CN107123181A - A kind of access control method and system - Google Patents

A kind of access control method and system Download PDF

Info

Publication number
CN107123181A
CN107123181A CN201710245237.XA CN201710245237A CN107123181A CN 107123181 A CN107123181 A CN 107123181A CN 201710245237 A CN201710245237 A CN 201710245237A CN 107123181 A CN107123181 A CN 107123181A
Authority
CN
China
Prior art keywords
authorization code
information
visitor
access controller
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710245237.XA
Other languages
Chinese (zh)
Inventor
李东声
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tendyron Corp
Tendyron Technology Co Ltd
Original Assignee
Tendyron Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tendyron Technology Co Ltd filed Critical Tendyron Technology Co Ltd
Priority to CN201710245237.XA priority Critical patent/CN107123181A/en
Publication of CN107123181A publication Critical patent/CN107123181A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention provides a kind of access control method and system, and wherein method includes:Authorisation device obtains the first authorization code, pending data is encrypted computing using the key of authorisation device, obtains encryption data, wherein, pending data includes:First authorization code;Authorisation device sends authority checking information to access controller, wherein, authority checking information includes:Encryption data;Access controller receives authority checking information;Access controller obtains the second authorization code;Access controller is at least verified using the second authorization code to encryption data;Obtain use condition information and simultaneously judge whether the use of the second authorization code meets use condition information, if being verified and the use of the second authorization code meets use condition information, the unlatching of access controller access control.

Description

A kind of access control method and system
Technical field
The present invention relates to a kind of electronic technology field, more particularly to a kind of access control method and system.
Background technology
At present, it is the security of raising building, the entrance at some building gates and each entrance would generally be provided with gate inhibition.Building Resident family in the world is normally come in and gone out gate inhibition control area using the access card of their own, and the personnel without access card then cannot be introduced into Access control region.
With the fast development of internet, increasing user's selection is taken out or net by shopping at network, ONLINE Upper application electrical maintenance etc., as attendant such as courier or maintenance mans, it is desirable to provide controlled positioned at gate inhibition the position of service When in region processed, visitor generally cannot be introduced into access control region.How so that the visitor without authority of entering is providing the user The security that during service or can enter cell when accessing resident family does not influence cell to manage in itself simultaneously is urgent problem.
The content of the invention
Present invention seek to address that above mentioned problem.
It is a primary object of the present invention to provide a kind of access control method, including:Authorisation device obtains the first authorization code, Computing is encrypted to pending data using the key of authorisation device, encryption data is obtained, wherein, pending data includes: First authorization code;Authorisation device sends authority checking information to access controller, wherein, authority checking information includes:Encryption Data;Access controller receives authority checking information;Access controller obtains the second authorization code;Access controller at least uses the Two authorization codes are verified to encryption data;Obtain use condition information and judge whether the use of the second authorization code meets and use Conditional information, if being verified and the use of the second authorization code meets use condition information, access controller access control is opened Open.
In addition, the first authorization code includes:Visitor's identity information, the second authorization code includes:Visitor's identity information;Or, the One authorization code includes:The licencing key of authorisation device generation, the second authorization code includes:Licencing key;Or, the first authorization code bag Include:Visitor's identity information and licencing key, the second authorization code include:Visitor's identity information and licencing key.
In addition, before access controller obtains the second authorization code, method also includes:Authorisation device sends out the first authorization code Deliver to visitor device and/or application system;Visitor device and/or application system send the first authorization code to access controller;Door Prohibit controller and obtain the second authorization code, including:Access controller receives the first mandate that visitor device and/or application system are sent Code, and using the first authorization code as the second authorization code, or, before access controller obtains the second authorization code, method is also wrapped Include:Authorisation device sends the first authorization code to visitor device and/or application system;Visitor device and/or application system prompting First authorization code;Access controller obtains the second authorization code, including:Access controller receives the first authorization code of input, and will First authorization code is used as the second authorization code.
In addition, in the case where the second authorization code includes visitor's identity information, access controller obtains the second authorization code, bag Include:Access controller obtains visitor's identity information, wherein, visitor's identity information is the certificate information of visitor or the biological knowledge of visitor Other information.
In addition, pending data is also including the use of conditional information, authority checking information is also including the use of conditional information;Authorize Equipment pending data is encrypted computing using the encryption key of authorisation device, including:Authorisation device is to pending data Signed, obtain signing messages;Access controller at least verified using the second authorization code to encryption data, including:Door Prohibit controller and sign test is carried out to signing messages using the second authorization code and use condition information;Or, access controller at least makes Encryption data is verified with the second authorization code, including;Access controller obtains the first authorization code after being decrypted to encryption data, Second authorization code is compared with the first authorization code.
In addition, use condition information includes access times information and/or uses effective time information;Access controller judges Whether the use of the second authorization code meets use condition information, including:Include the feelings of access times information in use condition information Under condition, access controller counts the access times of the second authorization code, judges whether the access times of the second authorization code are less than or wait In access times information, if access times are less than or equal to access times information, the second authorization code meets access times information; In the case where use condition information is including the use of effective time information, access controller records the currently used of the second authorization code Time, the currently used time is judged whether in the range of using effective time information, if the currently used time is using effective In the range of temporal information, then the second authorization code, which meets, uses effective time information.
Another object of the present invention is to provide a kind of access control system, including:Authorisation device, is awarded for obtaining first Weighted code, pending data is encrypted computing using the key of authorisation device, obtains encryption data, wherein, pending data Including:First authorization code;Authority checking information is sent to access controller, wherein, authority checking information includes:Encrypt number According to;Access controller, for receiving authority checking information;Obtain the second authorization code;At least using the second authorization code to encryption number According to being verified;Obtain use condition information and judge whether the use of the second authorization code meets use condition information, if checking By and the use of the second authorization code meets use condition information, then access controller access control is opened.
In addition, the first authorization code includes:Visitor's identity information, the second authorization code includes:Visitor's identity information;Or, the One authorization code includes:The licencing key of authorisation device generation, the second authorization code includes:Licencing key;Or, the first authorization code bag Include:Visitor's identity information and licencing key, the second authorization code include:Visitor's identity information and licencing key.
In addition, system also includes visitor device and/or application system;Wherein:Authorisation device, is additionally operable in access controller Obtain before the second authorization code, the first authorization code is sent to visitor device and/or application system;Visitor device and/or application System, for sending the first authorization code to access controller;Access controller, for obtaining the second authorization code, including:Gate inhibition is controlled Device processed, is authorized for receiving the first authorization code that visitor device and/or application system are sent, and using the first authorization code as second Code;Or, authorisation device is additionally operable to before access controller obtains the second authorization code, the first authorization code is sent to visitor Equipment and/or application system;Visitor device and/or application system, for pointing out the first authorization code;Access controller, for obtaining The second authorization code is taken, including:Access controller receives the first authorization code of input, and is authorized the first authorization code as second Code.
In addition, access controller, for obtaining the second authorization code, including:Include visitor's identity information in the second authorization code In the case of, access controller obtains visitor's identity information, wherein, visitor's identity information is certificate information or the visitor of visitor Biometric information.
In addition, pending data is also including the use of conditional information, authority checking information is also including the use of conditional information;Authorize Equipment, pending data is encrypted computing for the encryption key using authorisation device, including:Authorisation device, for pair Pending data is signed, and obtains signing messages;Access controller, at least being entered using the second authorization code to encryption data Row checking, including:Access controller, for carrying out sign test to signing messages using the second authorization code and use condition information;Or Person, access controller, at least being verified using the second authorization code to encryption data, including;Access controller, for pair The first authorization code is obtained after encryption data decryption, the second authorization code is compared with the first authorization code.
In addition, use condition information includes access times information and/or uses effective time information;Access controller, is used Whether meet use condition information in the use for judging the second authorization code, including:Believe in use condition information including access times In the case of breath, access controller counts the access times of the second authorization code, judges whether the access times of the second authorization code are small In or equal to access times information, if access times are less than or equal to access times information, the second authorization code meets using secondary Number information;In the case where use condition information is including the use of effective time information, access controller records the second authorization code The currently used time, the currently used time is judged whether in the range of using effective time information, if the currently used time exists In the range of effective time information, then the second authorization code, which meets, uses effective time information.
As seen from the above technical solution provided by the invention, authorisation device is obtained after the first authorization code, to including the Computing is encrypted in the pending data of one authorization code, obtains encryption data, and the authority checking information including encryption data is sent out Access controller is delivered to, access controller is obtained the second authorization code, encryption data is verified using the second authorization code, tested Card pass through and the second authorization code use meet use condition information in the case of, access control open.Provided with access control In the gate inhibition of device, even if the access card of the not no gate inhibition of visitor, it would however also be possible to employ the scheme in the present embodiment, i.e., awarded using second Weighted code verifies to encryption data, if the verification passes and the use of the second authorization code meets use condition information, then can pass through door Prohibit, and management of the realization that the user for holding authorisation device can then stay indoors to visitor's authority, such as pass through the first authorization code control Whether system allows the visitor by gate inhibition, controls the visitor can be by the number of times of gate inhibition or time etc. by using conditional information Deng being guaranteed safety while providing the user convenient, also, send the first authorization code to visitor device in authorisation device And/or application system, in the case that authority checking information is sent to access controller, first authorization code and authority checking information Because receiving device is different, the transmission of information employs different communication port (i.e. first communication ports:Authorisation device is sent Authority checking information is to access controller;Article 2 communication port:Authorisation device send the first authorization code to visitor device and/or Application system, then to access controller), illegal invasion person is difficult to while the first authorization code and authority checking information are cut simultaneously Obtain, in the case where only intercepting and capturing one of information, it is impossible to by checking, further increase the security of gate inhibition.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, being used required in being described below to embodiment Accompanying drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this For the those of ordinary skill in field, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings Accompanying drawing.
Fig. 1 is the flow chart for the access control method that the embodiment of the present invention 1 is provided;
Fig. 2 is the system block diagram for the access control system that the embodiment of the present invention 2 is provided;
Fig. 3 is the system block diagram of an optional embodiment of the access control system that the embodiment of the present invention 2 is provided.
Embodiment
With reference to the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Ground is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Based on this The embodiment of invention, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to protection scope of the present invention.
In the description of the invention, it is to be understood that term " " center ", " longitudinal direction ", " transverse direction ", " on ", " under ", The orientation or position relationship of the instruction such as "front", "rear", "left", "right", " vertical ", " level ", " top ", " bottom ", " interior ", " outer " are Based on orientation shown in the drawings or position relationship, it is for only for ease of the description present invention and simplifies description, rather than indicate or dark Specific orientation must be had, with specific azimuth configuration and operation by showing the device or element of meaning, therefore it is not intended that right The limitation of the present invention.In addition, term " first ", " second " are only used for describing purpose, and it is not intended that indicating or implying and be relative Importance or quantity or position.
In the description of the invention, it is necessary to illustrate, unless otherwise clearly defined and limited, term " installation ", " phase Even ", " connection " should be interpreted broadly, for example, it may be being fixedly connected or being detachably connected, or be integrally connected;Can To be mechanical connection or electrical connection;Can be joined directly together, can also be indirectly connected to by intermediary, Ke Yishi The connection of two element internals.For the ordinary skill in the art, with concrete condition above-mentioned term can be understood at this Concrete meaning in invention.
The embodiment of the present invention is described in further detail below in conjunction with accompanying drawing.
Embodiment 1
A kind of access control method is present embodiments provided, this method flow is suitable for access control system, the gate inhibition Control system can include:Authorisation device, visitor device/application system and access controller, wherein, authorisation device can be The terminal device (for example, mobile phone, PC, door control interphone etc.) that resident family holds, visitor device can be that the hand-held terminal of visitor is set It is standby (such as mobile phone, computer, other it is portable can be communication apparatus), application system can be mounted in the terminal that visitor holds Application software or third-party application Business Management Platform (for example, express delivery management platform, food delivery service management Platform etc.), access controller can be the control device for controlling door lock to open and close, and may be mounted on door can also be in door Vicinity, be easy to visitor to input information to be verified.
Fig. 1 is a kind of flow chart for access control method that the present embodiment is provided, as shown in figure 1, this method is including as follows Step:
Step 101, authorisation device obtains the first authorization code, and pending data is encrypted using the key of authorisation device Computing, obtains encryption data, wherein, pending data includes:First authorization code.
In the present embodiment, access request can be sent from visitor device to authorisation device, triggering authorisation device obtains first Authorization code, also can send access request, triggering authorisation device obtains the first authorization code, can be with from application system to authorisation device Authorisation device is directly triggered by the user of authorisation device, authorisation device obtains the first authorization code.From visitor device to authorisation device Access request is sent, optionally, visitor can add the time and/or number of times demand by gate inhibition in access request, and mandate is set The time for passing through gate inhibition for the visitor that after the access request is received, can be further determined whether in the agreement access request And/or number of times demand, if agreed to, time that can be directly by the visitor in the access request by gate inhibition and/or number of times demand Included in use condition information, if disagreed, be rejected by the access request or voluntarily set visitor by gate inhibition when Between and/or number of times, improve the security and convenience of access control system;Send to access from application system to authorisation device and ask Ask, can be managed by application system to whether being added in access request by information such as the time of gate inhibition and/or number of times demands, Avoid illegal visitor device user from sending unauthorized access request to authorisation device, improve the security of access control system;By The user of authorisation device actively triggers authorisation device, and the user can independently judge whether to trigger authorisation device according to demand, enter one The security of step increase access control system.
In an optional embodiment of the present embodiment, the first authorization code includes:Visitor's identity information, or, authorize The licencing key of equipment generation, or, visitor's identity information and licencing key.In this optional embodiment, visitor's identity letter Breath can be pre-stored in authorisation device or authorisation device to receive external equipment transmission or authorisation device use Family input;Licencing key can be pre-stored in authorisation device or authorisation device to receive external equipment transmission Or authorisation device user's input, can also be generation inside authorisation device, when visitor's identity information is set by outside When preparation is sent, the external equipment can be visitor device/application system or other equipment, and the visitor's identity information may be embodied in In the access request that visitor device/application system is sent.Visitor's identity information can be the ID card information of visitor, visitor its His certificate information, biometric information of visitor etc., licencing key can be one group of random number, character, character and random number Combination etc..When the first authorization code includes visitor's identity information, authorisation device need not send the visitor's identity information to visit Objective equipment/application system, reduces the operand of authorisation device, also reduces what information was tampered or stolen in transmitting procedure Risk, visitor only need using certificate or provide biometric information can opening gate, improve gate inhibition by efficiency, simultaneously Improve the security of gate inhibition;Using random number or the Form generation licencing key of character, it is fixation that can avoid licencing key Numeral or the risk brought for gate control system during character.
In this step, computing is encrypted to pending data using the key of authorisation device, can is using mandate The private key of equipment is signed to pending data, or computing is encrypted to pending data using symmetric key, can be with Computing is carried out to pending data using MAC algorithms, encryption data is obtained.Pending data is entered using the private key of authorisation device Row signature, it is ensured that encryption data is the true mandate of the holder of authorisation device;Computing is encrypted to pending data, protects Hindered the security of the first authorization code, reduce the first authorization code in transmitting procedure be stolen or caused after distorting illegally enter Blepharoptosis danger, improves the security of gate inhibition.
Step 102, authorisation device sends authority checking information to access controller, wherein, authority checking information includes: Encryption data.
Step 103, access controller receives authority checking information.
Step 104, access controller obtains the second authorization code.
In the present embodiment, the content that the second authorization code includes is corresponding with the content that the first authorization code includes, i.e.,: In the case that one authorization code includes visitor's identity information, the second authorization code also at least includes visitor's identity information, wherein, Fang Keshen Part information includes:Visitor's certificate information and/or the biometric information of visitor, access controller, which obtains the second authorization code, to be included Visitor's identity information, can be that access controller directly obtains (as scan) certificate that visitor holds, obtain the visit of the certificate Objective identity information or access controller directly obtain the visitors' such as iris information, finger print information, the palmprint information of visitor Biometric information;In the case where the first authorization code includes the licencing key that authorisation device is generated, the second licencing key is also extremely Include licencing key less.When the first authorization code and the second authorization code only include licencing key, access controller is received by it Unit (such as keyboard, communication interface, identification code scanner) obtains user's input, external equipment transmission or external equipment and shown The second authorization code, i.e. access controller can complete the acquisition of the second authorization code using the hardware device of simple structure, reduce The cost of access controller;When the first authorization code and the second authorization code include visitor's identity information, access controller can lead to Cross its read module (such as card reading module, fingerprint identification module, iris recognition module, personal recognition module) and read visitor's certificate The mode of information and/or the biometric information of visitor reads the second authorization code, the life based on visitor's certificate information and/or visitor The uniqueness of thing identification information, further increases the security of gate control system.
In an optional embodiment of the present embodiment, before step 104, in addition to:Authorisation device is authorized first Code is sent to visitor device and/or application system;Visitor device and/or application system send the first authorization code to access control Device.Access controller obtains the second authorization code in step 104, can be following scheme:Access controller receive visitor device and/ Or the first authorization code that application system is sent, and it regard the first authorization code as the second authorization code.In this optional embodiment, visitor Equipment and/or application system send the first authorization code to access controller, can be that visitor device passes through wired or wireless way Set up and be connected with access controller, directly the first authorization code is sent to access controller or, when application system is to pacify During application software in the visitor device that visitor holds, visitor device is built by wired or wireless way with access controller Vertical connection, visitor device or visitor's triggering application system are sent the first authorization code to access controller by visitor device, also Can be that, when application system is third-party application Business Management Platform, application system sets up network connection with access controller, Visitor device or visitor's triggering application system are sent the first authorization code to access controller by network.Visitor device and/or Application system is set up by wired or wireless way and access controller to be connected and sends the first authorization code, reduces the behaviour of visitor Measure, efficiency is reduced caused by also reducing the input error of visitor.
In another optional embodiment of the present embodiment, before step 104, in addition to:Authorisation device is awarded first Weighted code is sent to visitor device and/or application system;Visitor device and/or application system point out the first authorization code.In step 104 Access controller obtain the second authorization code, can be access controller obtain user input content as the second authorization code, Can be that access controller scans the content of user's offer as the second authorization code:Second is obtained to above-mentioned access controller below The two ways of authorization code is illustrated:Mode one:Access controller receives the first authorization code of input, and first is awarded Weighted code can point out visitor to have been received by the first authorization code, visitor as the second authorization code, i.e. visitor device and/or application system First authorization code can be read, and is inputted on access controller, the mode of the first authorization code is inputted in above-mentioned visitor In, access controller need not be set up with visitor device and be connected, and access controller and visitor device need not set corresponding communication Module, reduces the manufacturing cost of access controller and visitor device;Mode two:Access controller receives first scanned and awarded Weighted code, and receive first can be awarded the first authorization code as the second authorization code, i.e. visitor device and/or application system Weighted code is converted to Quick Response Code or bar code and shown, is scanned by the scanner of access controller, above-mentioned access control Device obtains the first authorization code by way of scanning, visitor need not be manually entered the first authorization code, it is to avoid because being manually entered and Caused efficiency decrease problem.
In the case where authorisation device sends the first authorization code to visitor device and/or application system, first mandate Code is from authority checking information because receiving device is different, and the transmission of information employs different communication port (i.e. first communications Passage:Authorisation device sends authority checking information to access controller;Article 2 communication port:Authorisation device sends first and authorized Code to visitor device and/or application system, then to access controller), illegal invasion person is difficult to by the first authorization code and award simultaneously Power checking information is intercepted and captured simultaneously, in the case where only intercepting and capturing one of information, it is impossible to by checking, improve the safety of gate inhibition Property.
Step 105, access controller is at least verified using the second authorization code to encryption data;Obtain use condition letter Cease and judge whether the use of the second authorization code meets use condition information, if being verified and the use of the second authorization code meets Use condition information, then access controller access control unlatching.
In the present embodiment, use condition information can be generated by authorisation device, and add included in pending data Send to access controller or generated by authorisation device after close, sent included in authority checking information to gate inhibition's control Device processed, can also be and be pre-stored in access controller, the present embodiment is not particularly limited.Only meeting use condition information In the case of, access controller ability access control is opened so that, also can not be not even if illegal invasion person intercepts and captures the first authorization code Verified in the case of meeting use condition information using first authorization code, further ensured the security of gate inhibition.
In the present embodiment, access controller is at least verified using the second authorization code to encryption data, verification mode The mode for the cryptographic calculation taken when obtaining cipher mode with authorisation device in step 101 is corresponding.For example, in pending data In the case of only including the first authorization code:If encryption data is that pending data is carried out using private key by authorisation device to sign Arrive, then verification mode is that access controller carries out sign test using authorisation device public key and the second authorization code to encryption data;If plus Ciphertext data is that computing is encrypted to pending data using symmetric key by authorisation device to obtain, then verification mode is controlled for gate inhibition Computing is encrypted using symmetric key and the second authorization code in device processed, and whether comparison operation result is identical with encryption data, or Access controller obtains the first authorization code to encryption data decryption, and the second authorization code is compared with the first authorization code;If plus Ciphertext data is to carry out MAC operation to pending data by authorisation device to obtain, then verification mode is that access controller is awarded to second Weighted code carries out MAC operation, and whether comparison operation result is identical with encryption data.
In an optional embodiment of the present embodiment, the pending data in step 101 is also believed including the use of condition Authority checking information in breath, step 102 is also including the use of conditional information;Authorisation device in step 101 uses authorisation device Encryption key pending data is encrypted computing, including:Authorisation device is signed to pending data, obtains signature Information;Access controller in step 105 at least verified using the second authorization code to encryption data, including:Access control Device carries out sign test using the second authorization code and use condition information to signing messages.Use condition information is included in pending number In so that even if illegal invasion person has been intercepted and captured use condition information and distorted, also it can not enter one by the checking of step 105 Step has ensured the security of gate inhibition.
In an optional embodiment of the present embodiment, use condition information includes access times information and/or used Effective time information;Access controller judges whether the use of the second authorization code meets use condition information, including:Using bar In the case that part information includes access times information, access controller counts the access times of the second authorization code, judges that second awards Whether the access times of weighted code are less than or equal to access times information, if access times are less than or equal to access times information, Second authorization code meets access times information, for example, access times information is 5 times in use condition information, access controller system The access times of the second authorization code are counted, if currently used number of times is 3 times, meet use condition information, if currently used number of times For 6 times, then use condition information is not met;In the case where use condition information is including the use of effective time information, gate inhibition's control Whether device processed records the currently used time of the second authorization code, judge the currently used time in the scope using effective time information Interior, if the currently used time is in the range of using effective time information, the second authorization code meets using effective time information, For example, the scope that effective time information is used in use condition information is 08:00AM—10:00AM, the currently used time is 11: 00AM, then do not meet use condition information, for example, making in use condition information in the range of using effective time information With the scope of effective time information in 5 minutes from being received authority checking information, access controller is receiving authority checking The second authorization code is received after information in 3 minutes, then the use of the second authorization code is in the range of using effective time information, symbol Close use condition information.Only in the case where meeting use condition information, access controller ability access control is opened so that non- Even if method invader intercepts and captures the first authorization code, first authorization code can not be also used in the case where not meeting use condition information Verified, further ensured the security of gate inhibition.
Below, using cryptographic calculation as signature computing, authority checking information includes encryption data and use condition information is Example, the scene that is applicable of the technical scheme provided the present embodiment carries out brief illustration:
Using example one:
Visitor device sends access request to authorisation device;
Authorisation device generates the first authorization code in the case where obtaining the confirmation of user, and the first authorization code is one group Random number, authorisation device carries out signature computing using authorisation device private key to the first authorization code, obtains encryption data, authorisation device Authority checking information including the encryption data and use condition information is sent to access controller, the first authorization code is sent To visitor device;
Access controller receives the first authorization code that the authority checking information and visitor device of authorisation device transmission are sent, will The first authorization code that visitor device is sent is as the second authorization code;Using the second authorization code and the public key of authorisation device to encryption Data carry out sign test, and obtain the use condition information in authority checking information, judge whether the use of the second authorization code meets Use condition information, if sign test by and meet use condition information, opening gate.
Using example two:
Visitor device sends access request to authorisation device, or, visitor device passes through answering in visitor device The visitor's ID card information for including visitor in access request, access request is sent to authorisation device with system client;
Authorisation device obtains the first authorization code in the case where obtaining the confirmation of user, and first authorization code is visit The ID card information of visitor, authorisation device carries out signature computing using authorisation device private key to the first authorization code, obtains encryption data, Authorisation device sends the authority checking information including the encryption data and use condition information to access controller;
Access controller receives the authority checking information that authorisation device is sent, and (first awards the ID card information of reading visitor Weighted code), it regard the ID card information as the second authorization code;Public key using the second authorization code and authorisation device enters to encryption data Row sign test, and the use condition information in authority checking information is obtained, judge whether the use of the second authorization code meets and use bar Part information, if sign test by and meet use condition information, opening gate.
Using example three:
Application system be express delivery sector application system, logistics information be wait deliver goods to the customers pattern when, application system to Authorisation device sends access request;
Authorisation device generates the first authorization code in the case where obtaining the confirmation of user, and the first authorization code is one group Random number, authorisation device carries out signature computing using authorisation device private key to the first authorization code, obtains encryption data, authorisation device Authority checking information including the encryption data and use condition information is sent to access controller, the first authorization code is sent To application system;
Visitor triggers application system by visitor device before by gate inhibition and sends the first authorization code to access controller;Or Person, application system sends the first authorization code to visitor device, and visitor triggers visitor device before by gate inhibition and authorized first Code is sent to access controller;
Access controller receives the authority checking information that authorisation device is sent, and application system or visitor device are sent First authorization code, the first authorization code that application system or visitor are sent is used as the second authorization code;Using the second authorization code and awarding The public key for weighing equipment carries out sign test to encryption data, and obtains the use condition information in authority checking information, judges that second awards Whether the use of weighted code meets use condition information, if sign test by and meet use condition information, opening gate.
In the present embodiment:Application system can be mounted in a client or one in visitor device Independent third-party application system;Access request can be sent by visitor device, can also be sent by application system;First authorization code can It is by awarding in the first authorization code to be the information such as the information or visitor's identity information of the generation of the authorisation devices such as random number In the case of weighing equipment generation, authorisation device needs to send the first authorization code to visitor device or application system, is awarded first In the case that weighted code includes visitor's identity information, authorisation device, which need not send visitor's identity information to visitor device or application, is System.
The access control method that the present embodiment is provided, authorisation device is obtained after the first authorization code, to including the first authorization code Pending data computing is encrypted, obtain encryption data, the authority checking information including encryption data sent to gate inhibition Controller, access controller obtains the second authorization code, and encryption data is verified using the second authorization code, being verified and In the case that the use of second authorization code meets use condition information, access control is opened.In the gate inhibition provided with access controller In, even if the access card of the not no gate inhibition of visitor, it would however also be possible to employ the scheme in the present embodiment, i.e., using the second authorization code pair plus Ciphertext data verifies, if the verification passes and the use of the second authorization code meets use condition information, then can be by gate inhibition, and holds Management of the realization that the user of authorisation device can then stay indoors to visitor's authority, such as controls whether to allow by the first authorization code The visitor controls the visitor to be that user carries by the number of times of gate inhibition or time etc. by gate inhibition by using conditional information For it is convenient while guarantee safety, also, authorisation device by the first authorization code send to visitor device and/or application be System, in the case that authority checking information is sent to access controller, first authorization code is set with authority checking information due to receiving Standby different, the transmission of information employs different communication port (i.e. first communication ports:Authorisation device sends authority checking letter Cease to access controller;Article 2 communication port:Authorisation device sends the first authorization code to visitor device and/or application system, Again to access controller), illegal invasion person is difficult to simultaneously intercept and capture the first authorization code and authority checking information simultaneously, is only intercepting and capturing In the case of one of information, it is impossible to by checking, further increase the security of gate inhibition.
Embodiment 2
Fig. 2 illustrates the structural representation of the access control system of the embodiment of the present invention 2, referring to Fig. 2, the embodiment of the present invention 2 access control system includes:Authorisation device 201, access controller 202;In some optional embodiment party of the embodiment of the present invention 2 In formula, access control system also includes visitor device 203 and/or application system 204, visitor device 203 and/or application system 204 are attached with access controller 202 by wired or wireless communication modes;The access control system of the embodiment of the present invention 2 System realizes that this is no longer going to repeat them, only the gate inhibition to the embodiment of the present invention 2 using the access control method of above-described embodiment 1 The structure of control system is briefly described:
Authorisation device 201, for obtaining the first authorization code, pending data is encrypted using the key of authorisation device Computing, obtains encryption data, wherein, pending data includes:First authorization code;Authority checking information is sent to access control Device 202, wherein, authority checking information includes:Encryption data;
Access controller 202, for receiving authority checking information;Obtain the second authorization code;At least use the second authorization code Encryption data is verified;Obtain use condition information and judge whether the use of the second authorization code meets use condition letter Breath, if being verified and the use of the second authorization code meets use condition information, the access control of access controller 202 is opened.
In an optional embodiment of the present embodiment, the first authorization code includes:Visitor's identity information, the second authorization code Including:Visitor's identity information;Or, the first authorization code includes:The licencing key that authorisation device 201 is generated, the second authorization code bag Include:Licencing key;Or, the first authorization code includes:Visitor's identity information and licencing key, the second authorization code include:Visitor's body Part information and licencing key.In this optional embodiment, visitor's identity information can be pre-stored in authorisation device 201, Can also authorisation device receive that external equipment is sent or the user of authorisation device 201 inputs;Licencing key can be It is pre-stored in authorisation device 201 or authorisation device 201 receives external equipment transmission or authorisation device 201 User's input, the generation of the inside of authorisation device 201 is can also be, should when visitor's identity information is sent by external equipment External equipment can be visitor device/application system or other equipment, and the visitor's identity information may be embodied in visitor device/should In the access request sent with system.Visitor's identity information can be the ID card information of visitor, other certificate informations of visitor, Biometric information of visitor etc., licencing key can be combination of one group of random number, character, character and random number etc..When First authorization code include visitor's identity information when, authorisation device 201 need not by the visitor's identity information send to visitor device/should With system, the operand of authorisation device is reduced, the risk that information is tampered or stolen in transmitting procedure, visitor is also reduced Only need using certificate or provide biometric information can opening gate, gate inhibition is improved by efficiency, while improving door The security of taboo;Using random number or the Form generation licencing key of character, licencing key can be avoided for fixed numeral or The risk brought during character for gate control system.
In an optional embodiment of the present embodiment, as shown in figure 3, the access control system of the present embodiment also includes Visitor device 203 and/or application system 204, wherein, visitor device 203 can be visitor's hand-held terminal device (such as hand Mechanical, electrical brain, other it is portable can communication apparatus etc.), application system 204 can be mounted in the application in the terminal that visitor holds Software or third-party application Business Management Platform are (for example, express delivery management platform, food delivery Business Management Platform Deng), when application system 204 is the application software in the terminal that visitor holds, guest system 204 and visitor device 203 be integral.Wherein:Authorisation device 201, is additionally operable to before access controller 202 obtains the second authorization code, first is awarded Weighted code is sent to visitor device 203 and/or application system 204;Visitor device 203 and/or application system 204, for sending the One authorization code is to access controller 202;Access controller 202, for obtaining the second authorization code, including:Access controller 202, For receiving the first authorization code that visitor device 203 and/or application system 204 are sent, and awarded the first authorization code as second Weighted code, as shown in the arrow flow direction in Fig. 3;Or, authorisation device 201 is additionally operable to obtain the second mandate in access controller 202 Before code, the first authorization code is sent to visitor device 203 and/or application system 204;Visitor device 203 and/or application system 204, for pointing out the first authorization code (on figure not shown);Access controller 202, for obtaining the second authorization code, including:Gate inhibition Controller 202 receives the first authorization code (not shown on figure) of input, and regard the first authorization code as the second authorization code.This is optional In embodiment, visitor device 203 and/or application system 204 send the first authorization code to access controller, can be that visitor sets Standby 203 are connected by wired or wireless way with access controller foundation, directly send the first authorization code to access controller 202 or, when application system 204 is mounted in the application software in the visitor device that visitor holds, visitor device 203 are connected by wired or wireless way with the foundation of access controller 202, visitor device 203 or visitor's triggering application system 204 The first authorization code is sent to access controller 202 by visitor device, it is also possible that when application system 204 is that third party should When using Business Management Platform, application system 204 sets up network connection, visitor device 203 or visitor's triggering with access controller 202 Application system 203 is sent the first authorization code to access controller 202 by network;It is also possible that being used as third-party application industry The application system 204 for management platform of being engaged in is set up with visitor device 203 and communicated to connect, and the first authorization code is sent to visitor device 203, first authorization code is sent to access controller 202 by visitor device 203.Visitor device 203 and/or application system 203 are connected by wired or wireless way and access controller foundation and send the first authorization code, reduce the operational ton of visitor, Efficiency is reduced caused by also reducing the input error of visitor.
In an optional embodiment of the present embodiment, what the content that the second authorization code includes included with the first authorization code Content is corresponding, i.e.,:In the case where the first authorization code includes visitor's identity information, the second authorization code also at least includes visitor's body Part information, in the case where the first authorization code includes the licencing key that authorisation device is generated, the second licencing key also at least includes Licencing key.Access controller 202, for obtaining the second authorization code, including:Include visitor's identity information in the second authorization code In the case of, access controller 202 obtains visitor's identity information, wherein, certificate information or visitor of the visitor's identity information for visitor Biometric information.In this optional embodiment, access controller 202 obtains visitor's identity letter that the second authorization code includes Breath, can be that access controller 202 directly obtains the certificate that (as scanned) visitor holds, obtain visitor's identity letter of the certificate Breath or access controller 202 directly obtain the biology of the visitors such as iris information, finger print information, the palmprint information of visitor Identification information;In the case where the first authorization code includes the licencing key that authorisation device is generated, the second licencing key is also at least wrapped Include licencing key.When the first authorization code and the second authorization code only include licencing key, access controller 202 is single by its reception First (such as keyboard, communication interface, scanning element) obtains the second mandate that user's input, external equipment are sent or external equipment is shown Code, i.e. access controller 202 can complete the acquisition of the second authorization code using the hardware device of simple structure, reduce gate inhibition's control The cost of device 202 processed;When first authorization code and the second authorization code include visitor's identity information, access controller 202 can be by it Read module (such as card reading module, fingerprint identification module, iris recognition module, personal recognition module) reads visitor's certificate information And/or the mode of the biometric information of visitor reads the second authorization code, known based on visitor's certificate information and/or the biological of visitor The uniqueness of other information, further increases the security of gate control system.
In an optional embodiment of the present embodiment, pending data is also including the use of conditional information, authority checking Information is also including the use of conditional information;Authorisation device 201, for the encryption key using authorisation device 201 to pending data Computing is encrypted, including:Authorisation device 201, for being signed to pending data, obtains signing messages;Access control Device 202, at least being verified using the second authorization code to encryption data, including:Access controller 202, for using Two authorization codes and use condition information carry out sign test to signing messages;Or, access controller 202, at least using second Authorization code verifies to encryption data, including;Access controller 202, is authorized for obtaining first after being decrypted to encryption data Code, the second authorization code is compared with the first authorization code.Use condition information is included in pending data so that illegal Even if invader has intercepted and captured use condition information and distorted, also access control system can not further be ensured by checking Security.
In an optional embodiment of the present embodiment, use condition information includes access times information and/or used Effective time information;Whether access controller 202, the use for judging the second authorization code meets use condition information, including: In the case where use condition information includes access times information, access controller 202 counts the access times of the second authorization code, Judge whether the access times of the second authorization code are less than or equal to access times information, if access times are less than or equal to using secondary Information is counted, then the second authorization code meets access times information;In situation of the use condition information including the use of effective time information Under, whether access controller 202 records the currently used time of the second authorization code, judge the currently used time when using effective Between in the range of information, if the currently used time, in the range of using effective time information, the second authorization code, which meets, to be used Effective time information.Only in the case where meeting use condition information, the ability access control of access controller 202 is opened so that Even if illegal invasion person intercepts and captures the first authorization code, first it can not also be authorized using this in the case where not meeting use condition information Code is verified, has further ensured the security of access control system.
The access control system provided using the present embodiment, authorisation device 201 is obtained after the first authorization code, to including first Computing is encrypted in the pending data of authorization code, obtains encryption data, and the authority checking information including encryption data is sent To access controller 202, access controller 202 is obtained the second authorization code, encryption data is verified using the second authorization code, Be verified and the second authorization code use meet use condition information in the case of, access control open.Provided with gate inhibition In the gate inhibition of controller 202, even if the access card of the not no gate inhibition of visitor, it would however also be possible to employ the scheme in the present embodiment, even if Encryption data is verified with the second authorization code, if the verification passes and the use of the second authorization code meets use condition information, then Can be by gate inhibition, and management of the realization that the user for holding authorisation device 201 can then stay indoors to visitor's authority such as passes through One authorization code controls whether to allow the visitor by gate inhibition, controls the visitor can be by the number of times of gate inhibition by using conditional information Or the time etc., guaranteed safety while providing the user convenient, also, send the first authorization code in authorisation device 201 To visitor device 203 and/or application system 204, in the case that authority checking information is sent to access controller 202, this first Authorization code is from authority checking information because receiving device is different, and the transmission of information employs different communication ports (i.e. first Communication port:Authorisation device sends authority checking information to access controller 202;Article 2 communication port:Authorisation device is sent First authorization code to visitor device 203 and/or application system 204, then to access controller 202), illegal invasion person is difficult to simultaneously First authorization code and authority checking information are intercepted and captured simultaneously, in the case where only intercepting and capturing one of information, it is impossible to by checking, Further increase the security of access control system.
Any process described otherwise above or method description are construed as in flow chart or herein, represent to include Module, fragment or the portion of the code of one or more executable instructions for the step of realizing specific logical function or process Point, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not be by shown or discussion suitable Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be of the invention Embodiment person of ordinary skill in the field understood.
It should be appreciated that each several part of the present invention can be realized with hardware, software, firmware or combinations thereof.Above-mentioned In embodiment, the software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage Or firmware is realized.If, and in another embodiment, can be with well known in the art for example, realized with hardware Any one of row technology or their combination are realized:With the logic gates for realizing logic function to data-signal Discrete logic, the application specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that to realize all or part of step that above-described embodiment method is carried Rapid to can be by program to instruct the hardware of correlation to complete, described program can be stored in a kind of computer-readable storage medium In matter, the program upon execution, including one or a combination set of the step of embodiment of the method.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing module, can also That unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould Block can both be realized in the form of hardware, it would however also be possible to employ the form of software function module is realized.The integrated module is such as Fruit is realized using in the form of software function module and as independent production marketing or in use, can also be stored in a computer In read/write memory medium.
Storage medium mentioned above can be read-only storage, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means to combine specific features, structure, material or the spy that the embodiment or example are described Point is contained at least one embodiment of the present invention or example.In this manual, to the schematic representation of above-mentioned term not Necessarily refer to identical embodiment or example.Moreover, specific features, structure, material or the feature of description can be any One or more embodiments or example in combine in an appropriate manner.
Although embodiments of the invention have been shown and described above, it is to be understood that above-described embodiment is example Property, it is impossible to limitation of the present invention is interpreted as, one of ordinary skill in the art is not departing from the principle and objective of the present invention In the case of above-described embodiment can be changed within the scope of the invention, change, replace and modification.The scope of the present invention By appended claims and its equivalent limit.

Claims (12)

1. a kind of access control method, it is characterised in that including:
Authorisation device obtains the first authorization code, and computing is encrypted to pending data using the key of the authorisation device, obtains Encryption data is obtained, wherein, the pending data includes:First authorization code;
The authorisation device sends authority checking information to access controller, wherein, the authority checking information includes:It is described Encryption data;
The access controller receives the authority checking information;
The access controller obtains the second authorization code;
The access controller is at least verified using second authorization code to the encryption data;Obtain use condition letter Cease and judge whether the use of second authorization code meets the use condition information, if being verified and second mandate The use of code meets the use condition information, then the access controller access control is opened.
2. according to the method described in claim 1, it is characterised in that
First authorization code includes:Visitor's identity information, second authorization code includes:The visitor's identity information;Or,
First authorization code includes:The licencing key of the authorisation device generation, second authorization code includes:It is described to authorize Password;Or,
First authorization code includes:The visitor's identity information and the licencing key, second authorization code include:It is described Visitor's identity information and the licencing key.
3. method according to claim 1 or 2, it is characterised in that obtain described second in the access controller and authorize Before code, methods described also includes:The authorisation device sends first authorization code to visitor device and/or application System;The visitor device and/or the application system send first authorization code to the access controller;Gate inhibition's control Device processed obtains second authorization code, including:The access controller receives the visitor device and/or application system hair First authorization code sent, and using first authorization code as second authorization code, or,
Before the access controller obtains second authorization code, methods described also includes:The authorisation device will be described First authorization code is sent to visitor device and/or application system;The visitor device and/or application system prompting described the One authorization code;The access controller obtains second authorization code, including:The access controller receives described the of input One authorization code, and it regard first authorization code as second authorization code.
4. method according to claim 2, it is characterised in that
In the case where second authorization code includes the visitor's identity information, the access controller obtains described second and awarded Weighted code, including:The access controller obtains the visitor's identity information, wherein, the visitor's identity information is the card of visitor Part information or the biometric information of visitor.
5. the method according to any one of Claims 1-4, it is characterised in that
The pending data also includes the use condition information, and the authority checking information also includes the use condition and believed Breath;Computing is encrypted to the pending data using the encryption key of the authorisation device in the authorisation device, including:Institute State authorisation device to sign to the pending data, obtain signing messages;The access controller is at least using described the Two authorization codes verify to the encryption data, including:The access controller is using second authorization code and described makes Sign test is carried out to the signing messages with conditional information;
Or, the access controller is at least verified using second authorization code to the encryption data, including;It is described Access controller obtains first authorization code after being decrypted to the encryption data, and second authorization code is awarded with described first Weighted code is compared.
6. the method according to any one of claim 1 to 5, it is characterised in that
The use condition information includes access times information and/or uses effective time information;
The access controller judges whether the use of second authorization code meets the use condition information, including:
In the case where the use condition information includes the access times information, the access controller statistics described second The access times of authorization code, judge whether the access times of second authorization code are less than or equal to the access times information, If the access times are less than or equal to the access times information, second authorization code meets the access times letter Breath;
In the case where the use condition information includes the use effective time information, the access controller record is described The currently used time of second authorization code, judge the currently used time whether the use effective time information scope Interior, if the currently used time is in the range of the use effective time information, second authorization code meets described Use effective time information.
7. a kind of access control system, it is characterised in that including:
Authorisation device, for obtaining the first authorization code, pending data is encrypted fortune using the key of the authorisation device Calculate, obtain encryption data, wherein, the pending data includes:First authorization code;Authority checking information is sent to door Prohibit controller, wherein, the authority checking information includes:The encryption data;
Access controller, for receiving the authority checking information;Obtain the second authorization code;At least use second authorization code The encryption data is verified;Obtain use condition information and judge whether the use of second authorization code meets described Use condition information, if being verified and the use of second authorization code meets the use condition information, the gate inhibition Controller access control is opened.
8. system according to claim 7, it is characterised in that
First authorization code includes:Visitor's identity information, second authorization code includes:The visitor's identity information;Or,
First authorization code includes:The licencing key of the authorisation device generation, second authorization code includes:It is described to authorize Password;Or,
First authorization code includes:The visitor's identity information and the licencing key, second authorization code include:It is described Visitor's identity information and the licencing key.
9. the system according to claim 7 or 8, it is characterised in that the system also includes visitor device and/or application system System;Wherein:
The authorisation device, is additionally operable to before the access controller obtains second authorization code, described first is authorized Code is sent to the visitor device and/or the application system;The visitor device and/or the application system, for sending First authorization code is to the access controller;The access controller, for obtaining second authorization code, including:Institute Access controller is stated, for receiving first authorization code that the visitor device and/or the application system are sent, and by institute The first authorization code is stated as second authorization code;Or,
The authorisation device, is additionally operable to before the access controller obtains second authorization code, described first is authorized Code is sent to the visitor device and/or the application system;The visitor device and/or the application system, for pointing out First authorization code;The access controller, for obtaining second authorization code, including:The access controller is received First authorization code of input, and it regard first authorization code as second authorization code.
10. system according to claim 8, it is characterised in that
The access controller, for obtaining second authorization code, including:Include visitor's body in second authorization code In the case of part information, the access controller obtains the visitor's identity information, wherein, the visitor's identity information is visitor Certificate information or visitor biometric information.
11. the system according to any one of claim 7 to 10, it is characterised in that
The pending data also includes the use condition information, and the authority checking information also includes the use condition and believed Breath;The authorisation device, computing is encrypted for the encryption key using the authorisation device to the pending data, bag Include:The authorisation device, for being signed to the pending data, obtains signing messages;The access controller, is used for At least the encryption data is verified using second authorization code, including:The access controller, for using described Second authorization code and the use condition information carry out sign test to the signing messages;
Or, the access controller, at least being verified using second authorization code to the encryption data, bag Include;The access controller, for obtaining first authorization code after being decrypted to the encryption data, by second authorization code It is compared with first authorization code.
12. the system according to any one of claim 7 to 11, it is characterised in that
The use condition information includes access times information and/or uses effective time information;
Whether the access controller, the use for judging second authorization code meets the use condition information, including:
In the case where the use condition information includes the access times information, the access controller statistics described second The access times of authorization code, judge whether the access times of second authorization code are less than or equal to the access times information, If the access times are less than or equal to the access times information, second authorization code meets the access times letter Breath;
In the case where the use condition information includes the use effective time information, the access controller record is described The currently used time of second authorization code, judge the currently used time whether the use effective time information scope Interior, if the currently used time is in the range of the use effective time information, second authorization code meets described Use effective time information.
CN201710245237.XA 2017-04-14 2017-04-14 A kind of access control method and system Pending CN107123181A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710245237.XA CN107123181A (en) 2017-04-14 2017-04-14 A kind of access control method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710245237.XA CN107123181A (en) 2017-04-14 2017-04-14 A kind of access control method and system

Publications (1)

Publication Number Publication Date
CN107123181A true CN107123181A (en) 2017-09-01

Family

ID=59725210

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710245237.XA Pending CN107123181A (en) 2017-04-14 2017-04-14 A kind of access control method and system

Country Status (1)

Country Link
CN (1) CN107123181A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109272607A (en) * 2018-07-19 2019-01-25 国政通科技有限公司 A kind of reservation visitor recognition methods and system
CN109785531A (en) * 2019-01-02 2019-05-21 广东乐心医疗电子股份有限公司 Storage method and related equipment
WO2019128087A1 (en) * 2017-12-28 2019-07-04 广景视睿科技(深圳)有限公司 Dual unlocking method, device and system
CN110390746A (en) * 2019-06-16 2019-10-29 广州智慧城市发展研究院 A kind of implementation method of fingerprint anti-theft gate inhibition

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102436688A (en) * 2010-09-27 2012-05-02 株式会社山武 Entry/exit controlling system and method
WO2014043326A1 (en) * 2012-09-12 2014-03-20 Illinois Tool Works Inc. A secure door entry system and method
CN104123777A (en) * 2014-08-05 2014-10-29 上海众人科技有限公司 Access control remote authorization method
CN104732626A (en) * 2015-01-22 2015-06-24 西安酷派软件科技有限公司 Entrance guard authorization management method and entrance guard authorization management system
CN105184934A (en) * 2015-10-13 2015-12-23 广东聚光电子科技有限公司 Access control system and control method thereof
CN105279832A (en) * 2015-12-01 2016-01-27 北京卡多宝信息技术有限公司 Intelligent door lock system and control method thereof
CN105447926A (en) * 2014-08-06 2016-03-30 漳州台懋实业有限公司 Visitor quick-passage management system structure

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102436688A (en) * 2010-09-27 2012-05-02 株式会社山武 Entry/exit controlling system and method
WO2014043326A1 (en) * 2012-09-12 2014-03-20 Illinois Tool Works Inc. A secure door entry system and method
CN104123777A (en) * 2014-08-05 2014-10-29 上海众人科技有限公司 Access control remote authorization method
CN105447926A (en) * 2014-08-06 2016-03-30 漳州台懋实业有限公司 Visitor quick-passage management system structure
CN104732626A (en) * 2015-01-22 2015-06-24 西安酷派软件科技有限公司 Entrance guard authorization management method and entrance guard authorization management system
CN105184934A (en) * 2015-10-13 2015-12-23 广东聚光电子科技有限公司 Access control system and control method thereof
CN105279832A (en) * 2015-12-01 2016-01-27 北京卡多宝信息技术有限公司 Intelligent door lock system and control method thereof

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019128087A1 (en) * 2017-12-28 2019-07-04 广景视睿科技(深圳)有限公司 Dual unlocking method, device and system
CN109272607A (en) * 2018-07-19 2019-01-25 国政通科技有限公司 A kind of reservation visitor recognition methods and system
CN109785531A (en) * 2019-01-02 2019-05-21 广东乐心医疗电子股份有限公司 Storage method and related equipment
CN110390746A (en) * 2019-06-16 2019-10-29 广州智慧城市发展研究院 A kind of implementation method of fingerprint anti-theft gate inhibition

Similar Documents

Publication Publication Date Title
US11101993B1 (en) Authentication and authorization through derived behavioral credentials using secured paired communication devices
CN105069876B (en) The method and system of intelligent entrance guard control
US10171444B1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
KR102056722B1 (en) Authentication system, and transmit terminal, receive terminal, and right authentication method of same
CN1770688B (en) User authentication system and method
US8689013B2 (en) Dual-interface key management
US20170264608A1 (en) Visual biometric authentication supplemented with a time-based secondary authentication factor
US20070223685A1 (en) Secure system and method of providing same
EP3787226A1 (en) A multi-user strong authentication token
CN108650212A (en) A kind of Internet of Things certification and access control method and Internet of Things security gateway system
KR101814719B1 (en) System and method for remote controlling digital door-lock using smartphone
CN107123181A (en) A kind of access control method and system
US20140329497A1 (en) Smartdevices Enabled Secure Access to Multiple Entities (SESAME)
CN107113315A (en) Identity authentication method, terminal and server
CN106027251B (en) A kind of identity card card-reading terminal and cloud authentication platform data transmission method and system
CN105960774A (en) Near field communication authentication mechanism
CN105939196B (en) Identity identifying method and system
CN104618114B (en) ID card information acquisition methods, apparatus and system
CN109074693A (en) Virtual panel for access control system
CN109920100A (en) A kind of smart lock method for unlocking and system
CN109272609A (en) A kind of CPU safety door inhibition control method and system
JP5359848B2 (en) IC card authentication system and IC card authentication method
CN109472903A (en) A kind of control of bluetooth access control method and its device
CN108200037A (en) A kind of method and system that safety operation is performed using safety equipment
CN113129525A (en) Method and apparatus for authenticating a user of a storage compartment device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170901

RJ01 Rejection of invention patent application after publication