CN105913533A - Intelligent door safety control method and intelligent door safety control system - Google Patents
Intelligent door safety control method and intelligent door safety control system Download PDFInfo
- Publication number
- CN105913533A CN105913533A CN201610485551.0A CN201610485551A CN105913533A CN 105913533 A CN105913533 A CN 105913533A CN 201610485551 A CN201610485551 A CN 201610485551A CN 105913533 A CN105913533 A CN 105913533A
- Authority
- CN
- China
- Prior art keywords
- key
- receiver
- intelligent door
- donor
- door
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/33—Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention belongs to the technical field of network information safety and in particular relates to an intelligent door safety control method and an intelligent door safety control system. The intelligent door safety control method is driven by access key information negotiated by a smart phone from a receiver and a visitor, and an intelligent switching controller generates a closing/opening control instruction of a physical door according to the accuracy of the received access key. The method and the system have the following characteristics that 1, visitors are managed in a distributed manner, waiting time of the visitors is reduced, and user service experience is enhanced; 2, an access key is dynamically generated, and the key has timeliness and is prevented from being repeatedly used; and 3, single-point safety responsibility risk of a common door is avoided, and the safety controllability of the common door is enhanced.
Description
Technical field
The invention belongs to network information system security technology area, particularly relate to a kind of Intelligent door method of controlling security and system.
Background technology
At present, building, private place, community, the security control in corporate office place generally use access card or key, visitor handles the Office Area process that access card is often required to specify, access right is obtained after loaded down with trivial details formality, receiver lacks autonomous management to interim client, security management relies on and entrance guard's responsibility simultaneously, and management cost is high and security control exists artificial responsibility single-point risk.
For the problems referred to above, existing based on symmetrical public key architecture certification access control scheme with based on unsymmetrical key system certification access control scheme, but these schemes exist certification license reuse leak, centralized management cost is high, quality of security service is poor.
Summary of the invention
The present invention is directed to public gate inhibition's Security Control Problem, a kind of Intelligent door method of controlling security and system are provided, the method and system principal and subordinate based on smart mobile phone key and timeliness variable authentication access scheme, realize central access management and distribution Access Management Access blends, reduce safety wind dangerous, promote quality of security service.
In order to realize above-mentioned purpose, present invention employs following technical scheme:
Intelligent door method of controlling security, the method is driven by the access key information consulted by smart mobile phone from receiver and client, the switch controller of intelligence according to the access key correctness received, and generate physics door turn off or on control instruction;The described key information that accesses includes one or more in Chinese character string, digit strings, English character string, mixed characters string, picture, face and phone number;The method comprises the following steps:
1) master key generates and distribution method
Security management center requires that the owner of Intelligent door provides real door identity document to obtain master key, the form of master key is following one or more: the smart phone number of donor, the smart machine hardware sequence number of donor, the character string of the sets itself of donor, the PKI of donor and the biological information of donor;
2) associated key generates and distribution method
The receiver grasping master key passes through smart mobile phone APP programming automatic generation associated key, and this process is:
1. personnel oneself selection information of coming to visit is sent to receiver as accessing key;
2. receiver uses hash algorithm that information is generated digital finger-print;
3. receiver uploads to public Intelligent door administrative center digital finger-print;
3) client accesses control process, and client accesses rate-determining steps and is described as follows:
1. client sends access key request to receiver;
2. receiver generates associated access key;
3. associated access key is sent to security management center;
4. Intelligent door security management center dynamically updates access key database, sets up the relation of associated key and master key;
5. Intelligent door security management center server checks that the associated key of client is the most correct, without expired and correct, then produces control instruction, opens physics door;Otherwise, display refusal information.
Intelligent door safety control system, this system is driven by the access key information consulted by smart mobile phone from receiver and client, the switch controller of intelligence according to the access key correctness received, and generate physics door turn off or on control instruction;The described key information that accesses includes one or more in Chinese character string, digit strings, English character string, mixed characters string, picture, face and phone number;The control method of this system comprises the following steps:
1) master key generates and distribution method
Security management center requires that the owner of Intelligent door provides real door identity document to obtain master key, the form of master key is following one or more: the smart phone number of donor, the smart machine hardware sequence number of donor, the character string of the sets itself of donor, the PKI of donor and the biological information of donor;
2) associated key generates and distribution method
The receiver grasping master key passes through smart mobile phone APP programming automatic generation associated key, and this process is:
1. personnel oneself selection information of coming to visit is sent to receiver as accessing key;
2. receiver uses hash algorithm that information is generated digital finger-print;
3. receiver uploads to public Intelligent door administrative center digital finger-print;
3) client accesses control process, and client accesses rate-determining steps and is described as follows:
1. client sends access key request to receiver;
2. receiver generates associated access key;
3. associated access key is sent to security management center;
4. Intelligent door security management center dynamically updates access key database, sets up the relation of associated key and master key;
5. Intelligent door security management center server checks that the associated key of client is the most correct, without expired and correct, then produces control instruction, opens physics door;Otherwise, display refusal information.
