CN106815906A - A kind of intelligent entrance guard management method and system based on optic communication - Google Patents
A kind of intelligent entrance guard management method and system based on optic communication Download PDFInfo
- Publication number
- CN106815906A CN106815906A CN201611088771.6A CN201611088771A CN106815906A CN 106815906 A CN106815906 A CN 106815906A CN 201611088771 A CN201611088771 A CN 201611088771A CN 106815906 A CN106815906 A CN 106815906A
- Authority
- CN
- China
- Prior art keywords
- password
- user
- log
- entrance guard
- intelligent entrance
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Alarm Systems (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
- Collating Specific Patterns (AREA)
Abstract
The embodiment of the invention discloses a kind of intelligent entrance guard management method based on optic communication, including:Intelligent entrance guard receives the registration request of user, and the registration request is sent into remote monitoring server;After registration request is by receiving, intelligent entrance guard prompting user the first log-in password for including optical signal is input into by mobile terminal and comprising encryption after double finger-print ciphers the second log-in password, when user needs opening gate, the intelligent entrance guard receives the first log-in password and the second log-in password that user is input into by mobile terminal, allows user to enter after being verified.The embodiment of the invention also discloses a kind of system.Using the present invention, the security and convenience of intelligent entrance guard can be improved.
Description
Technical field
The present invention relates to intelligent entrance guard technical field, more particularly to a kind of intelligent entrance guard management method based on optic communication and
System.
Background technology
In recent years, intelligent Community quickly grows, and many newly-built cells are provided with safety-protection system, as digital display circuit is hard
The reduction of part cost, increasing cell has used the safety-protection system based on data signal, and starts popularization.Unit gate inhibition
And cell gate inhibition is most basic safety-protection system in intelligent Community, for the producer for moving in, property can typically provide access card use
Come cell unlocking gate inhibition or unit gate inhibition, the authority of every card is different, and generally the access card of producer only allows solution
The gate inhibition of cell and unit where lock, and whether the card number of the foundation opened the door to be exactly user hold access card is legal.
In some cases, if after gate control system authority list is obtained by other people, it is possible to cause the information leakage of authority list,
In the card that the card number programming that obtaining the people of authority list will can know is forged to oneself, so, this card forged can just be obtained
The authority of gate inhibition must be unlocked.In the prior art, generally ensured safety by the way of being encrypted to card number.But, on the one hand, only
Having IC-card can be encrypted, and other such as magnetic cards, ID cards can not be encrypted, this generates limitation.On the other hand, even if IC
Card is encrypted, but still can not prevent from obtaining card number of the people of authority list in authority list to replicate access card.
Therefore, it is poor using gate inhibition's card safety, and sometimes resident family may leave behind or lose access card, this
When, it is necessary to a kind of method of safe and reliable opening gate.
The content of the invention
Embodiment of the present invention technical problem to be solved is, there is provided a kind of intelligent entrance guard manager based on optic communication
Method and system.It is relatively low using the intelligent entrance guard security of access card to solve the problems, such as.
In order to solve the above-mentioned technical problem, embodiment of the present invention first aspect provides a kind of intelligent door based on optic communication
Prohibit management method, including:
Intelligent entrance guard receives the registration request of user, and the registration request is sent into remote monitoring server;
Remote monitoring server display monitoring picture, points out keeper to process the registration request, and the monitored picture is used
Prove user facial image and/or user identity certificate image of the user for resident family so that the keeper confirms user in collection
Identity;
When keeper selection processes the registration request, keeper's input administrator password is pointed out to be managed
Member's authentication, keeper's authentication allows the keeper to receive or refuse the registration request after;
After registration request is by receiving, the intelligent entrance guard points out the log-in password of user input first;
The control mobile terminal display screen that mobile terminal receives user input carries out shading value change with self-defined rule
Instruction, generates dynamic picture;
The intelligent entrance guard is changed by the shading value that loophole scans the dynamic picture, generates the first log-in password;
The intelligent entrance guard has been collected after the first log-in password, is kept wireless connection with the mobile terminal and is pointed out to use
Family is input into the second log-in password;
Mobile terminal shows the nine grids of subsidiary Digital ID by touch screen, points out user to select at least two grid defeated
Enter different fingerprints, the Digital ID of the grid selected user and the user fingerprints collected on the grid carry out default adding
The encryption of close algorithm, generates the second log-in password, and second log-in password is sent into the intelligent entrance guard;
When user needs opening gate, the dynamic picture that the intelligent entrance guard scanning mobile terminal shows is registered to first
Password is verified;
After first log-in password is verified, the intelligent entrance guard points out the log-in password of user input second,
The second log-in password that user is sent by the mobile terminal is received, according to default solution corresponding with the predetermined encryption algorithm
Close algorithm is decrypted and verifies;
After second log-in password is verified, it is allowed to which user enters.
Embodiment of the present invention second aspect provides a kind of system, including:
Intelligent entrance guard, the registration request for receiving user, and the registration request is sent to remote monitoring server;
Remote monitoring server, for display monitoring picture, points out keeper to process the registration request, the monitoring picture
Face is used to gather proves user facial image and/or user identity certificate image of the user for resident family so that the keeper confirms
User identity;When keeper selection processes the registration request, keeper's input administrator password is pointed out to be managed
Reason person's authentication, keeper's authentication allows the keeper to receive or refuse the registration request after;
After registration request is by receiving, the intelligent entrance guard is additionally operable to point out the log-in password of user input first;
Mobile terminal, the control mobile terminal display screen for receiving user input carries out shading value change with self-defined rule
The instruction of change, generates dynamic picture;
The shading value that the intelligent entrance guard is additionally operable to scan the dynamic picture by loophole changes, and generation first is registered
Password;The intelligent entrance guard has been collected after the first log-in password, is kept wireless connection with the mobile terminal and is pointed out user
It is input into the second log-in password;Mobile terminal is additionally operable to be shown by touch screen the nine grids of subsidiary Digital ID, points out user choosing
Select the different fingerprints of at least two grid input, the Digital ID of the grid selected user and the use collected on the grid
Family fingerprint carries out the encryption of predetermined encryption algorithm, generates the second log-in password, and second log-in password is sent into institute
State intelligent entrance guard;When user needs opening gate, the dynamic picture that the intelligent entrance guard scanning mobile terminal shows is to first
Log-in password is verified;After first log-in password is verified, the intelligent entrance guard points out user input second
Log-in password, receives the second log-in password for being sent by the mobile terminal of user, according to the predetermined encryption algorithm pair
The default decipherment algorithm answered is decrypted and verifies;
The intelligent entrance guard is additionally operable to after second log-in password is verified, it is allowed to which user enters.
Implement the embodiment of the present invention, have the advantages that:
Intelligent access control system is connected and composed by by intelligent entrance guard, mobile terminal and remote monitoring server, user passes through
Intelligent entrance guard and remote monitoring server are registered after user identity is confirmed, it is ensured that the correctness of user identity;Then by
Mobile terminal and intelligent entrance guard coordinate first log-in password of the typing comprising optical signal and comprising encryption after double fingerprints the
Two log-in passwords;User can by way of verifying password opening gate, optical signal has been provided with certain peace as password
Quan Xing, and the second log-in password is added, therefore relative to the mode of single password, security is higher, and the second log-in password
Input mode be double fingerprints, crypticity and interesting relatively strong, user input extremely facilitates, beneficial to lifting Consumer's Experience, and hair
What is seen off is the information after encryption, and one layer of security protection, Ke Yi great can be further added by the basis of fingerprint in itself security
Big reduction information is intercepted the risk of leakage, improves the security of system.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to institute in embodiment
The accompanying drawing for needing to use is briefly described, it should be apparent that, drawings in the following description are only some implementations of the invention
Example, for those of ordinary skill in the art, on the premise of not paying creative work, can also obtain according to these accompanying drawings
Obtain other accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of the intelligent entrance guard management method based on optic communication of the embodiment of the present invention;
Fig. 2 is a kind of composition schematic diagram of system of the embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made
Embodiment, belongs to the scope of protection of the invention.
Fig. 1 is refer to, is a kind of schematic flow sheet of the intelligent entrance guard management method based on optic communication of the embodiment of the present invention,
In the present embodiment, the described method comprises the following steps:
S101, intelligent entrance guard receives the registration request of user, and the registration request is sent into remote monitoring server.
S102, remote monitoring server display monitoring picture points out keeper to process the registration request.
Wherein, the monitored picture is used to gather proves that user is user's facial image and/or the user identity card of resident family
Part image confirms user identity so as to the keeper.Keeper can be carried out artificial true by monitored picture to user identity
Recognize, it is also possible to the content of monitored picture is provided with the resident family that resident family preserves on remote monitoring server by remote monitoring server
Material such as photo, identity document information carries out Auto-matching to confirm user identity.
S103, when keeper selection processes the registration request, points out keeper's input administrator password to enter
Row keeper's authentication, keeper's authentication allows the keeper to receive or refuse the registration request after.
Wherein, keeper needs that the registration request of user could be processed after carrying out authentication, can avoid juridical-person
Member arbitrarily refuses the normal registration request of resident family or owner, and unauthorized person can also be avoided arbitrarily to agree to non-resident or non-owner
Illegal registration request, it is ensured that the safety and interests of resident family.
S104, after registration request is by receiving, the intelligent entrance guard points out the log-in password of user input first.
S105, the control mobile terminal display screen that mobile terminal receives user input carries out shading value change with self-defined rule
The instruction of change, generates dynamic picture.
S106, the intelligent entrance guard is changed by the shading value that loophole scans the dynamic picture, and generation first is registered
Password.
Shading value can be classified, and the light sensor in intelligent entrance guard can differentiate the rank of shading value, and user uses shifting
When dynamic terminal is scanned, the startup and stopping of dynamic picture can be controlled.Mode using optic communication is used as log-in password,
Crypticity is stronger, and terminal screen is directly contacted with intelligent entrance guard, and the possibility of leakage is relatively low, therefore security is higher.
S107, the intelligent entrance guard has been collected after the first log-in password, and wireless connection is kept simultaneously with the mobile terminal
The prompting log-in password of user input second.
S108, mobile terminal shows the nine grids of subsidiary Digital ID by touch screen, points out user's selection at least two
Grid is input into different fingerprints, and the Digital ID of the grid selected user and the user fingerprints collected on the grid are carried out
The encryption of predetermined encryption algorithm, generates the second log-in password, and second log-in password is sent into the intelligent entrance guard.
Alternatively, the grid random alignment in the nine grids.Can so avoid checking that user uses by illegal molecule
Which finger fingerprint, cannot also determine the Digital ID of grid.
Due to needing to be input at least two different fingerprints, therefore security is higher than the security of conventional single fingerprint.
And the grid in the nine grids can be with random alignment.The position of so each user input all changes, and is difficult by other
Invalid user stealing.For example, user have selected the 1 lattice input right hand index fingerprint in nine grids, right hand middle finger is input into 6 lattice
Fingerprint, then user can simultaneously with right hand forefinger 1 lattice of percussion when password is verified, right hand middle finger taps 6 lattice, it is of course also possible to first
1 lattice are tapped with right hand forefinger, then 6 lattice are tapped with right hand middle finger, the position of 1 lattice and 6 lattice may change every time, and in unblock
When input fingerprint order can be the same or different, the embodiment of the present invention is not limited in any way.
If worrying that single dynamic picture is inadequate as cipher safety, can also increase by the second log-in password.Example
Such as, in the present embodiment, the security that the second log-in password is used to improve password is just introduced.And second log-in password be nine
The double fingerprints being input on the lattice of palace even many finger-print ciphers, for example, user can respectively press nine grids simultaneously with forefinger and middle finger
In 1 key and 6 keys be input into the second log-in password.Double fingerprints of nine grids will be pressed as the second log-in password, be increased close
The interest of code checking;And the finger print information for sending is the information being encrypted according to predetermined encryption algorithm, therefore referring to
Further safeguard protection has been carried out on the basis of line security.Although there is provided two passwords, user input is very
It is convenient and simple, the nine grids on intelligent entrance guard need to be only pressed after brush identity card, relatively single password both improve
The security of intelligent entrance guard, turn avoid the trouble that Complicated Flow brings, and user experience is preferable.
S109, when user needs opening gate, the dynamic picture that intelligent entrance guard scanning mobile terminal shows is to the
One log-in password is verified.
S110, after first log-in password is verified, the intelligent entrance guard prompting user input second is registered
Password, receives the second log-in password that user is sent by the mobile terminal, according to corresponding with the predetermined encryption algorithm
Default decipherment algorithm is decrypted and verifies.
Alternatively, the predetermined encryption algorithm and the default decipherment algorithm are unsymmetrical key, and the predetermined encryption
Algorithm is associated and while dynamic change with the default decipherment algorithm.
Wherein, symmetric key encryption is also named secret/private key encryption (Secret Key Encryption, SKE), i.e.,
The both sides for sending and receiving data must encrypt and decrypt computing using identical/symmetrical key to plaintext.It is asymmetric
Key encryption be also public key encryption (Public Key Encryption, PKE), refer to everyone have a pair uniquely it is right
The key answered:Public-key cryptography and private cipher key, public key external disclosure, private key are preserved by privacy;With wherein one key come
Encryption, can only just decrypt key with another.The side for sending data is added with the public key of the opposing party to the information for sending
It is close, then it is decrypted with the private key of oneself by recipient.The issue and management that public key encryption technology solves key are asked
Topic, is the core of current commercial code.Using public key technique, the both sides for entering row data communication can safely confirm other side
Identity and public-key cryptography, there is provided the identifiability of communication.
Alternatively, the AES is corresponding with decipherment algorithm and dynamic change simultaneously.For example, many set correspondences can be consulted
Enciphering and deciphering algorithm, followed by every time when using agreement use wherein a set of, mobile terminal can identify letter by transmission algorithm
Cease to inform intelligent entrance guard.So the enciphering and deciphering algorithm of dynamic change can further lifting system security.
Finger print information after sending encryption can provide Double-protection, ground floor as the first log-in password for system
The decryption protection being made up of AES, the second layer is that the complicated calculations being made up of the uniqueness and complexity of finger print information are prevented
Shield so that illegally molecule cannot be cracked or simulating mobile terminal is sent to the signal of intelligent entrance guard, it is ensured that the safety of system.
S111, after second log-in password is verified, it is allowed to which user enters.
In the present embodiment, intelligent entrance guard is connected and composed by by intelligent entrance guard, mobile terminal and remote monitoring server
System, user is registered by intelligent entrance guard and remote monitoring server after user identity is confirmed, it is ensured that user identity
Correctness;Then from typing with mobile terminal and intelligent entrance guard comprising optical signal the first log-in password and comprising encryption after
Double fingerprints the second log-in password;User can by way of verifying password opening gate, optical signal as password,
Possess certain security, and add the second log-in password, therefore relative to the mode of single password, security is higher, and
The input mode of the second log-in password is double fingerprints, and crypticity and interest are relatively strong, and user input extremely facilitates, and is used beneficial to lifting
Family is experienced, and send is the information after encryption, and one layer of safety can be further added by the basis of fingerprint in itself security
Protection, the information that can substantially reduce is intercepted the risk of leakage, improves the security of system.
Alternatively, in addition to intelligent entrance guard locally preserves the first log-in password and the second log-in password is verified, also
Can be verified by remote monitoring server.Although remote monitoring server carries out verifying that possible efficiency can be slightly slow,
Security can be further lifted, especially when intelligent entrance guard breaks down and cannot verify, is carried out by remote monitoring server
Checking, can further lifting system work stability.
When being verified using remote monitoring server, the first log-in password and second can be registered by intelligent entrance guard
Password is sent directly to remote monitoring server and is preserved.
Alternatively, when intelligent entrance guard is damaged or is needed to carry out system update, it is necessary to when changing intelligent entrance guard, the intelligent door
Prohibit to send first log-in password and second log-in password to the remote monitoring server and preserve;
When the intelligent entrance guard is changed, the remote monitoring server sends to replacing the code data of preservation
Intelligent entrance guard afterwards.
So that it is guaranteed that changing the integrality and security of front and rear user data.
Because present cell the elderly is more and more, the first log-in password can be dynamic picture, forget without having to worry about user
Note, but the second log-in password it is easy to forget that.Now can be using following flow come opening gate.
If user forgets second log-in password, after the intelligent entrance guard is proved to be successful to the first log-in password,
The mobile terminal receives the call request of user;
The mobile terminal sends to the remote monitoring server call request, or by the call request
Sent in the way of short message or phone to the mobile phone of the keeper;
After the keeper confirms user identity by monitored picture, remote monitoring server receives the keeper
Remote control open command, open the intelligent entrance guard.
Alternatively, the mobile terminal is mobile phone, panel computer or wearable device.
When multiple authentication failure after for example continuous 3 authentication faileds, then intelligent entrance guard can a period of time in disconnect with
The password authentification request that the mobile terminal sends is rejected in the connection of the mobile terminal within a period of time.
Fig. 2 is refer to, is a kind of composition schematic diagram of system of the embodiment of the present invention, in the present embodiment, the system bag
Include:Remote monitoring server 200, the intelligent entrance guard 100 of mobile terminal 300 and at least one.Intelligent entrance guard 100 is included for being remote
Range monitoring server 200 provides the camera of monitored picture, the scan module for scanning the change of dynamic picture shading value, and
Authentication module for decrypting and verifying password.Remote monitoring server 200 includes display and the service for data storage
Device, mobile terminal include for generate dynamic picture generation module and for gather fingerprint finger print acquisition module and to refer to
The encrypting module of line information encryption.
Specifically, intelligent entrance guard 100, the registration request for receiving user, and the registration request is sent to remotely
Monitoring server;
Remote monitoring server 200, for display monitoring picture, points out keeper to process the registration request, the prison
Control picture is used to gather proves user facial image and/or user identity certificate image of the user for resident family so as to the keeper
Confirm user identity;When keeper selection processes the registration request, keeper's input administrator password is pointed out to enter
Row keeper's authentication, keeper's authentication allows the keeper to receive or refuse the registration request after;
After registration request is by receiving, the intelligent entrance guard 100 is additionally operable to point out the log-in password of user input first;
Mobile terminal 300, the control mobile terminal display screen for receiving user input carries out light and shade with self-defined rule
The instruction of change is spent, dynamic picture is generated;
The shading value that the intelligent entrance guard 100 is additionally operable to scan the dynamic picture by loophole changes, generation first
Log-in password;The intelligent entrance guard has been collected after the first log-in password, is kept wireless connection with the mobile terminal and is pointed out
The log-in password of user input second;Mobile terminal 300 is additionally operable to be shown by touch screen the nine grids of subsidiary Digital ID, points out
User selects the different fingerprints of at least two grid input, the Digital ID to the grid of user's selection and the collection on the grid
To user fingerprints carry out the encryption of predetermined encryption algorithm, generate the second log-in password, second log-in password is sent out
Give the intelligent entrance guard;When user needs opening gate, the dynamic picture that the intelligent entrance guard scanning mobile terminal shows
First log-in password is verified;After first log-in password is verified, the intelligent entrance guard prompting user is defeated
Enter the second log-in password, receive the second log-in password that user is sent by the mobile terminal, according to the predetermined encryption
The corresponding default decipherment algorithm of algorithm is decrypted and verifies;After second log-in password is verified, it is allowed to user
Into.
Alternatively, the grid random alignment in the nine grids.
The predetermined encryption algorithm and the default decipherment algorithm are unsymmetrical key, and the predetermined encryption algorithm and institute
State default decipherment algorithm association and simultaneously dynamic change.
Alternatively, the intelligent entrance guard 100 is additionally operable to:
First log-in password and second log-in password are sent to the remote monitoring server 200 and preserved;
The remote monitoring server 200 is additionally operable to:
When the intelligent entrance guard 100 is changed, the code data that the remote monitoring server 200 will be preserved sends
Intelligent entrance guard to after changing.
Alternatively, if user forgets second log-in password, the intelligent entrance guard 100 is additionally operable to user input
After first log-in password is proved to be successful, the mobile terminal 300 is additionally operable to receive the call request of user;Please by the calling
Transmission is asked to the remote monitoring server, or the call request is sent to the pipe in the way of short message or phone
The mobile phone of reason person;
After the keeper confirms user identity by monitored picture, the remote monitoring server 200 is additionally operable to
The remote control open command of the keeper is received, the intelligent entrance guard is opened.
Wherein, the mobile terminal is mobile phone, panel computer or wearable device.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight
Point explanation is all difference with other embodiments, between each embodiment identical similar part mutually referring to.
For device embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, related part referring to
The part explanation of embodiment of the method.
By the description of above-described embodiment, the present invention has advantages below:
Intelligent access control system is connected and composed by by intelligent entrance guard, mobile terminal and remote monitoring server, user passes through
Intelligent entrance guard and remote monitoring server are registered after user identity is confirmed, it is ensured that the correctness of user identity;Then by
Mobile terminal and intelligent entrance guard coordinate first log-in password of the typing comprising optical signal and comprising encryption after double fingerprints the
Two log-in passwords;User can by way of verifying password opening gate, optical signal has been provided with certain peace as password
Quan Xing, and the second log-in password is added, therefore relative to the mode of single password, security is higher, and the second log-in password
Input mode be double fingerprints, crypticity and interesting relatively strong, user input extremely facilitates, beneficial to lifting Consumer's Experience, and hair
What is seen off is the information after encryption, and one layer of security protection, Ke Yi great can be further added by the basis of fingerprint in itself security
Big reduction information is intercepted the risk of leakage, improves the security of system.
One of ordinary skill in the art will appreciate that all or part of flow in realizing above-described embodiment method, can be
The hardware of correlation is instructed to complete by computer program, described program can be stored in a computer read/write memory medium
In, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic
Dish, CD, read-only memory (Read-Only Memory, abbreviation ROM) or random access memory (Random
Access Memory, abbreviation RAM) etc..
Above disclosed is only present pre-ferred embodiments, can not limit the right model of the present invention with this certainly
Enclose, therefore the equivalent variations made according to the claims in the present invention, still belong to the scope that the present invention is covered.
Claims (10)
1. a kind of intelligent entrance guard management method based on optic communication, it is characterised in that including:
Intelligent entrance guard receives the registration request of user, and the registration request is sent into remote monitoring server;
Remote monitoring server display monitoring picture, points out keeper to process the registration request, and the monitored picture is used to adopt
Integrate the user's facial image and/or user identity certificate image that prove user as resident family so that the keeper confirms user's body
Part;
When keeper selection processes the registration request, the keeper's input administrator password person's of being managed body is pointed out
Part checking, keeper's authentication allows the keeper to receive or refuse the registration request after;
After registration request is by receiving, the intelligent entrance guard points out the log-in password of user input first;
The control mobile terminal display screen of mobile terminal reception user input carries out the instruction of shading value change with self-defined rule,
Generation dynamic picture;
The intelligent entrance guard is changed by the shading value that loophole scans the dynamic picture, generates the first log-in password;
The intelligent entrance guard has been collected after the first log-in password, is kept wireless connection with the mobile terminal and is pointed out user defeated
Enter the second log-in password;
Mobile terminal shows the nine grids of subsidiary Digital ID by touch screen, points out user to select the input of at least two grid not
Same fingerprint, the Digital ID of the grid selected user and the user fingerprints collected on the grid carry out predetermined encryption calculation
The encryption of method, generates the second log-in password, and second log-in password is sent into the intelligent entrance guard;
When user needs opening gate, the dynamic picture that the intelligent entrance guard scanning mobile terminal shows is to the first log-in password
Verified;
After first log-in password is verified, the intelligent entrance guard points out the log-in password of user input second, receives
The second log-in password that user is sent by the mobile terminal, calculates according to default decryption corresponding with the predetermined encryption algorithm
Method is decrypted and verifies;
After second log-in password is verified, it is allowed to which user enters.
2. the method for claim 1, it is characterised in that the grid random alignment in the nine grids.
3. the method for claim 1, it is characterised in that also include:
The intelligent entrance guard sends to the remote monitoring server first log-in password and second log-in password
Preserve;
When the intelligent entrance guard is changed, the remote monitoring server sends to replacing the code data of preservation
Intelligent entrance guard.
4. the method for claim 1, it is characterised in that if user forgets second log-in password, the intelligence
After gate inhibition is proved to be successful to the first log-in password, the mobile terminal receives the call request of user;
The mobile terminal sends to the remote monitoring server call request, or by the call request with short
The mode of information or phone is sent to the mobile phone of the keeper;
After the keeper confirms user identity by monitored picture, remote monitoring server receives the distant of the keeper
Control open command, opens the intelligent entrance guard.
5. the method as described in claim any one of 1-4, it is characterised in that the predetermined encryption algorithm and the default decryption
Algorithm is unsymmetrical key, and the predetermined encryption algorithm associates simultaneously dynamic change simultaneously with the default decipherment algorithm.
6. a kind of system, it is characterised in that including:
Intelligent entrance guard, the registration request for receiving user, and the registration request is sent to remote monitoring server;
Remote monitoring server, for display monitoring picture, points out keeper to process the registration request, and the monitored picture is used
Prove user facial image and/or user identity certificate image of the user for resident family so that the keeper confirms user in collection
Identity;When keeper selection processes the registration request, keeper's input administrator password person of being managed is pointed out
Authentication, keeper's authentication allows the keeper to receive or refuse the registration request after;
After registration request is by receiving, the intelligent entrance guard is additionally operable to point out the log-in password of user input first;
Mobile terminal, the control mobile terminal display screen for receiving user input carries out shading value change with self-defined rule
Instruction, generates dynamic picture;
The shading value that the intelligent entrance guard is additionally operable to scan the dynamic picture by loophole changes, and the registration of generation first is close
Code;The intelligent entrance guard has been collected after the first log-in password, is kept wireless connection with the mobile terminal and is pointed out user defeated
Enter the second log-in password;Mobile terminal is additionally operable to be shown by touch screen the nine grids of subsidiary Digital ID, points out user selection
The different fingerprints of at least two grid input, the Digital ID of the grid selected user and the user collected on the grid
Fingerprint carries out the encryption of predetermined encryption algorithm, generates the second log-in password, second log-in password is sent to described
Intelligent entrance guard;When user needs opening gate, the dynamic picture that the intelligent entrance guard scanning mobile terminal shows is to the first note
Volume password is verified;After first log-in password is verified, the intelligent entrance guard points out the note of user input second
Volume password, receives the second log-in password that user is sent by the mobile terminal, according to corresponding with the predetermined encryption algorithm
Default decipherment algorithm be decrypted and verify;
The intelligent entrance guard is additionally operable to after second log-in password is verified, it is allowed to which user enters.
7. system as claimed in claim 6, it is characterised in that the grid random alignment in the nine grids.
8. system as claimed in claim 6, it is characterised in that the intelligent entrance guard is additionally operable to:
First log-in password and second log-in password are sent to the remote monitoring server and is preserved;
The remote monitoring server is additionally operable to:
When the intelligent entrance guard is changed, the remote monitoring server sends to replacing the code data of preservation
Intelligent entrance guard.
9. system as claimed in claim 6, it is characterised in that if user forgets second log-in password, the intelligence
After gate inhibition is additionally operable to be proved to be successful the first log-in password of user input, the mobile terminal is additionally operable to receive exhaling for user
Cry request;The call request is sent to the remote monitoring server, or by the call request with short message or electricity
The mode of words is sent to the mobile phone of the keeper;
After the keeper confirms user identity by monitored picture, the remote monitoring server is additionally operable to receive described
The remote control open command of keeper, opens the intelligent entrance guard.
10. the system as described in claim any one of 6-9, it is characterised in that the predetermined encryption algorithm and the default solution
Close algorithm is unsymmetrical key, and the predetermined encryption algorithm associates simultaneously dynamic change simultaneously with the default decipherment algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611088771.6A CN106815906A (en) | 2016-11-29 | 2016-11-29 | A kind of intelligent entrance guard management method and system based on optic communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611088771.6A CN106815906A (en) | 2016-11-29 | 2016-11-29 | A kind of intelligent entrance guard management method and system based on optic communication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106815906A true CN106815906A (en) | 2017-06-09 |
Family
ID=59106889
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611088771.6A Pending CN106815906A (en) | 2016-11-29 | 2016-11-29 | A kind of intelligent entrance guard management method and system based on optic communication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106815906A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108876977A (en) * | 2018-04-23 | 2018-11-23 | 安徽展航信息科技发展有限公司 | A kind of intelligent unlocking system based on optic communication |
CN112291281A (en) * | 2019-07-09 | 2021-01-29 | 钉钉控股(开曼)有限公司 | Voice broadcast and voice broadcast content setting method and device |
CN113761494A (en) * | 2021-09-07 | 2021-12-07 | 山东产研信息与人工智能融合研究院有限公司 | Management method, device and equipment for electronic seal lock handheld terminal |
CN114999030A (en) * | 2022-05-25 | 2022-09-02 | 杭州萤石软件有限公司 | Unlocking method, system, electronic equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102982593A (en) * | 2011-09-06 | 2013-03-20 | 上海博路信息技术有限公司 | Electronic key system based on mobile terminal |
CN103198550A (en) * | 2013-04-10 | 2013-07-10 | 浙江省邮电工程建设有限公司 | Intelligent entrance guard system and entrance guard control method by adopting intelligent mobile phone |
US20150267438A1 (en) * | 2014-03-19 | 2015-09-24 | Meghan Martinez | Wireless door locking system |
CN105117630A (en) * | 2015-08-21 | 2015-12-02 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint authentication method, fingerprint authentication apparatus, and terminal |
CN105869255A (en) * | 2016-06-12 | 2016-08-17 | 深圳益强信息科技有限公司 | Intelligent access control method and system based on mobile terminal |
-
2016
- 2016-11-29 CN CN201611088771.6A patent/CN106815906A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102982593A (en) * | 2011-09-06 | 2013-03-20 | 上海博路信息技术有限公司 | Electronic key system based on mobile terminal |
CN103198550A (en) * | 2013-04-10 | 2013-07-10 | 浙江省邮电工程建设有限公司 | Intelligent entrance guard system and entrance guard control method by adopting intelligent mobile phone |
US20150267438A1 (en) * | 2014-03-19 | 2015-09-24 | Meghan Martinez | Wireless door locking system |
CN105117630A (en) * | 2015-08-21 | 2015-12-02 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint authentication method, fingerprint authentication apparatus, and terminal |
CN105869255A (en) * | 2016-06-12 | 2016-08-17 | 深圳益强信息科技有限公司 | Intelligent access control method and system based on mobile terminal |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108876977A (en) * | 2018-04-23 | 2018-11-23 | 安徽展航信息科技发展有限公司 | A kind of intelligent unlocking system based on optic communication |
CN112291281A (en) * | 2019-07-09 | 2021-01-29 | 钉钉控股(开曼)有限公司 | Voice broadcast and voice broadcast content setting method and device |
CN112291281B (en) * | 2019-07-09 | 2023-11-03 | 钉钉控股(开曼)有限公司 | Voice broadcasting and voice broadcasting content setting method and device |
CN113761494A (en) * | 2021-09-07 | 2021-12-07 | 山东产研信息与人工智能融合研究院有限公司 | Management method, device and equipment for electronic seal lock handheld terminal |
CN114999030A (en) * | 2022-05-25 | 2022-09-02 | 杭州萤石软件有限公司 | Unlocking method, system, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jiang et al. | Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles | |
CN101350724B (en) | Encrypting method base on biology characteristic information | |
CN104933793B (en) | A kind of two-dimensional code electronic key implementation method based on digital signature | |
CN108055235A (en) | A kind of control method of smart lock, relevant device and system | |
CN103327002A (en) | Cloud storage access control system based on attribute | |
CA2949847A1 (en) | System and method for secure deposit and recovery of secret data | |
CN103634477A (en) | Method and system for preventing thievery of mobile phone with fingerprint device | |
CN106815906A (en) | A kind of intelligent entrance guard management method and system based on optic communication | |
CN108900296B (en) | Secret key storage method based on biological feature identification | |
CN101674575A (en) | Method for protecting security of mobile communication terminal data and device thereof | |
CN106815905A (en) | A kind of method and system based on mobile terminal checking | |
CN102891749A (en) | Method and communication terminal for data encryption | |
CN107046556A (en) | A kind of method and system of checking | |
CN106600767A (en) | Verification method and system based on identification card | |
CN106033625A (en) | Lockset, mobile terminal, lockset control method, and lockset control system | |
CN106815907A (en) | A kind of method and intelligent access control system based on picture password management intelligent entrance guard | |
CN107046524A (en) | It is a kind of based on ultrasonic wave use intelligent entrance guard method and system | |
CN105959116B (en) | A kind of password input system and method cryptographically inputting password | |
US7587051B2 (en) | System and method for securing information, including a system and method for setting up a correspondent pairing | |
CN110738764A (en) | Security control system and method based on intelligent lock | |
CN106855924A (en) | Embedded intelligent chip equipment and background application system | |
CN108055124A (en) | Lock administration system and lock management method | |
CN106713278A (en) | Alarm method and system | |
CN106780871A (en) | A kind of method and system based on mobile terminal alarm | |
CN106683239A (en) | Mobile terminal response based method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170609 |