A kind of method and system for verifying gate inhibition's password
Technical field
The present invention relates to control field more particularly to a kind of method and systems for verifying gate inhibition's password.
Background technique
Access control system has been applied on a large scale in the whole nation, generally by access control system, gate inhibition's authentication unit and identity
Password unit composition.
Access control system records identity password, and the identity password for needing to be verified first has to be recorded in entrance guard management system
The data of system the inside, such as RFID card number, fingerprint collecting or recognition of face require that data are first collected entrance guard management
System is saved with the mode of database.
Gate inhibition's authentication unit goes lane database to check the data being saved when verifying identity password, if
Lane database exists, then is verified, if it is not, thinking to be verified, is refused.
Identity password common are fingerprint, recognition of face, key number password and RFID card, various identity passwords at present
There is different strengths and weaknesses.
Fingerprint recognition is needed to acquire the fingerprint for being verified people, and is stored in inside database, and advantage is: do not have to carry card,
Directly use fingerprint authentication.The disadvantage is that verifying equipment must be equipped with fingerprint identification device, on cell gate inhibition using less, often
A owner needs to remove admission fingerprint, and owner can worry that identity information is stolen.
Recognition of face, and need to acquire data, and be stored in lane database, advantage is: can not have to carry card, directly
Recognition of face can pass through verifying.The disadvantage is that: face identification device is needed to configure, price is also relatively high at present, in cell door
Using less in taboo.
Key number password, numerical ciphers are also a kind of method of cell gate inhibition, but in real life, and application
Less, because the variation of key number password is limited, after as you know, gate inhibition just becomes less safe, if given
As soon as each owner provides a different numerical ciphers, then management becomes relatively difficult again.
RFID card, this is the identity password carrying mode being most widely used in daily access control system of residential community, one
As in the case of, owner carry access card, the function of authentication is reached by gate inhibition's identity recognition device, advantage is: Yong Hujie
By degree height, advantage of lower cost, safety is moderate.The disadvantage is that: it needs owner to carry, is also easier to be replicated.
Above-mentioned method, which usually requires networking, can just guarantee to verify the real-time change and safety of password.
Summary of the invention
In view of this, the present invention provides a kind of method and system for verifying gate inhibition's password, it must be to solve the prior art
Networking situation can just guarantee the problem of password real-time change and safety.
Specifically, the present invention is achieved through the following technical solutions:
The present invention provides a kind of method for verifying gate inhibition's password, which comprises
Access control system is arranged the first password and the Encryption Algorithm that is encrypted to first password, and by described first
Password and the Encryption Algorithm are sent to mobile terminal of the user for gate inhibition's verifying, and first password is more to withdraw the previous remark
It enables;
First password is encrypted as the second password by the Encryption Algorithm by access control system;And
First password is encrypted as third password by the Encryption Algorithm by mobile terminal, and by the third password
It is sent to the access control system, the access control system and mobile terminal are based on identical time shaft and carry out the encryption;
The third password is compared access control system with the second password: if identical, being verified, if not
Together, then authentication failed.
The present invention also provides it is a kind of verify gate inhibition's password system, the system comprises:
Access control system, the Encryption Algorithm for the first password to be arranged and is encrypted to first password, and by institute
It states the first password and the Encryption Algorithm is sent to mobile terminal of the user for gate inhibition's verifying, by the Encryption Algorithm by institute
It states the first password and is encrypted as the second password, the third password that the mobile terminal is sent is received, by the third password and second
Password is compared: if identical, being verified, if it is different, then authentication failed, first password is more to withdraw the previous remark
It enables;
At least one mobile terminal passes through institute for receiving the first password and Encryption Algorithm that the access control system is sent
It states Encryption Algorithm and first password is encrypted as third password, and send the access control system, institute for the third password
It states access control system and mobile terminal is based on identical time shaft and carries out the encryption.
The embodiment of the present invention, access control system and mobile terminal save identical password and Encryption Algorithm respectively, identical
Time shaft encrypts the password of preservation using the Encryption Algorithm of preservation so that access control system and mobile terminal without
Identical verifying password can be generated in the case where networking, simultaneously because the verifying password of access control system and mobile terminal is default
Time interval do not stop to convert, therefore ensure that verifying password safety.
Detailed description of the invention
Fig. 1 is a kind of flow chart of verifying gate inhibition password method shown in an exemplary embodiment of the invention;
Fig. 2 is a kind of structure chart of verifying gate inhibition password system shown in an exemplary embodiment of the invention.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended
The example of device and method being described in detail in claims, some aspects of the invention are consistent.
It is only to be not intended to limit the invention merely for for the purpose of describing particular embodiments in terminology used in the present invention.
It is also intended in the present invention and the "an" of singular used in the attached claims, " described " and "the" including majority
Form, unless the context clearly indicates other meaning.It is also understood that term "and/or" used herein refers to and wraps
It may be combined containing one or more associated any or all of project listed.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the present invention
A little information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other out.For example, not departing from
In the case where the scope of the invention, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as
One information.Depending on context, word as used in this " if " can be construed to " ... when " or " when ...
When " or " in response to determination ".
Embodiment one
It is as shown in Figure 1 a kind of flow chart of verifying gate inhibition password method shown in an exemplary embodiment of the invention, institute
State guard method the following steps are included:
Step S101, the Encryption Algorithm that access control system is arranged the first password and is encrypted to first password, and
The mobile terminal that user is used for gate inhibition's verifying is sent by first password and the Encryption Algorithm, first password is not
Password can be changed.
In embodiments of the present invention, it is provided with the first password in access control system and adds to what first password was encrypted
Close algorithm, which is that can not change password, after being set in access control system, unless restarting access control system, not so not
Allow to be modified, first password and Encryption Algorithm periodically can also restart gate inhibition by machine by user's manual setting
After reset, the present invention is not specifically limited in this embodiment.Receive gate inhibition's password can facilitate user to carry out gate inhibition mouthful to be various
The mobile terminal of verifying is enabled, such as: mobile phone, palm PC.
It is provided in access control system after the first password and Encryption Algorithm, sends first password and Encryption Algorithm to
Mobile terminal, specifically, access control system can send movement eventually for the first password and Encryption Algorithm by Radio Transmission Technology
End, can also send mobile terminal for the first password and Encryption Algorithm by wire transmission technology, the present invention does not make this to have
Body limits.
First password is encrypted as the second password by the Encryption Algorithm by step S102, access control system;And
First password is encrypted as third password by the Encryption Algorithm by mobile terminal, and by the third password
It is sent to the access control system, the access control system and mobile terminal are based on identical time shaft and carry out the encryption.
In embodiments of the present invention, access control system and mobile terminal use respectively identical Encryption Algorithm to the first password into
Row encryption, obtains the second password by encryption access control system, mobile terminal obtains third password, also, mobile terminal by this
Three passwords send access control system.It should be pointed out that access control system and mobile terminal are encrypted based on identical time shaft
, such as: getting home when 7 points of user's evening and need to carry out gate inhibition's verifying, then access control system and mobile terminal are based on 19:00:00's
Time shaft is encrypted.
It should be pointed out that mobile terminal sends gate inhibition system for third password by any one of bluetooth, optical signal
System can guarantee that mobile terminal successfully sends third password since mobile terminal can use different transmission modes
To access control system.
It should be pointed out that access control system and mobile terminal carry out the primary encryption every preset time interval, such as:
Preset time interval is 1 second, then access control system and mobile terminal were every 1 second progress primary encryption, that is, 19:00:01,19:
00:02,19:00:03 ... it is encrypted, it should be pointed out that when access control system and mobile terminal are based on identical always
Between axis encrypted.
The third password is compared with the second password for step S103, access control system: if identical, verifying is logical
It crosses, if it is different, then authentication failed.
In embodiments of the present invention, after access control system receives third password, by third password and local second mouthful
Order is compared, and subsequent step is carried out according to the result of comparison: if identical, it is verified, access control system releases gate inhibition,
If it is different, then authentication failed, access control system can not release gate inhibition.Since access control system and mobile terminal are when being based on identical
Between axis identical password is encrypted using identical Encryption Algorithm, the second password and third password should be identical.
The embodiment of the present invention, access control system and mobile terminal save identical password and Encryption Algorithm respectively, identical
Time shaft encrypts the password of preservation using the Encryption Algorithm of preservation so that access control system and mobile terminal without
Identical verifying password can be generated in the case where networking, simultaneously because the verifying password of access control system and mobile terminal is default
Time interval do not stop to convert, therefore ensure that verifying password safety.
As an alternative embodiment of the present invention, the third password and the second password are carried out in the access control system
After the step of comparison, the method also includes:
If authentication failed, mobile terminal is corrected local zone time, the first password and Encryption Algorithm.
In embodiments of the present invention, since axis uses identical encryption calculation at the same time for mobile terminal and access control system
Method encrypts identical password, therefore third password and the second password should be identical.If authentication failed, then it represents that generate
The element of third password: there is error in time shaft, the first password, Encryption Algorithm, it is therefore desirable to carry out to above three element
Correction.
Embodiment two
It is illustrated in figure 2 a kind of structure chart of verifying gate inhibition password system shown in an exemplary embodiment of the invention, is
Convenient for explanation, part related to the present embodiment is only shown, comprising:
Access control system 201, the Encryption Algorithm for the first password to be arranged and is encrypted to first password, and will
First password and the Encryption Algorithm are sent to mobile terminal 202 of the user for gate inhibition's verifying, are calculated by the encryption
First password is encrypted as the second password by method, the third password that the mobile terminal 202 is sent is received, by the third mouth
Order is compared with the second password: if identical, being verified, if it is different, then authentication failed, first password is not
Password can be changed;
At least one mobile terminal 202, for receiving the first password and Encryption Algorithm that the access control system 201 is sent,
First password is encrypted as third password by the Encryption Algorithm, and sends the gate inhibition for the third password and is
System 201, the access control system 201 and mobile terminal 202 are based on identical time shaft and carry out the encryption.
In embodiments of the present invention, it is provided with the first password in access control system and adds to what first password was encrypted
Close algorithm, which is that can not change password, after being set in access control system, unless restarting access control system, not so not
Allow to be modified, first password and Encryption Algorithm periodically can also restart gate inhibition by machine by user's manual setting
After reset, the present invention is not specifically limited in this embodiment.Receive gate inhibition's password can facilitate user to carry out gate inhibition mouthful to be various
The mobile terminal of verifying is enabled, such as: mobile phone, palm PC.
It is provided in access control system after the first password and Encryption Algorithm, sends first password and Encryption Algorithm to
Mobile terminal, specifically, access control system can send movement eventually for the first password and Encryption Algorithm by Radio Transmission Technology
End, can also send mobile terminal for the first password and Encryption Algorithm by wire transmission technology, the present invention does not make this to have
Body limits.
Access control system and mobile terminal respectively encrypt the first password using identical Encryption Algorithm, by encrypting door
Access control system obtains the second password, mobile terminal obtains third password, also, the third password is sent gate inhibition system by mobile terminal
System.It should be pointed out that access control system and mobile terminal are encrypted based on identical time shaft, such as: when user's evening 7
Point, which is got home, needs to carry out gate inhibition's verifying, then the time shaft that access control system and mobile terminal are based on 19:00:00 is encrypted.
It should be pointed out that mobile terminal sends gate inhibition system for third password by any one of bluetooth, optical signal
System can guarantee that mobile terminal successfully sends third password since mobile terminal can use different transmission modes
To access control system.
It should be pointed out that access control system and mobile terminal carry out the primary encryption every preset time interval, such as:
Preset time interval is 1 second, then access control system and mobile terminal were every 1 second progress primary encryption, that is, 19:00:01,19:
00:02,19:00:03 ... it is encrypted, it should be pointed out that when access control system and mobile terminal are based on identical always
Between axis encrypted.
In embodiments of the present invention, after access control system receives third password, by third password and local second mouthful
Order is compared, and subsequent step is carried out according to the result of comparison: if identical, it is verified, access control system releases gate inhibition,
If it is different, then authentication failed, access control system can not release gate inhibition.Since access control system and mobile terminal are when being based on identical
Between axis identical password is encrypted using identical Encryption Algorithm, the second password and third password should be identical.
The embodiment of the present invention, access control system and mobile terminal save identical password and Encryption Algorithm respectively, identical
Time shaft encrypts the password of preservation using the Encryption Algorithm of preservation so that access control system and mobile terminal without
Identical verifying password can be generated in the case where networking, simultaneously because the verifying password of access control system and mobile terminal is default
Time interval do not stop to convert, therefore ensure that verifying password safety.
As an alternative embodiment of the present invention, the mobile terminal 202 is also used to:
If authentication failed, local zone time, the first password and Encryption Algorithm are corrected.
In embodiments of the present invention, since axis uses identical encryption calculation at the same time for mobile terminal and access control system
Method encrypts identical password, therefore third password and the second password should be identical.If authentication failed, then it represents that generate
The element of third password: there is error in time shaft, the first password, Encryption Algorithm, it is therefore desirable to carry out to above three element
Correction.
For device embodiment, since it corresponds essentially to embodiment of the method, so related place is referring to method reality
Apply the part explanation of example.The apparatus embodiments described above are merely exemplary, wherein described be used as separation unit
The unit of explanation may or may not be physically separated, and component shown as a unit can be or can also be with
It is not physical unit, it can it is in one place, or may be distributed over multiple network units.It can be according to actual
The purpose for needing to select some or all of the modules therein to realize the present invention program.Those of ordinary skill in the art are not paying
Out in the case where creative work, it can understand and implement.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Within mind and principle, any modification, equivalent substitution, improvement and etc. done be should be included within the scope of the present invention.