Quick Response Code recognition unit, door lock unlatching unit;
Image correction unit is corrected in order to carry out gray proces, denoising and rotation to the image of shooting;
Quick Response Code recognition unit, in order to identify the image in 2 D code through transforming, therefrom obtains the soft key information of encryption, and obtains expressly key information through deciphering;
Door lock opens unit in order to after the identity information that obtains soft key case and contain, holds module the authorization message that identity information and server end are preserved to be analyzed, and determine whether opening gate according to result by gate inhibition; In order to ensure the ageing restriction of key, once key uses once, remove from server, next time uses and must regenerate at once; If authentication failure, then gate inhibition's end is pointed out.
As a preferred embodiment of the present invention, described image correction unit comprises gray proces subelement, denoising subelement, rotation correction subelement;
Gray proces subelement is colored in order to obtain image acquiescence from camera, and data volume is huge, is not easy to identifying processing, needs first to be converted into gray level image;
Described gray proces subelement gray processing process formula is:
W=a×R+b×G+c×B,a+b+c=1.0
Wherein, W is gray level image pixel value, and R, G, B represent the color component value of original color image respectively, and a, b, c are respectively the coefficient of three color components; In order to obtain higher Quick Response Code discrimination, setting a=0.3, b=0.11, c=0.59;
Denoising subelement removes in order to adopt the medium filtering of the rectangular window of suitable size the salt grain noise meeting Poisson distribution; The algorithm removing noise is:
f ( k ; λ ) = Pr ( X = k ) = λ k e - λ k ! , Wherein, λ is the average of Poisson distribution;
Rotation correction subelement is in order to will image rotation to horizontal direction before identification; First want the X deflection angle of detected image, could according to angle image rotating; Detected image X deflection angle needs, through image binaryzation, edge extracting and Hough transform 3 steps, to be finally rotated counterclockwise image according to deflection angle.
As a preferred embodiment of the present invention, rotation correction subelement comprises image binaryzation processing unit, edge detection unit, Hough transform unit, rotation correction unit;
Image binaryzation processing unit, in order to image is converted to black white image, conveniently carries out Quick Response Code identification.Ultimate principle is when keeping characteristics of image, gives up the redundant information in image; Realize principle be selection threshold value and change, make image information only comprise black and white two kinds of colouring informations;
Edge detection unit is in order to detect the edge of black white image; Use the horizontal operator in Sobel operator to carry out convolution to image, and obtain image border by threshold process.In algorithm realization process, do Convolution sums computing by 3 × 3 templates as each pixel in core and image, then in image, high-high brightness and the minimum average measured are edge;
Hough transform unit is in order to obtain deflection angle by the image after rim detection by Hough transform; Algorithm principle is, straight line L polar form for x-y plane represents, by setting straight line inclination angle theta value and picture altitude ρ, (θ is set, ρ) matrix, chooses each black pixel point in image, calculates ρ value to each θ value, in (θ, ρ) matrix, respective value accumulated value adds 1.Finding the place that accumulated value is maximum, is namely a horizontal edge line of QR code, and now corresponding angle of inclination is 90 ° of-θ, therefore, thus judges that image needs to be rotated counterclockwise 90 ° of-θ;
Rotation correction unit in order to bring the θ obtained before value into following formula, if around reference point be rotated counterclockwise on the occasion of, clockwise turn to negative value; Postrotational image has a little distortion usually, and reason is that the new coordinate figure obtained differs and is decided to be integer, also needs to use grey scale interpolation computing to correct the new value drawn;
x 1 y 1 = c o s θ sin θ - sin θ cos θ x 0 y 0
X 0, y 0for rotating the coordinate figure of preceding pixel, x 1, y 1for postrotational coordinate figure.
Beneficial effect of the present invention is: the cell phone access control that the present invention proposes can effectively reduce costs, and improves convenience and the security of management.
The gate control system that the present invention proposes realizes based on ciphering type Quick Response Code and image recognition technology, the ciphering type QRCode (soft key) being presented at mobile phone screen end comprises certificate data, image recognition apparatus by gate inhibition's end gathers soft key image and carries out authentication to user, holds electric-control system opening door lock by authentication rear drive gate inhibition.
Accompanying drawing explanation
Fig. 1 is the Organization Chart of gate control system of the present invention.
Fig. 2 is the fundamental diagram of gate control system of the present invention.
Fig. 3 is the soft key generating principle figure of gate control system of the present invention.
Embodiment
The preferred embodiments of the present invention are described in detail below in conjunction with accompanying drawing.
Embodiment one
Refer to Fig. 1, present invention is disclosed a kind of cell phone access control based on ciphering type Quick Response Code, described system is formed primarily of mobile phone terminal, gate inhibition's end and management server three part;
In this system, the soft key carrying identity information by mobile phone terminal Software Create, and has timeliness and number of times restriction with Quick Response Code form.During use, first mobile phone client software generates soft key and is presented on mobile phone screen, gate inhibition holds software-driven camera obtain the soft key image on mobile phone screen and be decrypted checking by the authentication module being integrated in gate inhibition's end to soft key, opens door lock by authentication rear drive electric control switch.
