CN107945331A - A kind of access control method, apparatus and system - Google Patents
A kind of access control method, apparatus and system Download PDFInfo
- Publication number
- CN107945331A CN107945331A CN201711167853.4A CN201711167853A CN107945331A CN 107945331 A CN107945331 A CN 107945331A CN 201711167853 A CN201711167853 A CN 201711167853A CN 107945331 A CN107945331 A CN 107945331A
- Authority
- CN
- China
- Prior art keywords
- door control
- control terminal
- encrypted
- character string
- authorization server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a kind of access control method, including:Device authorization server mandate door control terminal ID;Door control terminal ID and user information are combined into character string by key authorization server;Cloud encryption server is encrypted character string using the encrypted mode of cloud;The encrypted character string is generated two-dimension code image by mobile terminal by Quick Response Code transfer algorithm;Door control terminal scans the two-dimension code image and by opening door after decryption and judgement.The invention also discloses a kind of access control device and access control system.Embodiment using the present invention, can ensure that terminal obtains the real-time of Quick Response Code and saves flow, while improve security of the Quick Response Code in information transfer process.
Description
Technical field
The present invention relates to intelligent security guard technical field, more particularly to a kind of access control method, apparatus and system.
Background technology
Access control system is commonly used in present intelligent security guard technical field, is led in existing access control system
Often using two-dimension code image come into the transmission of row information, including Cloud Server, for user's number and corresponding user is whole
Number is held to establish binding, and generation two-dimension code image and transmission;User terminal, for receiving and two-dimensional code display picture;Gate inhibition
Terminal, including data reception module, Response Code scan module, Quick Response Code identification module, control module, display module and automatically controlled
Lock, wherein data reception module, for receiving two-dimension code image;The Response Code scan module, for scanning and typing;It is described
Quick Response Code identification module, the feature of two-dimension code image and corresponding user's number are obtained for identifying;The control module, is used
In two-dimension code image characteristic matching, electric control lock is controlled to open when successful match, and driving display module will identify that institute is handy
Family number is shown.
Existing access control system has the following disadvantages:Two-dimension code image Cloud Server generation and transmission process in,
The transmission pressure and terminal flow of server are added, causes terminal to obtain the inefficient of Quick Response Code;Quick Response Code is according to set
Terminal is sent to after rule generation, it is easy to character string rule is cracked out by Quick Response Code identifier and is replicated generation effectively
Quick Response Code, very big hidden danger is caused to the safety of access control system.
The content of the invention
The many aspects of the present invention provide a kind of access control method, apparatus and system, can ensure that terminal obtains two dimension
The real-time and saving flow of code, while improve security of the Quick Response Code in information transfer process.
One aspect of the present invention provides a kind of access control method, including:
S11, mobile terminal send the first request to key authorization server, are based on the key authorization server described
First requests to generate and is sent to cloud encryption server after electron key character string and is encrypted, and by the key authorization server
Receive the encrypted electron key character string that the cloud encryption server returns;
S12, the mobile terminal receive the encrypted electron key character that the key authorization server returns
String, and by Quick Response Code transfer algorithm by the encrypted electron key text string generation two-dimension code image;Wherein, described two
Dimension code picture is used to open lock after scanning successfully for the door control terminal corresponding to the door control terminal ID.
A kind of access control method provided in this embodiment obtains electronics key by mobile terminal to key authorization server
Spoon character string, and the electron key character string of acquisition is generated into two-dimension code image at local (mobile terminal), solve Quick Response Code
The problem of picture directly transmits in server and mobile terminal and causes to waste flow, obtains the technology effect for saving flow
Fruit;In addition, the electron key character string of acquisition for mobile terminal has also first passed through the encryption of cloud encryption server, solves existing skill
Because of the problem of being directly transmitted without the two-dimension code image of any encryption so as to cause information leakage in art, access control system is improved
Security.
As the improvement of this programme, further included before the S11:
S101, the mobile terminal send door control terminal ID to device authorization server and obtain request, award the equipment
Power server is based on door control terminal ID acquisitions and requests to generate corresponding door control terminal ID;Wherein described door control terminal ID is obtained
Request includes user information;
S102, the mobile terminal receive the door control terminal ID that the device authorization server returns and are stored in this
Ground.
As the improvement of this programme, the two-dimension code image of generation is equipped with the restriction letter of usage time or access times
Breath.
Another aspect of the present invention provides a kind of access control method, including:
S21, key authorization server receive the first request that mobile terminal is sent;Wherein, first request includes door
Prohibit Termination ID and user information;
S22, the key authorization server are based on the door control terminal ID in the described first request and user information generation electricity
Sub- key character string, and the electron key character string of generation is sent to cloud encryption server and is encrypted;
The electron key character string received is encrypted for S23, the cloud encryption server, obtains encrypted
Electron key character string, and the encrypted electron key character string is returned into the key authorization server;
The encrypted electron key character string is sent to mobile terminal by S24, the key authorization server, makes institute
Mobile terminal is stated by Quick Response Code transfer algorithm by the encrypted electron key text string generation two-dimension code image;Wherein,
The two-dimension code image is used to open lock after scanning successfully for the door control terminal corresponding to the door control terminal ID.
A kind of access control method provided in this embodiment is used as the platform of generation two-dimension code image, tool by mobile terminal
Body obtains electron key character string to key authorization server, and the electron key character string of acquisition is generated two in mobile terminal
Code picture is tieed up, solves the problems, such as that two-dimension code image is directly transmitted in server and mobile terminal and causes to waste flow, obtains
Obtained the technique effect for saving flow;And just eventually through mobile terminal after character string is encrypted by cloud encryption server
Two-dimension code image is generated, is solved in the prior art because the two-dimension code image for being directly transmitted without any encryption is so as to cause
The problem of information leakage, improve the security of access control system.
As the improvement of this programme, further included before the S21:
S201, device authorization server receive the door control terminal ID that the mobile terminal is sent and obtain request, wherein described
Door control terminal ID, which obtains request, includes user information;
S202, the device authorization server are based on door control terminal ID acquisitions and request to generate corresponding door control terminal ID
And it is sent to the mobile terminal.
As the improvement of this programme, the two-dimension code image of generation is equipped with the restriction letter of usage time or access times
Breath.
Another aspect of the present invention provides a kind of access control device, including:
Sending module, for sending the first request to key authorization server, makes the key authorization server be based on institute
State first and request to generate and be sent to cloud encryption server after electron key character string and be encrypted, and by the key authorization service
Device receives the encrypted electron key character string that the cloud encryption server returns;
Receiving module, the encrypted electron key character string returned for receiving the key authorization server,
And by Quick Response Code transfer algorithm by the encrypted electron key text string generation two-dimension code image;Wherein, the two dimension
Code picture is used to open lock after scanning successfully for the door control terminal corresponding to the door control terminal ID.
As the improvement of this programme, the access control device further includes:
Door control terminal ID obtains request sending module, please for sending door control terminal ID acquisitions to device authorization server
Ask, the device authorization server is based on door control terminal ID acquisitions and request to generate corresponding door control terminal ID;Wherein institute
Stating door control terminal ID acquisition requests includes user information;
Door control terminal ID receiving modules, for receiving the door control terminal ID of the device authorization server return and depositing
Storage is in local.
A kind of access control device provided in this embodiment by key authorization server obtain electron key character string,
And the electron key character string of acquisition is generated into two-dimension code image at local (mobile terminal), solve two-dimension code image and directly exist
The problem of server causes to waste flow with transmitting in mobile terminal, obtains the technique effect for saving flow;It is in addition, mobile
The electron key character string that terminal obtains also has first passed through the encryption of cloud encryption server, solves in the prior art because directly passing
The defeated two-dimension code image without any encryption improves the security of access control system so that the problem of causing information leakage.
Another aspect of the present invention provides a kind of access control system, including key authorization server, cloud encryption clothes
Business device and door control terminal;Wherein,
The key authorization server is used for the first request for receiving mobile terminal transmission and please seek survival based on described first
Into electron key character string, and the electron key character string of generation is sent to cloud encryption server and is encrypted;Wherein,
First request includes door control terminal ID and user information;
The cloud encryption server is used to the electron key character string received being encrypted, and obtains encrypted
Electron key character string, and the encrypted electron key character string is returned into the key authorization server;
The key authorization server is additionally operable to the encrypted electron key character string being sent to mobile terminal, makes
The encrypted electron key character string is converted to having time or secondary by the mobile terminal by Quick Response Code transfer algorithm
The two-dimension code image that number limits;
The door control terminal is used to after the two-dimension code image is identified and scans successfully correspond to door control terminal ID
Door open.
A kind of access control system provided in this embodiment is used as the platform of generation two-dimension code image, tool by mobile terminal
Body obtains electron key character string to key authorization server, and the electron key character string of acquisition is generated two in mobile terminal
Code picture is tieed up, solves the problems, such as that two-dimension code image is directly transmitted in server and mobile terminal and causes to waste flow, obtains
Obtained the technique effect for saving flow;And just eventually through mobile terminal after character string is encrypted by cloud encryption server
Two-dimension code image is generated, is solved in the prior art because the two-dimension code image for being directly transmitted without any encryption is so as to cause
The problem of information leakage, improve the security of access control system.
As the improvement of this programme, the access control system further includes standby authorization server;
The device authorization server is used to receive the door control terminal ID acquisition requests that the mobile terminal is sent, and is based on
The door control terminal ID acquisitions request to generate corresponding door control terminal ID and are sent to the mobile terminal;Wherein described gate inhibition is whole
End ID, which obtains request, includes user information.
Brief description of the drawings
Fig. 1 is a kind of flow diagram of access control method in the embodiment of the present invention;
Fig. 2 is a kind of flow diagram of access control method in the embodiment of the present invention;
Fig. 3 is the flow diagram of another access control method in the embodiment of the present invention;
Fig. 4 is the flow diagram of another access control method in the embodiment of the present invention;
Fig. 5 is a kind of structure diagram of access control device in the embodiment of the present invention;
Fig. 6 is a kind of structure diagram of access control device in the embodiment of the present invention;
Fig. 7 is a kind of structure diagram of access control system in the embodiment of the present invention.
Embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other without creative efforts
Embodiment, belongs to the scope of protection of the invention.
Referring to Fig. 1, a kind of access control method provided in an embodiment of the present invention, comprises the following steps:
S101, mobile terminal send the first request to key authorization server, the key authorization server is based on institute
State first and request to generate and be sent to cloud encryption server after electron key character string and be encrypted, and by the key authorization service
Device receives the encrypted electron key character string that the cloud encryption server returns;Wherein, first request includes gate inhibition
Termination ID and user information;
S102, the mobile terminal receive the encrypted electron key character that the key authorization server returns
String, and by Quick Response Code transfer algorithm by the encrypted electron key text string generation two-dimension code image;Wherein, described two
Dimension code picture is used to open lock after scanning successfully for the door control terminal corresponding to the door control terminal ID.
Wherein, the two-dimension code image is equipped with usage time or the prescribed information of access times;Wherein, usage time can
Be set as 24 it is small when but not limited to this, access times may be set to disposable but not limited to this.
Specifically, the door control terminal parses the two-dimension code image when the two-dimension code image is arrived in scanning;
The door control terminal obtains encrypted characters string after having parsed two-dimension code image, and the encrypted characters string is decrypted and is solved
Character string after close;The door control terminal character string after the decryption is parsed after door control terminal ID and
User information after parsing;The door control terminal to the door control terminal ID after the parsing and the user information after the parsing into
Row judges, judges that effectively then the door control terminal opens the corresponding doors of door control terminal ID to result;Wherein, the door after the parsing
The door control terminal ID for prohibiting Termination ID and door control terminal itself storage is compared, and the user information after the parsing and door control terminal are certainly
The user information of body storage compares.
The implementation process of the present embodiment includes:Mobile terminal sends door control terminal ID to key authorization server and user believes
Breath, the key authorization server are based on the door control terminal ID and shown user information generation electron key character string and send
It is encrypted to cloud encryption server;The key authorization server receives the encrypted of the cloud encryption server return
Electron key character string;The mobile terminal receives the encrypted electron key word that the key authorization server returns
Symbol string, and by Quick Response Code transfer algorithm by the encrypted electron key text string generation two-dimension code image.Based on above-mentioned
Implementation process directly can generate two-dimension code image in mobile terminal, play the role of saving flow and accelerate information transmission.Together
When add cloud encryption server character string be encrypted, improve the security in information transfer process.
Referring to Fig. 2, a kind of method of access control provided in an embodiment of the present invention, comprises the following steps:
S11, mobile terminal send door control terminal ID to device authorization server and obtain request, make the device authorization service
Device is based on door control terminal ID acquisitions and requests to generate corresponding door control terminal ID;
S12, mobile terminal receive the door control terminal ID that the device authorization server returns and are stored in local;
S13, mobile terminal send the first request to key authorization server, are based on the key authorization server described
First requests to generate and is sent to cloud encryption server after electron key character string and is encrypted, and by the key authorization server
Receive the encrypted electron key character string that the cloud encryption server returns;
S14, mobile terminal receive the encrypted electron key character string that the key authorization server returns;
S15, mobile terminal are by Quick Response Code transfer algorithm by the encrypted electron key text string generation Quick Response Code
Picture.
As different from Example 1, the present embodiment increases step S11~S12 to fulfil user ahead of schedule to controllable door
Prohibit the registration of terminal.Specifically, user is registered by mobile terminal in the present embodiment, input user information can be completed
Registration;Specifically, the controllable door control terminal more than one of mobile terminal in the present embodiment, based on gate inhibition in the mobile terminal
The stored number of Termination ID controls corresponding door control terminal.
Based on above-described embodiment, using generating platform of the mobile terminal as two-dimension code image, while cloud encryption is added
Character string is encrypted in server, with being then forwarded to after directly generating two-dimension code image in the server in the prior art
Mobile terminal is very different, and the present invention can solve prior art two-dimension code image in server and mobile terminal interaction
In generation flow excessively and information the problem of easily leaking, play and save flow, accelerate information transmission and raising security
Effect.
Referring to Fig. 3, the method for another kind access control provided in an embodiment of the present invention, comprises the following steps:
S201, key authorization server receive the first request that mobile terminal is sent;Wherein, first request includes door
Prohibit Termination ID and user information;
S202, the key authorization server are based on the door control terminal ID in the described first request and user information generation electricity
Sub- key character string, and the electron key character string of generation is sent to cloud encryption server and is encrypted;
The electron key character string received is encrypted for S203, the cloud encryption server, after obtaining encryption
Electron key character string, and the encrypted electron key character string is returned into the key authorization server;
The encrypted electron key character string is sent to mobile terminal by S204, the key authorization server, is made
The mobile terminal is by Quick Response Code transfer algorithm by the encrypted electron key text string generation two-dimension code image;Its
In, the two-dimension code image is used to open lock after scanning successfully for the door control terminal corresponding to the door control terminal ID.
Wherein, the two-dimension code image is equipped with usage time or the prescribed information of access times;Wherein, usage time can
Be set as 24 it is small when but not limited to this, access times may be set to disposable but not limited to this.
Referring to Fig. 4, another kind access control method provided in an embodiment of the present invention, comprises the following steps:
The door control terminal ID that S21, device authorization server connect mobile terminal transmission obtains request and based on gate inhibition end
End ID acquisitions return to the mobile terminal after requesting to generate corresponding door control terminal ID;
S22, key authorization server receive the first request that mobile terminal is sent, and based on the door in the described first request
Prohibit Termination ID and user information generation electron key character string, and the electron key character string of generation is sent to cloud encryption
Server;
The electron key character string received is encrypted for S23, cloud encryption server, obtains encrypted electronics
Key character string, and the encrypted electron key character string is returned into the key authorization server;
The encrypted electron key character string is sent to mobile terminal by S24, key authorization server, makes the shifting
Dynamic terminal is by Quick Response Code transfer algorithm by the encrypted electron key text string generation two-dimension code image.
Wherein, the door control terminal ID, which obtains request, includes user information.First request includes door control terminal ID
And user information.The two-dimension code image is used to make lock after scanning successfully for the door control terminal corresponding to the door control terminal ID
Open.The two-dimension code image is equipped with usage time or the prescribed information of access times;Wherein, usage time can be set as 24
Hour but not limited to this, access times may be set to disposable but not limited to this.
Unlike the embodiments above, the present embodiment is by implementation steps S21 to fulfil device authorization server ahead of schedule
Mandate to gate inhibition's Termination ID.Specifically, the use that the device authorization server is sended over according to the mobile terminal received
Family information returns to the corresponding door control terminal ID of the user information, realizes the mandate of door control terminal ID.It should be understood that this implementation
The controllable door control terminal more than one of mobile terminal in example, the stored number control based on door control terminal ID in the mobile terminal
Make corresponding door control terminal.
Based on above-described embodiment, add cloud encryption server and character string is encrypted, it is direct with the prior art
Transmit without the Quick Response Code difference for carrying out any encryption, the safety in information transfer process can be improved with cloud encryption technology
Property.Generating platform of the mobile terminal as two-dimension code image is used at the same time, with directly generating two in the server in the prior art
Mobile terminal is then forwarded to after dimension code picture to be very different, the present invention can solve prior art two-dimension code image in server
With the flow of the generation in mobile terminal interaction it is excessive the problem of, play the role of save flow, accelerate information transmission.
The embodiment of the present invention also provides a kind of system of access control device and access control, can realize above-described embodiment
The method of middle access control.
Referring to Fig. 5, a kind of structure diagram of access control device provided in an embodiment of the present invention;The access control dress
Put including:
Sending module 51, for sending the first request to key authorization server, is based on the key authorization server
Described first requests to generate and is sent to cloud encryption server after electron key character string and is encrypted, and is taken by the key mandate
Business device receives the encrypted electron key character string that the cloud encryption server returns;
Receiving module 52, the encrypted electron key character returned for receiving the key authorization server
String, and by Quick Response Code transfer algorithm by the encrypted electron key text string generation two-dimension code image;Wherein, described two
Dimension code picture is used to open lock after scanning successfully for the door control terminal corresponding to the door control terminal ID.
Optionally, further included referring to Fig. 6, the access control device:
Door control terminal ID obtains request sending module 53, please for sending door control terminal ID acquisitions to device authorization server
Ask, the device authorization server is based on door control terminal ID acquisitions and request to generate corresponding door control terminal ID;Wherein institute
Stating door control terminal ID acquisition requests includes user information;
Door control terminal ID receiving modules 54, for receiving the door control terminal ID of the device authorization server return simultaneously
It is stored in local.
The operation principle and process of a kind of access control device provided in this embodiment please refer to Fig.1 or Fig. 2 shown in reality
A process is applied, details are not described herein.
Referring to Fig. 7, a kind of structure diagram of access control system provided in an embodiment of the present invention, including:
Device authorization server 61, request, and base are obtained for receiving the door control terminal ID that the mobile terminal 64 is sent
Corresponding door control terminal ID is requested to generate in door control terminal ID acquisitions and is sent to the mobile terminal 64;Wherein described door
Prohibiting Termination ID acquisition request includes user information;
Key authorization server 62, for receiving the first request of the transmission of mobile terminal 64 and please seek survival based on described first
Into electron key character string, and the electron key character string of generation is sent to cloud encryption server 63 and is encrypted;Its
In, the first request includes door control terminal ID and user information;
Cloud encryption server 63, for the electron key character string received to be encrypted, obtains encrypted
Electron key character string, and the encrypted electron key character string is returned into the key authorization server 62;Wherein,
The key authorization server 62 is additionally operable to the encrypted electron key character string being sent to mobile terminal 64;
Mobile terminal 64, the encrypted electron key character returned for receiving the key authorization server 62
String, and by Quick Response Code transfer algorithm by the encrypted electron key text string generation two-dimension code image;Wherein, described two
Dimension code picture is used to open lock after scanning successfully for the door control terminal 65 corresponding to the door control terminal ID;
Door control terminal 65, for after being identified and being scanned successfully to the two-dimension code image that door control terminal ID is corresponding
Door is opened.
The operation principle and process of a kind of access control system provided in this embodiment please refer to Fig.3 shown embodiment mistake
Journey, details are not described herein.
In conclusion access control method provided in an embodiment of the present invention, apparatus and system, are used as life by mobile terminal
Into the platform of two-dimension code image, specifically electron key character string is obtained to key authorization server, and by the electron key of acquisition
Character string generates two-dimension code image in mobile terminal, solve two-dimension code image directly transmitted in server and mobile terminal and
The problem of causing to waste flow, obtains the technique effect for saving flow;And character string is added by cloud encryption server
Two-dimension code image just is generated eventually through mobile terminal after close, is solved in the prior art because being directly transmitted without at any encryption
The two-dimension code image of reason improves the security of access control system so that the problem of causing information leakage.
The above is the preferred embodiment of the present invention, it is noted that for those skilled in the art
For, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also considered as
Protection scope of the present invention.
Claims (10)
- A kind of 1. access control method, it is characterised in that the described method includes:S11, mobile terminal send the first request to key authorization server, the key authorization server is based on described first Request to generate and be sent to cloud encryption server after electron key character string and be encrypted, and received by the key authorization server The encrypted electron key character string that the cloud encryption server returns;Wherein, first request includes door control terminal ID And user information;S12, the mobile terminal receive the encrypted electron key character string that the key authorization server returns, and By Quick Response Code transfer algorithm by the encrypted electron key text string generation two-dimension code image;Wherein, the Quick Response Code Picture is used to open lock after scanning successfully for the door control terminal corresponding to door control terminal ID.
- 2. access control method as claimed in claim 1, it is characterised in that further included before the S11:S101, the mobile terminal send door control terminal ID to device authorization server and obtain request, take the device authorization Business device is based on door control terminal ID acquisitions and requests to generate corresponding door control terminal ID;Wherein described door control terminal ID obtains request Include user information;S102, the mobile terminal receive the door control terminal ID that the device authorization server returns and are stored in local.
- 3. access control method as claimed in claim 2, it is characterised in that when the two-dimension code image of generation is equipped with use Between or access times prescribed information.
- A kind of 4. access control method, it is characterised in that the described method includes:S21, key authorization server receive the first request that mobile terminal is sent;Wherein, first request includes gate inhibition's end Hold ID and user information;S22, the key authorization server are based on the door control terminal ID in the described first request and user information generation electronics key Spoon character string, and the electron key character string of generation is sent to cloud encryption server and is encrypted;The electron key character string received is encrypted for S23, the cloud encryption server, obtains encrypted electronics Key character string, and the encrypted electron key character string is returned into the key authorization server;The encrypted electron key character string is sent to mobile terminal by S24, the key authorization server, makes the shifting Dynamic terminal is by Quick Response Code transfer algorithm by the encrypted electron key text string generation two-dimension code image;Wherein, it is described Two-dimension code image is used to open lock after scanning successfully for the door control terminal corresponding to the door control terminal ID.
- 5. access control method as claimed in claim 4, it is characterised in that further included before the S21:S201, device authorization server receive the door control terminal ID that the mobile terminal is sent and obtain request, wherein the gate inhibition Termination ID, which obtains request, includes user information;S202, the device authorization server are based on the door control terminal ID and obtain that to request to generate corresponding door control terminal ID concurrent Give the mobile terminal.
- 6. access control method as claimed in claim 4, it is characterised in that when the two-dimension code image of generation is equipped with use Between or access times prescribed information.
- A kind of 7. access control device, it is characterised in that including:Sending module, for sending the first request to key authorization server, makes the key authorization server be based on described the One requests to generate and is sent to cloud encryption server after electron key character string and is encrypted, and is connect by the key authorization server Receive the encrypted electron key character string that the cloud encryption server returns;Receiving module, the encrypted electron key character string returned for receiving the key authorization server, and lead to Quick Response Code transfer algorithm is crossed by the encrypted electron key text string generation two-dimension code image;Wherein, the Quick Response Code figure Piece is used to open lock after scanning successfully for the door control terminal corresponding to the door control terminal ID.
- 8. access control device as claimed in claim 7, it is characterised in that the access control device further includes:Door control terminal ID obtains request sending module, obtains request for sending door control terminal ID to device authorization server, makes The device authorization server is based on door control terminal ID acquisitions and requests to generate corresponding door control terminal ID;Wherein described gate inhibition Termination ID, which obtains request, includes user information;Door control terminal ID receiving modules, for receiving the door control terminal ID of the device authorization server return and being stored in It is local.
- 9. a kind of access control system, it is characterised in that whole including key authorization server, cloud encryption server and gate inhibition End;Wherein,The key authorization server is used for the first request for receiving mobile terminal transmission and requests to generate electricity based on described first Sub- key character string, and the electron key character string of generation is sent to cloud encryption server and is encrypted;Wherein, first Request includes door control terminal ID and user information;The cloud encryption server is used to the electron key character string received being encrypted, and obtains encrypted electronics Key character string, and the encrypted electron key character string is returned into the key authorization server;The key authorization server is additionally operable to the encrypted electron key character string being sent to mobile terminal, makes described The encrypted electron key character string is converted to two-dimension code image by mobile terminal by Quick Response Code transfer algorithm;The door control terminal is used for the corresponding doors of door control terminal ID after being identified and being scanned successfully to the two-dimension code image Open.
- 10. access control system as claimed in claim 9, it is characterised in that the access control system further includes equipment and awards Weigh server;The device authorization server is used to receive the door control terminal ID acquisition requests that the mobile terminal is sent, and based on described Door control terminal ID acquisitions request to generate corresponding door control terminal ID and are sent to the mobile terminal;Wherein described door control terminal ID Obtaining request includes user information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711167853.4A CN107945331A (en) | 2017-11-21 | 2017-11-21 | A kind of access control method, apparatus and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711167853.4A CN107945331A (en) | 2017-11-21 | 2017-11-21 | A kind of access control method, apparatus and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107945331A true CN107945331A (en) | 2018-04-20 |
Family
ID=61930573
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711167853.4A Pending CN107945331A (en) | 2017-11-21 | 2017-11-21 | A kind of access control method, apparatus and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107945331A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109615749A (en) * | 2018-12-27 | 2019-04-12 | 广州启盟信息科技有限公司 | A kind of offline two dimensional code opens a sluice gate method, apparatus and computer readable storage medium |
CN110379052A (en) * | 2019-07-03 | 2019-10-25 | 深圳供电局有限公司 | Unlocking method, method, authorization method and the management system of application unlock |
CN110956718A (en) * | 2018-09-21 | 2020-04-03 | 富士电机株式会社 | Electronic lock unit unlocking system of electrical equipment |
CN111047750A (en) * | 2018-10-12 | 2020-04-21 | 杭州海康威视数字技术股份有限公司 | Method, device and system for controlling offline access control device |
CN111199601A (en) * | 2019-09-02 | 2020-05-26 | 腾讯科技(深圳)有限公司 | Access control method and device, intelligent terminal, server and storage medium |
CN111540093A (en) * | 2020-04-29 | 2020-08-14 | 三仟(杭州)数字科技有限公司 | Access control system and control method thereof |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103646455A (en) * | 2013-12-24 | 2014-03-19 | 杨密凯 | Intelligent lock device and usage method thereof as well as configuration method for electronic keys |
US8844811B1 (en) * | 2013-06-04 | 2014-09-30 | April Elizabeth Rogers | System and method for controlling locks |
CN105069868A (en) * | 2015-07-21 | 2015-11-18 | 杭州晟元数据安全技术股份有限公司 | Intelligent district cloud system base on mobile phone dynamic safety two dimension code recognition |
CN105069876A (en) * | 2015-08-04 | 2015-11-18 | 珠海格力电器股份有限公司 | Control method and system for intelligent access control |
CN105139491A (en) * | 2015-08-10 | 2015-12-09 | 闻泰通讯股份有限公司 | Mobile phone access control system based on encrypted two-dimensional code |
-
2017
- 2017-11-21 CN CN201711167853.4A patent/CN107945331A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8844811B1 (en) * | 2013-06-04 | 2014-09-30 | April Elizabeth Rogers | System and method for controlling locks |
CN103646455A (en) * | 2013-12-24 | 2014-03-19 | 杨密凯 | Intelligent lock device and usage method thereof as well as configuration method for electronic keys |
CN105069868A (en) * | 2015-07-21 | 2015-11-18 | 杭州晟元数据安全技术股份有限公司 | Intelligent district cloud system base on mobile phone dynamic safety two dimension code recognition |
CN105069876A (en) * | 2015-08-04 | 2015-11-18 | 珠海格力电器股份有限公司 | Control method and system for intelligent access control |
CN105139491A (en) * | 2015-08-10 | 2015-12-09 | 闻泰通讯股份有限公司 | Mobile phone access control system based on encrypted two-dimensional code |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110956718A (en) * | 2018-09-21 | 2020-04-03 | 富士电机株式会社 | Electronic lock unit unlocking system of electrical equipment |
CN111047750A (en) * | 2018-10-12 | 2020-04-21 | 杭州海康威视数字技术股份有限公司 | Method, device and system for controlling offline access control device |
CN109615749A (en) * | 2018-12-27 | 2019-04-12 | 广州启盟信息科技有限公司 | A kind of offline two dimensional code opens a sluice gate method, apparatus and computer readable storage medium |
CN110379052A (en) * | 2019-07-03 | 2019-10-25 | 深圳供电局有限公司 | Unlocking method, method, authorization method and the management system of application unlock |
CN111199601A (en) * | 2019-09-02 | 2020-05-26 | 腾讯科技(深圳)有限公司 | Access control method and device, intelligent terminal, server and storage medium |
CN111199601B (en) * | 2019-09-02 | 2022-06-14 | 腾讯科技(深圳)有限公司 | Access control method and device, intelligent terminal, server and storage medium |
CN111540093A (en) * | 2020-04-29 | 2020-08-14 | 三仟(杭州)数字科技有限公司 | Access control system and control method thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107945331A (en) | A kind of access control method, apparatus and system | |
CN106559217B (en) | A kind of dynamic encrypting method, terminal, server | |
US10506428B2 (en) | Wireless network connection method, apparatus, and system | |
US8954741B2 (en) | Apparatus and method for supporting family cloud in cloud computing system | |
CN104410967B (en) | A kind of method, apparatus and system being attached | |
US10637650B2 (en) | Active authentication session transfer | |
CN105096431A (en) | Intelligent door lock remote control and management system | |
CN103685384A (en) | User authentication method and device for preventing malicious harassment | |
CN106101147A (en) | A kind of method and system realizing smart machine and remote terminal dynamic encryption communication | |
CN107067576A (en) | Intelligent cabinet tenant remote authorization other people use method, apparatus and system | |
US8732460B2 (en) | System and method for providing a one-time key for identification | |
CN109995710A (en) | A kind of lan device management system and method | |
CN104283961A (en) | Community management cloud service integration platform and method | |
TW200612712A (en) | Application authentication in wireless communication networks | |
CN103886661A (en) | Entrance guard management method and system | |
CN106599632B (en) | Cipher-code input method and device | |
CN101840468A (en) | User authentication method and device | |
CN112910644A (en) | Security authentication system based on quantum secret data | |
CN205140033U (en) | Electron password privilege management system of intelligence lock | |
CN109918028A (en) | A kind of computer based remote printing method and its system | |
CN109408007A (en) | A kind of computer based shares Method of printing and its system | |
CN109067712A (en) | A kind of user cloud data guard method and proxy server | |
CN105745954B (en) | A kind of M2M terminal control method and relevant device | |
CN107295510A (en) | The method, equipment and system of Home eNodeB access control are realized based on OCSP | |
CN108737081B (en) | Quantum key output control system and method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180420 |
|
RJ01 | Rejection of invention patent application after publication |