CN106683239A - Mobile terminal response based method and system - Google Patents
Mobile terminal response based method and system Download PDFInfo
- Publication number
- CN106683239A CN106683239A CN201611076669.4A CN201611076669A CN106683239A CN 106683239 A CN106683239 A CN 106683239A CN 201611076669 A CN201611076669 A CN 201611076669A CN 106683239 A CN106683239 A CN 106683239A
- Authority
- CN
- China
- Prior art keywords
- password
- log
- user
- entrance guard
- mobile terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/33—Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
Abstract
The embodiment of the invention discloses a mobile terminal response based method and system. The method comprises the steps as follows: a remote monitoring server allocates an authorization code to a valid user; an intelligent entrance guard receives a registration request input by the user and transmits the registration request to the remote monitoring server for validation; the intelligent entrance guard is informed to receive the registration request after validation is passed; the user is prompted to input a first register password and a second register password through the mobile terminal; the first register password is an encrypted double-fingerprint password; the second register password is a digital password or a pressing password of the first time for pressing a first area of a touch screen of the mobile terminal and the second time for pressing a second area of the touch screen of the mobile terminal within preset time; the second register password comprises a user password and an alarm password; and when a user needs to open the entrance guard, the intelligent entrance guard receives the first register password and the second register password input by the user and sends an alarm when validating that the second register password is the alarm password. By adopting the mobile terminal response-based method and system, the security and the convenience of the intelligent entrance guard can be improved.
Description
Technical field
The present invention relates to intelligent entrance guard technical field, more particularly to a kind of method and system responded based on mobile terminal.
Background technology
In the development course of gate control system, password access system is most original, be also it is most simple, cost minimization,
But because its security performance is than relatively low, therefore the field of gate control system of fading out gradually.Afterwards, gate control system of swiping the card or card
Sensing gate control system becomes the main flow of current gate control system due to durable, cost performance is good, the advantage such as reading speed is fast.
But in recent years, due to developing rapidly for mobile terminal, its is intelligent can to bring great convenience for user, more and more
Intelligent entrance guard starts the unlatching that gate inhibition is carried out with mobile terminal cooperation.
The method that mobile terminal is verified is although advanced, but user may lose and be usurped by undesirable.Additionally, with
Family is likely to be threatened haves no alternative but be opened the door using the mobile terminal of oneself.With the continuous development of intelligent entrance guard, traditional
In gate control system, controller is carried out after authentication by receiving certain data, i.e. the action of controlling switch door.This gate inhibition
System is sent to the customizing messages that the data of controller are generally all the mobile terminals of user.But cannot judge that user uses shifting
Whether it is voluntary when dynamic terminal is verified or is coerced.And in bank, customs, prison or other confidential departments,
It is very high to the safety requirements of gate inhibition's keyholed back plate, if intelligent entrance guard can only open the door when there are abnormal conditions, then its
Security or far from being enough.
The content of the invention
Embodiment of the present invention technical problem to be solved is, there is provided a kind of method responded based on mobile terminal and be
System.It is inadequate to solve the problems, such as intelligent entrance guard security.
In order to solve above-mentioned technical problem, embodiment of the present invention first aspect is provided and a kind of responded based on mobile terminal
Method, including:
Remote monitoring server is that validated user distributes authorization code;
The registration request of intelligent entrance guard receiving user's input and sending to remote monitoring server verified, the registration
Authorization code information comprising user input in request;
Remote monitoring server is verified to authorization code, is verified and notify afterwards the intelligent entrance guard acceptance note
Volume request;
After registration request is received, the intelligent entrance guard points out the log-in password of user input first;
Mobile terminal shows the nine grids of subsidiary Digital ID by touch screen, points out user to select at least two grid defeated
Enter different fingerprints, the Digital ID of the grid selected user and the user fingerprints collected on the grid carry out default adding
The encryption of close algorithm, generates the first log-in password;
First log-in password is sent to the intelligent entrance guard by mobile terminal;
The intelligent entrance guard has been collected after the first log-in password, is kept wirelessly being connected with the mobile terminal and is pointed out to use
Family is input into the second log-in password, and second log-in password is for numerical ciphers or to press mobile terminal touch screen in Preset Time
The pressing code of the number of first area first time and pressing mobile terminal touch screen second number of second area, and second registration
Password is included for the user cipher of opening gate and for opening gate and the alarm cipher reported to the police;
When user needs opening gate, the first note that the intelligent entrance guard receive user is sent by the mobile terminal
Volume password, is decrypted and verifies according to default decipherment algorithm corresponding with the predetermined encryption algorithm;
After first log-in password is verified, the intelligent entrance guard points out the log-in password of user input second;
The mobile terminal senses the compression number of user, generates the second log-in password and sends to the intelligent entrance guard;
When second log-in password is verified as user cipher, opening gate, when second log-in password is verified as
During alarm cipher, opening gate is simultaneously reported to the police.
Embodiment of the present invention second aspect provides a kind of system, including:
Remote monitoring server, for distributing authorization code for validated user;
Intelligent entrance guard, the registration request for receiving user's input and sending to remote monitoring server verified, institute
State the authorization code information comprising user input in registration request;
The remote monitoring server is additionally operable to verify authorization code, is verified and notifies the intelligent entrance guard afterwards
Receive the registration request;
After registration request is received, the intelligent entrance guard is additionally operable to point out the log-in password of user input first;
Mobile terminal, for showing the nine grids of subsidiary Digital ID by touch screen, points out user to select at least two
Grid is input into different fingerprints, and the Digital ID of the grid selected user and the user fingerprints collected on the grid are carried out
The encryption of predetermined encryption algorithm, generates the first log-in password;And first log-in password is sent into the intelligence
Gate inhibition;
The intelligent entrance guard has been collected after the first log-in password, is kept wirelessly being connected with the mobile terminal and is pointed out to use
Family is input into the second log-in password, and second log-in password is for numerical ciphers or to press mobile terminal touch screen in Preset Time
The pressing code of the number of first area first time and pressing mobile terminal touch screen second number of second area, and second registration
Password is included for the user cipher of opening gate and for opening gate and the alarm cipher reported to the police;When user needs to open
During gate inhibition, the intelligent entrance guard is additionally operable to the first log-in password that receive user is sent by the mobile terminal, according to institute
State the corresponding default decipherment algorithm of predetermined encryption algorithm to be decrypted and verify;When first log-in password is verified it
Afterwards, the intelligent entrance guard points out the log-in password of user input second;
The mobile terminal is additionally operable to sense the compression number of user, generates the second log-in password and sends to the intelligent door
Prohibit;
The intelligent entrance guard is additionally operable to when second log-in password is verified as user cipher, opening gate, when described
When second log-in password is verified as alarm cipher, opening gate is simultaneously reported to the police.
Implement the embodiment of the present invention, have the advantages that:
By the way that intelligent entrance guard and remote monitoring server connected and composed into intelligent access control system, user by intelligent entrance guard and
Remote monitoring server is registered after user identity is confirmed, it is ensured that the correctness of user identity;Then typing first is registered
Password and the second log-in password;User can verify password by way of opening gate, because the first log-in password is double
Finger-print cipher, therefore security is higher, and used the double finger-print ciphers after encryption as the first log-in password, illegal molecule is more
Difficulty is cracked, and security is also higher;And due to adding the second log-in password, therefore relative to the mode of single password, security
It is higher, and the input mode of the second log-in password is numeral or mobile terminal touch screen zones of different pressed respectively different times
Number, crypticity is stronger if pressing, and the second log-in password includes user cipher and alarm cipher, is threatened beneficial to user
When, concealed warning fully improves the security of intelligent entrance guard.
Description of the drawings
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to institute in embodiment
The accompanying drawing that needs are used is briefly described, it should be apparent that, drawings in the following description are only some enforcements of the present invention
Example, for those of ordinary skill in the art, on the premise of not paying creative work, can be being obtained according to these accompanying drawings
Obtain other accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of the method responded based on mobile terminal of the embodiment of the present invention;
Fig. 2 is a kind of composition schematic diagram of system of the embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than the embodiment of whole.It is based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made
Embodiment, belongs to the scope of protection of the invention.
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than the embodiment of whole.It is based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made
Embodiment, belongs to the scope of protection of the invention.
Fig. 1 is refer to, is a kind of schematic flow sheet of the method responded based on mobile terminal of the embodiment of the present invention, in this reality
In applying example, the method comprising the steps of:
S101, remote monitoring server is that validated user distributes authorization code.
Remote monitoring server needs the identity for confirming user, it is ensured that authorization code is only assigned to validated user, and authorization code
After use, failure can not be reused.
S102, the registration request of intelligent entrance guard receiving user's input and sending to remote monitoring server verified, institute
State the authorization code information comprising user input in registration request.
S103, remote monitoring server is verified to authorization code, is verified and notify afterwards the intelligent entrance guard acceptance
The registration request.
S104, after registration request is received, the intelligent entrance guard points out the log-in password of user input first.
S105, mobile terminal shows the nine grids of subsidiary Digital ID by touch screen, points out user to select at least two
Grid is input into different fingerprints, and the Digital ID of the grid selected user and the user fingerprints collected on the grid are carried out
The encryption of predetermined encryption algorithm, generates the first log-in password.
Alternatively, the grid random alignment in the nine grids.So can avoid checking that user uses by illegal molecule
Which finger fingerprint, cannot also determine the Digital ID of grid.
Due to needing to be input at least two different fingerprints, therefore security is higher than the security of conventional single fingerprint.
And the grid in the nine grids can be with random alignment.The position of so each user input all changes, and is difficult by other
Invalid user stealing.For example, user have selected the 1 lattice input right hand index fingerprint in nine grids, and in 6 lattice right hand middle finger is input into
Fingerprint, then user can simultaneously with right hand forefinger 1 lattice of percussion when password is verified, right hand middle finger taps 6 lattice, it is of course also possible to first
1 lattice are tapped with right hand forefinger, then the position for tapping 6 lattice, 1 lattice and 6 lattice with right hand middle finger may change every time, and in unblock
When be input into fingerprint order can be the same or different, the embodiment of the present invention is not limited in any way.
First log-in password is sent to the intelligent entrance guard by S106, mobile terminal.
S107, the intelligent entrance guard has been collected after the first log-in password, keeps wirelessly being connected simultaneously with the mobile terminal
The prompting log-in password of user input second, second log-in password is for numerical ciphers or to press mobile terminal in Preset Time
The pressing code of the number of touch screen first area first time and pressing mobile terminal touch screen second number of second area, and described the
Two log-in passwords are included for the user cipher of opening gate and for opening gate and the alarm cipher reported to the police.
Single biometrics password security is relatively low, exists and is replicated the possibility usurped, and existing intelligent entrance guard is using above-mentioned
Single password is very easy to the situation that password is obtained by unauthorized person, therefore, in the present embodiment, introduce the second registration close
Code is to improve the security of password.Second log-in password is numerical ciphers or touches to press mobile terminal in Preset Time
The pressing code of the control screen number of first area first time and pressing mobile terminal touch screen second number of second area, and described second
Log-in password is included for the user cipher of opening gate and for opening gate and the alarm cipher reported to the police.So, user
When normally using, the normally-open intelligent entrance guard of user cipher can be input into, it is also possible to be input into alarm cipher when being threatened,
Reported to the police by intelligent entrance guard while opening gate, in order to improve security, warning herein is secret warning, and the secret is reported to the police
Implementation be typically, gate inhibition's connect setting controls alarm bell and reports to the police in the emergency alarm bell of room security by switching signal, and threatens
One's share of expenses for a joint undertaking is not aware that warning has occurred and that, it is also possible to by the warning of remotely administered server real-time reception gate inhibition, to room security report
Police dials 110 warnings by being connected to the modem of remote monitoring server, or can also be directly by intelligent entrance guard
Modem backstage dial 110 warnings.The embodiment of the present invention is not limited in any way.
Alarm cipher is different from user cipher, and when alarm cipher is numerical ciphers, it can be than user cipher digit
Less numerical ciphers, such as user cipher are 5, and alarm cipher is 1, is pressed after user input is complete by acknowledgement key by intelligence
Energy gate inhibition receives and is judged to that alarm cipher carries out alert process.And when alarm cipher is pressing code, the firstth area of pressing
Domain is different from second area.For example, first area presses 3 times in 5 seconds, and second area pressing 4 is inferior.Mobile terminal will be pressed
Touch screen is used as the second log-in password, and crypticity is stronger, is difficult to be checked or usurps after listening to;And press and must register first
Just possess availability after password authentification, therefore when the first log-in password is not verified, without the need for the pressing that processing detection is arrived,
Can avoid processing user misoperation or unconscious operation.Although being provided with two passwords, user input is very convenient
Simply, mobile terminal touch screen only need to be pressed after the first log-in password is verified, relatively single password both improve
The security of intelligent entrance guard, turn avoid the trouble that Complicated Flow brings, and user experience is preferable.And second log-in password be
The pressing code of two region difference number of times of pressing, first area is different with second area, and first number and second number are permissible
It is identical, it is also possible to different, by such setting so that the complexity and degree of safety of the second log-in password is further lifted, and
It is still very convenient that user performs operation.
S108, when user needs opening gate, what the intelligent entrance guard receive user was sent by the mobile terminal
First log-in password, is decrypted and verifies according to default decipherment algorithm corresponding with the predetermined encryption algorithm.
Alternatively, the predetermined encryption algorithm and the default decipherment algorithm are unsymmetrical key, and the predetermined encryption
Algorithm is associated and while dynamic change with the default decipherment algorithm.
Wherein, symmetric key encryption is also named secret/private key encryption (Secret Key Encryption, SKE), i.e.,
Sending and receiving the both sides of data must encrypt and decrypt computing using identical/symmetrical key to plaintext.It is asymmetric
Public key encryption (Public Key Encryption, PKE) is also in key encryption, refer to everyone have a pair it is uniquely right
The key answered:Public-key cryptography and private cipher key, public key external disclosure, private key is preserved by privacy;With wherein one key come
Encryption, just can only decrypt key with another.Send a side of data carries out adding with the public key of the opposing party to the information for sending
It is close, then it is decrypted with the private key of oneself by recipient.Public key encryption technology solves the issue and management of key and asks
Topic, is the core of current commercial code.Using public key technique, the both sides for entering row data communication can safely confirm other side
Identity and public-key cryptography, there is provided the identifiability of communication.
Alternatively, the AES is corresponding with decipherment algorithm and while dynamic change.For example, many set correspondences can be consulted
Enciphering and deciphering algorithm, followed by when using every time agreement use it is wherein a set of, mobile terminal can by transmission algorithm identify letter
Cease to inform intelligent entrance guard.So the enciphering and deciphering algorithm of dynamic change can further lift system security.
Finger print information after by sending encryption can provide Double-protection, ground floor as the first log-in password for system
The decryption protection being made up of AES, the second layer is that the complicated calculations being made up of the uniqueness and complexity of finger print information are prevented
Shield so that illegally molecule cannot be cracked or simulating mobile terminal is sent to the signal of intelligent entrance guard, it is ensured that the safety of system.
S109, after first log-in password is verified, the intelligent entrance guard prompting user input second is registered
Password.
S110, the mobile terminal senses the compression number of user, generates the second log-in password and sends to the intelligent door
Prohibit.
S111, when second log-in password is verified as user cipher, opening gate, when second log-in password is tested
Demonstrate,prove for alarm cipher when, opening gate is simultaneously reported to the police.
Alternatively, when second log-in password is verified as alarm cipher, can be being passed through by remote monitoring server
Monitoring camera carries out recognition of face and amplifies face to take pictures to user and its at one's side personnel, preserves the result of recognition of face
And the photo for shooting.It is easy to follow-up tracking to threaten one's share of expenses for a joint undertaking.
In the present embodiment, by the way that intelligent entrance guard and remote monitoring server are connected and composed into intelligent access control system, user
Registered after user identity is confirmed by intelligent entrance guard and remote monitoring server, it is ensured that the correctness of user identity;So
The log-in password of typing first and the second log-in password afterwards;User can verifying password by way of opening gate, due to the
One log-in password is double finger-print ciphers, therefore security is higher, and has used the double finger-print ciphers after encryption as the first registration
Password, illegal molecule is more difficult to crack, and security is also higher;And due to adding the second log-in password, therefore relative to single close
The mode of code, security is higher, and the input mode of the second log-in password is for numeral or to mobile terminal touch screen zones of different
Different number of times are pressed respectively, and crypticity is stronger if pressing, and the second log-in password includes user cipher and alarm cipher,
When being threatened beneficial to user, concealed warning fully improves the security of intelligent entrance guard.
Alternatively, in addition to intelligent entrance guard locally preserves the first log-in password and the second log-in password is verified, also
Can be verified by remote monitoring server.Although remote monitoring server carries out verifying that possible efficiency can be slightly slow,
Security can be further lifted, especially when intelligent entrance guard breaks down and cannot verify, is carried out by remote monitoring server
Checking, can further lift system work stability.
Alternatively, when intelligent entrance guard is damaged or needs to carry out system update, needs to change intelligent entrance guard, the intelligent door
Prohibit first log-in password and second log-in password to be sent to the remote monitoring server and preserve;
When the intelligent entrance guard is changed, the remote monitoring server sends the code data of preservation to replacing
Intelligent entrance guard afterwards.
So that it is guaranteed that change before and after user data integrality and security.
Alternatively, when second log-in password is verified as alarm cipher, also include:
User's emergency number set in advance is dialed on the mobile terminal backstage.The mode reported to the police further is enriched, is improved
Security.
Alternatively, the mobile terminal is mobile phone, panel computer or wearable device.
Such as 3 times after the failure of password multiple authentication, then intelligent entrance guard can disconnect and mobile terminal within a period of time
Connection, or the password authentification of refusal mobile terminal is asked within a period of time.
Fig. 2 is refer to, is a kind of composition schematic diagram of system of the embodiment of the present invention, in the present embodiment, the system bag
Include:Remote monitoring server 200, the intelligent entrance guard 100 of mobile terminal 300 and at least one.Intelligent entrance guard 100 is included for for far
Range monitoring server 200 provides the camera of monitored picture, and for decrypting and verifying the authentication module of password.Remote monitoring
Server 200 includes display and the server for data storage, and mobile terminal includes the collection for collecting user fingerprints
Module, the encrypting module that fingerprint is encrypted and touch screen.
Specifically, remote monitoring server 200, for distributing authorization code for validated user;
Intelligent entrance guard 100, the registration request for receiving user's input and sending to remote monitoring server verified,
Authorization code information comprising user input in the registration request;
The remote monitoring server 200 is additionally operable to verify authorization code, is verified and notifies the intelligence afterwards
Gate inhibition 100 receives the registration request;
After registration request is received, the intelligent entrance guard 100 is additionally operable to point out the log-in password of user input first;
Mobile terminal 300, for showing the nine grids of subsidiary Digital ID by touch screen, points out user to select at least two
Individual grid is input into different fingerprints, and the Digital ID of the grid selected user and the user fingerprints collected on the grid enter
The encryption of row predetermined encryption algorithm, generates the first log-in password;And first log-in password is sent into the intelligence
Can gate inhibition;
The intelligent entrance guard 100 is additionally operable to collect after the first log-in password, points out the log-in password of user input second,
Second log-in password be numerical ciphers or in Preset Time press the mobile terminal touch screen number of first area first time and
The pressing code of mobile terminal touch screen second number of second area is pressed, and second log-in password is included for opening door
The user cipher of taboo and for opening gate and report to the police alarm cipher;When user needs opening gate, the intelligent door
Prohibit and 200 be additionally operable to the first log-in password that receive user is sent by the mobile terminal, according to the predetermined encryption algorithm
Corresponding default decipherment algorithm is decrypted and verifies;After first log-in password is verified, the intelligent entrance guard
The prompting log-in password of user input second;
The mobile terminal 300 is additionally operable to sense the number of taps of user, generates the second log-in password and sends to the intelligence
Can gate inhibition;
The intelligent entrance guard 100 is additionally operable to when second log-in password is verified as user cipher, and opening gate works as institute
When stating the second log-in password and being verified as alarm cipher, opening gate is simultaneously reported to the police.
Alternatively, the grid random alignment in the nine grids.
The predetermined encryption algorithm and the default decipherment algorithm are unsymmetrical key, and the predetermined encryption algorithm and institute
State default decipherment algorithm association and simultaneously dynamic change.
Alternatively, the remote monitoring server 200 is additionally operable to:
When second log-in password is verified as alarm cipher, by monitoring camera, to user and its at one's side personnel enter
Row recognition of face is simultaneously amplified face and is taken pictures, and preserves the result of recognition of face and the photo of shooting.
The intelligent entrance guard 100 is additionally operable to:
First log-in password and second log-in password are sent to the remote monitoring server 200 and preserved;
The remote monitoring server 200 is additionally operable to:
When the intelligent entrance guard 100 is changed, the remote monitoring server 200 sends the code data for preserving
Intelligent entrance guard to after changing.
When second log-in password is verified as alarm cipher, the mobile terminal 300 is additionally operable to backstage and dials user
Emergency number set in advance.
The mobile terminal 300 is mobile phone, panel computer or wearable device.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight
Point explanation is all difference with other embodiments, between each embodiment identical similar part mutually referring to.
For device embodiment, due to itself and embodiment of the method basic simlarity, so description is fairly simple, related part referring to
The part explanation of embodiment of the method.
By the description of above-described embodiment, the present invention has advantages below:
By the way that intelligent entrance guard and remote monitoring server connected and composed into intelligent access control system, user by intelligent entrance guard and
Remote monitoring server is registered after user identity is confirmed, it is ensured that the correctness of user identity;Then typing first is registered
Password and the second log-in password;User can verify password by way of opening gate, because the first log-in password is double
Finger-print cipher, therefore security is higher, and used the double finger-print ciphers after encryption as the first log-in password, illegal molecule is more
Difficulty is cracked, and security is also higher;And due to adding the second log-in password, therefore relative to the mode of single password, security
It is higher, and the input mode of the second log-in password is numeral or mobile terminal touch screen zones of different pressed respectively different times
Number, crypticity is stronger if pressing, and the second log-in password includes user cipher and alarm cipher, is threatened beneficial to user
When, concealed warning fully improves the security of intelligent entrance guard.
One of ordinary skill in the art will appreciate that realizing all or part of flow process in above-described embodiment method, can be
Related hardware is instructed to complete by computer program, described program can be stored in a computer read/write memory medium
In, the program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic
Dish, CD, read-only memory (Read-Only Memory, abbreviation ROM) or random access memory (Random
Access Memory, abbreviation RAM) etc..
Above disclosed is only present pre-ferred embodiments, can not limit the right model of the present invention with this certainly
Enclose, therefore the equivalent variations made according to the claims in the present invention, still belong to the scope that the present invention is covered.
Claims (10)
1. it is a kind of based on mobile terminal respond method, it is characterised in that include:
Remote monitoring server is that validated user distributes authorization code;
The registration request of intelligent entrance guard receiving user's input and sending to remote monitoring server verified, the registration request
In comprising user input authorization code information;
Remote monitoring server verifies to authorization code, and notifying that the intelligent entrance guard receives the registration after being verified please
Ask;
After registration request is received, the intelligent entrance guard points out the log-in password of user input first;
Mobile terminal shows the nine grids of subsidiary Digital ID by touch screen, points out user to select at least two grid to be input into not
Same fingerprint, the Digital ID of the grid selected user and the user fingerprints collected on the grid carry out predetermined encryption calculation
The encryption of method, generates the first log-in password;
First log-in password is sent to the intelligent entrance guard by mobile terminal;
The intelligent entrance guard has been collected after the first log-in password, keeps wirelessly being connected and pointing out user defeated with the mobile terminal
Enter the second log-in password, second log-in password is for numerical ciphers or to press mobile terminal touch screen first in Preset Time
The pressing code of the number of region first time and pressing mobile terminal touch screen second number of second area, and second log-in password
Including the user cipher for opening gate and for opening gate and the alarm cipher reported to the police;
When user needs opening gate, the intelligent entrance guard receive user is close by the first registration that the mobile terminal sends
Code, is decrypted and verifies according to default decipherment algorithm corresponding with the predetermined encryption algorithm;
After first log-in password is verified, the intelligent entrance guard points out the log-in password of user input second;
The mobile terminal senses the compression number of user, generates the second log-in password and sends to the intelligent entrance guard;
When second log-in password is verified as user cipher, opening gate, when second log-in password is verified as reporting to the police
During password, opening gate is simultaneously reported to the police.
2. the method for claim 1, it is characterised in that when second log-in password is verified as alarm cipher, also
Including:
Remote monitoring server carries out recognition of face and amplifies face to carry out by monitoring camera to user and its at one's side personnel
Take pictures, preserve the result of recognition of face and the photo of shooting.
3. the method for claim 1, it is characterised in that also include:
The intelligent entrance guard sends first log-in password and second log-in password to the remote monitoring server
Preserve;
When the intelligent entrance guard is changed, the remote monitoring server sends the code data of preservation to replacing
Intelligent entrance guard.
4. the method for claim 1, it is characterised in that when second log-in password is verified as alarm cipher, also
Including:
User's emergency number set in advance is dialed on the mobile terminal backstage.
5. the method as described in any one of claim 1-4, it is characterised in that the grid random alignment in the nine grids, institute
Predetermined encryption algorithm and the default decipherment algorithm are stated for unsymmetrical key, and the predetermined encryption algorithm and the default decryption
Algorithm association and simultaneously dynamic change.
6. a kind of system, it is characterised in that include:
Remote monitoring server, for distributing authorization code for validated user;
Intelligent entrance guard, the registration request for receiving user's input and sending to remote monitoring server verified, the note
Authorization code information comprising user input in volume request;
The remote monitoring server is additionally operable to verify authorization code, is verified and notify afterwards the intelligent entrance guard acceptance
The registration request;
After registration request is received, the intelligent entrance guard is additionally operable to point out the log-in password of user input first;
Mobile terminal, for showing the nine grids of subsidiary Digital ID by touch screen, points out user to select at least two grid
The different fingerprint of input, the Digital ID of the grid selected user and the user fingerprints collected on the grid are preset
The encryption of AES, generates the first log-in password;And first log-in password is sent into the intelligent entrance guard;
The intelligent entrance guard has been collected after the first log-in password, keeps wirelessly being connected and pointing out user defeated with the mobile terminal
Enter the second log-in password, second log-in password is for numerical ciphers or to press mobile terminal touch screen first in Preset Time
The pressing code of the number of region first time and pressing mobile terminal touch screen second number of second area, and second log-in password
Including the user cipher for opening gate and for opening gate and the alarm cipher reported to the police;When user needs opening gate
When, the intelligent entrance guard is additionally operable to the first log-in password that receive user is sent by the mobile terminal, according to pre- with described
If the corresponding default decipherment algorithm of AES is decrypted and verifies;After first log-in password is verified, institute
State the intelligent entrance guard prompting log-in password of user input second;
The mobile terminal is additionally operable to sense the compression number of user, generates the second log-in password and sends to the intelligent entrance guard;
The intelligent entrance guard is additionally operable to when second log-in password is verified as user cipher, opening gate, when described second
When log-in password is verified as alarm cipher, opening gate is simultaneously reported to the police.
7. system as claimed in claim 6, it is characterised in that the remote monitoring server is additionally operable to:
When second log-in password is verified as alarm cipher, by monitoring camera, to user and its at one's side personnel enter pedestrian
Face recognizes and amplifies face and taken pictures, and preserves the result of recognition of face and the photo of shooting.
8. system as claimed in claim 6, it is characterised in that the intelligent entrance guard is additionally operable to:
First log-in password and second log-in password are sent to the remote monitoring server and is preserved;
The remote monitoring server is additionally operable to:
When the intelligent entrance guard is changed, the remote monitoring server sends the code data of preservation to replacing
Intelligent entrance guard.
9. system as claimed in claim 6, it is characterised in that when second log-in password is verified as alarm cipher, institute
State mobile terminal and be additionally operable to backstage and dial user's emergency number set in advance.
10. the system as described in any one of claim 6-9, it is characterised in that the grid random alignment in the nine grids, institute
Predetermined encryption algorithm and the default decipherment algorithm are stated for unsymmetrical key, and the predetermined encryption algorithm and the default decryption
Algorithm association and simultaneously dynamic change.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611076669.4A CN106683239A (en) | 2016-11-29 | 2016-11-29 | Mobile terminal response based method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611076669.4A CN106683239A (en) | 2016-11-29 | 2016-11-29 | Mobile terminal response based method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106683239A true CN106683239A (en) | 2017-05-17 |
Family
ID=58867288
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611076669.4A Pending CN106683239A (en) | 2016-11-29 | 2016-11-29 | Mobile terminal response based method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106683239A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110021099A (en) * | 2018-01-04 | 2019-07-16 | 台湾福兴工业股份有限公司 | Electronic lock and in an electronic lock increase newly a user method |
CN111369718A (en) * | 2020-03-16 | 2020-07-03 | 杭州涂鸦信息技术有限公司 | Method and system for marking and notifying intelligent door lock hijack function |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH1173506A (en) * | 1997-08-28 | 1999-03-16 | Nec Corp | Method and device for identification by fingerprint matching |
CN1320254A (en) * | 1999-08-28 | 2001-10-31 | 伯格株式会社 | Method for controlling fingerprint identification door lock system |
CN102110320A (en) * | 2010-12-23 | 2011-06-29 | 汉王科技股份有限公司 | Coerce alarm method and entrance guard control equipment in entrance guard system |
CN105117630A (en) * | 2015-08-21 | 2015-12-02 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint authentication method, fingerprint authentication apparatus, and terminal |
CN105872104A (en) * | 2016-06-12 | 2016-08-17 | 深圳益强信息科技有限公司 | Method and system for managing intelligent entrance guard by combining mobile terminal |
-
2016
- 2016-11-29 CN CN201611076669.4A patent/CN106683239A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH1173506A (en) * | 1997-08-28 | 1999-03-16 | Nec Corp | Method and device for identification by fingerprint matching |
CN1320254A (en) * | 1999-08-28 | 2001-10-31 | 伯格株式会社 | Method for controlling fingerprint identification door lock system |
CN102110320A (en) * | 2010-12-23 | 2011-06-29 | 汉王科技股份有限公司 | Coerce alarm method and entrance guard control equipment in entrance guard system |
CN105117630A (en) * | 2015-08-21 | 2015-12-02 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint authentication method, fingerprint authentication apparatus, and terminal |
CN105872104A (en) * | 2016-06-12 | 2016-08-17 | 深圳益强信息科技有限公司 | Method and system for managing intelligent entrance guard by combining mobile terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110021099A (en) * | 2018-01-04 | 2019-07-16 | 台湾福兴工业股份有限公司 | Electronic lock and in an electronic lock increase newly a user method |
CN111369718A (en) * | 2020-03-16 | 2020-07-03 | 杭州涂鸦信息技术有限公司 | Method and system for marking and notifying intelligent door lock hijack function |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7152466B2 (en) | Secure communication method and smart lock system based thereon | |
CN106815905A (en) | A kind of method and system based on mobile terminal checking | |
CN106656510B (en) | A kind of encryption key acquisition methods and system | |
CN108881304A (en) | A kind of pair of internet of things equipment carries out the method and system of safety management | |
CN107046556A (en) | A kind of method and system of checking | |
CN102945526B (en) | A kind of device and method for improving mobile equipment on-line safety of payment | |
CN106682903B (en) | A kind of feedback validation method of bank paying Licensing Authority information | |
CN101272301B (en) | Safety access method of wireless metropolitan area network | |
CN107579828A (en) | Safety certification device and method in machine-to-machine communication between the device based on PUF | |
CN102262793A (en) | Entrance guard control method and entrance guard control system | |
WO2016001489A1 (en) | Lock system and the creation of electronic keys in the lock system | |
CN105761066A (en) | Bank card password protection method and system | |
CN106033625A (en) | Lockset, mobile terminal, lockset control method, and lockset control system | |
CN107424274A (en) | The method, apparatus and intelligent door lock that a kind of intelligent door lock is unlocked | |
CN106600767A (en) | Verification method and system based on identification card | |
US20120284787A1 (en) | Personal Secured Access Devices | |
CN106683239A (en) | Mobile terminal response based method and system | |
CN106815907A (en) | A kind of method and intelligent access control system based on picture password management intelligent entrance guard | |
CN106780871A (en) | A kind of method and system based on mobile terminal alarm | |
CN106815906A (en) | A kind of intelligent entrance guard management method and system based on optic communication | |
CN106855924A (en) | Embedded intelligent chip equipment and background application system | |
CN107046524A (en) | It is a kind of based on ultrasonic wave use intelligent entrance guard method and system | |
CN106713278A (en) | Alarm method and system | |
CN112637172A (en) | Novel data security and confidentiality method | |
CN102752307B (en) | Based on transmission method and the system of the video monitoring data of mark |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170517 |
|
RJ01 | Rejection of invention patent application after publication |