Due to the fact that and have employed above-mentioned technical scheme that there is following feature: 1, distributed management client, reduce the waiting time of client, strengthen user's service experience.2, dynamically generating access key, key has ageing, it is to avoid reuse.3, avoid the safety responsibility single-point risk of public door, strengthen the property safely controllable processed of public door.
Accompanying drawing explanation
Fig. 1 is intelligence public door working machine drawing.
Detailed description of the invention
Below in conjunction with the accompanying drawings the detailed description of the invention of the present invention is made a detailed explanation.
1, intelligence public door method of controlling security
The unlatching of intelligence public door safety is consulted specific information-driven by from receiver and client by smart mobile phone, these specific information are referred to as accessing key, the switch controller of intelligence according to the access key correctness received, and generate physics door turn off or on control instruction.The activation bit of this method includes the following:
Chinese character string
Digit strings
English character string
Mixed characters string
Picture
Face
Phone number.
2, master key generates and distribution method
Security management center requires that the owner of Intelligent door provides real door identity document to obtain master key, and the form of master key is:
The smart phone number of donor
The smart machine hardware sequence number of donor
The character string of the sets itself of donor
The PKI of donor
The biological information of donor.
3, associated key generates and distribution method
The receiver grasping master key passes through intelligence APP programming automatic generation associated key, and as Fig. 1 is, its process is:
Visiting personnel oneself selection information is sent to receiver's (physical access regional body) as accessing key.
Receiver uses hash algorithm that information is generated digital finger-print.
Receiver uploads to public Intelligent door administrative center digital finger-print.
4, client accesses control process
Client accesses rate-determining steps and is described as follows:
Client sends access key request to receiver.
Receiver generates associated access key.
Associated access key is sent to security management center.
Intelligent door security management center dynamically updates access key database, sets up the relation of associated key and master key.
Intelligent door security management center server checks that the associated key of client is the most correct, without expired and correct, then produces control instruction, opens physics door.Otherwise, display refusal information.
Claims (2)
1. Intelligent door method of controlling security, it is characterized in that the method is driven by the access key information consulted by smart mobile phone from receiver and client, the switch controller of intelligence according to the access key correctness received, and generate physics door turn off or on control instruction;The described key information that accesses includes one or more in Chinese character string, digit strings, English character string, mixed characters string, picture, face and phone number;The method comprises the following steps:
1) master key generates and distribution method
Security management center requires that the owner of Intelligent door provides real door identity document to obtain master key, the form of master key is following one or more: the smart phone number of donor, the smart machine hardware sequence number of donor, the character string of the sets itself of donor, the PKI of donor and the biological information of donor;
2) associated key generates and distribution method
The receiver grasping master key passes through smart mobile phone APP programming automatic generation associated key, and this process is:
1. personnel oneself selection information of coming to visit is sent to receiver as accessing key;
2. receiver uses hash algorithm that information is generated digital finger-print;
3. receiver uploads to public Intelligent door administrative center digital finger-print;
3) client accesses control process, and client accesses rate-determining steps and is described as follows:
1. client sends access key request to receiver;
2. receiver generates associated access key;
3. associated access key is sent to security management center;
4. Intelligent door security management center dynamically updates access key database, sets up the relation of associated key and master key;
5. Intelligent door security management center server checks that the associated key of client is the most correct, without expired and correct, then produces control instruction, opens physics door;Otherwise, display refusal information.
2. Intelligent door safety control system, it is characterized in that this system is driven by the access key information consulted by smart mobile phone from receiver and client, the switch controller of intelligence according to the access key correctness received, and generate physics door turn off or on control instruction;The described key information that accesses includes one or more in Chinese character string, digit strings, English character string, mixed characters string, picture, face and phone number;The control method of this system comprises the following steps:
1) master key generates and distribution method
Security management center requires that the owner of Intelligent door provides real door identity document to obtain master key, the form of master key is following one or more: the smart phone number of donor, the smart machine hardware sequence number of donor, the character string of the sets itself of donor, the PKI of donor and the biological information of donor;
2) associated key generates and distribution method
The receiver grasping master key passes through smart mobile phone APP programming automatic generation associated key, and this process is:
1. personnel oneself selection information of coming to visit is sent to receiver as accessing key;
2. receiver uses hash algorithm that information is generated digital finger-print;
3. receiver uploads to public Intelligent door administrative center digital finger-print;
3) client accesses control process, and client accesses rate-determining steps and is described as follows:
1. client sends access key request to receiver;
2. receiver generates associated access key;
3. associated access key is sent to security management center;
4. Intelligent door security management center dynamically updates access key database, sets up the relation of associated key and master key;
5. Intelligent door security management center server checks that the associated key of client is the most correct, without expired and correct, then produces control instruction, opens physics door;Otherwise, display refusal information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610485551.0A CN105913533B (en) | 2016-06-25 | 2016-06-25 | Intelligent door method of controlling security and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610485551.0A CN105913533B (en) | 2016-06-25 | 2016-06-25 | Intelligent door method of controlling security and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105913533A true CN105913533A (en) | 2016-08-31 |
CN105913533B CN105913533B (en) | 2018-06-05 |
Family
ID=56758851
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610485551.0A Active CN105913533B (en) | 2016-06-25 | 2016-06-25 | Intelligent door method of controlling security and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105913533B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1564507A (en) * | 2004-04-22 | 2005-01-12 | 上海三盈通信科技有限公司 | Distinguishing method and system combined information security software, hardware with user's status of enterprise |
US6950944B2 (en) * | 2000-12-18 | 2005-09-27 | David Frank Yager | Security code activated access control system |
CN101141241A (en) * | 2006-09-06 | 2008-03-12 | 华为技术有限公司 | Method and network appliance for implementing MAC safety |
CN101874419A (en) * | 2007-11-27 | 2010-10-27 | 思科技术公司 | Providing secure communications for active RFID tags |
CN102238186A (en) * | 2011-07-22 | 2011-11-09 | 成都天钥科技有限公司 | High-value control method |
CN102236766A (en) * | 2011-05-10 | 2011-11-09 | 桂林电子科技大学 | Security data item level database encryption system |
JP2012069036A (en) * | 2010-09-27 | 2012-04-05 | Yamatake Corp | Entry/exit management system and method |
CN105022965A (en) * | 2015-07-14 | 2015-11-04 | 广东欧珀移动通信有限公司 | Data encryption method and apparatus |
-
2016
- 2016-06-25 CN CN201610485551.0A patent/CN105913533B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6950944B2 (en) * | 2000-12-18 | 2005-09-27 | David Frank Yager | Security code activated access control system |
CN1564507A (en) * | 2004-04-22 | 2005-01-12 | 上海三盈通信科技有限公司 | Distinguishing method and system combined information security software, hardware with user's status of enterprise |
CN101141241A (en) * | 2006-09-06 | 2008-03-12 | 华为技术有限公司 | Method and network appliance for implementing MAC safety |
CN101874419A (en) * | 2007-11-27 | 2010-10-27 | 思科技术公司 | Providing secure communications for active RFID tags |
JP2012069036A (en) * | 2010-09-27 | 2012-04-05 | Yamatake Corp | Entry/exit management system and method |
CN102236766A (en) * | 2011-05-10 | 2011-11-09 | 桂林电子科技大学 | Security data item level database encryption system |
CN102238186A (en) * | 2011-07-22 | 2011-11-09 | 成都天钥科技有限公司 | High-value control method |
CN105022965A (en) * | 2015-07-14 | 2015-11-04 | 广东欧珀移动通信有限公司 | Data encryption method and apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN105913533B (en) | 2018-06-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3121795B9 (en) | Establishment of a communication connection with a user device over an access control device | |
CN105976471B (en) | A kind of access control equipment, caller management method and system | |
CN106710043B (en) | Have the time limit access control system and its method of visitor's authentication | |
CN207409010U (en) | The newer temporary password access control system of encryption parameter dynamic | |
CN106131179A (en) | The password Rights Management System of a kind of intelligent door lock and method | |
CN106056707A (en) | Residential quarter network access control scheme | |
CN105741395A (en) | Entrance guard access method and system based on two-dimension code and face identification | |
US9692598B2 (en) | Multi-use long string authentication keys | |
CN104050742A (en) | Intelligent door and control method and system thereof | |
CN109191649B (en) | Method and device for sharing control authority of intelligent door lock | |
CN104052817A (en) | Intelligent door and intelligent door control method and system | |
CN108171851A (en) | A kind of intelligent door lock system and control method with scanning function | |
CN102547695A (en) | Security authentication method for wireless network | |
CN107989514A (en) | There is the safety box of dynamic password | |
CN106600775A (en) | Non-networking dynamic password generation method used for intelligent access control system | |
CN104580246B (en) | Dynamic and intelligent safe key is produced and managing and control system and method under WiFi environment | |
CN112978526B (en) | Access control method, equipment and system and elevator control method, equipment and system | |
CN109740001A (en) | A kind of monitoring method and system based on recognition of face | |
CN109756579A (en) | A kind of Internet of Things Information Secure Transmission System and transmission method based on block chain | |
CN105050086A (en) | Method for terminal to log in Wifi hotspot | |
CN104580260A (en) | Safety method applicable to intelligent terminal of internet of things | |
CN105243718A (en) | Control method and system for access control | |
CN106961326A (en) | POS terminal remote cipher key more new system and update method | |
CN105931343A (en) | Smart door lock system and control method for same | |
CN105678869B (en) | Gate inhibition's open method of gate inhibition's intelligence control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |