CN107123181A - A kind of access control method and system - Google Patents
A kind of access control method and system Download PDFInfo
- Publication number
- CN107123181A CN107123181A CN201710245237.XA CN201710245237A CN107123181A CN 107123181 A CN107123181 A CN 107123181A CN 201710245237 A CN201710245237 A CN 201710245237A CN 107123181 A CN107123181 A CN 107123181A
- Authority
- CN
- China
- Prior art keywords
- authorization code
- information
- visitor
- access controller
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention provides a kind of access control method and system, and wherein method includes:Authorisation device obtains the first authorization code, pending data is encrypted computing using the key of authorisation device, obtains encryption data, wherein, pending data includes:First authorization code;Authorisation device sends authority checking information to access controller, wherein, authority checking information includes:Encryption data;Access controller receives authority checking information;Access controller obtains the second authorization code;Access controller is at least verified using the second authorization code to encryption data;Obtain use condition information and simultaneously judge whether the use of the second authorization code meets use condition information, if being verified and the use of the second authorization code meets use condition information, the unlatching of access controller access control.
Description
Technical field
The present invention relates to a kind of electronic technology field, more particularly to a kind of access control method and system.
Background technology
At present, it is the security of raising building, the entrance at some building gates and each entrance would generally be provided with gate inhibition.Building
Resident family in the world is normally come in and gone out gate inhibition control area using the access card of their own, and the personnel without access card then cannot be introduced into
Access control region.
With the fast development of internet, increasing user's selection is taken out or net by shopping at network, ONLINE
Upper application electrical maintenance etc., as attendant such as courier or maintenance mans, it is desirable to provide controlled positioned at gate inhibition the position of service
When in region processed, visitor generally cannot be introduced into access control region.How so that the visitor without authority of entering is providing the user
The security that during service or can enter cell when accessing resident family does not influence cell to manage in itself simultaneously is urgent problem.
The content of the invention
Present invention seek to address that above mentioned problem.
It is a primary object of the present invention to provide a kind of access control method, including:Authorisation device obtains the first authorization code,
Computing is encrypted to pending data using the key of authorisation device, encryption data is obtained, wherein, pending data includes:
First authorization code;Authorisation device sends authority checking information to access controller, wherein, authority checking information includes:Encryption
Data;Access controller receives authority checking information;Access controller obtains the second authorization code;Access controller at least uses the
Two authorization codes are verified to encryption data;Obtain use condition information and judge whether the use of the second authorization code meets and use
Conditional information, if being verified and the use of the second authorization code meets use condition information, access controller access control is opened
Open.
In addition, the first authorization code includes:Visitor's identity information, the second authorization code includes:Visitor's identity information;Or, the
One authorization code includes:The licencing key of authorisation device generation, the second authorization code includes:Licencing key;Or, the first authorization code bag
Include:Visitor's identity information and licencing key, the second authorization code include:Visitor's identity information and licencing key.
In addition, before access controller obtains the second authorization code, method also includes:Authorisation device sends out the first authorization code
Deliver to visitor device and/or application system;Visitor device and/or application system send the first authorization code to access controller;Door
Prohibit controller and obtain the second authorization code, including:Access controller receives the first mandate that visitor device and/or application system are sent
Code, and using the first authorization code as the second authorization code, or, before access controller obtains the second authorization code, method is also wrapped
Include:Authorisation device sends the first authorization code to visitor device and/or application system;Visitor device and/or application system prompting
First authorization code;Access controller obtains the second authorization code, including:Access controller receives the first authorization code of input, and will
First authorization code is used as the second authorization code.
In addition, in the case where the second authorization code includes visitor's identity information, access controller obtains the second authorization code, bag
Include:Access controller obtains visitor's identity information, wherein, visitor's identity information is the certificate information of visitor or the biological knowledge of visitor
Other information.
In addition, pending data is also including the use of conditional information, authority checking information is also including the use of conditional information;Authorize
Equipment pending data is encrypted computing using the encryption key of authorisation device, including:Authorisation device is to pending data
Signed, obtain signing messages;Access controller at least verified using the second authorization code to encryption data, including:Door
Prohibit controller and sign test is carried out to signing messages using the second authorization code and use condition information;Or, access controller at least makes
Encryption data is verified with the second authorization code, including;Access controller obtains the first authorization code after being decrypted to encryption data,
Second authorization code is compared with the first authorization code.
In addition, use condition information includes access times information and/or uses effective time information;Access controller judges
Whether the use of the second authorization code meets use condition information, including:Include the feelings of access times information in use condition information
Under condition, access controller counts the access times of the second authorization code, judges whether the access times of the second authorization code are less than or wait
In access times information, if access times are less than or equal to access times information, the second authorization code meets access times information;
In the case where use condition information is including the use of effective time information, access controller records the currently used of the second authorization code
Time, the currently used time is judged whether in the range of using effective time information, if the currently used time is using effective
In the range of temporal information, then the second authorization code, which meets, uses effective time information.
Another object of the present invention is to provide a kind of access control system, including:Authorisation device, is awarded for obtaining first
Weighted code, pending data is encrypted computing using the key of authorisation device, obtains encryption data, wherein, pending data
Including:First authorization code;Authority checking information is sent to access controller, wherein, authority checking information includes:Encrypt number
According to;Access controller, for receiving authority checking information;Obtain the second authorization code;At least using the second authorization code to encryption number
According to being verified;Obtain use condition information and judge whether the use of the second authorization code meets use condition information, if checking
By and the use of the second authorization code meets use condition information, then access controller access control is opened.
In addition, the first authorization code includes:Visitor's identity information, the second authorization code includes:Visitor's identity information;Or, the
One authorization code includes:The licencing key of authorisation device generation, the second authorization code includes:Licencing key;Or, the first authorization code bag
Include:Visitor's identity information and licencing key, the second authorization code include:Visitor's identity information and licencing key.
In addition, system also includes visitor device and/or application system;Wherein:Authorisation device, is additionally operable in access controller
Obtain before the second authorization code, the first authorization code is sent to visitor device and/or application system;Visitor device and/or application
System, for sending the first authorization code to access controller;Access controller, for obtaining the second authorization code, including:Gate inhibition is controlled
Device processed, is authorized for receiving the first authorization code that visitor device and/or application system are sent, and using the first authorization code as second
Code;Or, authorisation device is additionally operable to before access controller obtains the second authorization code, the first authorization code is sent to visitor
Equipment and/or application system;Visitor device and/or application system, for pointing out the first authorization code;Access controller, for obtaining
The second authorization code is taken, including:Access controller receives the first authorization code of input, and is authorized the first authorization code as second
Code.