Whole system is formed primarily of mobile phone terminal, gate inhibition's end and management server three part, as shown in Figure 1: (a) mobile phone terminal is a software mainly, is responsible for generating or obtaining the soft key image comprising ciphering two-dimension code image from server.B () gate inhibition end is primarily of access controller, gate inhibition's power supply and electromagnetic lock composition, gate inhibition's end gathers soft key image by image recognition apparatus and determines whether opening door lock according to the result.C () management server is responsible for key granting and rights management, realize the distributed management of key, user, door lock.
As shown in Figure 2, the principle of work of native system is: (a) user downloads and installs mobile phone terminal software by management server, and obtains use authority by registration; B () user generates image in 2 D code by cell phone software---soft key; C this image in 2 D code of image recognition apparatus identification that () holds by gate inhibition, then deciphers and carries out the identification of door opener, finally judging whether opening door lock.
For guaranteeing the tight security of gate inhibition, system is based on the multiple security strategy of employing: the ageing restriction of (a) soft key, and for preventing soft key stolen or copy, soft key can auto-destruct after general 5 minutes; (b) soft key access times restriction, the soft key that mobile phone terminal generates can only use once, destroys immediately, so also can prevent soft key from maliciously being usurped after use; C the licensing scheme of the soft key of () mobile phone terminal, cracks or illegal download for preventing user, system adopts application for registration licensing mode, and namely user could use after must applying for obtaining keyed feature code; D () prevents unauthorized use software.Mobile phone terminal can arrange software startup password, prevents mobile phone from losing the illegal use caused, and mobile phone can also by management end to sending short message by mobile phone " destruction " mobile phone terminal software after losing.
[soft key generation module]
Described system comprises soft key generation module, and the generation of soft key is completed by mobile phone terminal software, in fact also can be designed by server software and complete.The algorithm of mobile phone terminal Software Create ciphering two-dimension code image is made up of several parts such as authentication information generation, enciphering transformation, Base64 coding and QR codings, as shown in Figure 3, below introduces the ultimate principle of various piece.
Described system comprises soft key generation module, and the generation of soft key is completed by mobile phone terminal software, or is completed by server software; The algorithm of mobile phone terminal Software Create ciphering two-dimension code image is by authentication information generation unit, Base64 transcoder unit and soft key generation unit.
Comprise authentication information in soft key, identity information comprises mobile phone IMEI code, address name, post information, and IMEI code is mainly used in binding mobile phone; Essential information can be presented on door lock screen when door-lock opening; Authentication information also comprises timestamp information, for gate inhibition's end to contents such as the ageing judgements of soft key.
Authentication information generation unit adopts DES algorithm for encryption authentication information or adopts triple des or AES encryption algorithm; The concrete steps of employing DES algorithm for encryption authentication information are: the 1st step, software startup password user inputted, as secret key, obtains 16 cover sub-keys (can certainly be other quantity) after expansion, displacement, grouping, displacement, iterative processing; 2nd step, expressly generates on the basis of secret key above to identity information, and carry out dividing into groups displacement and iteration obtain the identity information of encryption.
Base64 transcoder unit is in order to carry out code conversion.Because the character that can comprise in Quick Response Code is limited, and the character that des encryption generates may exceed the represented character range of Quick Response Code, so, must code conversion be carried out.Base64 transcoder unit adopts Base64 coding the authentication information of encryption to be converted to the ascii character sequence that can be used for generating Quick Response Code.The ultimate principle of conversion 3 octets is converted into the byte of 46, and benefit two 0 each 6 before, is formed 8 (can certainly be other figure places) afterwards; Replace with specific coding schedule according to the value of each byte, the corresponding character in coding schedule is made up of English character, numeral and conventional sign again, just in time in the acceptable character range of Quick Response Code; By this conversion, just the identity information of encryption is converted to and can represents at character information with Quick Response Code, but this information is still encryption.
Authentication information through Base64 code conversion is all made up of English character, numeral and conventional sign, conveniently generates image in 2 D code.Soft key generation unit adopts the coding form of widely used QRCode Quick Response Code, its ultimate principle is to input character (C1C2 ... Cn) numerical value (D1D2 is converted into according to coding schedule ... Dn) sequence, and complete cataloged procedure add mode indicators and character number before sequence after, finally adopt image generating technologies, generate ciphering two-dimension code image---the i.e. soft key of native system, this image is by the image recognition apparatus identification of being held by gate inhibition and judge whether should opening door lock.
[door lock unlatching control module]
Described system also comprises door lock and opens control module, and the door opening process of soft key holds realization gate inhibition; The image in 2 D code that gate inhibition holds camera to take mobile phone screen to generate, and to take the correct image process, Quick Response Code identification, authentication and the door lock that obtain open three processing stage; Door lock is opened control module and is comprised image correction unit, Quick Response Code recognition unit, door lock unlatching unit.
Image correction unit is corrected in order to carry out gray proces, denoising and rotation to the image of shooting.
Quick Response Code recognition unit, in order to identify the image in 2 D code through transforming, therefrom obtains the soft key information of encryption, and obtains expressly key information through deciphering.
