CN106683239A - Mobile terminal response based method and system - Google Patents

Mobile terminal response based method and system Download PDF

Info

Publication number
CN106683239A
CN106683239A CN201611076669.4A CN201611076669A CN106683239A CN 106683239 A CN106683239 A CN 106683239A CN 201611076669 A CN201611076669 A CN 201611076669A CN 106683239 A CN106683239 A CN 106683239A
Authority
CN
China
Prior art keywords
password
log
user
entrance guard
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611076669.4A
Other languages
Chinese (zh)
Inventor
张哲文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Playright Mdt Infotech Ltd
Original Assignee
Shenzhen Playright Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Playright Mdt Infotech Ltd filed Critical Shenzhen Playright Mdt Infotech Ltd
Priority to CN201611076669.4A priority Critical patent/CN106683239A/en
Publication of CN106683239A publication Critical patent/CN106683239A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/33Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition

Abstract

The embodiment of the invention discloses a mobile terminal response based method and system. The method comprises the steps as follows: a remote monitoring server allocates an authorization code to a valid user; an intelligent entrance guard receives a registration request input by the user and transmits the registration request to the remote monitoring server for validation; the intelligent entrance guard is informed to receive the registration request after validation is passed; the user is prompted to input a first register password and a second register password through the mobile terminal; the first register password is an encrypted double-fingerprint password; the second register password is a digital password or a pressing password of the first time for pressing a first area of a touch screen of the mobile terminal and the second time for pressing a second area of the touch screen of the mobile terminal within preset time; the second register password comprises a user password and an alarm password; and when a user needs to open the entrance guard, the intelligent entrance guard receives the first register password and the second register password input by the user and sends an alarm when validating that the second register password is the alarm password. By adopting the mobile terminal response-based method and system, the security and the convenience of the intelligent entrance guard can be improved.

Description

A kind of method and system responded based on mobile terminal
Technical field
The present invention relates to intelligent entrance guard technical field, more particularly to a kind of method and system responded based on mobile terminal.
Background technology
In the development course of gate control system, password access system is most original, be also it is most simple, cost minimization, But because its security performance is than relatively low, therefore the field of gate control system of fading out gradually.Afterwards, gate control system of swiping the card or card Sensing gate control system becomes the main flow of current gate control system due to durable, cost performance is good, the advantage such as reading speed is fast. But in recent years, due to developing rapidly for mobile terminal, its is intelligent can to bring great convenience for user, more and more Intelligent entrance guard starts the unlatching that gate inhibition is carried out with mobile terminal cooperation.
The method that mobile terminal is verified is although advanced, but user may lose and be usurped by undesirable.Additionally, with Family is likely to be threatened haves no alternative but be opened the door using the mobile terminal of oneself.With the continuous development of intelligent entrance guard, traditional In gate control system, controller is carried out after authentication by receiving certain data, i.e. the action of controlling switch door.This gate inhibition System is sent to the customizing messages that the data of controller are generally all the mobile terminals of user.But cannot judge that user uses shifting Whether it is voluntary when dynamic terminal is verified or is coerced.And in bank, customs, prison or other confidential departments, It is very high to the safety requirements of gate inhibition's keyholed back plate, if intelligent entrance guard can only open the door when there are abnormal conditions, then its Security or far from being enough.
The content of the invention
Embodiment of the present invention technical problem to be solved is, there is provided a kind of method responded based on mobile terminal and be System.It is inadequate to solve the problems, such as intelligent entrance guard security.
In order to solve above-mentioned technical problem, embodiment of the present invention first aspect is provided and a kind of responded based on mobile terminal Method, including:
Remote monitoring server is that validated user distributes authorization code;
The registration request of intelligent entrance guard receiving user's input and sending to remote monitoring server verified, the registration Authorization code information comprising user input in request;
Remote monitoring server is verified to authorization code, is verified and notify afterwards the intelligent entrance guard acceptance note Volume request;
After registration request is received, the intelligent entrance guard points out the log-in password of user input first;
Mobile terminal shows the nine grids of subsidiary Digital ID by touch screen, points out user to select at least two grid defeated Enter different fingerprints, the Digital ID of the grid selected user and the user fingerprints collected on the grid carry out default adding The encryption of close algorithm, generates the first log-in password;
First log-in password is sent to the intelligent entrance guard by mobile terminal;
The intelligent entrance guard has been collected after the first log-in password, is kept wirelessly being connected with the mobile terminal and is pointed out to use Family is input into the second log-in password, and second log-in password is for numerical ciphers or to press mobile terminal touch screen in Preset Time The pressing code of the number of first area first time and pressing mobile terminal touch screen second number of second area, and second registration Password is included for the user cipher of opening gate and for opening gate and the alarm cipher reported to the police;
When user needs opening gate, the first note that the intelligent entrance guard receive user is sent by the mobile terminal Volume password, is decrypted and verifies according to default decipherment algorithm corresponding with the predetermined encryption algorithm;
After first log-in password is verified, the intelligent entrance guard points out the log-in password of user input second;
The mobile terminal senses the compression number of user, generates the second log-in password and sends to the intelligent entrance guard;
When second log-in password is verified as user cipher, opening gate, when second log-in password is verified as During alarm cipher, opening gate is simultaneously reported to the police.
Embodiment of the present invention second aspect provides a kind of system, including:
Remote monitoring server, for distributing authorization code for validated user;
Intelligent entrance guard, the registration request for receiving user's input and sending to remote monitoring server verified, institute State the authorization code information comprising user input in registration request;
The remote monitoring server is additionally operable to verify authorization code, is verified and notifies the intelligent entrance guard afterwards Receive the registration request;
After registration request is received, the intelligent entrance guard is additionally operable to point out the log-in password of user input first;
Mobile terminal, for showing the nine grids of subsidiary Digital ID by touch screen, points out user to select at least two Grid is input into different fingerprints, and the Digital ID of the grid selected user and the user fingerprints collected on the grid are carried out The encryption of predetermined encryption algorithm, generates the first log-in password;And first log-in password is sent into the intelligence Gate inhibition;
The intelligent entrance guard has been collected after the first log-in password, is kept wirelessly being connected with the mobile terminal and is pointed out to use Family is input into the second log-in password, and second log-in password is for numerical ciphers or to press mobile terminal touch screen in Preset Time The pressing code of the number of first area first time and pressing mobile terminal touch screen second number of second area, and second registration Password is included for the user cipher of opening gate and for opening gate and the alarm cipher reported to the police;When user needs to open During gate inhibition, the intelligent entrance guard is additionally operable to the first log-in password that receive user is sent by the mobile terminal, according to institute State the corresponding default decipherment algorithm of predetermined encryption algorithm to be decrypted and verify;When first log-in password is verified it Afterwards, the intelligent entrance guard points out the log-in password of user input second;
The mobile terminal is additionally operable to sense the compression number of user, generates the second log-in password and sends to the intelligent door Prohibit;
The intelligent entrance guard is additionally operable to when second log-in password is verified as user cipher, opening gate, when described When second log-in password is verified as alarm cipher, opening gate is simultaneously reported to the police.
Implement the embodiment of the present invention, have the advantages that:
By the way that intelligent entrance guard and remote monitoring server connected and composed into intelligent access control system, user by intelligent entrance guard and Remote monitoring server is registered after user identity is confirmed, it is ensured that the correctness of user identity;Then typing first is registered Password and the second log-in password;User can verify password by way of opening gate, because the first log-in password is double Finger-print cipher, therefore security is higher, and used the double finger-print ciphers after encryption as the first log-in password, illegal molecule is more Difficulty is cracked, and security is also higher;And due to adding the second log-in password, therefore relative to the mode of single password, security It is higher, and the input mode of the second log-in password is numeral or mobile terminal touch screen zones of different pressed respectively different times Number, crypticity is stronger if pressing, and the second log-in password includes user cipher and alarm cipher, is threatened beneficial to user When, concealed warning fully improves the security of intelligent entrance guard.
Description of the drawings
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to institute in embodiment The accompanying drawing that needs are used is briefly described, it should be apparent that, drawings in the following description are only some enforcements of the present invention Example, for those of ordinary skill in the art, on the premise of not paying creative work, can be being obtained according to these accompanying drawings Obtain other accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of the method responded based on mobile terminal of the embodiment of the present invention;
Fig. 2 is a kind of composition schematic diagram of system of the embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than the embodiment of whole.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than the embodiment of whole.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
Fig. 1 is refer to, is a kind of schematic flow sheet of the method responded based on mobile terminal of the embodiment of the present invention, in this reality In applying example, the method comprising the steps of:
S101, remote monitoring server is that validated user distributes authorization code.
Remote monitoring server needs the identity for confirming user, it is ensured that authorization code is only assigned to validated user, and authorization code After use, failure can not be reused.
S102, the registration request of intelligent entrance guard receiving user's input and sending to remote monitoring server verified, institute State the authorization code information comprising user input in registration request.
S103, remote monitoring server is verified to authorization code, is verified and notify afterwards the intelligent entrance guard acceptance The registration request.
S104, after registration request is received, the intelligent entrance guard points out the log-in password of user input first.
S105, mobile terminal shows the nine grids of subsidiary Digital ID by touch screen, points out user to select at least two Grid is input into different fingerprints, and the Digital ID of the grid selected user and the user fingerprints collected on the grid are carried out The encryption of predetermined encryption algorithm, generates the first log-in password.
Alternatively, the grid random alignment in the nine grids.So can avoid checking that user uses by illegal molecule Which finger fingerprint, cannot also determine the Digital ID of grid.
Due to needing to be input at least two different fingerprints, therefore security is higher than the security of conventional single fingerprint. And the grid in the nine grids can be with random alignment.The position of so each user input all changes, and is difficult by other Invalid user stealing.For example, user have selected the 1 lattice input right hand index fingerprint in nine grids, and in 6 lattice right hand middle finger is input into Fingerprint, then user can simultaneously with right hand forefinger 1 lattice of percussion when password is verified, right hand middle finger taps 6 lattice, it is of course also possible to first 1 lattice are tapped with right hand forefinger, then the position for tapping 6 lattice, 1 lattice and 6 lattice with right hand middle finger may change every time, and in unblock When be input into fingerprint order can be the same or different, the embodiment of the present invention is not limited in any way.
First log-in password is sent to the intelligent entrance guard by S106, mobile terminal.
S107, the intelligent entrance guard has been collected after the first log-in password, keeps wirelessly being connected simultaneously with the mobile terminal The prompting log-in password of user input second, second log-in password is for numerical ciphers or to press mobile terminal in Preset Time The pressing code of the number of touch screen first area first time and pressing mobile terminal touch screen second number of second area, and described the Two log-in passwords are included for the user cipher of opening gate and for opening gate and the alarm cipher reported to the police.
Single biometrics password security is relatively low, exists and is replicated the possibility usurped, and existing intelligent entrance guard is using above-mentioned Single password is very easy to the situation that password is obtained by unauthorized person, therefore, in the present embodiment, introduce the second registration close Code is to improve the security of password.Second log-in password is numerical ciphers or touches to press mobile terminal in Preset Time The pressing code of the control screen number of first area first time and pressing mobile terminal touch screen second number of second area, and described second Log-in password is included for the user cipher of opening gate and for opening gate and the alarm cipher reported to the police.So, user When normally using, the normally-open intelligent entrance guard of user cipher can be input into, it is also possible to be input into alarm cipher when being threatened, Reported to the police by intelligent entrance guard while opening gate, in order to improve security, warning herein is secret warning, and the secret is reported to the police Implementation be typically, gate inhibition's connect setting controls alarm bell and reports to the police in the emergency alarm bell of room security by switching signal, and threatens One's share of expenses for a joint undertaking is not aware that warning has occurred and that, it is also possible to by the warning of remotely administered server real-time reception gate inhibition, to room security report Police dials 110 warnings by being connected to the modem of remote monitoring server, or can also be directly by intelligent entrance guard Modem backstage dial 110 warnings.The embodiment of the present invention is not limited in any way.
Alarm cipher is different from user cipher, and when alarm cipher is numerical ciphers, it can be than user cipher digit Less numerical ciphers, such as user cipher are 5, and alarm cipher is 1, is pressed after user input is complete by acknowledgement key by intelligence Energy gate inhibition receives and is judged to that alarm cipher carries out alert process.And when alarm cipher is pressing code, the firstth area of pressing Domain is different from second area.For example, first area presses 3 times in 5 seconds, and second area pressing 4 is inferior.Mobile terminal will be pressed Touch screen is used as the second log-in password, and crypticity is stronger, is difficult to be checked or usurps after listening to;And press and must register first Just possess availability after password authentification, therefore when the first log-in password is not verified, without the need for the pressing that processing detection is arrived, Can avoid processing user misoperation or unconscious operation.Although being provided with two passwords, user input is very convenient Simply, mobile terminal touch screen only need to be pressed after the first log-in password is verified, relatively single password both improve The security of intelligent entrance guard, turn avoid the trouble that Complicated Flow brings, and user experience is preferable.And second log-in password be The pressing code of two region difference number of times of pressing, first area is different with second area, and first number and second number are permissible It is identical, it is also possible to different, by such setting so that the complexity and degree of safety of the second log-in password is further lifted, and It is still very convenient that user performs operation.
S108, when user needs opening gate, what the intelligent entrance guard receive user was sent by the mobile terminal First log-in password, is decrypted and verifies according to default decipherment algorithm corresponding with the predetermined encryption algorithm.
Alternatively, the predetermined encryption algorithm and the default decipherment algorithm are unsymmetrical key, and the predetermined encryption Algorithm is associated and while dynamic change with the default decipherment algorithm.
Wherein, symmetric key encryption is also named secret/private key encryption (Secret Key Encryption, SKE), i.e., Sending and receiving the both sides of data must encrypt and decrypt computing using identical/symmetrical key to plaintext.It is asymmetric Public key encryption (Public Key Encryption, PKE) is also in key encryption, refer to everyone have a pair it is uniquely right The key answered:Public-key cryptography and private cipher key, public key external disclosure, private key is preserved by privacy;With wherein one key come Encryption, just can only decrypt key with another.Send a side of data carries out adding with the public key of the opposing party to the information for sending It is close, then it is decrypted with the private key of oneself by recipient.Public key encryption technology solves the issue and management of key and asks Topic, is the core of current commercial code.Using public key technique, the both sides for entering row data communication can safely confirm other side Identity and public-key cryptography, there is provided the identifiability of communication.
Alternatively, the AES is corresponding with decipherment algorithm and while dynamic change.For example, many set correspondences can be consulted Enciphering and deciphering algorithm, followed by when using every time agreement use it is wherein a set of, mobile terminal can by transmission algorithm identify letter Cease to inform intelligent entrance guard.So the enciphering and deciphering algorithm of dynamic change can further lift system security.
Finger print information after by sending encryption can provide Double-protection, ground floor as the first log-in password for system The decryption protection being made up of AES, the second layer is that the complicated calculations being made up of the uniqueness and complexity of finger print information are prevented Shield so that illegally molecule cannot be cracked or simulating mobile terminal is sent to the signal of intelligent entrance guard, it is ensured that the safety of system.
S109, after first log-in password is verified, the intelligent entrance guard prompting user input second is registered Password.
S110, the mobile terminal senses the compression number of user, generates the second log-in password and sends to the intelligent door Prohibit.
S111, when second log-in password is verified as user cipher, opening gate, when second log-in password is tested Demonstrate,prove for alarm cipher when, opening gate is simultaneously reported to the police.
Alternatively, when second log-in password is verified as alarm cipher, can be being passed through by remote monitoring server Monitoring camera carries out recognition of face and amplifies face to take pictures to user and its at one's side personnel, preserves the result of recognition of face And the photo for shooting.It is easy to follow-up tracking to threaten one's share of expenses for a joint undertaking.
In the present embodiment, by the way that intelligent entrance guard and remote monitoring server are connected and composed into intelligent access control system, user Registered after user identity is confirmed by intelligent entrance guard and remote monitoring server, it is ensured that the correctness of user identity;So The log-in password of typing first and the second log-in password afterwards;User can verifying password by way of opening gate, due to the One log-in password is double finger-print ciphers, therefore security is higher, and has used the double finger-print ciphers after encryption as the first registration Password, illegal molecule is more difficult to crack, and security is also higher;And due to adding the second log-in password, therefore relative to single close The mode of code, security is higher, and the input mode of the second log-in password is for numeral or to mobile terminal touch screen zones of different Different number of times are pressed respectively, and crypticity is stronger if pressing, and the second log-in password includes user cipher and alarm cipher, When being threatened beneficial to user, concealed warning fully improves the security of intelligent entrance guard.
Alternatively, in addition to intelligent entrance guard locally preserves the first log-in password and the second log-in password is verified, also Can be verified by remote monitoring server.Although remote monitoring server carries out verifying that possible efficiency can be slightly slow, Security can be further lifted, especially when intelligent entrance guard breaks down and cannot verify, is carried out by remote monitoring server Checking, can further lift system work stability.
Alternatively, when intelligent entrance guard is damaged or needs to carry out system update, needs to change intelligent entrance guard, the intelligent door Prohibit first log-in password and second log-in password to be sent to the remote monitoring server and preserve;
When the intelligent entrance guard is changed, the remote monitoring server sends the code data of preservation to replacing Intelligent entrance guard afterwards.
So that it is guaranteed that change before and after user data integrality and security.
Alternatively, when second log-in password is verified as alarm cipher, also include:
User's emergency number set in advance is dialed on the mobile terminal backstage.The mode reported to the police further is enriched, is improved Security.
Alternatively, the mobile terminal is mobile phone, panel computer or wearable device.
Such as 3 times after the failure of password multiple authentication, then intelligent entrance guard can disconnect and mobile terminal within a period of time Connection, or the password authentification of refusal mobile terminal is asked within a period of time.
Fig. 2 is refer to, is a kind of composition schematic diagram of system of the embodiment of the present invention, in the present embodiment, the system bag Include:Remote monitoring server 200, the intelligent entrance guard 100 of mobile terminal 300 and at least one.Intelligent entrance guard 100 is included for for far Range monitoring server 200 provides the camera of monitored picture, and for decrypting and verifying the authentication module of password.Remote monitoring Server 200 includes display and the server for data storage, and mobile terminal includes the collection for collecting user fingerprints Module, the encrypting module that fingerprint is encrypted and touch screen.
Specifically, remote monitoring server 200, for distributing authorization code for validated user;
Intelligent entrance guard 100, the registration request for receiving user's input and sending to remote monitoring server verified, Authorization code information comprising user input in the registration request;
The remote monitoring server 200 is additionally operable to verify authorization code, is verified and notifies the intelligence afterwards Gate inhibition 100 receives the registration request;
After registration request is received, the intelligent entrance guard 100 is additionally operable to point out the log-in password of user input first;
Mobile terminal 300, for showing the nine grids of subsidiary Digital ID by touch screen, points out user to select at least two Individual grid is input into different fingerprints, and the Digital ID of the grid selected user and the user fingerprints collected on the grid enter The encryption of row predetermined encryption algorithm, generates the first log-in password;And first log-in password is sent into the intelligence Can gate inhibition;
The intelligent entrance guard 100 is additionally operable to collect after the first log-in password, points out the log-in password of user input second, Second log-in password be numerical ciphers or in Preset Time press the mobile terminal touch screen number of first area first time and The pressing code of mobile terminal touch screen second number of second area is pressed, and second log-in password is included for opening door The user cipher of taboo and for opening gate and report to the police alarm cipher;When user needs opening gate, the intelligent door Prohibit and 200 be additionally operable to the first log-in password that receive user is sent by the mobile terminal, according to the predetermined encryption algorithm Corresponding default decipherment algorithm is decrypted and verifies;After first log-in password is verified, the intelligent entrance guard The prompting log-in password of user input second;
The mobile terminal 300 is additionally operable to sense the number of taps of user, generates the second log-in password and sends to the intelligence Can gate inhibition;
The intelligent entrance guard 100 is additionally operable to when second log-in password is verified as user cipher, and opening gate works as institute When stating the second log-in password and being verified as alarm cipher, opening gate is simultaneously reported to the police.
Alternatively, the grid random alignment in the nine grids.
The predetermined encryption algorithm and the default decipherment algorithm are unsymmetrical key, and the predetermined encryption algorithm and institute State default decipherment algorithm association and simultaneously dynamic change.
Alternatively, the remote monitoring server 200 is additionally operable to:
When second log-in password is verified as alarm cipher, by monitoring camera, to user and its at one's side personnel enter Row recognition of face is simultaneously amplified face and is taken pictures, and preserves the result of recognition of face and the photo of shooting.
The intelligent entrance guard 100 is additionally operable to:
First log-in password and second log-in password are sent to the remote monitoring server 200 and preserved;
The remote monitoring server 200 is additionally operable to:
When the intelligent entrance guard 100 is changed, the remote monitoring server 200 sends the code data for preserving Intelligent entrance guard to after changing.
When second log-in password is verified as alarm cipher, the mobile terminal 300 is additionally operable to backstage and dials user Emergency number set in advance.
The mobile terminal 300 is mobile phone, panel computer or wearable device.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation is all difference with other embodiments, between each embodiment identical similar part mutually referring to. For device embodiment, due to itself and embodiment of the method basic simlarity, so description is fairly simple, related part referring to The part explanation of embodiment of the method.
By the description of above-described embodiment, the present invention has advantages below:
By the way that intelligent entrance guard and remote monitoring server connected and composed into intelligent access control system, user by intelligent entrance guard and Remote monitoring server is registered after user identity is confirmed, it is ensured that the correctness of user identity;Then typing first is registered Password and the second log-in password;User can verify password by way of opening gate, because the first log-in password is double Finger-print cipher, therefore security is higher, and used the double finger-print ciphers after encryption as the first log-in password, illegal molecule is more Difficulty is cracked, and security is also higher;And due to adding the second log-in password, therefore relative to the mode of single password, security It is higher, and the input mode of the second log-in password is numeral or mobile terminal touch screen zones of different pressed respectively different times Number, crypticity is stronger if pressing, and the second log-in password includes user cipher and alarm cipher, is threatened beneficial to user When, concealed warning fully improves the security of intelligent entrance guard.
One of ordinary skill in the art will appreciate that realizing all or part of flow process in above-described embodiment method, can be Related hardware is instructed to complete by computer program, described program can be stored in a computer read/write memory medium In, the program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, abbreviation ROM) or random access memory (Random Access Memory, abbreviation RAM) etc..
Above disclosed is only present pre-ferred embodiments, can not limit the right model of the present invention with this certainly Enclose, therefore the equivalent variations made according to the claims in the present invention, still belong to the scope that the present invention is covered.

Claims (10)

1. it is a kind of based on mobile terminal respond method, it is characterised in that include:
Remote monitoring server is that validated user distributes authorization code;
The registration request of intelligent entrance guard receiving user's input and sending to remote monitoring server verified, the registration request In comprising user input authorization code information;
Remote monitoring server verifies to authorization code, and notifying that the intelligent entrance guard receives the registration after being verified please Ask;
After registration request is received, the intelligent entrance guard points out the log-in password of user input first;
Mobile terminal shows the nine grids of subsidiary Digital ID by touch screen, points out user to select at least two grid to be input into not Same fingerprint, the Digital ID of the grid selected user and the user fingerprints collected on the grid carry out predetermined encryption calculation The encryption of method, generates the first log-in password;
First log-in password is sent to the intelligent entrance guard by mobile terminal;
The intelligent entrance guard has been collected after the first log-in password, keeps wirelessly being connected and pointing out user defeated with the mobile terminal Enter the second log-in password, second log-in password is for numerical ciphers or to press mobile terminal touch screen first in Preset Time The pressing code of the number of region first time and pressing mobile terminal touch screen second number of second area, and second log-in password Including the user cipher for opening gate and for opening gate and the alarm cipher reported to the police;
When user needs opening gate, the intelligent entrance guard receive user is close by the first registration that the mobile terminal sends Code, is decrypted and verifies according to default decipherment algorithm corresponding with the predetermined encryption algorithm;
After first log-in password is verified, the intelligent entrance guard points out the log-in password of user input second;
The mobile terminal senses the compression number of user, generates the second log-in password and sends to the intelligent entrance guard;
When second log-in password is verified as user cipher, opening gate, when second log-in password is verified as reporting to the police During password, opening gate is simultaneously reported to the police.
2. the method for claim 1, it is characterised in that when second log-in password is verified as alarm cipher, also Including:
Remote monitoring server carries out recognition of face and amplifies face to carry out by monitoring camera to user and its at one's side personnel Take pictures, preserve the result of recognition of face and the photo of shooting.
3. the method for claim 1, it is characterised in that also include:
The intelligent entrance guard sends first log-in password and second log-in password to the remote monitoring server Preserve;
When the intelligent entrance guard is changed, the remote monitoring server sends the code data of preservation to replacing Intelligent entrance guard.
4. the method for claim 1, it is characterised in that when second log-in password is verified as alarm cipher, also Including:
User's emergency number set in advance is dialed on the mobile terminal backstage.
5. the method as described in any one of claim 1-4, it is characterised in that the grid random alignment in the nine grids, institute Predetermined encryption algorithm and the default decipherment algorithm are stated for unsymmetrical key, and the predetermined encryption algorithm and the default decryption Algorithm association and simultaneously dynamic change.
6. a kind of system, it is characterised in that include:
Remote monitoring server, for distributing authorization code for validated user;
Intelligent entrance guard, the registration request for receiving user's input and sending to remote monitoring server verified, the note Authorization code information comprising user input in volume request;
The remote monitoring server is additionally operable to verify authorization code, is verified and notify afterwards the intelligent entrance guard acceptance The registration request;
After registration request is received, the intelligent entrance guard is additionally operable to point out the log-in password of user input first;
Mobile terminal, for showing the nine grids of subsidiary Digital ID by touch screen, points out user to select at least two grid The different fingerprint of input, the Digital ID of the grid selected user and the user fingerprints collected on the grid are preset The encryption of AES, generates the first log-in password;And first log-in password is sent into the intelligent entrance guard;
The intelligent entrance guard has been collected after the first log-in password, keeps wirelessly being connected and pointing out user defeated with the mobile terminal Enter the second log-in password, second log-in password is for numerical ciphers or to press mobile terminal touch screen first in Preset Time The pressing code of the number of region first time and pressing mobile terminal touch screen second number of second area, and second log-in password Including the user cipher for opening gate and for opening gate and the alarm cipher reported to the police;When user needs opening gate When, the intelligent entrance guard is additionally operable to the first log-in password that receive user is sent by the mobile terminal, according to pre- with described If the corresponding default decipherment algorithm of AES is decrypted and verifies;After first log-in password is verified, institute State the intelligent entrance guard prompting log-in password of user input second;
The mobile terminal is additionally operable to sense the compression number of user, generates the second log-in password and sends to the intelligent entrance guard;
The intelligent entrance guard is additionally operable to when second log-in password is verified as user cipher, opening gate, when described second When log-in password is verified as alarm cipher, opening gate is simultaneously reported to the police.
7. system as claimed in claim 6, it is characterised in that the remote monitoring server is additionally operable to:
When second log-in password is verified as alarm cipher, by monitoring camera, to user and its at one's side personnel enter pedestrian Face recognizes and amplifies face and taken pictures, and preserves the result of recognition of face and the photo of shooting.
8. system as claimed in claim 6, it is characterised in that the intelligent entrance guard is additionally operable to:
First log-in password and second log-in password are sent to the remote monitoring server and is preserved;
The remote monitoring server is additionally operable to:
When the intelligent entrance guard is changed, the remote monitoring server sends the code data of preservation to replacing Intelligent entrance guard.
9. system as claimed in claim 6, it is characterised in that when second log-in password is verified as alarm cipher, institute State mobile terminal and be additionally operable to backstage and dial user's emergency number set in advance.
10. the system as described in any one of claim 6-9, it is characterised in that the grid random alignment in the nine grids, institute Predetermined encryption algorithm and the default decipherment algorithm are stated for unsymmetrical key, and the predetermined encryption algorithm and the default decryption Algorithm association and simultaneously dynamic change.
CN201611076669.4A 2016-11-29 2016-11-29 Mobile terminal response based method and system Pending CN106683239A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611076669.4A CN106683239A (en) 2016-11-29 2016-11-29 Mobile terminal response based method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611076669.4A CN106683239A (en) 2016-11-29 2016-11-29 Mobile terminal response based method and system

Publications (1)

Publication Number Publication Date
CN106683239A true CN106683239A (en) 2017-05-17

Family

ID=58867288

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611076669.4A Pending CN106683239A (en) 2016-11-29 2016-11-29 Mobile terminal response based method and system

Country Status (1)

Country Link
CN (1) CN106683239A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110021099A (en) * 2018-01-04 2019-07-16 台湾福兴工业股份有限公司 Electronic lock and in an electronic lock increase newly a user method
CN111369718A (en) * 2020-03-16 2020-07-03 杭州涂鸦信息技术有限公司 Method and system for marking and notifying intelligent door lock hijack function

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1173506A (en) * 1997-08-28 1999-03-16 Nec Corp Method and device for identification by fingerprint matching
CN1320254A (en) * 1999-08-28 2001-10-31 伯格株式会社 Method for controlling fingerprint identification door lock system
CN102110320A (en) * 2010-12-23 2011-06-29 汉王科技股份有限公司 Coerce alarm method and entrance guard control equipment in entrance guard system
CN105117630A (en) * 2015-08-21 2015-12-02 宇龙计算机通信科技(深圳)有限公司 Fingerprint authentication method, fingerprint authentication apparatus, and terminal
CN105872104A (en) * 2016-06-12 2016-08-17 深圳益强信息科技有限公司 Method and system for managing intelligent entrance guard by combining mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1173506A (en) * 1997-08-28 1999-03-16 Nec Corp Method and device for identification by fingerprint matching
CN1320254A (en) * 1999-08-28 2001-10-31 伯格株式会社 Method for controlling fingerprint identification door lock system
CN102110320A (en) * 2010-12-23 2011-06-29 汉王科技股份有限公司 Coerce alarm method and entrance guard control equipment in entrance guard system
CN105117630A (en) * 2015-08-21 2015-12-02 宇龙计算机通信科技(深圳)有限公司 Fingerprint authentication method, fingerprint authentication apparatus, and terminal
CN105872104A (en) * 2016-06-12 2016-08-17 深圳益强信息科技有限公司 Method and system for managing intelligent entrance guard by combining mobile terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110021099A (en) * 2018-01-04 2019-07-16 台湾福兴工业股份有限公司 Electronic lock and in an electronic lock increase newly a user method
CN111369718A (en) * 2020-03-16 2020-07-03 杭州涂鸦信息技术有限公司 Method and system for marking and notifying intelligent door lock hijack function

Similar Documents

Publication Publication Date Title
JP7152466B2 (en) Secure communication method and smart lock system based thereon
CN106815905A (en) A kind of method and system based on mobile terminal checking
CN106656510B (en) A kind of encryption key acquisition methods and system
CN108881304A (en) A kind of pair of internet of things equipment carries out the method and system of safety management
CN107046556A (en) A kind of method and system of checking
CN102945526B (en) A kind of device and method for improving mobile equipment on-line safety of payment
CN106682903B (en) A kind of feedback validation method of bank paying Licensing Authority information
CN101272301B (en) Safety access method of wireless metropolitan area network
CN107579828A (en) Safety certification device and method in machine-to-machine communication between the device based on PUF
CN102262793A (en) Entrance guard control method and entrance guard control system
WO2016001489A1 (en) Lock system and the creation of electronic keys in the lock system
CN105761066A (en) Bank card password protection method and system
CN106033625A (en) Lockset, mobile terminal, lockset control method, and lockset control system
CN107424274A (en) The method, apparatus and intelligent door lock that a kind of intelligent door lock is unlocked
CN106600767A (en) Verification method and system based on identification card
US20120284787A1 (en) Personal Secured Access Devices
CN106683239A (en) Mobile terminal response based method and system
CN106815907A (en) A kind of method and intelligent access control system based on picture password management intelligent entrance guard
CN106780871A (en) A kind of method and system based on mobile terminal alarm
CN106815906A (en) A kind of intelligent entrance guard management method and system based on optic communication
CN106855924A (en) Embedded intelligent chip equipment and background application system
CN107046524A (en) It is a kind of based on ultrasonic wave use intelligent entrance guard method and system
CN106713278A (en) Alarm method and system
CN112637172A (en) Novel data security and confidentiality method
CN102752307B (en) Based on transmission method and the system of the video monitoring data of mark

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170517

RJ01 Rejection of invention patent application after publication