CN106600767A - Verification method and system based on identification card - Google Patents
Verification method and system based on identification card Download PDFInfo
- Publication number
- CN106600767A CN106600767A CN201611088816.XA CN201611088816A CN106600767A CN 106600767 A CN106600767 A CN 106600767A CN 201611088816 A CN201611088816 A CN 201611088816A CN 106600767 A CN106600767 A CN 106600767A
- Authority
- CN
- China
- Prior art keywords
- password
- user
- log
- entrance guard
- intelligent entrance
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/33—Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
Abstract
The embodiment of the invention discloses a verification method and system based on an identification card. The method comprises the steps that an intelligent access control receives a registration request of a user and sends the registration request to a remote monitoring server for verification; the intelligent access control receives a verification passing message returned by the remote monitoring server, and the identification card of the user is scanned to serve as a first registration password of the intelligent access control; after the first registration password is collected, the user is prompted to input a second registration password, wherein the second registration password is an encrypted double-fingerprint password; when the user needs to open the access control, the intelligent access control scans the identification card of the user to verify the first registration password; after the first registration password is verified to be valid, the intelligent access control prompts the user to input the second registration password, receives the second registration password input by the user and decrypts and verifies the second registration password; after the second registration password is verified to be valid, the user is allowed to enter the intelligent access control. By adopting the verification method and system, safety and convenience of the intelligent access control can be improved.
Description
Technical field
The present invention relates to intelligent entrance guard technical field, more particularly to a kind of method and system of identity-based results card.
Background technology
In recent years, intelligent Community quickly grows, and many newly-built cells are provided with safety-protection system, with digital display circuit it is hard
The reduction of part cost, increasing cell has been used based on the safety-protection system of data signal, and starts popularization.Unit gate inhibition
And cell gate inhibition is safety-protection system most basic in intelligent Community, for the producer for moving in, property can typically provide access card use
Come cell unlocking gate inhibition or unit gate inhibition, be different per an authority for card, generally the access card of producer only allows solution
Lock place cell and unit gate inhibition, and open the door foundation be exactly user hold access card card number it is whether legal.
But the extra cost of gate inhibition's calorie requirement, and user easily leaves behind.Exist in prior art and use user's body
The intelligent entrance guard that part card is verified, but single ID card verification security is not high, it is non-if user identity card is lost
Chang Rongyi is utilized by undesirable, and to the even personal safety of owner's property detrimental effect is brought.Accordingly, it would be desirable to a kind of safety is again
The method of convenient opening gate.
The content of the invention
Embodiment of the present invention technical problem to be solved is, there is provided a kind of method of identity-based results card and be
System.It is not enough to solve the problems, such as existing entrance guard management and convenience.
In order to solve above-mentioned technical problem, embodiment of the present invention first aspect provides a kind of side of identity-based results card
Method, including:
The registration request of intelligent entrance guard receive user, includes proof of identification information in the registration request;
The intelligent entrance guard sends registration request to remote monitoring server;
Remote monitoring server is verified according to owner's information of pre-stored to the proof of identification information in registration request;
Intelligent entrance guard receives the message that is verified of remote monitoring server return, and the identity card of scanning user is used as intelligence
First log-in password of gate inhibition;
After having collected the first log-in password, the intelligent entrance guard shows nine palaces of subsidiary Digital ID by touch screen
Lattice, point out user to select at least two grid to be input into different fingerprints, the Digital ID of the grid selected user and in the lattice
The user fingerprints collected on son carry out the encryption of predetermined encryption algorithm, generate the second log-in password;
When user needs opening gate, the identity card of the intelligent entrance guard scanning user is tested the first log-in password
Card;
After first log-in password is verified, the intelligent entrance guard points out the log-in password of user input second,
Second log-in password of receiving user's input, is decrypted simultaneously according to default decipherment algorithm corresponding with the predetermined encryption algorithm
Checking;
After second log-in password is verified, it is allowed to which user enters.
Embodiment of the present invention second aspect provides a kind of system, including:
Intelligent entrance guard, for the registration request of receive user, includes proof of identification information in the registration request;Will registration
Request is sent to remote monitoring server;
The remote monitoring server, for according to owner's information of pre-stored to the proof of identification information in registration request
Verified;
The intelligent entrance guard is additionally operable to receive the identity for being verified message, scanning user that remote monitoring server is returned
Demonstrate,prove the first log-in password as intelligent entrance guard;After having collected the first log-in password, the intelligent entrance guard passes through touch-control screen display
Show the nine grids of subsidiary Digital ID, point out user to select at least two grid to be input into different fingerprints, the lattice selected user
The Digital ID of son and the user fingerprints collected on the grid carry out the encryption of predetermined encryption algorithm, generate the second note
Volume password;When user needs opening gate, the identity card of the intelligent entrance guard scanning user is tested the first log-in password
Card;After first log-in password is verified, the intelligent entrance guard points out the log-in password of user input second, receives and uses
Second log-in password of family input, is decrypted and verifies according to default decipherment algorithm corresponding with the predetermined encryption algorithm;
After second log-in password is verified, it is allowed to which user enters.
Implement the embodiment of the present invention, have the advantages that:
By the way that intelligent entrance guard and remote monitoring server connected and composed into intelligent access control system, user by intelligent entrance guard and
Remote monitoring server is registered after owner's identity is proved, it is ensured that the correctness of user identity;Then scan identity card to make
For the first log-in password and use encryption after double fingerprints as the second log-in password;User can pass through the side of checking password
Formula opening gate, due to adding the second log-in password, therefore relative to the mode of single password, security is higher, and second
The input mode of log-in password is double fingerprints, and crypticity and interest are relatively strong, and user input extremely facilitates, beneficial to lifting user's body
Test, and send for the information after encryption, one layer of security protection can be further added by the basis of fingerprint security itself,
The risk that information is intercepted leakage can be substantially reduced, the security of system is improved.
Description of the drawings
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to institute in embodiment
The accompanying drawing that needs are used is briefly described, it should be apparent that, drawings in the following description are only some enforcements of the present invention
Example, for those of ordinary skill in the art, on the premise of not paying creative work, can be being obtained according to these accompanying drawings
Obtain other accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of the method for identity-based results card of the embodiment of the present invention;
Fig. 2 is a kind of composition schematic diagram of system of the embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than the embodiment of whole.It is based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made
Embodiment, belongs to the scope of protection of the invention.
Fig. 1 is refer to, is a kind of schematic flow sheet of the method for identity-based results card of the embodiment of the present invention, in this enforcement
In example, the method comprising the steps of:
S101, the registration request of intelligent entrance guard receive user includes proof of identification information in the registration request.
Alternatively, subscriber identity information includes user biological characteristic information, ID card information, photo, phone number, individual
Setting code, room number, House Property card numbering, at least one of, in order to ensure the correctness of user identity, can be with various
Information is used in combination, so as to the information for neighbours living of input system.
S102, the intelligent entrance guard sends registration request to remote monitoring server.
S103, remote monitoring server is carried out according to owner's information of pre-stored to the proof of identification information in registration request
Checking.
S104, intelligent entrance guard receives the identity card work for being verified message, scanning user that remote monitoring server is returned
For the first log-in password of intelligent entrance guard.
S105, after having collected the first log-in password, the intelligent entrance guard shows subsidiary Digital ID by touch screen
Nine grids, point out user to select at least two grid to be input into different fingerprints, the Digital ID of the grid that user is selected and
The user fingerprints collected on the grid carry out the encryption of predetermined encryption algorithm, generate the second log-in password.
Alternatively, the grid random alignment in the nine grids.So can avoid checking that user uses by illegal molecule
Which finger fingerprint, cannot also determine the Digital ID of grid.
Due to needing to be input at least two different fingerprints, therefore security is higher than the security of conventional single fingerprint.
And the grid in the nine grids can be with random alignment.The position of so each user input all changes, and is difficult by other
Invalid user stealing.For example, user have selected the 1 lattice input right hand index fingerprint in nine grids, and in 6 lattice right hand middle finger is input into
Fingerprint, then user can simultaneously with right hand forefinger 1 lattice of percussion when password is verified, right hand middle finger taps 6 lattice, it is of course also possible to first
1 lattice are tapped with right hand forefinger, then the position for tapping 6 lattice, 1 lattice and 6 lattice with right hand middle finger may change every time, and in unblock
When be input into fingerprint order can be the same or different, the embodiment of the present invention is not limited in any way.
Single identity card cipher safety is relatively low, and existing intelligent entrance guard is demonstrate,proved using above-mentioned single password in user identity
During loss, the property safety of normal resident family is difficult to preferably be protected, therefore, in the present embodiment, introduce the second registration close
Code is to improve the security of password.And second log-in password be in nine grids be input into double fingerprints in addition many finger-print ciphers,
For example, user can respectively press 1 key and 6 keys in nine grids to be input into the second log-in password simultaneously with forefinger and middle finger.Will
Double fingerprints of pressing nine grids increased the interest of password authentification as the second log-in password;And the fingerprint letter for sending
Breath is the information being encrypted according to predetermined encryption algorithm, therefore is further pacified on the basis of finger print safety
Full guard.Although being provided with two passwords, user input is very convenient simple, and intelligence only need to be pressed after brush identity card
Nine grids on gate inhibition, relatively single password had both improve the security of intelligent entrance guard, turn avoid Complicated Flow band
The trouble come, user experience is preferable.
S106, when user needs opening gate, the identity card of the intelligent entrance guard scanning user is to the first log-in password
Verified.
S107, after first log-in password is verified, the intelligent entrance guard prompting user input second is registered
Password, the second log-in password of receiving user's input is carried out according to default decipherment algorithm corresponding with the predetermined encryption algorithm
Decrypt and verify.
Alternatively, the predetermined encryption algorithm and the default decipherment algorithm are unsymmetrical key, and the predetermined encryption
Algorithm is associated and while dynamic change with the default decipherment algorithm.
Wherein, symmetric key encryption is also named secret/private key encryption (Secret Key Encryption, SKE), i.e.,
Sending and receiving the both sides of data must encrypt and decrypt computing using identical/symmetrical key to plaintext.It is asymmetric
Public key encryption (Public Key Encryption, PKE) is also in key encryption, refer to everyone have a pair it is uniquely right
The key answered:Public-key cryptography and private cipher key, public key external disclosure, private key is preserved by privacy;With wherein one key come
Encryption, just can only decrypt key with another.Send a side of data carries out adding with the public key of the opposing party to the information for sending
It is close, then it is decrypted with the private key of oneself by recipient.Public key encryption technology solves the issue and management of key and asks
Topic, is the core of current commercial code.Using public key technique, the both sides for entering row data communication can safely confirm other side
Identity and public-key cryptography, there is provided the identifiability of communication.
Alternatively, the AES is corresponding with decipherment algorithm and while dynamic change.For example, many set correspondences can be consulted
Enciphering and deciphering algorithm, followed by when using every time agreement use it is wherein a set of, mobile terminal can by transmission algorithm identify letter
Cease to inform intelligent entrance guard.So the enciphering and deciphering algorithm of dynamic change can further lift system security.
Finger print information after by sending encryption can provide Double-protection, ground floor as the first log-in password for system
The decryption protection being made up of AES, the second layer is that the complicated calculations being made up of the uniqueness and complexity of finger print information are prevented
Shield so that illegally molecule cannot be cracked or simulating mobile terminal is sent to the signal of intelligent entrance guard, it is ensured that the safety of system.
It should be noted that in the present embodiment, the first log-in password can point out the note of user input second after being verified
Volume password, for non-neighbours living, it may be difficult to expect that the mode for being input into the second log-in password is pressing nine grids, therefore,
Security and disguise are higher.In addition, the first log-in password that user input second can not also be pointed out to register after being verified is close
Code, only points out the log-in password of user first to be verified, and the second log-in password is input in the Preset Time by user after passing through,
Such that it is able to the disguise for further lifting the second log-in password.
S108, after second log-in password is verified, it is allowed to which user enters.
In the present embodiment, by the way that intelligent entrance guard and remote monitoring server are connected and composed into intelligent access control system, user
Registered after owner's identity is proved by intelligent entrance guard and remote monitoring server, it is ensured that the correctness of user identity;So
Identity card is scanned afterwards as the first log-in password and uses the double fingerprints after encryption as the second log-in password;User can lead to
The mode opening gate of checking password is crossed, due to adding the second log-in password, therefore relative to the mode of single password, safety
Property it is higher, and the input mode of the second log-in password is double fingerprints, crypticity and interesting relatively strong, and user input extremely facilitates,
Beneficial to the information lifted after Consumer's Experience, and the unencryption for sending, can again increase on the basis of fingerprint security itself
Plus one layer of security protection, the information that can substantially reduce is intercepted the risk of leakage, improves the security of system.
In view of the second log-in password is pressing nine grids, in order to prevent illegal user from malicious from attempting, 3 inputs can be set
After failure, temporarily refusal processes the request (can determine user identity by user fingerprints) of the user.If the user is little really
Resident family of area, it can confirm remote opening door after identity by contacting the keeper at remote monitoring server end by monitored picture
Prohibit.
Alternatively, in addition to intelligent entrance guard locally preserves the first log-in password and the second log-in password is verified, also
Can be verified by remote monitoring server.Although remote monitoring server carries out verifying that possible efficiency can be slightly slow,
Security can be further lifted, especially when intelligent entrance guard breaks down and cannot verify, is carried out by remote monitoring server
Checking, can further lift system work stability.
When being verified using remote monitoring server, the first log-in password and second can be registered by intelligent entrance guard
Password is sent directly to remote monitoring server and is preserved.
Alternatively, when intelligent entrance guard is damaged or needs to carry out system update, needs to change intelligent entrance guard, the intelligent door
Prohibit first log-in password and second log-in password to be sent to the remote monitoring server and preserve;
When the intelligent entrance guard is changed, the remote monitoring server sends the code data of preservation to replacing
Intelligent entrance guard afterwards.
So that it is guaranteed that change before and after user data integrality and security.
Because present cell the elderly is more and more, the first log-in password can be identity card, forget without having to worry about user,
But the second log-in password it is easy to forget that.Now can be using following flow process come opening gate.
If user forgets second log-in password, the intelligent entrance guard is verified to the first log-in password of user input
After success, the call request of receive user;
The call request is sent to the remote monitoring server, or by the call request with short message or electricity
The mode of words is sent to the mobile phone of the keeper;
After the keeper confirms user identity by monitored picture, remote monitoring server receives the keeper
Remote control open command, open the intelligent entrance guard.
Fig. 2 is refer to, is a kind of composition schematic diagram of system of the embodiment of the present invention, in the present embodiment, the system bag
Include:The intelligent entrance guard 100 of remote monitoring server 200 and at least one.Intelligent entrance guard 100 is included for for remote monitoring server
200 cameras that monitored picture is provided, for scanning the scan module of identity card, for obtaining the nine grids of user fingerprints, with
And for decrypting and verifying the authentication module of password.Remote monitoring server 200 includes display and the clothes for data storage
Business device.
Specifically, intelligent entrance guard 100, for the registration request of receive user, include proof of identification in the registration request
Information;Registration request is sent to remote monitoring server 200;
The device of the remote monitoring service 200, for according to owner's information of pre-stored to the proof of identification in registration request
Information is verified;
The intelligent entrance guard 100 is additionally operable to receive the message that is verified of the return of remote monitoring server 200, scanning user
Identity card as intelligent entrance guard the first log-in password;After having collected the first log-in password, the intelligent entrance guard is by touching
Control screen shows the nine grids of subsidiary Digital ID, points out user to select at least two grid to be input into different fingerprints, and user is selected
The Digital ID of the grid selected and the user fingerprints collected on the grid carry out the encryption of predetermined encryption algorithm, generate
Second log-in password;When user needs opening gate, the identity card of the scanning user of the intelligent entrance guard 100 is close to the first registration
Code is verified;After first log-in password is verified, the intelligent entrance guard prompting user input second is registered close
Code, the second log-in password of receiving user's input is solved according to default decipherment algorithm corresponding with the predetermined encryption algorithm
It is close and verify;After second log-in password is verified, it is allowed to which user enters.
Alternatively, the grid random alignment in the nine grids.
The predetermined encryption algorithm and the default decipherment algorithm are unsymmetrical key, and the predetermined encryption algorithm and institute
State default decipherment algorithm association and simultaneously dynamic change.
Alternatively, the intelligent entrance guard 100 is additionally operable to:
First log-in password and second log-in password are sent to the remote monitoring server 200 and preserved;
The remote monitoring server 200 is additionally operable to:
When the intelligent entrance guard 100 is changed, the remote monitoring server 200 sends the code data for preserving
Intelligent entrance guard to after changing.
Alternatively, if user forgets second log-in password, the intelligent entrance guard 100 is additionally operable to user input
After first log-in password is proved to be successful, the call request of receive user;The call request is sent to the remote monitoring
Server 200, or the call request is sent in the way of short message or phone to the mobile phone of the keeper;
After the keeper confirms user identity by monitored picture, the remote monitoring server 200 is additionally operable to
The remote control open command of the keeper is received, the intelligent entrance guard is opened.
Wherein, the intelligent entrance guard predeterminable area includes being mounted with the touching display screen or intelligent entrance guard on intelligent entrance guard
The region of pressure sensor.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight
Point explanation is all difference with other embodiments, between each embodiment identical similar part mutually referring to.
For device embodiment, due to itself and embodiment of the method basic simlarity, so description is fairly simple, related part referring to
The part explanation of embodiment of the method.
By the description of above-described embodiment, the present invention has advantages below:
By the way that intelligent entrance guard and remote monitoring server connected and composed into intelligent access control system, user by intelligent entrance guard and
Remote monitoring server is registered after owner's identity is proved, it is ensured that the correctness of user identity;Then scan identity card to make
For the first log-in password and use encryption after double fingerprints as the second log-in password;User can pass through the side of checking password
Formula opening gate, due to adding the second log-in password, therefore relative to the mode of single password, security is higher, and second
The input mode of log-in password is double fingerprints, and crypticity and interest are relatively strong, and user input extremely facilitates, beneficial to lifting user's body
Test, and the information after the unencryption for sending, one layer of security protection can be further added by the basis of fingerprint security itself,
The risk that information is intercepted leakage can be substantially reduced, the security of system is improved.
One of ordinary skill in the art will appreciate that realizing all or part of flow process in above-described embodiment method, can be
Related hardware is instructed to complete by computer program, described program can be stored in a computer read/write memory medium
In, the program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic
Dish, CD, read-only memory (Read-Only Memory, abbreviation ROM) or random access memory (Random
Access Memory, abbreviation RAM) etc..
Above disclosed is only present pre-ferred embodiments, can not limit the right model of the present invention with this certainly
Enclose, therefore the equivalent variations made according to the claims in the present invention, still belong to the scope that the present invention is covered.
Claims (10)
1. a kind of method that identity-based results is demonstrate,proved, it is characterised in that include:
The registration request of intelligent entrance guard receive user, includes proof of identification information in the registration request;
The intelligent entrance guard sends registration request to remote monitoring server;
Remote monitoring server is verified according to owner's information of pre-stored to the proof of identification information in registration request;
Intelligent entrance guard receives the message that is verified of remote monitoring server return, and the identity card of scanning user is used as intelligent entrance guard
The first log-in password;
After having collected the first log-in password, the intelligent entrance guard shows the nine grids of subsidiary Digital ID by touch screen, carries
Show that user selects at least two grid to be input into different fingerprints, the Digital ID of the grid that user is selected and adopt on the grid
The user fingerprints for collecting carry out the encryption of predetermined encryption algorithm, generate the second log-in password;
When user needs opening gate, the identity card of the intelligent entrance guard scanning user is verified to the first log-in password;
After first log-in password is verified, the intelligent entrance guard points out the log-in password of user input second, receives
Second log-in password of user input, is decrypted and tests according to default decipherment algorithm corresponding with the predetermined encryption algorithm
Card;
After second log-in password is verified, it is allowed to which user enters.
2. the method for claim 1, it is characterised in that the grid random alignment in the nine grids.
3. the method for claim 1, it is characterised in that also include:
The intelligent entrance guard sends first log-in password and second log-in password to the remote monitoring server
Preserve;
When the intelligent entrance guard is changed, the remote monitoring server sends the code data of preservation to replacing
Intelligent entrance guard.
4. the method for claim 1, it is characterised in that if user forgets second log-in password, the intelligence
After gate inhibition is proved to be successful to the first log-in password of user input, the call request of receive user;
The call request is sent to the remote monitoring server, or by the call request with short message or phone
Mode is sent to the mobile phone of keeper;
After keeper confirms user identity by monitored picture, remote monitoring server receives the remote control of the keeper and opens
Instruction is opened, the intelligent entrance guard is opened.
5. the method as described in any one of claim 1-4, it is characterised in that the predetermined encryption algorithm and the default decryption
Algorithm is unsymmetrical key, and the predetermined encryption algorithm associates simultaneously dynamic change simultaneously with the default decipherment algorithm.
6. a kind of system, it is characterised in that include:
Intelligent entrance guard, for the registration request of receive user, includes proof of identification information in the registration request;By registration request
Send to remote monitoring server;
The remote monitoring server, for being carried out to the proof of identification information in registration request according to owner's information of pre-stored
Checking;
The intelligent entrance guard is additionally operable to receive the identity card work for being verified message, scanning user that remote monitoring server is returned
For the first log-in password of intelligent entrance guard;After having collected the first log-in password, the intelligent entrance guard shows attached by touch screen
Nine grids with Digital ID, point out user to select at least two grid to be input into different fingerprints, the grid selected user
Digital ID and the user fingerprints collected on the grid carry out the encryption of predetermined encryption algorithm, generate the second registration close
Code;When user needs opening gate, the identity card of the intelligent entrance guard scanning user is verified to the first log-in password;When
After first log-in password is verified, the intelligent entrance guard points out the log-in password of user input second, and receive user is defeated
The second log-in password for entering, is decrypted and verifies according to default decipherment algorithm corresponding with the predetermined encryption algorithm;Work as institute
State after the second log-in password is verified, it is allowed to which user enters.
7. system as claimed in claim 6, it is characterised in that the grid random alignment in the nine grids.
8. system as claimed in claim 6, it is characterised in that the intelligent entrance guard is additionally operable to:
First log-in password and second log-in password are sent to the remote monitoring server and is preserved;
The remote monitoring server is additionally operable to:
When the intelligent entrance guard is changed, the remote monitoring server sends the code data of preservation to replacing
Intelligent entrance guard.
9. system as claimed in claim 6, it is characterised in that if user forgets second log-in password, the intelligence
After gate inhibition is additionally operable to be proved to be successful the first log-in password of user input, the call request of receive user;By the calling
Request is sent to the remote monitoring server, or the call request is sent to described in the way of short message or phone
The mobile phone of keeper;
After the keeper confirms user identity by monitored picture, the remote monitoring server is additionally operable to receive described
The remote control open command of keeper, opens the intelligent entrance guard.
10. the system as described in any one of claim 6-9, it is characterised in that the predetermined encryption algorithm and the default solution
Close algorithm is unsymmetrical key, and the predetermined encryption algorithm associates simultaneously dynamic change simultaneously with the default decipherment algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611088816.XA CN106600767A (en) | 2016-11-29 | 2016-11-29 | Verification method and system based on identification card |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611088816.XA CN106600767A (en) | 2016-11-29 | 2016-11-29 | Verification method and system based on identification card |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106600767A true CN106600767A (en) | 2017-04-26 |
Family
ID=58594763
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611088816.XA Pending CN106600767A (en) | 2016-11-29 | 2016-11-29 | Verification method and system based on identification card |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106600767A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107516363A (en) * | 2017-08-24 | 2017-12-26 | 上海与德科技有限公司 | Management method, device, mobile terminal and the storage medium of intelligent residential district |
CN108416884A (en) * | 2018-04-26 | 2018-08-17 | 郑州近距离电子产品有限公司 | A kind of intelligent door lock that security performance is high |
CN108777015A (en) * | 2018-05-25 | 2018-11-09 | 国网湖北省电力有限公司荆州供电公司 | A kind of access control system based on dynamic password |
CN112291281A (en) * | 2019-07-09 | 2021-01-29 | 钉钉控股(开曼)有限公司 | Voice broadcast and voice broadcast content setting method and device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH1173506A (en) * | 1997-08-28 | 1999-03-16 | Nec Corp | Method and device for identification by fingerprint matching |
CN101414905A (en) * | 2007-10-17 | 2009-04-22 | 谢丹 | Various selectivity cipher safety authentication system and method |
CN105069343A (en) * | 2015-08-26 | 2015-11-18 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint verification method, fingerprint verification apparatus and terminal |
CN105117629A (en) * | 2015-08-21 | 2015-12-02 | 京东方科技集团股份有限公司 | Electronic device control method and apparatus, and electronic device |
CN105117630A (en) * | 2015-08-21 | 2015-12-02 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint authentication method, fingerprint authentication apparatus, and terminal |
CN105847303A (en) * | 2016-06-12 | 2016-08-10 | 深圳益强信息科技有限公司 | Verification method and system of intelligent access control unit |
CN105915544A (en) * | 2016-06-12 | 2016-08-31 | 深圳益强信息科技有限公司 | Intelligent entrance guard management method and intelligent entrance guard system |
-
2016
- 2016-11-29 CN CN201611088816.XA patent/CN106600767A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH1173506A (en) * | 1997-08-28 | 1999-03-16 | Nec Corp | Method and device for identification by fingerprint matching |
CN101414905A (en) * | 2007-10-17 | 2009-04-22 | 谢丹 | Various selectivity cipher safety authentication system and method |
CN105117629A (en) * | 2015-08-21 | 2015-12-02 | 京东方科技集团股份有限公司 | Electronic device control method and apparatus, and electronic device |
CN105117630A (en) * | 2015-08-21 | 2015-12-02 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint authentication method, fingerprint authentication apparatus, and terminal |
CN105069343A (en) * | 2015-08-26 | 2015-11-18 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint verification method, fingerprint verification apparatus and terminal |
CN105847303A (en) * | 2016-06-12 | 2016-08-10 | 深圳益强信息科技有限公司 | Verification method and system of intelligent access control unit |
CN105915544A (en) * | 2016-06-12 | 2016-08-31 | 深圳益强信息科技有限公司 | Intelligent entrance guard management method and intelligent entrance guard system |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107516363A (en) * | 2017-08-24 | 2017-12-26 | 上海与德科技有限公司 | Management method, device, mobile terminal and the storage medium of intelligent residential district |
CN108416884A (en) * | 2018-04-26 | 2018-08-17 | 郑州近距离电子产品有限公司 | A kind of intelligent door lock that security performance is high |
CN108777015A (en) * | 2018-05-25 | 2018-11-09 | 国网湖北省电力有限公司荆州供电公司 | A kind of access control system based on dynamic password |
CN112291281A (en) * | 2019-07-09 | 2021-01-29 | 钉钉控股(开曼)有限公司 | Voice broadcast and voice broadcast content setting method and device |
CN112291281B (en) * | 2019-07-09 | 2023-11-03 | 钉钉控股(开曼)有限公司 | Voice broadcasting and voice broadcasting content setting method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108270571B (en) | Internet of Things identity authorization system and its method based on block chain | |
CN104732626B (en) | Gate inhibition's authorization management method and system | |
CN108055235A (en) | A kind of control method of smart lock, relevant device and system | |
CN101452514B (en) | User data protection method for safety computer | |
EP2028829B1 (en) | Message processing apparatus, wireless device and method of storing a message in a wireless device | |
CN103327002A (en) | Cloud storage access control system based on attribute | |
CN106600767A (en) | Verification method and system based on identification card | |
KR20100018095A (en) | Method and system for managing data on a network | |
CN100353787C (en) | Security guarantee for memory data information of mobile terminal | |
CN108900296B (en) | Secret key storage method based on biological feature identification | |
CN104468937A (en) | Data encryption and decryption methods and devices for mobile terminal and protection system | |
CN106815905A (en) | A kind of method and system based on mobile terminal checking | |
CN107046556A (en) | A kind of method and system of checking | |
CN106033625A (en) | Lockset, mobile terminal, lockset control method, and lockset control system | |
CN106815906A (en) | A kind of intelligent entrance guard management method and system based on optic communication | |
Yin et al. | Protecting private data by honey encryption | |
CN108010166A (en) | Electronic door lock system | |
CN101262669B (en) | A secure guarantee method for information stored in a mobile terminal | |
CN106815907A (en) | A kind of method and intelligent access control system based on picture password management intelligent entrance guard | |
CN107046524A (en) | It is a kind of based on ultrasonic wave use intelligent entrance guard method and system | |
CN110738764A (en) | Security control system and method based on intelligent lock | |
CN106789085A (en) | Computer booting management system and method based on mobile phone cipher | |
CN106855924A (en) | Embedded intelligent chip equipment and background application system | |
US20040165729A1 (en) | System and method for securing information, including a system and method for setting up a correspondent pairing | |
CN106713278A (en) | Alarm method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170426 |