Door lock opens unit in order to after the identity information that obtains soft key case and contain, holds module the authorization message that identity information and server end are preserved to be analyzed, and determine whether opening gate according to result by gate inhibition; In order to ensure the ageing restriction of key, once key uses once, remove from server, next time uses and must regenerate at once; If authentication failure, then gate inhibition's end is pointed out.
Wherein, image correction unit comprises gray proces subelement, denoising subelement, rotation correction subelement.
Gray proces subelement is colored in order to obtain image acquiescence from camera, and data volume is huge, is not easy to identifying processing, needs first to be converted into gray level image; Gray processing process formula is:
W=a×R+b×G+c×B,a+b+c=1.0
Wherein, W is gray level image pixel value, and R, G, B represent the color component value of original color image respectively, and a, b, c are respectively the coefficient of three color components; In order to obtain higher Quick Response Code discrimination, setting a=0.3, b=0.11, c=0.59.
Denoising subelement removes in order to adopt the medium filtering of the rectangular window of suitable size the salt grain noise meeting Poisson distribution; The algorithm removing noise is:
f ( k ; λ ) = Pr ( X = k ) = λ k e - λ k ! , Wherein, λ is the average of Poisson distribution.
Rotation correction subelement is in order to will image rotation to horizontal direction before identification; First want the X deflection angle of detected image, could according to angle image rotating; Detected image X deflection angle needs, through image binaryzation, edge extracting and Hough transform 3 steps, to be finally rotated counterclockwise image according to deflection angle; Rotation correction subelement comprises image binaryzation processing unit, edge detection unit, Hough transform unit, rotation correction unit.
Image binaryzation processing unit, in order to image is converted to black white image, conveniently carries out Quick Response Code identification.Ultimate principle is when keeping characteristics of image, gives up the redundant information in image; Realize principle be selection threshold value and change, make image information only comprise black and white two kinds of colouring informations.
Edge detection unit is in order to detect the edge of black white image; Use the horizontal operator in Sobel operator to carry out convolution to image, and obtain image border by threshold process.In algorithm realization process, do Convolution sums computing by 3 × 3 templates as each pixel in core and image, then in image, high-high brightness and the minimum average measured are edge.
Hough transform unit is in order to obtain deflection angle by the image after rim detection by Hough transform; Algorithm principle is, straight line L polar form for x-y plane represents, by setting straight line inclination angle theta value and picture altitude ρ, (θ is set, ρ) matrix, chooses each black pixel point in image, calculates ρ value to each θ value, in (θ, ρ) matrix, respective value accumulated value adds 1.Finding the place that accumulated value is maximum, is namely a horizontal edge line of QR code, and now corresponding angle of inclination is 90 ° of-θ, therefore, thus judges that image needs to be rotated counterclockwise 90 ° of-θ.
Rotation correction unit in order to bring the θ obtained before value into following formula, if around reference point be rotated counterclockwise on the occasion of, clockwise turn to negative value; Postrotational image has a little distortion usually, and reason is that the new coordinate figure obtained differs and is decided to be integer, also needs to use grey scale interpolation computing to correct the new value drawn;
x 1 y 1 = c o s θ sin θ - sin θ cos θ x 0 y 0
X 0, y 0for rotating the coordinate figure of preceding pixel, x 1, y 1for postrotational coordinate figure.
Embodiment two
Based on a cell phone access control for ciphering type Quick Response Code, described system comprises: mobile phone terminal, gate inhibition's end and management server; Mobile phone terminal generates soft key and is presented on mobile phone screen, gate inhibition holds the soft key image driven on camera acquisition mobile phone screen, and by the authentication module being integrated in gate inhibition's end, checking is decrypted to soft key, open door lock by authentication rear drive electric control switch.
Described mobile phone terminal mainly comprises a software, is responsible for generating or obtaining the soft key image comprising ciphering two-dimension code image from server; Described gate inhibition end is primarily of access controller, gate inhibition's power supply and electromagnetic lock composition, and gate inhibition's end gathers soft key image by image recognition apparatus and determines whether opening door lock according to the result; Described management server is responsible for key granting and rights management, realizes the distributed management of key, user, door lock.
In sum, beneficial effect of the present invention is: the cell phone access control that the present invention proposes can effectively reduce costs, and improves convenience and the security of management.
The gate control system that the present invention proposes realizes based on ciphering type Quick Response Code and image recognition technology, the ciphering type QRCode (soft key) being presented at mobile phone screen end comprises certificate data, image recognition apparatus by gate inhibition's end gathers soft key image and carries out authentication to user, holds electric-control system opening door lock by authentication rear drive gate inhibition.
Here description of the invention and application is illustrative, not wants by scope restriction of the present invention in the above-described embodiments.Distortion and the change of embodiment disclosed are here possible, are known for the replacement of embodiment those those of ordinary skill in the art and the various parts of equivalence.Those skilled in the art are noted that when not departing from spirit of the present invention or essential characteristic, the present invention can in other forms, structure, layout, ratio, and to realize with other assembly, material and parts.When not departing from the scope of the invention and spirit, can other distortion be carried out here to disclosed embodiment and change.

Claims (10)

1. based on a cell phone access control for ciphering type Quick Response Code, it is characterized in that, described system is formed primarily of mobile phone terminal, gate inhibition's end and management server three part;
Described mobile phone terminal mainly comprises a software, is responsible for generating or obtaining the soft key image comprising ciphering two-dimension code image from server;
Described gate inhibition end is primarily of access controller, gate inhibition's power supply and electromagnetic lock composition, and gate inhibition's end gathers soft key image by image recognition apparatus and determines whether opening door lock according to the result;
Described management server is responsible for key granting and rights management, realizes the distributed management of key, user, door lock;
User downloads and installs mobile phone terminal software by management server, and obtains use authority by registration; User generates image in 2 D code by cell phone software---soft key; By this image in 2 D code of image recognition apparatus identification of gate inhibition's end, then decipher and carry out the identification of door opener, finally judging whether opening door lock;
In this system, the soft key carrying identity information by mobile phone terminal Software Create, and has timeliness and number of times restriction with Quick Response Code form; During use, first mobile phone terminal software generate soft key and be presented on mobile phone screen, gate inhibition holds software-driven camera obtain the soft key image on mobile phone screen and be decrypted checking by the authentication module being integrated in gate inhibition's end to soft key, opens door lock by authentication rear drive electric control switch;
Described system is based on the multiple security strategy of employing: the ageing restriction of (a) soft key, and for preventing soft key stolen or copy, soft key can auto-destruct after setting-up time; (b) soft key access times restriction, the soft key that mobile phone terminal generates can only use once, destroys immediately, so also can prevent soft key from maliciously being usurped after use; C the licensing scheme of the soft key of () mobile phone terminal, cracks or illegal download for preventing user, system adopts application for registration licensing mode, and namely user could use after must applying for obtaining keyed feature code; D () prevents unauthorized use software; Mobile phone terminal can arrange software startup password, prevents mobile phone from losing the illegal use caused, and mobile phone can also by management end to sending short message by mobile phone " destruction " mobile phone terminal software after losing;
Described system comprises soft key generation module, and the generation of soft key is completed by mobile phone terminal software, or is completed by server software; The algorithm of mobile phone terminal Software Create ciphering two-dimension code image is by authentication information generation unit, Base64 transcoder unit and soft key generation unit;
Comprise authentication information in soft key, identity information comprises mobile phone IMEI code, address name, post information, and IMEI code is mainly used in binding mobile phone; Essential information can be presented on door lock screen when door-lock opening; Authentication information also comprises timestamp information, for the ageing judgement of gate inhibition's end to soft key;
Authentication information generation unit adopts DES algorithm for encryption authentication information or adopts triple des or AES encryption algorithm; Concrete steps are: the 1st step, and software startup password user inputted, as secret key, obtains 16 cover sub-keys after expansion, displacement, grouping, displacement, iterative processing; 2nd step, expressly generates on the basis of secret key above to identity information, and carry out dividing into groups displacement and iteration obtain the identity information of encryption;
Base64 transcoder unit is in order to carry out code conversion; Base64 coding is adopted the authentication information of encryption to be converted to the ascii character sequence that can be used for generating Quick Response Code.The ultimate principle of conversion 3 octets is converted into the byte of 46, and benefit two 0 each 6 before, forms 8 afterwards; Replace with specific coding schedule according to the value of each byte, the corresponding character in coding schedule is made up of English character, numeral and conventional sign again, just in time in the acceptable character range of Quick Response Code; By this conversion, just the identity information of encryption is converted to and can represents at character information with Quick Response Code, but this information is still encryption;
Soft key generation unit adopts the coding form of widely used QRCode Quick Response Code, its ultimate principle is to input character (C1C2 ... Cn) numerical value (D1D2 is converted into according to coding schedule ... Dn) sequence, and complete cataloged procedure add mode indicators and character number before sequence after, finally adopt image generating technologies, generate ciphering two-dimension code image---the i.e. soft key of native system, this image is by the image recognition apparatus identification of being held by gate inhibition and judge whether should opening door lock;
Described system also comprises door lock and opens control module, and the door opening process of soft key holds realization gate inhibition; The image in 2 D code that gate inhibition holds camera to take mobile phone screen to generate, and to take the correct image process, Quick Response Code identification, authentication and the door lock that obtain open three processing stage; Door lock is opened control module and is comprised image correction unit, Quick Response Code recognition unit, door lock unlatching unit;
Image correction unit is corrected in order to carry out gray proces, denoising and rotation to the image of shooting; Image correction unit comprises gray proces subelement, denoising subelement, rotation correction subelement;
(1) gray proces subelement is colored in order to obtain image acquiescence from camera, and data volume is huge, is not easy to identifying processing, needs first to be converted into gray level image; Gray processing process formula is:
W=a×R+b×G+c×B,a+b+c=1.0
Wherein, W is gray level image pixel value, and R, G, B represent the color component value of original color image respectively, and a, b, c are respectively the coefficient of three color components; In order to obtain higher Quick Response Code discrimination, setting a=0.3, b=0.11, c=0.59;
Denoising subelement removes in order to adopt the medium filtering of the rectangular window of suitable size the salt grain noise meeting Poisson distribution; The algorithm removing noise is:
f ( k ; λ ) = Pr ( X = k ) = λ k e - λ k ! , Wherein, λ is the average of Poisson distribution;
Rotation correction subelement is in order to will image rotation to horizontal direction before identification; First want the X deflection angle of detected image, could according to angle image rotating; Detected image X deflection angle needs, through image binaryzation, edge extracting and Hough transform 3 steps, to be finally rotated counterclockwise image according to deflection angle; Rotation correction subelement comprises image binaryzation processing unit, edge detection unit, Hough transform unit, rotation correction unit;