In addition, access controller, for obtaining the second authorization code, including:Include visitor's identity information in the second authorization code
In the case of, access controller obtains visitor's identity information, wherein, visitor's identity information is certificate information or the visitor of visitor
Biometric information.
In addition, pending data is also including the use of conditional information, authority checking information is also including the use of conditional information;Authorize
Equipment, pending data is encrypted computing for the encryption key using authorisation device, including:Authorisation device, for pair
Pending data is signed, and obtains signing messages;Access controller, at least being entered using the second authorization code to encryption data
Row checking, including:Access controller, for carrying out sign test to signing messages using the second authorization code and use condition information;Or
Person, access controller, at least being verified using the second authorization code to encryption data, including;Access controller, for pair
The first authorization code is obtained after encryption data decryption, the second authorization code is compared with the first authorization code.
In addition, use condition information includes access times information and/or uses effective time information;Access controller, is used
Whether meet use condition information in the use for judging the second authorization code, including:Believe in use condition information including access times
In the case of breath, access controller counts the access times of the second authorization code, judges whether the access times of the second authorization code are small
In or equal to access times information, if access times are less than or equal to access times information, the second authorization code meets using secondary
Number information;In the case where use condition information is including the use of effective time information, access controller records the second authorization code
The currently used time, the currently used time is judged whether in the range of using effective time information, if the currently used time exists
In the range of effective time information, then the second authorization code, which meets, uses effective time information.
As seen from the above technical solution provided by the invention, authorisation device is obtained after the first authorization code, to including the
Computing is encrypted in the pending data of one authorization code, obtains encryption data, and the authority checking information including encryption data is sent out
Access controller is delivered to, access controller is obtained the second authorization code, encryption data is verified using the second authorization code, tested
Card pass through and the second authorization code use meet use condition information in the case of, access control open.Provided with access control
In the gate inhibition of device, even if the access card of the not no gate inhibition of visitor, it would however also be possible to employ the scheme in the present embodiment, i.e., awarded using second
Weighted code verifies to encryption data, if the verification passes and the use of the second authorization code meets use condition information, then can pass through door
Prohibit, and management of the realization that the user for holding authorisation device can then stay indoors to visitor's authority, such as pass through the first authorization code control
Whether system allows the visitor by gate inhibition, controls the visitor can be by the number of times of gate inhibition or time etc. by using conditional information
Deng being guaranteed safety while providing the user convenient, also, send the first authorization code to visitor device in authorisation device
And/or application system, in the case that authority checking information is sent to access controller, first authorization code and authority checking information
Because receiving device is different, the transmission of information employs different communication port (i.e. first communication ports:Authorisation device is sent
Authority checking information is to access controller;Article 2 communication port:Authorisation device send the first authorization code to visitor device and/or
Application system, then to access controller), illegal invasion person is difficult to while the first authorization code and authority checking information are cut simultaneously
Obtain, in the case where only intercepting and capturing one of information, it is impossible to by checking, further increase the security of gate inhibition.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, being used required in being described below to embodiment
Accompanying drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this
For the those of ordinary skill in field, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings
Accompanying drawing.
Fig. 1 is the flow chart for the access control method that the embodiment of the present invention 1 is provided;
Fig. 2 is the system block diagram for the access control system that the embodiment of the present invention 2 is provided;
Fig. 3 is the system block diagram of an optional embodiment of the access control system that the embodiment of the present invention 2 is provided.
Embodiment
With reference to the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Ground is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Based on this
The embodiment of invention, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example, belongs to protection scope of the present invention.
In the description of the invention, it is to be understood that term " " center ", " longitudinal direction ", " transverse direction ", " on ", " under ",
The orientation or position relationship of the instruction such as "front", "rear", "left", "right", " vertical ", " level ", " top ", " bottom ", " interior ", " outer " are
Based on orientation shown in the drawings or position relationship, it is for only for ease of the description present invention and simplifies description, rather than indicate or dark
Specific orientation must be had, with specific azimuth configuration and operation by showing the device or element of meaning, therefore it is not intended that right
The limitation of the present invention.In addition, term " first ", " second " are only used for describing purpose, and it is not intended that indicating or implying and be relative
Importance or quantity or position.
In the description of the invention, it is necessary to illustrate, unless otherwise clearly defined and limited, term " installation ", " phase
Even ", " connection " should be interpreted broadly, for example, it may be being fixedly connected or being detachably connected, or be integrally connected;Can
To be mechanical connection or electrical connection;Can be joined directly together, can also be indirectly connected to by intermediary, Ke Yishi
The connection of two element internals.For the ordinary skill in the art, with concrete condition above-mentioned term can be understood at this
Concrete meaning in invention.
The embodiment of the present invention is described in further detail below in conjunction with accompanying drawing.
Embodiment 1
A kind of access control method is present embodiments provided, this method flow is suitable for access control system, the gate inhibition
Control system can include:Authorisation device, visitor device/application system and access controller, wherein, authorisation device can be
The terminal device (for example, mobile phone, PC, door control interphone etc.) that resident family holds, visitor device can be that the hand-held terminal of visitor is set
It is standby (such as mobile phone, computer, other it is portable can be communication apparatus), application system can be mounted in the terminal that visitor holds
Application software or third-party application Business Management Platform (for example, express delivery management platform, food delivery service management
Platform etc.), access controller can be the control device for controlling door lock to open and close, and may be mounted on door can also be in door
Vicinity, be easy to visitor to input information to be verified.
Fig. 1 is a kind of flow chart for access control method that the present embodiment is provided, as shown in figure 1, this method is including as follows
Step:
Step 101, authorisation device obtains the first authorization code, and pending data is encrypted using the key of authorisation device
Computing, obtains encryption data, wherein, pending data includes:First authorization code.
In the present embodiment, access request can be sent from visitor device to authorisation device, triggering authorisation device obtains first
Authorization code, also can send access request, triggering authorisation device obtains the first authorization code, can be with from application system to authorisation device
Authorisation device is directly triggered by the user of authorisation device, authorisation device obtains the first authorization code.From visitor device to authorisation device
Access request is sent, optionally, visitor can add the time and/or number of times demand by gate inhibition in access request, and mandate is set
The time for passing through gate inhibition for the visitor that after the access request is received, can be further determined whether in the agreement access request
And/or number of times demand, if agreed to, time that can be directly by the visitor in the access request by gate inhibition and/or number of times demand
Included in use condition information, if disagreed, be rejected by the access request or voluntarily set visitor by gate inhibition when
Between and/or number of times, improve the security and convenience of access control system;Send to access from application system to authorisation device and ask
Ask, can be managed by application system to whether being added in access request by information such as the time of gate inhibition and/or number of times demands,
Avoid illegal visitor device user from sending unauthorized access request to authorisation device, improve the security of access control system;By
The user of authorisation device actively triggers authorisation device, and the user can independently judge whether to trigger authorisation device according to demand, enter one
The security of step increase access control system.
In an optional embodiment of the present embodiment, the first authorization code includes:Visitor's identity information, or, authorize
The licencing key of equipment generation, or, visitor's identity information and licencing key.In this optional embodiment, visitor's identity letter
Breath can be pre-stored in authorisation device or authorisation device to receive external equipment transmission or authorisation device use
Family input;Licencing key can be pre-stored in authorisation device or authorisation device to receive external equipment transmission
Or authorisation device user's input, can also be generation inside authorisation device, when visitor's identity information is set by outside
When preparation is sent, the external equipment can be visitor device/application system or other equipment, and the visitor's identity information may be embodied in
In the access request that visitor device/application system is sent.Visitor's identity information can be the ID card information of visitor, visitor its
His certificate information, biometric information of visitor etc., licencing key can be one group of random number, character, character and random number
Combination etc..When the first authorization code includes visitor's identity information, authorisation device need not send the visitor's identity information to visit
Objective equipment/application system, reduces the operand of authorisation device, also reduces what information was tampered or stolen in transmitting procedure
Risk, visitor only need using certificate or provide biometric information can opening gate, improve gate inhibition by efficiency, simultaneously
Improve the security of gate inhibition;Using random number or the Form generation licencing key of character, it is fixation that can avoid licencing key
Numeral or the risk brought for gate control system during character.
In this step, computing is encrypted to pending data using the key of authorisation device, can is using mandate
The private key of equipment is signed to pending data, or computing is encrypted to pending data using symmetric key, can be with
Computing is carried out to pending data using MAC algorithms, encryption data is obtained.Pending data is entered using the private key of authorisation device
Row signature, it is ensured that encryption data is the true mandate of the holder of authorisation device;Computing is encrypted to pending data, protects
Hindered the security of the first authorization code, reduce the first authorization code in transmitting procedure be stolen or caused after distorting illegally enter
Blepharoptosis danger, improves the security of gate inhibition.
Step 102, authorisation device sends authority checking information to access controller, wherein, authority checking information includes:
Encryption data.
Step 103, access controller receives authority checking information.
Step 104, access controller obtains the second authorization code.
In the present embodiment, the content that the second authorization code includes is corresponding with the content that the first authorization code includes, i.e.,:
In the case that one authorization code includes visitor's identity information, the second authorization code also at least includes visitor's identity information, wherein, Fang Keshen
Part information includes:Visitor's certificate information and/or the biometric information of visitor, access controller, which obtains the second authorization code, to be included
Visitor's identity information, can be that access controller directly obtains (as scan) certificate that visitor holds, obtain the visit of the certificate
Objective identity information or access controller directly obtain the visitors' such as iris information, finger print information, the palmprint information of visitor
Biometric information;In the case where the first authorization code includes the licencing key that authorisation device is generated, the second licencing key is also extremely
Include licencing key less.When the first authorization code and the second authorization code only include licencing key, access controller is received by it
Unit (such as keyboard, communication interface, identification code scanner) obtains user's input, external equipment transmission or external equipment and shown
The second authorization code, i.e. access controller can complete the acquisition of the second authorization code using the hardware device of simple structure, reduce
The cost of access controller;When the first authorization code and the second authorization code include visitor's identity information, access controller can lead to
Cross its read module (such as card reading module, fingerprint identification module, iris recognition module, personal recognition module) and read visitor's certificate
The mode of information and/or the biometric information of visitor reads the second authorization code, the life based on visitor's certificate information and/or visitor
The uniqueness of thing identification information, further increases the security of gate control system.
In an optional embodiment of the present embodiment, before step 104, in addition to:Authorisation device is authorized first
Code is sent to visitor device and/or application system;Visitor device and/or application system send the first authorization code to access control
Device.Access controller obtains the second authorization code in step 104, can be following scheme:Access controller receive visitor device and/
Or the first authorization code that application system is sent, and it regard the first authorization code as the second authorization code.In this optional embodiment, visitor
Equipment and/or application system send the first authorization code to access controller, can be that visitor device passes through wired or wireless way
Set up and be connected with access controller, directly the first authorization code is sent to access controller or, when application system is to pacify
During application software in the visitor device that visitor holds, visitor device is built by wired or wireless way with access controller
Vertical connection, visitor device or visitor's triggering application system are sent the first authorization code to access controller by visitor device, also
Can be that, when application system is third-party application Business Management Platform, application system sets up network connection with access controller,
Visitor device or visitor's triggering application system are sent the first authorization code to access controller by network.Visitor device and/or
Application system is set up by wired or wireless way and access controller to be connected and sends the first authorization code, reduces the behaviour of visitor
Measure, efficiency is reduced caused by also reducing the input error of visitor.
In another optional embodiment of the present embodiment, before step 104, in addition to:Authorisation device is awarded first
Weighted code is sent to visitor device and/or application system;Visitor device and/or application system point out the first authorization code.In step 104
Access controller obtain the second authorization code, can be access controller obtain user input content as the second authorization code,
Can be that access controller scans the content of user's offer as the second authorization code:Second is obtained to above-mentioned access controller below
The two ways of authorization code is illustrated:Mode one:Access controller receives the first authorization code of input, and first is awarded
Weighted code can point out visitor to have been received by the first authorization code, visitor as the second authorization code, i.e. visitor device and/or application system
First authorization code can be read, and is inputted on access controller, the mode of the first authorization code is inputted in above-mentioned visitor
In, access controller need not be set up with visitor device and be connected, and access controller and visitor device need not set corresponding communication
Module, reduces the manufacturing cost of access controller and visitor device;Mode two:Access controller receives first scanned and awarded
Weighted code, and receive first can be awarded the first authorization code as the second authorization code, i.e. visitor device and/or application system
Weighted code is converted to Quick Response Code or bar code and shown, is scanned by the scanner of access controller, above-mentioned access control
Device obtains the first authorization code by way of scanning, visitor need not be manually entered the first authorization code, it is to avoid because being manually entered and
Caused efficiency decrease problem.
In the case where authorisation device sends the first authorization code to visitor device and/or application system, first mandate
Code is from authority checking information because receiving device is different, and the transmission of information employs different communication port (i.e. first communications
Passage:Authorisation device sends authority checking information to access controller;Article 2 communication port:Authorisation device sends first and authorized
Code to visitor device and/or application system, then to access controller), illegal invasion person is difficult to by the first authorization code and award simultaneously
Power checking information is intercepted and captured simultaneously, in the case where only intercepting and capturing one of information, it is impossible to by checking, improve the safety of gate inhibition
Property.
Step 105, access controller is at least verified using the second authorization code to encryption data;Obtain use condition letter
Cease and judge whether the use of the second authorization code meets use condition information, if being verified and the use of the second authorization code meets
Use condition information, then access controller access control unlatching.
In the present embodiment, use condition information can be generated by authorisation device, and add included in pending data
Send to access controller or generated by authorisation device after close, sent included in authority checking information to gate inhibition's control
Device processed, can also be and be pre-stored in access controller, the present embodiment is not particularly limited.Only meeting use condition information
In the case of, access controller ability access control is opened so that, also can not be not even if illegal invasion person intercepts and captures the first authorization code
Verified in the case of meeting use condition information using first authorization code, further ensured the security of gate inhibition.
In the present embodiment, access controller is at least verified using the second authorization code to encryption data, verification mode
The mode for the cryptographic calculation taken when obtaining cipher mode with authorisation device in step 101 is corresponding.For example, in pending data
In the case of only including the first authorization code:If encryption data is that pending data is carried out using private key by authorisation device to sign
Arrive, then verification mode is that access controller carries out sign test using authorisation device public key and the second authorization code to encryption data;If plus
Ciphertext data is that computing is encrypted to pending data using symmetric key by authorisation device to obtain, then verification mode is controlled for gate inhibition
Computing is encrypted using symmetric key and the second authorization code in device processed, and whether comparison operation result is identical with encryption data, or
Access controller obtains the first authorization code to encryption data decryption, and the second authorization code is compared with the first authorization code;If plus
Ciphertext data is to carry out MAC operation to pending data by authorisation device to obtain, then verification mode is that access controller is awarded to second
Weighted code carries out MAC operation, and whether comparison operation result is identical with encryption data.
In an optional embodiment of the present embodiment, the pending data in step 101 is also believed including the use of condition
Authority checking information in breath, step 102 is also including the use of conditional information;Authorisation device in step 101 uses authorisation device
Encryption key pending data is encrypted computing, including:Authorisation device is signed to pending data, obtains signature
Information;Access controller in step 105 at least verified using the second authorization code to encryption data, including:Access control
Device carries out sign test using the second authorization code and use condition information to signing messages.Use condition information is included in pending number
In so that even if illegal invasion person has been intercepted and captured use condition information and distorted, also it can not enter one by the checking of step 105
Step has ensured the security of gate inhibition.
In an optional embodiment of the present embodiment, use condition information includes access times information and/or used
Effective time information;Access controller judges whether the use of the second authorization code meets use condition information, including:Using bar
In the case that part information includes access times information, access controller counts the access times of the second authorization code, judges that second awards
Whether the access times of weighted code are less than or equal to access times information, if access times are less than or equal to access times information,
Second authorization code meets access times information, for example, access times information is 5 times in use condition information, access controller system
The access times of the second authorization code are counted, if currently used number of times is 3 times, meet use condition information, if currently used number of times
For 6 times, then use condition information is not met;In the case where use condition information is including the use of effective time information, gate inhibition's control
Whether device processed records the currently used time of the second authorization code, judge the currently used time in the scope using effective time information
Interior, if the currently used time is in the range of using effective time information, the second authorization code meets using effective time information,
For example, the scope that effective time information is used in use condition information is 08:00AM—10:00AM, the currently used time is 11:
00AM, then do not meet use condition information, for example, making in use condition information in the range of using effective time information
With the scope of effective time information in 5 minutes from being received authority checking information, access controller is receiving authority checking
The second authorization code is received after information in 3 minutes, then the use of the second authorization code is in the range of using effective time information, symbol
Close use condition information.Only in the case where meeting use condition information, access controller ability access control is opened so that non-
Even if method invader intercepts and captures the first authorization code, first authorization code can not be also used in the case where not meeting use condition information
Verified, further ensured the security of gate inhibition.
Below, using cryptographic calculation as signature computing, authority checking information includes encryption data and use condition information is
Example, the scene that is applicable of the technical scheme provided the present embodiment carries out brief illustration:
Using example one:
Visitor device sends access request to authorisation device;
Authorisation device generates the first authorization code in the case where obtaining the confirmation of user, and the first authorization code is one group
Random number, authorisation device carries out signature computing using authorisation device private key to the first authorization code, obtains encryption data, authorisation device
Authority checking information including the encryption data and use condition information is sent to access controller, the first authorization code is sent
To visitor device;
Access controller receives the first authorization code that the authority checking information and visitor device of authorisation device transmission are sent, will
The first authorization code that visitor device is sent is as the second authorization code;Using the second authorization code and the public key of authorisation device to encryption
Data carry out sign test, and obtain the use condition information in authority checking information, judge whether the use of the second authorization code meets
Use condition information, if sign test by and meet use condition information, opening gate.
Using example two:
Visitor device sends access request to authorisation device, or, visitor device passes through answering in visitor device
The visitor's ID card information for including visitor in access request, access request is sent to authorisation device with system client;
Authorisation device obtains the first authorization code in the case where obtaining the confirmation of user, and first authorization code is visit
The ID card information of visitor, authorisation device carries out signature computing using authorisation device private key to the first authorization code, obtains encryption data,
Authorisation device sends the authority checking information including the encryption data and use condition information to access controller;
Access controller receives the authority checking information that authorisation device is sent, and (first awards the ID card information of reading visitor
Weighted code), it regard the ID card information as the second authorization code;Public key using the second authorization code and authorisation device enters to encryption data
Row sign test, and the use condition information in authority checking information is obtained, judge whether the use of the second authorization code meets and use bar
Part information, if sign test by and meet use condition information, opening gate.
Using example three:
Application system be express delivery sector application system, logistics information be wait deliver goods to the customers pattern when, application system to
Authorisation device sends access request;
Authorisation device generates the first authorization code in the case where obtaining the confirmation of user, and the first authorization code is one group
Random number, authorisation device carries out signature computing using authorisation device private key to the first authorization code, obtains encryption data, authorisation device
Authority checking information including the encryption data and use condition information is sent to access controller, the first authorization code is sent
To application system;
Visitor triggers application system by visitor device before by gate inhibition and sends the first authorization code to access controller;Or
Person, application system sends the first authorization code to visitor device, and visitor triggers visitor device before by gate inhibition and authorized first
Code is sent to access controller;
Access controller receives the authority checking information that authorisation device is sent, and application system or visitor device are sent
First authorization code, the first authorization code that application system or visitor are sent is used as the second authorization code;Using the second authorization code and awarding
The public key for weighing equipment carries out sign test to encryption data, and obtains the use condition information in authority checking information, judges that second awards
Whether the use of weighted code meets use condition information, if sign test by and meet use condition information, opening gate.
In the present embodiment:Application system can be mounted in a client or one in visitor device
Independent third-party application system;Access request can be sent by visitor device, can also be sent by application system;First authorization code can
It is by awarding in the first authorization code to be the information such as the information or visitor's identity information of the generation of the authorisation devices such as random number
In the case of weighing equipment generation, authorisation device needs to send the first authorization code to visitor device or application system, is awarded first
In the case that weighted code includes visitor's identity information, authorisation device, which need not send visitor's identity information to visitor device or application, is
System.
The access control method that the present embodiment is provided, authorisation device is obtained after the first authorization code, to including the first authorization code
Pending data computing is encrypted, obtain encryption data, the authority checking information including encryption data sent to gate inhibition
Controller, access controller obtains the second authorization code, and encryption data is verified using the second authorization code, being verified and
In the case that the use of second authorization code meets use condition information, access control is opened.In the gate inhibition provided with access controller
In, even if the access card of the not no gate inhibition of visitor, it would however also be possible to employ the scheme in the present embodiment, i.e., using the second authorization code pair plus
Ciphertext data verifies, if the verification passes and the use of the second authorization code meets use condition information, then can be by gate inhibition, and holds
Management of the realization that the user of authorisation device can then stay indoors to visitor's authority, such as controls whether to allow by the first authorization code
The visitor controls the visitor to be that user carries by the number of times of gate inhibition or time etc. by gate inhibition by using conditional information
For it is convenient while guarantee safety, also, authorisation device by the first authorization code send to visitor device and/or application be
System, in the case that authority checking information is sent to access controller, first authorization code is set with authority checking information due to receiving
Standby different, the transmission of information employs different communication port (i.e. first communication ports:Authorisation device sends authority checking letter
Cease to access controller;Article 2 communication port:Authorisation device sends the first authorization code to visitor device and/or application system,
Again to access controller), illegal invasion person is difficult to simultaneously intercept and capture the first authorization code and authority checking information simultaneously, is only intercepting and capturing
In the case of one of information, it is impossible to by checking, further increase the security of gate inhibition.
Embodiment 2
Fig. 2 illustrates the structural representation of the access control system of the embodiment of the present invention 2, referring to Fig. 2, the embodiment of the present invention
2 access control system includes:Authorisation device 201, access controller 202;In some optional embodiment party of the embodiment of the present invention 2
In formula, access control system also includes visitor device 203 and/or application system 204, visitor device 203 and/or application system
204 are attached with access controller 202 by wired or wireless communication modes;The access control system of the embodiment of the present invention 2
System realizes that this is no longer going to repeat them, only the gate inhibition to the embodiment of the present invention 2 using the access control method of above-described embodiment 1
The structure of control system is briefly described:
Authorisation device 201, for obtaining the first authorization code, pending data is encrypted using the key of authorisation device
Computing, obtains encryption data, wherein, pending data includes:First authorization code;Authority checking information is sent to access control
Device 202, wherein, authority checking information includes:Encryption data;
Access controller 202, for receiving authority checking information;Obtain the second authorization code;At least use the second authorization code
Encryption data is verified;Obtain use condition information and judge whether the use of the second authorization code meets use condition letter
Breath, if being verified and the use of the second authorization code meets use condition information, the access control of access controller 202 is opened.
In an optional embodiment of the present embodiment, the first authorization code includes:Visitor's identity information, the second authorization code
Including:Visitor's identity information;Or, the first authorization code includes:The licencing key that authorisation device 201 is generated, the second authorization code bag
Include:Licencing key;Or, the first authorization code includes:Visitor's identity information and licencing key, the second authorization code include:Visitor's body
Part information and licencing key.In this optional embodiment, visitor's identity information can be pre-stored in authorisation device 201,
Can also authorisation device receive that external equipment is sent or the user of authorisation device 201 inputs;Licencing key can be
It is pre-stored in authorisation device 201 or authorisation device 201 receives external equipment transmission or authorisation device 201
User's input, the generation of the inside of authorisation device 201 is can also be, should when visitor's identity information is sent by external equipment
External equipment can be visitor device/application system or other equipment, and the visitor's identity information may be embodied in visitor device/should
In the access request sent with system.Visitor's identity information can be the ID card information of visitor, other certificate informations of visitor,
Biometric information of visitor etc., licencing key can be combination of one group of random number, character, character and random number etc..When
First authorization code include visitor's identity information when, authorisation device 201 need not by the visitor's identity information send to visitor device/should
With system, the operand of authorisation device is reduced, the risk that information is tampered or stolen in transmitting procedure, visitor is also reduced
Only need using certificate or provide biometric information can opening gate, gate inhibition is improved by efficiency, while improving door
The security of taboo;Using random number or the Form generation licencing key of character, licencing key can be avoided for fixed numeral or
The risk brought during character for gate control system.
In an optional embodiment of the present embodiment, as shown in figure 3, the access control system of the present embodiment also includes
Visitor device 203 and/or application system 204, wherein, visitor device 203 can be visitor's hand-held terminal device (such as hand
Mechanical, electrical brain, other it is portable can communication apparatus etc.), application system 204 can be mounted in the application in the terminal that visitor holds
Software or third-party application Business Management Platform are (for example, express delivery management platform, food delivery Business Management Platform
Deng), when application system 204 is the application software in the terminal that visitor holds, guest system 204 and visitor device
203 be integral.Wherein:Authorisation device 201, is additionally operable to before access controller 202 obtains the second authorization code, first is awarded
Weighted code is sent to visitor device 203 and/or application system 204;Visitor device 203 and/or application system 204, for sending the
One authorization code is to access controller 202;Access controller 202, for obtaining the second authorization code, including:Access controller 202,
For receiving the first authorization code that visitor device 203 and/or application system 204 are sent, and awarded the first authorization code as second
Weighted code, as shown in the arrow flow direction in Fig. 3;Or, authorisation device 201 is additionally operable to obtain the second mandate in access controller 202
Before code, the first authorization code is sent to visitor device 203 and/or application system 204;Visitor device 203 and/or application system
204, for pointing out the first authorization code (on figure not shown);Access controller 202, for obtaining the second authorization code, including:Gate inhibition
Controller 202 receives the first authorization code (not shown on figure) of input, and regard the first authorization code as the second authorization code.This is optional
In embodiment, visitor device 203 and/or application system 204 send the first authorization code to access controller, can be that visitor sets
Standby 203 are connected by wired or wireless way with access controller foundation, directly send the first authorization code to access controller
202 or, when application system 204 is mounted in the application software in the visitor device that visitor holds, visitor device
203 are connected by wired or wireless way with the foundation of access controller 202, visitor device 203 or visitor's triggering application system 204
The first authorization code is sent to access controller 202 by visitor device, it is also possible that when application system 204 is that third party should
When using Business Management Platform, application system 204 sets up network connection, visitor device 203 or visitor's triggering with access controller 202
Application system 203 is sent the first authorization code to access controller 202 by network;It is also possible that being used as third-party application industry
The application system 204 for management platform of being engaged in is set up with visitor device 203 and communicated to connect, and the first authorization code is sent to visitor device
203, first authorization code is sent to access controller 202 by visitor device 203.Visitor device 203 and/or application system
203 are connected by wired or wireless way and access controller foundation and send the first authorization code, reduce the operational ton of visitor,
Efficiency is reduced caused by also reducing the input error of visitor.
In an optional embodiment of the present embodiment, what the content that the second authorization code includes included with the first authorization code
Content is corresponding, i.e.,:In the case where the first authorization code includes visitor's identity information, the second authorization code also at least includes visitor's body
Part information, in the case where the first authorization code includes the licencing key that authorisation device is generated, the second licencing key also at least includes
Licencing key.Access controller 202, for obtaining the second authorization code, including:Include visitor's identity information in the second authorization code
In the case of, access controller 202 obtains visitor's identity information, wherein, certificate information or visitor of the visitor's identity information for visitor
Biometric information.In this optional embodiment, access controller 202 obtains visitor's identity letter that the second authorization code includes
Breath, can be that access controller 202 directly obtains the certificate that (as scanned) visitor holds, obtain visitor's identity letter of the certificate
Breath or access controller 202 directly obtain the biology of the visitors such as iris information, finger print information, the palmprint information of visitor
Identification information;In the case where the first authorization code includes the licencing key that authorisation device is generated, the second licencing key is also at least wrapped
Include licencing key.When the first authorization code and the second authorization code only include licencing key, access controller 202 is single by its reception
First (such as keyboard, communication interface, scanning element) obtains the second mandate that user's input, external equipment are sent or external equipment is shown
Code, i.e. access controller 202 can complete the acquisition of the second authorization code using the hardware device of simple structure, reduce gate inhibition's control
The cost of device 202 processed;When first authorization code and the second authorization code include visitor's identity information, access controller 202 can be by it
Read module (such as card reading module, fingerprint identification module, iris recognition module, personal recognition module) reads visitor's certificate information
And/or the mode of the biometric information of visitor reads the second authorization code, known based on visitor's certificate information and/or the biological of visitor
The uniqueness of other information, further increases the security of gate control system.
In an optional embodiment of the present embodiment, pending data is also including the use of conditional information, authority checking
Information is also including the use of conditional information;Authorisation device 201, for the encryption key using authorisation device 201 to pending data
Computing is encrypted, including:Authorisation device 201, for being signed to pending data, obtains signing messages;Access control
Device 202, at least being verified using the second authorization code to encryption data, including:Access controller 202, for using
Two authorization codes and use condition information carry out sign test to signing messages;Or, access controller 202, at least using second
Authorization code verifies to encryption data, including;Access controller 202, is authorized for obtaining first after being decrypted to encryption data
Code, the second authorization code is compared with the first authorization code.Use condition information is included in pending data so that illegal
Even if invader has intercepted and captured use condition information and distorted, also access control system can not further be ensured by checking
Security.
In an optional embodiment of the present embodiment, use condition information includes access times information and/or used
Effective time information;Whether access controller 202, the use for judging the second authorization code meets use condition information, including:
In the case where use condition information includes access times information, access controller 202 counts the access times of the second authorization code,
Judge whether the access times of the second authorization code are less than or equal to access times information, if access times are less than or equal to using secondary
Information is counted, then the second authorization code meets access times information;In situation of the use condition information including the use of effective time information
Under, whether access controller 202 records the currently used time of the second authorization code, judge the currently used time when using effective
Between in the range of information, if the currently used time, in the range of using effective time information, the second authorization code, which meets, to be used
Effective time information.Only in the case where meeting use condition information, the ability access control of access controller 202 is opened so that
Even if illegal invasion person intercepts and captures the first authorization code, first it can not also be authorized using this in the case where not meeting use condition information
Code is verified, has further ensured the security of access control system.
The access control system provided using the present embodiment, authorisation device 201 is obtained after the first authorization code, to including first
Computing is encrypted in the pending data of authorization code, obtains encryption data, and the authority checking information including encryption data is sent
To access controller 202, access controller 202 is obtained the second authorization code, encryption data is verified using the second authorization code,
Be verified and the second authorization code use meet use condition information in the case of, access control open.Provided with gate inhibition
In the gate inhibition of controller 202, even if the access card of the not no gate inhibition of visitor, it would however also be possible to employ the scheme in the present embodiment, even if
Encryption data is verified with the second authorization code, if the verification passes and the use of the second authorization code meets use condition information, then
Can be by gate inhibition, and management of the realization that the user for holding authorisation device 201 can then stay indoors to visitor's authority such as passes through
One authorization code controls whether to allow the visitor by gate inhibition, controls the visitor can be by the number of times of gate inhibition by using conditional information
Or the time etc., guaranteed safety while providing the user convenient, also, send the first authorization code in authorisation device 201
To visitor device 203 and/or application system 204, in the case that authority checking information is sent to access controller 202, this first
Authorization code is from authority checking information because receiving device is different, and the transmission of information employs different communication ports (i.e. first
Communication port:Authorisation device sends authority checking information to access controller 202;Article 2 communication port:Authorisation device is sent
First authorization code to visitor device 203 and/or application system 204, then to access controller 202), illegal invasion person is difficult to simultaneously
First authorization code and authority checking information are intercepted and captured simultaneously, in the case where only intercepting and capturing one of information, it is impossible to by checking,
Further increase the security of access control system.
Any process described otherwise above or method description are construed as in flow chart or herein, represent to include
Module, fragment or the portion of the code of one or more executable instructions for the step of realizing specific logical function or process
Point, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not be by shown or discussion suitable
Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be of the invention
Embodiment person of ordinary skill in the field understood.
It should be appreciated that each several part of the present invention can be realized with hardware, software, firmware or combinations thereof.Above-mentioned
In embodiment, the software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage
Or firmware is realized.If, and in another embodiment, can be with well known in the art for example, realized with hardware
Any one of row technology or their combination are realized:With the logic gates for realizing logic function to data-signal
Discrete logic, the application specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (PGA), scene
Programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that to realize all or part of step that above-described embodiment method is carried
Rapid to can be by program to instruct the hardware of correlation to complete, described program can be stored in a kind of computer-readable storage medium
In matter, the program upon execution, including one or a combination set of the step of embodiment of the method.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing module, can also
That unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould
Block can both be realized in the form of hardware, it would however also be possible to employ the form of software function module is realized.The integrated module is such as
Fruit is realized using in the form of software function module and as independent production marketing or in use, can also be stored in a computer
In read/write memory medium.
Storage medium mentioned above can be read-only storage, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means to combine specific features, structure, material or the spy that the embodiment or example are described
Point is contained at least one embodiment of the present invention or example.In this manual, to the schematic representation of above-mentioned term not
Necessarily refer to identical embodiment or example.Moreover, specific features, structure, material or the feature of description can be any
One or more embodiments or example in combine in an appropriate manner.
Although embodiments of the invention have been shown and described above, it is to be understood that above-described embodiment is example
Property, it is impossible to limitation of the present invention is interpreted as, one of ordinary skill in the art is not departing from the principle and objective of the present invention
In the case of above-described embodiment can be changed within the scope of the invention, change, replace and modification.The scope of the present invention
By appended claims and its equivalent limit.
Claims (12)
1. a kind of access control method, it is characterised in that including:
Authorisation device obtains the first authorization code, and computing is encrypted to pending data using the key of the authorisation device, obtains
Encryption data is obtained, wherein, the pending data includes:First authorization code;
The authorisation device sends authority checking information to access controller, wherein, the authority checking information includes:It is described
Encryption data;
The access controller receives the authority checking information;
The access controller obtains the second authorization code;
The access controller is at least verified using second authorization code to the encryption data;Obtain use condition letter
Cease and judge whether the use of second authorization code meets the use condition information, if being verified and second mandate
The use of code meets the use condition information, then the access controller access control is opened.
2. according to the method described in claim 1, it is characterised in that
First authorization code includes:Visitor's identity information, second authorization code includes:The visitor's identity information;Or,
First authorization code includes:The licencing key of the authorisation device generation, second authorization code includes:It is described to authorize
Password;Or,
First authorization code includes:The visitor's identity information and the licencing key, second authorization code include:It is described
Visitor's identity information and the licencing key.
3. method according to claim 1 or 2, it is characterised in that obtain described second in the access controller and authorize
Before code, methods described also includes:The authorisation device sends first authorization code to visitor device and/or application
System;The visitor device and/or the application system send first authorization code to the access controller;Gate inhibition's control
Device processed obtains second authorization code, including:The access controller receives the visitor device and/or application system hair
First authorization code sent, and using first authorization code as second authorization code, or,
Before the access controller obtains second authorization code, methods described also includes:The authorisation device will be described
First authorization code is sent to visitor device and/or application system;The visitor device and/or application system prompting described the
One authorization code;The access controller obtains second authorization code, including:The access controller receives described the of input
One authorization code, and it regard first authorization code as second authorization code.
4. method according to claim 2, it is characterised in that
In the case where second authorization code includes the visitor's identity information, the access controller obtains described second and awarded
Weighted code, including:The access controller obtains the visitor's identity information, wherein, the visitor's identity information is the card of visitor
Part information or the biometric information of visitor.
5. the method according to any one of Claims 1-4, it is characterised in that
The pending data also includes the use condition information, and the authority checking information also includes the use condition and believed
Breath;Computing is encrypted to the pending data using the encryption key of the authorisation device in the authorisation device, including:Institute
State authorisation device to sign to the pending data, obtain signing messages;The access controller is at least using described the
Two authorization codes verify to the encryption data, including:The access controller is using second authorization code and described makes
Sign test is carried out to the signing messages with conditional information;
Or, the access controller is at least verified using second authorization code to the encryption data, including;It is described
Access controller obtains first authorization code after being decrypted to the encryption data, and second authorization code is awarded with described first
Weighted code is compared.
6. the method according to any one of claim 1 to 5, it is characterised in that
The use condition information includes access times information and/or uses effective time information;
The access controller judges whether the use of second authorization code meets the use condition information, including:
In the case where the use condition information includes the access times information, the access controller statistics described second
The access times of authorization code, judge whether the access times of second authorization code are less than or equal to the access times information,
If the access times are less than or equal to the access times information, second authorization code meets the access times letter
Breath;
In the case where the use condition information includes the use effective time information, the access controller record is described
The currently used time of second authorization code, judge the currently used time whether the use effective time information scope
Interior, if the currently used time is in the range of the use effective time information, second authorization code meets described
Use effective time information.
7. a kind of access control system, it is characterised in that including:
Authorisation device, for obtaining the first authorization code, pending data is encrypted fortune using the key of the authorisation device
Calculate, obtain encryption data, wherein, the pending data includes:First authorization code;Authority checking information is sent to door
Prohibit controller, wherein, the authority checking information includes:The encryption data;
Access controller, for receiving the authority checking information;Obtain the second authorization code;At least use second authorization code
The encryption data is verified;Obtain use condition information and judge whether the use of second authorization code meets described
Use condition information, if being verified and the use of second authorization code meets the use condition information, the gate inhibition
Controller access control is opened.
8. system according to claim 7, it is characterised in that
First authorization code includes:Visitor's identity information, second authorization code includes:The visitor's identity information;Or,
First authorization code includes:The licencing key of the authorisation device generation, second authorization code includes:It is described to authorize
Password;Or,
First authorization code includes:The visitor's identity information and the licencing key, second authorization code include:It is described
Visitor's identity information and the licencing key.
9. the system according to claim 7 or 8, it is characterised in that the system also includes visitor device and/or application system
System;Wherein:
The authorisation device, is additionally operable to before the access controller obtains second authorization code, described first is authorized
Code is sent to the visitor device and/or the application system;The visitor device and/or the application system, for sending
First authorization code is to the access controller;The access controller, for obtaining second authorization code, including:Institute
Access controller is stated, for receiving first authorization code that the visitor device and/or the application system are sent, and by institute
The first authorization code is stated as second authorization code;Or,
The authorisation device, is additionally operable to before the access controller obtains second authorization code, described first is authorized
Code is sent to the visitor device and/or the application system;The visitor device and/or the application system, for pointing out
First authorization code;The access controller, for obtaining second authorization code, including:The access controller is received
First authorization code of input, and it regard first authorization code as second authorization code.
10. system according to claim 8, it is characterised in that
The access controller, for obtaining second authorization code, including:Include visitor's body in second authorization code
In the case of part information, the access controller obtains the visitor's identity information, wherein, the visitor's identity information is visitor
Certificate information or visitor biometric information.
11. the system according to any one of claim 7 to 10, it is characterised in that
The pending data also includes the use condition information, and the authority checking information also includes the use condition and believed
Breath;The authorisation device, computing is encrypted for the encryption key using the authorisation device to the pending data, bag
Include:The authorisation device, for being signed to the pending data, obtains signing messages;The access controller, is used for
At least the encryption data is verified using second authorization code, including:The access controller, for using described
Second authorization code and the use condition information carry out sign test to the signing messages;
Or, the access controller, at least being verified using second authorization code to the encryption data, bag
Include;The access controller, for obtaining first authorization code after being decrypted to the encryption data, by second authorization code
It is compared with first authorization code.
12. the system according to any one of claim 7 to 11, it is characterised in that
The use condition information includes access times information and/or uses effective time information;
Whether the access controller, the use for judging second authorization code meets the use condition information, including:
In the case where the use condition information includes the access times information, the access controller statistics described second
The access times of authorization code, judge whether the access times of second authorization code are less than or equal to the access times information,
If the access times are less than or equal to the access times information, second authorization code meets the access times letter
Breath;
In the case where the use condition information includes the use effective time information, the access controller record is described
The currently used time of second authorization code, judge the currently used time whether the use effective time information scope
Interior, if the currently used time is in the range of the use effective time information, second authorization code meets described
Use effective time information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710245237.XA CN107123181A (en) | 2017-04-14 | 2017-04-14 | A kind of access control method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710245237.XA CN107123181A (en) | 2017-04-14 | 2017-04-14 | A kind of access control method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107123181A true CN107123181A (en) | 2017-09-01 |
Family
ID=59725210
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710245237.XA Pending CN107123181A (en) | 2017-04-14 | 2017-04-14 | A kind of access control method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107123181A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109272607A (en) * | 2018-07-19 | 2019-01-25 | 国政通科技有限公司 | A kind of reservation visitor recognition methods and system |
CN109785531A (en) * | 2019-01-02 | 2019-05-21 | 广东乐心医疗电子股份有限公司 | Storage method and related equipment |
WO2019128087A1 (en) * | 2017-12-28 | 2019-07-04 | 广景视睿科技(深圳)有限公司 | Dual unlocking method, device and system |
CN110390746A (en) * | 2019-06-16 | 2019-10-29 | 广州智慧城市发展研究院 | A kind of implementation method of fingerprint anti-theft gate inhibition |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102436688A (en) * | 2010-09-27 | 2012-05-02 | 株式会社山武 | Entry/exit controlling system and method |
WO2014043326A1 (en) * | 2012-09-12 | 2014-03-20 | Illinois Tool Works Inc. | A secure door entry system and method |
CN104123777A (en) * | 2014-08-05 | 2014-10-29 | 上海众人科技有限公司 | Access control remote authorization method |
CN104732626A (en) * | 2015-01-22 | 2015-06-24 | 西安酷派软件科技有限公司 | Entrance guard authorization management method and entrance guard authorization management system |
CN105184934A (en) * | 2015-10-13 | 2015-12-23 | 广东聚光电子科技有限公司 | Access control system and control method thereof |
CN105279832A (en) * | 2015-12-01 | 2016-01-27 | 北京卡多宝信息技术有限公司 | Intelligent door lock system and control method thereof |
CN105447926A (en) * | 2014-08-06 | 2016-03-30 | 漳州台懋实业有限公司 | Visitor quick-passage management system structure |
-
2017
- 2017-04-14 CN CN201710245237.XA patent/CN107123181A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102436688A (en) * | 2010-09-27 | 2012-05-02 | 株式会社山武 | Entry/exit controlling system and method |
WO2014043326A1 (en) * | 2012-09-12 | 2014-03-20 | Illinois Tool Works Inc. | A secure door entry system and method |
CN104123777A (en) * | 2014-08-05 | 2014-10-29 | 上海众人科技有限公司 | Access control remote authorization method |
CN105447926A (en) * | 2014-08-06 | 2016-03-30 | 漳州台懋实业有限公司 | Visitor quick-passage management system structure |
CN104732626A (en) * | 2015-01-22 | 2015-06-24 | 西安酷派软件科技有限公司 | Entrance guard authorization management method and entrance guard authorization management system |
CN105184934A (en) * | 2015-10-13 | 2015-12-23 | 广东聚光电子科技有限公司 | Access control system and control method thereof |
CN105279832A (en) * | 2015-12-01 | 2016-01-27 | 北京卡多宝信息技术有限公司 | Intelligent door lock system and control method thereof |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019128087A1 (en) * | 2017-12-28 | 2019-07-04 | 广景视睿科技(深圳)有限公司 | Dual unlocking method, device and system |
CN109272607A (en) * | 2018-07-19 | 2019-01-25 | 国政通科技有限公司 | A kind of reservation visitor recognition methods and system |
CN109785531A (en) * | 2019-01-02 | 2019-05-21 | 广东乐心医疗电子股份有限公司 | Storage method and related equipment |
CN110390746A (en) * | 2019-06-16 | 2019-10-29 | 广州智慧城市发展研究院 | A kind of implementation method of fingerprint anti-theft gate inhibition |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11101993B1 (en) | Authentication and authorization through derived behavioral credentials using secured paired communication devices | |
CN105069876B (en) | The method and system of intelligent entrance guard control | |
US10171444B1 (en) | Securitization of temporal digital communications via authentication and validation for wireless user and access devices | |
KR102056722B1 (en) | Authentication system, and transmit terminal, receive terminal, and right authentication method of same | |
CN1770688B (en) | User authentication system and method | |
US8689013B2 (en) | Dual-interface key management | |
US20170264608A1 (en) | Visual biometric authentication supplemented with a time-based secondary authentication factor | |
US20070223685A1 (en) | Secure system and method of providing same | |
EP3787226A1 (en) | A multi-user strong authentication token | |
CN108650212A (en) | A kind of Internet of Things certification and access control method and Internet of Things security gateway system | |
KR101814719B1 (en) | System and method for remote controlling digital door-lock using smartphone | |
CN107123181A (en) | A kind of access control method and system | |
US20140329497A1 (en) | Smartdevices Enabled Secure Access to Multiple Entities (SESAME) | |
CN107113315A (en) | Identity authentication method, terminal and server | |
CN106027251B (en) | A kind of identity card card-reading terminal and cloud authentication platform data transmission method and system | |
CN105960774A (en) | Near field communication authentication mechanism | |
CN105939196B (en) | Identity identifying method and system | |
CN104618114B (en) | ID card information acquisition methods, apparatus and system | |
CN109074693A (en) | Virtual panel for access control system | |
CN109920100A (en) | A kind of smart lock method for unlocking and system | |
CN109272609A (en) | A kind of CPU safety door inhibition control method and system | |
JP5359848B2 (en) | IC card authentication system and IC card authentication method | |
CN109472903A (en) | A kind of control of bluetooth access control method and its device | |
CN108200037A (en) | A kind of method and system that safety operation is performed using safety equipment | |
CN113129525A (en) | Method and apparatus for authenticating a user of a storage compartment device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170901 |
|
RJ01 | Rejection of invention patent application after publication |