CN106600767A - Verification method and system based on identification card - Google Patents

Verification method and system based on identification card Download PDF

Info

Publication number
CN106600767A
CN106600767A CN201611088816.XA CN201611088816A CN106600767A CN 106600767 A CN106600767 A CN 106600767A CN 201611088816 A CN201611088816 A CN 201611088816A CN 106600767 A CN106600767 A CN 106600767A
Authority
CN
China
Prior art keywords
password
user
log
entrance guard
intelligent entrance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611088816.XA
Other languages
Chinese (zh)
Inventor
张哲文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Playright Mdt Infotech Ltd
Original Assignee
Shenzhen Playright Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Playright Mdt Infotech Ltd filed Critical Shenzhen Playright Mdt Infotech Ltd
Priority to CN201611088816.XA priority Critical patent/CN106600767A/en
Publication of CN106600767A publication Critical patent/CN106600767A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/33Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

The embodiment of the invention discloses a verification method and system based on an identification card. The method comprises the steps that an intelligent access control receives a registration request of a user and sends the registration request to a remote monitoring server for verification; the intelligent access control receives a verification passing message returned by the remote monitoring server, and the identification card of the user is scanned to serve as a first registration password of the intelligent access control; after the first registration password is collected, the user is prompted to input a second registration password, wherein the second registration password is an encrypted double-fingerprint password; when the user needs to open the access control, the intelligent access control scans the identification card of the user to verify the first registration password; after the first registration password is verified to be valid, the intelligent access control prompts the user to input the second registration password, receives the second registration password input by the user and decrypts and verifies the second registration password; after the second registration password is verified to be valid, the user is allowed to enter the intelligent access control. By adopting the verification method and system, safety and convenience of the intelligent access control can be improved.

Description

A kind of method and system of identity-based results card
Technical field
The present invention relates to intelligent entrance guard technical field, more particularly to a kind of method and system of identity-based results card.
Background technology
In recent years, intelligent Community quickly grows, and many newly-built cells are provided with safety-protection system, with digital display circuit it is hard The reduction of part cost, increasing cell has been used based on the safety-protection system of data signal, and starts popularization.Unit gate inhibition And cell gate inhibition is safety-protection system most basic in intelligent Community, for the producer for moving in, property can typically provide access card use Come cell unlocking gate inhibition or unit gate inhibition, be different per an authority for card, generally the access card of producer only allows solution Lock place cell and unit gate inhibition, and open the door foundation be exactly user hold access card card number it is whether legal.
But the extra cost of gate inhibition's calorie requirement, and user easily leaves behind.Exist in prior art and use user's body The intelligent entrance guard that part card is verified, but single ID card verification security is not high, it is non-if user identity card is lost Chang Rongyi is utilized by undesirable, and to the even personal safety of owner's property detrimental effect is brought.Accordingly, it would be desirable to a kind of safety is again The method of convenient opening gate.
The content of the invention
Embodiment of the present invention technical problem to be solved is, there is provided a kind of method of identity-based results card and be System.It is not enough to solve the problems, such as existing entrance guard management and convenience.
In order to solve above-mentioned technical problem, embodiment of the present invention first aspect provides a kind of side of identity-based results card Method, including:
The registration request of intelligent entrance guard receive user, includes proof of identification information in the registration request;
The intelligent entrance guard sends registration request to remote monitoring server;
Remote monitoring server is verified according to owner's information of pre-stored to the proof of identification information in registration request;
Intelligent entrance guard receives the message that is verified of remote monitoring server return, and the identity card of scanning user is used as intelligence First log-in password of gate inhibition;
After having collected the first log-in password, the intelligent entrance guard shows nine palaces of subsidiary Digital ID by touch screen Lattice, point out user to select at least two grid to be input into different fingerprints, the Digital ID of the grid selected user and in the lattice The user fingerprints collected on son carry out the encryption of predetermined encryption algorithm, generate the second log-in password;
When user needs opening gate, the identity card of the intelligent entrance guard scanning user is tested the first log-in password Card;
After first log-in password is verified, the intelligent entrance guard points out the log-in password of user input second, Second log-in password of receiving user's input, is decrypted simultaneously according to default decipherment algorithm corresponding with the predetermined encryption algorithm Checking;
After second log-in password is verified, it is allowed to which user enters.
Embodiment of the present invention second aspect provides a kind of system, including:
Intelligent entrance guard, for the registration request of receive user, includes proof of identification information in the registration request;Will registration Request is sent to remote monitoring server;
The remote monitoring server, for according to owner's information of pre-stored to the proof of identification information in registration request Verified;
The intelligent entrance guard is additionally operable to receive the identity for being verified message, scanning user that remote monitoring server is returned Demonstrate,prove the first log-in password as intelligent entrance guard;After having collected the first log-in password, the intelligent entrance guard passes through touch-control screen display Show the nine grids of subsidiary Digital ID, point out user to select at least two grid to be input into different fingerprints, the lattice selected user The Digital ID of son and the user fingerprints collected on the grid carry out the encryption of predetermined encryption algorithm, generate the second note Volume password;When user needs opening gate, the identity card of the intelligent entrance guard scanning user is tested the first log-in password Card;After first log-in password is verified, the intelligent entrance guard points out the log-in password of user input second, receives and uses Second log-in password of family input, is decrypted and verifies according to default decipherment algorithm corresponding with the predetermined encryption algorithm; After second log-in password is verified, it is allowed to which user enters.
Implement the embodiment of the present invention, have the advantages that:
By the way that intelligent entrance guard and remote monitoring server connected and composed into intelligent access control system, user by intelligent entrance guard and Remote monitoring server is registered after owner's identity is proved, it is ensured that the correctness of user identity;Then scan identity card to make For the first log-in password and use encryption after double fingerprints as the second log-in password;User can pass through the side of checking password Formula opening gate, due to adding the second log-in password, therefore relative to the mode of single password, security is higher, and second The input mode of log-in password is double fingerprints, and crypticity and interest are relatively strong, and user input extremely facilitates, beneficial to lifting user's body Test, and send for the information after encryption, one layer of security protection can be further added by the basis of fingerprint security itself, The risk that information is intercepted leakage can be substantially reduced, the security of system is improved.
Description of the drawings
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to institute in embodiment The accompanying drawing that needs are used is briefly described, it should be apparent that, drawings in the following description are only some enforcements of the present invention Example, for those of ordinary skill in the art, on the premise of not paying creative work, can be being obtained according to these accompanying drawings Obtain other accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of the method for identity-based results card of the embodiment of the present invention;
Fig. 2 is a kind of composition schematic diagram of system of the embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than the embodiment of whole.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
Fig. 1 is refer to, is a kind of schematic flow sheet of the method for identity-based results card of the embodiment of the present invention, in this enforcement In example, the method comprising the steps of:
S101, the registration request of intelligent entrance guard receive user includes proof of identification information in the registration request.
Alternatively, subscriber identity information includes user biological characteristic information, ID card information, photo, phone number, individual Setting code, room number, House Property card numbering, at least one of, in order to ensure the correctness of user identity, can be with various Information is used in combination, so as to the information for neighbours living of input system.
S102, the intelligent entrance guard sends registration request to remote monitoring server.
S103, remote monitoring server is carried out according to owner's information of pre-stored to the proof of identification information in registration request Checking.
S104, intelligent entrance guard receives the identity card work for being verified message, scanning user that remote monitoring server is returned For the first log-in password of intelligent entrance guard.
S105, after having collected the first log-in password, the intelligent entrance guard shows subsidiary Digital ID by touch screen Nine grids, point out user to select at least two grid to be input into different fingerprints, the Digital ID of the grid that user is selected and The user fingerprints collected on the grid carry out the encryption of predetermined encryption algorithm, generate the second log-in password.
Alternatively, the grid random alignment in the nine grids.So can avoid checking that user uses by illegal molecule Which finger fingerprint, cannot also determine the Digital ID of grid.
Due to needing to be input at least two different fingerprints, therefore security is higher than the security of conventional single fingerprint. And the grid in the nine grids can be with random alignment.The position of so each user input all changes, and is difficult by other Invalid user stealing.For example, user have selected the 1 lattice input right hand index fingerprint in nine grids, and in 6 lattice right hand middle finger is input into Fingerprint, then user can simultaneously with right hand forefinger 1 lattice of percussion when password is verified, right hand middle finger taps 6 lattice, it is of course also possible to first 1 lattice are tapped with right hand forefinger, then the position for tapping 6 lattice, 1 lattice and 6 lattice with right hand middle finger may change every time, and in unblock When be input into fingerprint order can be the same or different, the embodiment of the present invention is not limited in any way.
Single identity card cipher safety is relatively low, and existing intelligent entrance guard is demonstrate,proved using above-mentioned single password in user identity During loss, the property safety of normal resident family is difficult to preferably be protected, therefore, in the present embodiment, introduce the second registration close Code is to improve the security of password.And second log-in password be in nine grids be input into double fingerprints in addition many finger-print ciphers, For example, user can respectively press 1 key and 6 keys in nine grids to be input into the second log-in password simultaneously with forefinger and middle finger.Will Double fingerprints of pressing nine grids increased the interest of password authentification as the second log-in password;And the fingerprint letter for sending Breath is the information being encrypted according to predetermined encryption algorithm, therefore is further pacified on the basis of finger print safety Full guard.Although being provided with two passwords, user input is very convenient simple, and intelligence only need to be pressed after brush identity card Nine grids on gate inhibition, relatively single password had both improve the security of intelligent entrance guard, turn avoid Complicated Flow band The trouble come, user experience is preferable.
S106, when user needs opening gate, the identity card of the intelligent entrance guard scanning user is to the first log-in password Verified.
S107, after first log-in password is verified, the intelligent entrance guard prompting user input second is registered Password, the second log-in password of receiving user's input is carried out according to default decipherment algorithm corresponding with the predetermined encryption algorithm Decrypt and verify.
Alternatively, the predetermined encryption algorithm and the default decipherment algorithm are unsymmetrical key, and the predetermined encryption Algorithm is associated and while dynamic change with the default decipherment algorithm.
Wherein, symmetric key encryption is also named secret/private key encryption (Secret Key Encryption, SKE), i.e., Sending and receiving the both sides of data must encrypt and decrypt computing using identical/symmetrical key to plaintext.It is asymmetric Public key encryption (Public Key Encryption, PKE) is also in key encryption, refer to everyone have a pair it is uniquely right The key answered:Public-key cryptography and private cipher key, public key external disclosure, private key is preserved by privacy;With wherein one key come Encryption, just can only decrypt key with another.Send a side of data carries out adding with the public key of the opposing party to the information for sending It is close, then it is decrypted with the private key of oneself by recipient.Public key encryption technology solves the issue and management of key and asks Topic, is the core of current commercial code.Using public key technique, the both sides for entering row data communication can safely confirm other side Identity and public-key cryptography, there is provided the identifiability of communication.
Alternatively, the AES is corresponding with decipherment algorithm and while dynamic change.For example, many set correspondences can be consulted Enciphering and deciphering algorithm, followed by when using every time agreement use it is wherein a set of, mobile terminal can by transmission algorithm identify letter Cease to inform intelligent entrance guard.So the enciphering and deciphering algorithm of dynamic change can further lift system security.
Finger print information after by sending encryption can provide Double-protection, ground floor as the first log-in password for system The decryption protection being made up of AES, the second layer is that the complicated calculations being made up of the uniqueness and complexity of finger print information are prevented Shield so that illegally molecule cannot be cracked or simulating mobile terminal is sent to the signal of intelligent entrance guard, it is ensured that the safety of system.
It should be noted that in the present embodiment, the first log-in password can point out the note of user input second after being verified Volume password, for non-neighbours living, it may be difficult to expect that the mode for being input into the second log-in password is pressing nine grids, therefore, Security and disguise are higher.In addition, the first log-in password that user input second can not also be pointed out to register after being verified is close Code, only points out the log-in password of user first to be verified, and the second log-in password is input in the Preset Time by user after passing through, Such that it is able to the disguise for further lifting the second log-in password.
S108, after second log-in password is verified, it is allowed to which user enters.
In the present embodiment, by the way that intelligent entrance guard and remote monitoring server are connected and composed into intelligent access control system, user Registered after owner's identity is proved by intelligent entrance guard and remote monitoring server, it is ensured that the correctness of user identity;So Identity card is scanned afterwards as the first log-in password and uses the double fingerprints after encryption as the second log-in password;User can lead to The mode opening gate of checking password is crossed, due to adding the second log-in password, therefore relative to the mode of single password, safety Property it is higher, and the input mode of the second log-in password is double fingerprints, crypticity and interesting relatively strong, and user input extremely facilitates, Beneficial to the information lifted after Consumer's Experience, and the unencryption for sending, can again increase on the basis of fingerprint security itself Plus one layer of security protection, the information that can substantially reduce is intercepted the risk of leakage, improves the security of system.
In view of the second log-in password is pressing nine grids, in order to prevent illegal user from malicious from attempting, 3 inputs can be set After failure, temporarily refusal processes the request (can determine user identity by user fingerprints) of the user.If the user is little really Resident family of area, it can confirm remote opening door after identity by contacting the keeper at remote monitoring server end by monitored picture Prohibit.
Alternatively, in addition to intelligent entrance guard locally preserves the first log-in password and the second log-in password is verified, also Can be verified by remote monitoring server.Although remote monitoring server carries out verifying that possible efficiency can be slightly slow, Security can be further lifted, especially when intelligent entrance guard breaks down and cannot verify, is carried out by remote monitoring server Checking, can further lift system work stability.
When being verified using remote monitoring server, the first log-in password and second can be registered by intelligent entrance guard Password is sent directly to remote monitoring server and is preserved.
Alternatively, when intelligent entrance guard is damaged or needs to carry out system update, needs to change intelligent entrance guard, the intelligent door Prohibit first log-in password and second log-in password to be sent to the remote monitoring server and preserve;
When the intelligent entrance guard is changed, the remote monitoring server sends the code data of preservation to replacing Intelligent entrance guard afterwards.
So that it is guaranteed that change before and after user data integrality and security.
Because present cell the elderly is more and more, the first log-in password can be identity card, forget without having to worry about user, But the second log-in password it is easy to forget that.Now can be using following flow process come opening gate.
If user forgets second log-in password, the intelligent entrance guard is verified to the first log-in password of user input After success, the call request of receive user;
The call request is sent to the remote monitoring server, or by the call request with short message or electricity The mode of words is sent to the mobile phone of the keeper;
After the keeper confirms user identity by monitored picture, remote monitoring server receives the keeper Remote control open command, open the intelligent entrance guard.
Fig. 2 is refer to, is a kind of composition schematic diagram of system of the embodiment of the present invention, in the present embodiment, the system bag Include:The intelligent entrance guard 100 of remote monitoring server 200 and at least one.Intelligent entrance guard 100 is included for for remote monitoring server 200 cameras that monitored picture is provided, for scanning the scan module of identity card, for obtaining the nine grids of user fingerprints, with And for decrypting and verifying the authentication module of password.Remote monitoring server 200 includes display and the clothes for data storage Business device.
Specifically, intelligent entrance guard 100, for the registration request of receive user, include proof of identification in the registration request Information;Registration request is sent to remote monitoring server 200;
The device of the remote monitoring service 200, for according to owner's information of pre-stored to the proof of identification in registration request Information is verified;
The intelligent entrance guard 100 is additionally operable to receive the message that is verified of the return of remote monitoring server 200, scanning user Identity card as intelligent entrance guard the first log-in password;After having collected the first log-in password, the intelligent entrance guard is by touching Control screen shows the nine grids of subsidiary Digital ID, points out user to select at least two grid to be input into different fingerprints, and user is selected The Digital ID of the grid selected and the user fingerprints collected on the grid carry out the encryption of predetermined encryption algorithm, generate Second log-in password;When user needs opening gate, the identity card of the scanning user of the intelligent entrance guard 100 is close to the first registration Code is verified;After first log-in password is verified, the intelligent entrance guard prompting user input second is registered close Code, the second log-in password of receiving user's input is solved according to default decipherment algorithm corresponding with the predetermined encryption algorithm It is close and verify;After second log-in password is verified, it is allowed to which user enters.
Alternatively, the grid random alignment in the nine grids.
The predetermined encryption algorithm and the default decipherment algorithm are unsymmetrical key, and the predetermined encryption algorithm and institute State default decipherment algorithm association and simultaneously dynamic change.
Alternatively, the intelligent entrance guard 100 is additionally operable to:
First log-in password and second log-in password are sent to the remote monitoring server 200 and preserved;
The remote monitoring server 200 is additionally operable to:
When the intelligent entrance guard 100 is changed, the remote monitoring server 200 sends the code data for preserving Intelligent entrance guard to after changing.
Alternatively, if user forgets second log-in password, the intelligent entrance guard 100 is additionally operable to user input After first log-in password is proved to be successful, the call request of receive user;The call request is sent to the remote monitoring Server 200, or the call request is sent in the way of short message or phone to the mobile phone of the keeper;
After the keeper confirms user identity by monitored picture, the remote monitoring server 200 is additionally operable to The remote control open command of the keeper is received, the intelligent entrance guard is opened.
Wherein, the intelligent entrance guard predeterminable area includes being mounted with the touching display screen or intelligent entrance guard on intelligent entrance guard The region of pressure sensor.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation is all difference with other embodiments, between each embodiment identical similar part mutually referring to. For device embodiment, due to itself and embodiment of the method basic simlarity, so description is fairly simple, related part referring to The part explanation of embodiment of the method.
By the description of above-described embodiment, the present invention has advantages below:
By the way that intelligent entrance guard and remote monitoring server connected and composed into intelligent access control system, user by intelligent entrance guard and Remote monitoring server is registered after owner's identity is proved, it is ensured that the correctness of user identity;Then scan identity card to make For the first log-in password and use encryption after double fingerprints as the second log-in password;User can pass through the side of checking password Formula opening gate, due to adding the second log-in password, therefore relative to the mode of single password, security is higher, and second The input mode of log-in password is double fingerprints, and crypticity and interest are relatively strong, and user input extremely facilitates, beneficial to lifting user's body Test, and the information after the unencryption for sending, one layer of security protection can be further added by the basis of fingerprint security itself, The risk that information is intercepted leakage can be substantially reduced, the security of system is improved.
One of ordinary skill in the art will appreciate that realizing all or part of flow process in above-described embodiment method, can be Related hardware is instructed to complete by computer program, described program can be stored in a computer read/write memory medium In, the program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, abbreviation ROM) or random access memory (Random Access Memory, abbreviation RAM) etc..
Above disclosed is only present pre-ferred embodiments, can not limit the right model of the present invention with this certainly Enclose, therefore the equivalent variations made according to the claims in the present invention, still belong to the scope that the present invention is covered.

Claims (10)

1. a kind of method that identity-based results is demonstrate,proved, it is characterised in that include:
The registration request of intelligent entrance guard receive user, includes proof of identification information in the registration request;
The intelligent entrance guard sends registration request to remote monitoring server;
Remote monitoring server is verified according to owner's information of pre-stored to the proof of identification information in registration request;
Intelligent entrance guard receives the message that is verified of remote monitoring server return, and the identity card of scanning user is used as intelligent entrance guard The first log-in password;
After having collected the first log-in password, the intelligent entrance guard shows the nine grids of subsidiary Digital ID by touch screen, carries Show that user selects at least two grid to be input into different fingerprints, the Digital ID of the grid that user is selected and adopt on the grid The user fingerprints for collecting carry out the encryption of predetermined encryption algorithm, generate the second log-in password;
When user needs opening gate, the identity card of the intelligent entrance guard scanning user is verified to the first log-in password;
After first log-in password is verified, the intelligent entrance guard points out the log-in password of user input second, receives Second log-in password of user input, is decrypted and tests according to default decipherment algorithm corresponding with the predetermined encryption algorithm Card;
After second log-in password is verified, it is allowed to which user enters.
2. the method for claim 1, it is characterised in that the grid random alignment in the nine grids.
3. the method for claim 1, it is characterised in that also include:
The intelligent entrance guard sends first log-in password and second log-in password to the remote monitoring server Preserve;
When the intelligent entrance guard is changed, the remote monitoring server sends the code data of preservation to replacing Intelligent entrance guard.
4. the method for claim 1, it is characterised in that if user forgets second log-in password, the intelligence After gate inhibition is proved to be successful to the first log-in password of user input, the call request of receive user;
The call request is sent to the remote monitoring server, or by the call request with short message or phone Mode is sent to the mobile phone of keeper;
After keeper confirms user identity by monitored picture, remote monitoring server receives the remote control of the keeper and opens Instruction is opened, the intelligent entrance guard is opened.
5. the method as described in any one of claim 1-4, it is characterised in that the predetermined encryption algorithm and the default decryption Algorithm is unsymmetrical key, and the predetermined encryption algorithm associates simultaneously dynamic change simultaneously with the default decipherment algorithm.
6. a kind of system, it is characterised in that include:
Intelligent entrance guard, for the registration request of receive user, includes proof of identification information in the registration request;By registration request Send to remote monitoring server;
The remote monitoring server, for being carried out to the proof of identification information in registration request according to owner's information of pre-stored Checking;
The intelligent entrance guard is additionally operable to receive the identity card work for being verified message, scanning user that remote monitoring server is returned For the first log-in password of intelligent entrance guard;After having collected the first log-in password, the intelligent entrance guard shows attached by touch screen Nine grids with Digital ID, point out user to select at least two grid to be input into different fingerprints, the grid selected user Digital ID and the user fingerprints collected on the grid carry out the encryption of predetermined encryption algorithm, generate the second registration close Code;When user needs opening gate, the identity card of the intelligent entrance guard scanning user is verified to the first log-in password;When After first log-in password is verified, the intelligent entrance guard points out the log-in password of user input second, and receive user is defeated The second log-in password for entering, is decrypted and verifies according to default decipherment algorithm corresponding with the predetermined encryption algorithm;Work as institute State after the second log-in password is verified, it is allowed to which user enters.
7. system as claimed in claim 6, it is characterised in that the grid random alignment in the nine grids.
8. system as claimed in claim 6, it is characterised in that the intelligent entrance guard is additionally operable to:
First log-in password and second log-in password are sent to the remote monitoring server and is preserved;
The remote monitoring server is additionally operable to:
When the intelligent entrance guard is changed, the remote monitoring server sends the code data of preservation to replacing Intelligent entrance guard.
9. system as claimed in claim 6, it is characterised in that if user forgets second log-in password, the intelligence After gate inhibition is additionally operable to be proved to be successful the first log-in password of user input, the call request of receive user;By the calling Request is sent to the remote monitoring server, or the call request is sent to described in the way of short message or phone The mobile phone of keeper;
After the keeper confirms user identity by monitored picture, the remote monitoring server is additionally operable to receive described The remote control open command of keeper, opens the intelligent entrance guard.
10. the system as described in any one of claim 6-9, it is characterised in that the predetermined encryption algorithm and the default solution Close algorithm is unsymmetrical key, and the predetermined encryption algorithm associates simultaneously dynamic change simultaneously with the default decipherment algorithm.
CN201611088816.XA 2016-11-29 2016-11-29 Verification method and system based on identification card Pending CN106600767A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611088816.XA CN106600767A (en) 2016-11-29 2016-11-29 Verification method and system based on identification card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611088816.XA CN106600767A (en) 2016-11-29 2016-11-29 Verification method and system based on identification card

Publications (1)

Publication Number Publication Date
CN106600767A true CN106600767A (en) 2017-04-26

Family

ID=58594763

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611088816.XA Pending CN106600767A (en) 2016-11-29 2016-11-29 Verification method and system based on identification card

Country Status (1)

Country Link
CN (1) CN106600767A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107516363A (en) * 2017-08-24 2017-12-26 上海与德科技有限公司 Management method, device, mobile terminal and the storage medium of intelligent residential district
CN108416884A (en) * 2018-04-26 2018-08-17 郑州近距离电子产品有限公司 A kind of intelligent door lock that security performance is high
CN108777015A (en) * 2018-05-25 2018-11-09 国网湖北省电力有限公司荆州供电公司 A kind of access control system based on dynamic password
CN112291281A (en) * 2019-07-09 2021-01-29 钉钉控股(开曼)有限公司 Voice broadcast and voice broadcast content setting method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1173506A (en) * 1997-08-28 1999-03-16 Nec Corp Method and device for identification by fingerprint matching
CN101414905A (en) * 2007-10-17 2009-04-22 谢丹 Various selectivity cipher safety authentication system and method
CN105069343A (en) * 2015-08-26 2015-11-18 宇龙计算机通信科技(深圳)有限公司 Fingerprint verification method, fingerprint verification apparatus and terminal
CN105117629A (en) * 2015-08-21 2015-12-02 京东方科技集团股份有限公司 Electronic device control method and apparatus, and electronic device
CN105117630A (en) * 2015-08-21 2015-12-02 宇龙计算机通信科技(深圳)有限公司 Fingerprint authentication method, fingerprint authentication apparatus, and terminal
CN105847303A (en) * 2016-06-12 2016-08-10 深圳益强信息科技有限公司 Verification method and system of intelligent access control unit
CN105915544A (en) * 2016-06-12 2016-08-31 深圳益强信息科技有限公司 Intelligent entrance guard management method and intelligent entrance guard system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1173506A (en) * 1997-08-28 1999-03-16 Nec Corp Method and device for identification by fingerprint matching
CN101414905A (en) * 2007-10-17 2009-04-22 谢丹 Various selectivity cipher safety authentication system and method
CN105117629A (en) * 2015-08-21 2015-12-02 京东方科技集团股份有限公司 Electronic device control method and apparatus, and electronic device
CN105117630A (en) * 2015-08-21 2015-12-02 宇龙计算机通信科技(深圳)有限公司 Fingerprint authentication method, fingerprint authentication apparatus, and terminal
CN105069343A (en) * 2015-08-26 2015-11-18 宇龙计算机通信科技(深圳)有限公司 Fingerprint verification method, fingerprint verification apparatus and terminal
CN105847303A (en) * 2016-06-12 2016-08-10 深圳益强信息科技有限公司 Verification method and system of intelligent access control unit
CN105915544A (en) * 2016-06-12 2016-08-31 深圳益强信息科技有限公司 Intelligent entrance guard management method and intelligent entrance guard system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107516363A (en) * 2017-08-24 2017-12-26 上海与德科技有限公司 Management method, device, mobile terminal and the storage medium of intelligent residential district
CN108416884A (en) * 2018-04-26 2018-08-17 郑州近距离电子产品有限公司 A kind of intelligent door lock that security performance is high
CN108777015A (en) * 2018-05-25 2018-11-09 国网湖北省电力有限公司荆州供电公司 A kind of access control system based on dynamic password
CN112291281A (en) * 2019-07-09 2021-01-29 钉钉控股(开曼)有限公司 Voice broadcast and voice broadcast content setting method and device
CN112291281B (en) * 2019-07-09 2023-11-03 钉钉控股(开曼)有限公司 Voice broadcasting and voice broadcasting content setting method and device

Similar Documents

Publication Publication Date Title
CN108270571B (en) Internet of Things identity authorization system and its method based on block chain
CN104732626B (en) Gate inhibition's authorization management method and system
CN108055235A (en) A kind of control method of smart lock, relevant device and system
CN101452514B (en) User data protection method for safety computer
EP2028829B1 (en) Message processing apparatus, wireless device and method of storing a message in a wireless device
CN103327002A (en) Cloud storage access control system based on attribute
CN106600767A (en) Verification method and system based on identification card
KR20100018095A (en) Method and system for managing data on a network
CN100353787C (en) Security guarantee for memory data information of mobile terminal
CN108900296B (en) Secret key storage method based on biological feature identification
CN104468937A (en) Data encryption and decryption methods and devices for mobile terminal and protection system
CN106815905A (en) A kind of method and system based on mobile terminal checking
CN107046556A (en) A kind of method and system of checking
CN106033625A (en) Lockset, mobile terminal, lockset control method, and lockset control system
CN106815906A (en) A kind of intelligent entrance guard management method and system based on optic communication
Yin et al. Protecting private data by honey encryption
CN108010166A (en) Electronic door lock system
CN101262669B (en) A secure guarantee method for information stored in a mobile terminal
CN106815907A (en) A kind of method and intelligent access control system based on picture password management intelligent entrance guard
CN107046524A (en) It is a kind of based on ultrasonic wave use intelligent entrance guard method and system
CN110738764A (en) Security control system and method based on intelligent lock
CN106789085A (en) Computer booting management system and method based on mobile phone cipher
CN106855924A (en) Embedded intelligent chip equipment and background application system
US20040165729A1 (en) System and method for securing information, including a system and method for setting up a correspondent pairing
CN106713278A (en) Alarm method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170426