Image binaryzation processing unit, in order to image is converted to black white image, conveniently carries out Quick Response Code identification.Ultimate principle is when keeping characteristics of image, gives up the redundant information in image; Realize principle be selection threshold value and change, make image information only comprise black and white two kinds of colouring informations;
Edge detection unit is in order to detect the edge of black white image; Use the horizontal operator in Sobel operator to carry out convolution to image, and obtain image border by threshold process.In algorithm realization process, do Convolution sums computing by 3 × 3 templates as each pixel in core and image, then in image, high-high brightness and the minimum average measured are edge;
Hough transform unit is in order to obtain deflection angle by the image after rim detection by Hough transform; Algorithm principle is, straight line L polar form for x-y plane represents, by setting straight line inclination angle theta value and picture altitude ρ, (θ is set, ρ) matrix, chooses each black pixel point in image, calculates ρ value to each θ value, in (θ, ρ) matrix, respective value accumulated value adds 1.Finding the place that accumulated value is maximum, is namely a horizontal edge line of QR code, and now corresponding angle of inclination is 90 ° of-θ, therefore, thus judges that image needs to be rotated counterclockwise 90 ° of-θ;
Rotation correction unit in order to bring the θ obtained before value into following formula, if around reference point be rotated counterclockwise on the occasion of, clockwise turn to negative value; Postrotational image has a little distortion usually, and reason is that the new coordinate figure obtained differs and is decided to be integer, also needs to use grey scale interpolation computing to correct the new value drawn;
x 1 y 1 = c o s θ sin θ - sin θ cos θ x 0 y 0
X 0, y 0for rotating the coordinate figure of preceding pixel, x 1, y 1for postrotational coordinate figure;
Quick Response Code recognition unit, in order to identify the image in 2 D code through transforming, therefrom obtains the soft key information of encryption, and obtains expressly key information through deciphering;
Door lock opens unit in order to after the identity information that obtains soft key case and contain, holds module the authorization message that identity information and server end are preserved to be analyzed, and determine whether opening gate according to result by gate inhibition; In order to ensure the ageing restriction of key, once key uses once, remove from server, next time uses and must regenerate at once; If authentication failure, then gate inhibition's end is pointed out.
2. based on a cell phone access control for ciphering type Quick Response Code, it is characterized in that, described system comprises: mobile phone terminal, gate inhibition's end and management server;
Mobile phone terminal generates soft key and is presented on mobile phone screen, gate inhibition holds the soft key image driven on camera acquisition mobile phone screen, and by the authentication module being integrated in gate inhibition's end, checking is decrypted to soft key, open door lock by authentication rear drive electric control switch.
3. the cell phone access control based on ciphering type Quick Response Code according to claim 2, is characterized in that:
Described mobile phone terminal mainly comprises a software, is responsible for generating or obtaining the soft key image comprising ciphering two-dimension code image from server;
Described gate inhibition end is primarily of access controller, gate inhibition's power supply and electromagnetic lock composition, and gate inhibition's end gathers soft key image by image recognition apparatus and determines whether opening door lock according to the result;
Described management server is responsible for key granting and rights management, realizes the distributed management of key, user, door lock.
4. the cell phone access control based on ciphering type Quick Response Code according to claim 2, is characterized in that:
User downloads and installs mobile phone terminal software by management server, and obtains use authority by registration; User generates image in 2 D code by cell phone software---soft key; By this image in 2 D code of image recognition apparatus identification of gate inhibition's end, then decipher and carry out the identification of door opener, finally judging whether opening door lock;
In this system, the soft key carrying identity information by mobile phone terminal Software Create, and has timeliness and number of times restriction with Quick Response Code form; During use, first mobile phone terminal software generate soft key and be presented on mobile phone screen, gate inhibition holds software-driven camera obtain the soft key image on mobile phone screen and be decrypted checking by the authentication module being integrated in gate inhibition's end to soft key, opens door lock by authentication rear drive electric control switch.
5. the cell phone access control based on ciphering type Quick Response Code according to claim 2, is characterized in that:
Described system is based on the multiple security strategy of employing: the ageing restriction of (a) soft key, and for preventing soft key stolen or copy, soft key can auto-destruct after setting-up time; (b) soft key access times restriction, the soft key that mobile phone terminal generates can only use once, destroys immediately, so also can prevent soft key from maliciously being usurped after use; C the licensing scheme of the soft key of () mobile phone terminal, cracks or illegal download for preventing user, system adopts application for registration licensing mode, and namely user could use after must applying for obtaining keyed feature code; D () prevents unauthorized use software; Mobile phone terminal can arrange software startup password, prevents mobile phone from losing the illegal use caused, and mobile phone can also by management end to sending short message by mobile phone " destruction " mobile phone terminal software after losing.
6. the cell phone access control based on ciphering type Quick Response Code according to claim 2, is characterized in that:
Described system comprises soft key generation module, and the generation of soft key is completed by mobile phone terminal software, or is completed by server software; The algorithm of mobile phone terminal Software Create ciphering two-dimension code image is by authentication information generation unit, Base64 transcoder unit and soft key generation unit;
Comprise authentication information in soft key, identity information comprises mobile phone IMEI code, address name, post information, and IMEI code is mainly used in binding mobile phone; Essential information can be presented on door lock screen when door-lock opening; Authentication information also comprises timestamp information, for the ageing judgement of gate inhibition's end to soft key;
Authentication information generation unit adopts DES algorithm for encryption authentication information or adopts triple des or AES encryption algorithm; Concrete steps are: the 1st step, and software startup password user inputted, as secret key, obtains 16 cover sub-keys after expansion, displacement, grouping, displacement, iterative processing; 2nd step, expressly generates on the basis of secret key above to identity information, and carry out dividing into groups displacement and iteration obtain the identity information of encryption;
Base64 transcoder unit is in order to carry out code conversion; Base64 coding is adopted the authentication information of encryption to be converted to the ascii character sequence that can be used for generating Quick Response Code.The ultimate principle of conversion 3 octets is converted into the byte of 46, and benefit two 0 each 6 before, forms 8 afterwards; Replace with specific coding schedule according to the value of each byte, the corresponding character in coding schedule is made up of English character, numeral and conventional sign again, just in time in the acceptable character range of Quick Response Code; By this conversion, just the identity information of encryption is converted to and can represents at character information with Quick Response Code, but this information is still encryption;
Soft key generation unit adopts the coding form of widely used QRCode Quick Response Code, its ultimate principle is to input character (C1C2 ... Cn) numerical value (D1D2 is converted into according to coding schedule ... Dn) sequence, and complete cataloged procedure add mode indicators and character number before sequence after, finally adopt image generating technologies, generate ciphering two-dimension code image---the i.e. soft key of native system, this image is by the image recognition apparatus identification of being held by gate inhibition and judge whether should opening door lock.
7. the cell phone access control based on ciphering type Quick Response Code according to claim 2, is characterized in that:
Described system also comprises door lock and opens control module, and the door opening process of soft key holds realization gate inhibition; The image in 2 D code that gate inhibition holds camera to take mobile phone screen to generate, and open taking the correct image process, Quick Response Code identification, authentication and the door lock that obtain.
8. the cell phone access control based on ciphering type Quick Response Code according to claim 7, is characterized in that:
Described door lock is opened control module and is comprised image correction unit, Quick Response Code recognition unit, door lock unlatching unit;
Image correction unit is corrected in order to carry out gray proces, denoising and rotation to the image of shooting;
Quick Response Code recognition unit, in order to identify the image in 2 D code through transforming, therefrom obtains the soft key information of encryption, and obtains expressly key information through deciphering;
Door lock opens unit in order to after the identity information that obtains soft key case and contain, holds module the authorization message that identity information and server end are preserved to be analyzed, and determine whether opening gate according to result by gate inhibition; In order to ensure the ageing restriction of key, once key uses once, remove from server, next time uses and must regenerate at once; If authentication failure, then gate inhibition's end is pointed out.
9. the cell phone access control based on ciphering type Quick Response Code according to claim 8, is characterized in that:
Described image correction unit comprises gray proces subelement, denoising subelement, rotation correction subelement;
Gray proces subelement is colored in order to obtain image acquiescence from camera, and data volume is huge, is not easy to identifying processing, needs first to be converted into gray level image;
Described gray proces subelement gray processing process formula is:
W=a×R+b×G+c×B,a+b+c=1.0
Wherein, W is gray level image pixel value, and R, G, B represent the color component value of original color image respectively, and a, b, c are respectively the coefficient of three color components; In order to obtain higher Quick Response Code discrimination, setting a=0.3, b=0.11, c=0.59;
Denoising subelement removes in order to adopt the medium filtering of the rectangular window of suitable size the salt grain noise meeting Poisson distribution; The algorithm removing noise is:
f ( k ; λ ) = Pr ( X = k ) = λ k e - λ k ! , Wherein, λ is the average of Poisson distribution;
Rotation correction subelement is in order to will image rotation to horizontal direction before identification; First want the X deflection angle of detected image, could according to angle image rotating; Detected image X deflection angle needs, through image binaryzation, edge extracting and Hough transform 3 steps, to be finally rotated counterclockwise image according to deflection angle.
10. the cell phone access control based on ciphering type Quick Response Code according to claim 9, is characterized in that:
Rotation correction subelement comprises image binaryzation processing unit, edge detection unit, Hough transform unit, rotation correction unit;
Image binaryzation processing unit, in order to image is converted to black white image, conveniently carries out Quick Response Code identification.Ultimate principle is when keeping characteristics of image, gives up the redundant information in image; Realize principle be selection threshold value and change, make image information only comprise black and white two kinds of colouring informations;
Edge detection unit is in order to detect the edge of black white image; Use the horizontal operator in Sobel operator to carry out convolution to image, and obtain image border by threshold process.In algorithm realization process, do Convolution sums computing by 3 × 3 templates as each pixel in core and image, then in image, high-high brightness and the minimum average measured are edge;
Hough transform unit is in order to obtain deflection angle by the image after rim detection by Hough transform; Algorithm principle is, straight line L polar form for x-y plane represents, by setting straight line inclination angle theta value and picture altitude ρ, (θ is set, ρ) matrix, chooses each black pixel point in image, calculates ρ value to each θ value, in (θ, ρ) matrix, respective value accumulated value adds 1.Finding the place that accumulated value is maximum, is namely a horizontal edge line of QR code, and now corresponding angle of inclination is 90 ° of-θ, therefore, thus judges that image needs to be rotated counterclockwise 90 ° of-θ;
Rotation correction unit in order to bring the θ obtained before value into following formula, if around reference point be rotated counterclockwise on the occasion of, clockwise turn to negative value; Postrotational image has a little distortion usually, and reason is that the new coordinate figure obtained differs and is decided to be integer, also needs to use grey scale interpolation computing to correct the new value drawn;
x 1 y 1 = c o s θ sin θ - sin θ cos θ x 0 y 0
X 0, y 0for rotating the coordinate figure of preceding pixel, x 1, y 1for postrotational coordinate figure.
CN201510486990.9A 2015-08-10 2015-08-10 A kind of cell phone access control based on ciphering type Quick Response Code Active CN105139491B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510486990.9A CN105139491B (en) 2015-08-10 2015-08-10 A kind of cell phone access control based on ciphering type Quick Response Code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510486990.9A CN105139491B (en) 2015-08-10 2015-08-10 A kind of cell phone access control based on ciphering type Quick Response Code

Publications (2)

Publication Number Publication Date
CN105139491A true CN105139491A (en) 2015-12-09
CN105139491B CN105139491B (en) 2017-11-28

Family

ID=54724820

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510486990.9A Active CN105139491B (en) 2015-08-10 2015-08-10 A kind of cell phone access control based on ciphering type Quick Response Code

Country Status (1)

Country Link
CN (1) CN105139491B (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105472037A (en) * 2016-01-06 2016-04-06 深圳市呤云科技有限公司 Method and device for opening entrance guard through scanning two-dimension code
CN105701899A (en) * 2016-04-07 2016-06-22 上海斐讯数据通信技术有限公司 Intelligent access control method and system
WO2017071250A1 (en) * 2015-10-26 2017-05-04 广州畅联信息科技有限公司 Virtual key data processing method, apparatus, and mobile terminal, and server
CN106846655A (en) * 2017-01-23 2017-06-13 湖南晶威科技有限公司 A kind of key management cabinet and control method based on internet
CN106934264A (en) * 2015-12-31 2017-07-07 深圳先进技术研究院 A kind of intelligent unlocking method, device and lock device
CN107016769A (en) * 2017-06-05 2017-08-04 合肥展游软件开发有限公司 A kind of intelligent access control system for residential quarters
CN107067557A (en) * 2016-11-16 2017-08-18 国网山东省电力公司日照供电公司 A kind of two-dimentional key of intelligent charging spot is from lock administration system
CN107342854A (en) * 2017-06-20 2017-11-10 杭州高锦科技有限公司 The encrypting and decrypting method and intelligent access control system of gate inhibition's Quick Response Code authority information
CN107358700A (en) * 2017-07-17 2017-11-17 合肥锦和信息技术有限公司 A kind of intelligent access control system being used for for residential quarters
CN107492162A (en) * 2017-06-01 2017-12-19 景德镇学院 Intelligent access control system based on ciphering type Quick Response Code and WiFi technology
CN107945331A (en) * 2017-11-21 2018-04-20 广州思加特科技有限公司 A kind of access control method, apparatus and system
CN108833118A (en) * 2018-07-25 2018-11-16 合肥学院 Using the safety access method and system of containing parameter Thiele type rational interpolation
CN108868348A (en) * 2018-06-15 2018-11-23 潘政 Low-power consumption safety lock based on photo resistance coding and decoding
CN108921988A (en) * 2018-06-25 2018-11-30 西安石油大学 A kind of door-locking system and control method
CN108961511A (en) * 2018-07-25 2018-12-07 合肥学院 Using the unlocking method and system of containing parameter Thiele type continued fraction rational interpolation
CN108986328A (en) * 2018-05-29 2018-12-11 惠州智享物流科技有限公司 The self-service lease management system of pallet
CN109102602A (en) * 2018-07-25 2018-12-28 合肥学院 Using the unlocking method and system of containing parameter Newton type polynomial interopolation
CN110415419A (en) * 2019-08-21 2019-11-05 杭州享钥科技有限公司 Electron key share system in access control system based on mobile terminal
CN110462691A (en) * 2017-01-21 2019-11-15 云丁网络技术(北京)有限公司 Method for unlocking, mobile terminal, intelligent door lock and the Cloud Server of intelligent door lock
CN111540093A (en) * 2020-04-29 2020-08-14 三仟(杭州)数字科技有限公司 Access control system and control method thereof
US10937264B2 (en) 2017-11-01 2021-03-02 Ademco Inc. Systems and methods for disarming a security system monitoring a secured area using a two-dimensional scannable access code
US11854329B2 (en) 2019-05-24 2023-12-26 Ademco Inc. Systems and methods for authorizing transmission of commands and signals to an access control device or a control panel device
US11928904B2 (en) 2019-08-02 2024-03-12 Yunding Network Technology (Beijing) Co., Ltd. Methods and systems for controlling a smart lock

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000353259A (en) * 1999-06-09 2000-12-19 Palstaff Kk Entrance/exit management system
CN101826227A (en) * 2010-04-30 2010-09-08 广州合立正通信息网络集成有限公司 Triple-authentication gate control system and control method
CN103955982A (en) * 2014-05-22 2014-07-30 国家电网公司 Method and device for identifying time-varying dynamic two-dimensional code entrance guard
CN103955975A (en) * 2014-04-22 2014-07-30 广州闪购软件服务有限公司 Cellphone-based dynamic two-dimension code access control system
CN203759775U (en) * 2014-03-21 2014-08-06 高椿明 Double-encrypted access control system based on two-dimensional code recognition

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000353259A (en) * 1999-06-09 2000-12-19 Palstaff Kk Entrance/exit management system
CN101826227A (en) * 2010-04-30 2010-09-08 广州合立正通信息网络集成有限公司 Triple-authentication gate control system and control method
CN203759775U (en) * 2014-03-21 2014-08-06 高椿明 Double-encrypted access control system based on two-dimensional code recognition
CN103955975A (en) * 2014-04-22 2014-07-30 广州闪购软件服务有限公司 Cellphone-based dynamic two-dimension code access control system
CN103955982A (en) * 2014-05-22 2014-07-30 国家电网公司 Method and device for identifying time-varying dynamic two-dimensional code entrance guard

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017071250A1 (en) * 2015-10-26 2017-05-04 广州畅联信息科技有限公司 Virtual key data processing method, apparatus, and mobile terminal, and server
CN106934264A (en) * 2015-12-31 2017-07-07 深圳先进技术研究院 A kind of intelligent unlocking method, device and lock device
CN105472037A (en) * 2016-01-06 2016-04-06 深圳市呤云科技有限公司 Method and device for opening entrance guard through scanning two-dimension code
CN105701899A (en) * 2016-04-07 2016-06-22 上海斐讯数据通信技术有限公司 Intelligent access control method and system
CN107067557A (en) * 2016-11-16 2017-08-18 国网山东省电力公司日照供电公司 A kind of two-dimentional key of intelligent charging spot is from lock administration system
CN110462691A (en) * 2017-01-21 2019-11-15 云丁网络技术(北京)有限公司 Method for unlocking, mobile terminal, intelligent door lock and the Cloud Server of intelligent door lock
US11335144B2 (en) 2017-01-21 2022-05-17 Yunding Network Technology (Beijing) Co., Ltd. Method for unlocking intelligent lock, mobile terminal, intelligent lock and server
CN106846655A (en) * 2017-01-23 2017-06-13 湖南晶威科技有限公司 A kind of key management cabinet and control method based on internet
CN107492162A (en) * 2017-06-01 2017-12-19 景德镇学院 Intelligent access control system based on ciphering type Quick Response Code and WiFi technology
CN107016769A (en) * 2017-06-05 2017-08-04 合肥展游软件开发有限公司 A kind of intelligent access control system for residential quarters
CN107342854A (en) * 2017-06-20 2017-11-10 杭州高锦科技有限公司 The encrypting and decrypting method and intelligent access control system of gate inhibition's Quick Response Code authority information
CN107358700A (en) * 2017-07-17 2017-11-17 合肥锦和信息技术有限公司 A kind of intelligent access control system being used for for residential quarters
US10937264B2 (en) 2017-11-01 2021-03-02 Ademco Inc. Systems and methods for disarming a security system monitoring a secured area using a two-dimensional scannable access code
CN107945331A (en) * 2017-11-21 2018-04-20 广州思加特科技有限公司 A kind of access control method, apparatus and system
CN108986328A (en) * 2018-05-29 2018-12-11 惠州智享物流科技有限公司 The self-service lease management system of pallet
CN108868348A (en) * 2018-06-15 2018-11-23 潘政 Low-power consumption safety lock based on photo resistance coding and decoding
CN108868348B (en) * 2018-06-15 2020-04-14 威海利赫自动化科技有限公司 Low-power consumption safety lock based on photoresistor coding and decoding
CN108921988A (en) * 2018-06-25 2018-11-30 西安石油大学 A kind of door-locking system and control method
CN108833118A (en) * 2018-07-25 2018-11-16 合肥学院 Using the safety access method and system of containing parameter Thiele type rational interpolation
CN109102602A (en) * 2018-07-25 2018-12-28 合肥学院 Using the unlocking method and system of containing parameter Newton type polynomial interopolation
CN108961511B (en) * 2018-07-25 2021-11-23 合肥学院 Unlocking method and system applying rational interpolation containing parameter Thiele type continuous fraction
CN108833118B (en) * 2018-07-25 2021-12-10 合肥学院 Safety access method and system applying rational interpolation containing parameter Thiele type
CN108961511A (en) * 2018-07-25 2018-12-07 合肥学院 Using the unlocking method and system of containing parameter Thiele type continued fraction rational interpolation
US11854329B2 (en) 2019-05-24 2023-12-26 Ademco Inc. Systems and methods for authorizing transmission of commands and signals to an access control device or a control panel device
US11928904B2 (en) 2019-08-02 2024-03-12 Yunding Network Technology (Beijing) Co., Ltd. Methods and systems for controlling a smart lock
CN110415419A (en) * 2019-08-21 2019-11-05 杭州享钥科技有限公司 Electron key share system in access control system based on mobile terminal
CN111540093A (en) * 2020-04-29 2020-08-14 三仟(杭州)数字科技有限公司 Access control system and control method thereof

Also Published As

Publication number Publication date
CN105139491B (en) 2017-11-28

Similar Documents

Publication Publication Date Title
CN105139491A (en) Mobile phone access control system based on encrypted two-dimensional code
US8868902B1 (en) Characteristically shaped colorgram tokens in mobile transactions
CN102045367B (en) Registration method and authentication server of real-name authentication
US8478990B2 (en) Mobile transaction methods and devices with three-dimensional colorgram tokens
JP7277270B2 (en) Personalization of Integrated Circuits Generated with Embedded Root of Trust Secrets
CN106100850B (en) Intelligent and safe chip signing messages transmission method and system based on two dimensional code
CN110677418A (en) Trusted voiceprint authentication method and device, electronic equipment and storage medium
CN109635610B (en) RFID tag data reading and writing system and method
CN106953732B (en) Key management system and method for chip card
CN101447010A (en) Login system and method for logging in
CN104322003A (en) Cryptographic authentication and identification method using real-time encryption
CN104424579A (en) Security traceability management system
CN101807994A (en) Method and system for application data transmission of IC card
KR20160139885A (en) Certification System for Using Biometrics and Certification Method for Using Key Sharing and Recording medium Storing a Program to Implement the Method
CN104463016A (en) Data safety storing method suitable for IC cards and two-dimension codes
CN106936588A (en) A kind of trustship method, the apparatus and system of hardware controls lock
CN105956452A (en) Method and system for unlocking device
JPH09282155A (en) Method for equipping cipher authentication function
CN114780923A (en) Electronic seal management and control method and system
CN106792669A (en) Information of mobile terminal encryption method and device based on Hybrid Encryption algorithm
CN113378119A (en) Software authorization method, device, equipment and storage medium
CN106656955A (en) Communication method and system and user terminal
CN100547963C (en) Utilize the method and the device of USB secret key inputting/displaying/transmitting user information
CN109829329B (en) Method and device for decrypting electronic signature document, storage medium and electronic equipment
CN106953731A (en) The authentication method and system of a kind of terminal management person

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant