CN109002875B - Two-dimensional code encryption method, two-dimensional code transmission system and storage medium - Google Patents

Two-dimensional code encryption method, two-dimensional code transmission system and storage medium Download PDF

Info

Publication number
CN109002875B
CN109002875B CN201810562967.7A CN201810562967A CN109002875B CN 109002875 B CN109002875 B CN 109002875B CN 201810562967 A CN201810562967 A CN 201810562967A CN 109002875 B CN109002875 B CN 109002875B
Authority
CN
China
Prior art keywords
dimensional code
character string
sub
radio station
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810562967.7A
Other languages
Chinese (zh)
Other versions
CN109002875A (en
Inventor
董佳佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Debi Innovation Technology Development Co ltd
Original Assignee
Shanghai Debi Innovation Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Debi Innovation Technology Development Co ltd filed Critical Shanghai Debi Innovation Technology Development Co ltd
Priority to CN201810562967.7A priority Critical patent/CN109002875B/en
Priority to US16/489,014 priority patent/US20210326665A1/en
Priority to PCT/CN2018/100983 priority patent/WO2019205357A1/en
Publication of CN109002875A publication Critical patent/CN109002875A/en
Application granted granted Critical
Publication of CN109002875B publication Critical patent/CN109002875B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/23Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Abstract

A two-dimensional code encryption method, a two-dimensional code transmission system and a storage medium are provided, wherein the two-dimensional code encryption method comprises the steps of generating a first character string of a first system according to user information; converting the first character string into a second character string of a second system by using a preset codebook, wherein the preset codebook is updated and replaced according to a preset period, and the cardinal number of the second system is larger than that of the first system; and generating a two-dimensional code by using the second character string. The technical scheme of the invention can improve the entrance guard safety of the shared space.

Description

Two-dimensional code encryption method, two-dimensional code transmission system and storage medium
Technical Field
The invention relates to the technical field of security protection, in particular to a two-dimensional code encryption method, a two-dimensional code transmission system and a storage medium.
Background
The prior art access control device generally adopts an Identification Card (ID) Card, an Integrated Circuit (IC) Card, a password, a fingerprint, etc. to verify the user identity. The access control device can compare the acquired user identity to determine whether to open the door.
However, the two-dimensional code used by the existing access control equipment is too long in length and slow in code scanning identification, and therefore a user can wait for code scanning in a queue under the condition of using a large number of users. Part of users can splice the two-dimension code content directly by using the text character string and then generate the two-dimension code; the two-dimensional code content is displayed in a plaintext form, can be directly identified, is easy to guess the meaning of the two-dimensional code so as to be disguised, and has low safety. To the entrance guard's equipment in different places, like gymnasium entrance guard, meeting room entrance guard and elevator entrance guard, the user need show different two-dimensional code, brings very big inconvenience for the user. The user can copy the available two-dimension code pictures of other users for repeated use, and if the two-dimension code leaks, the access control safety is seriously influenced.
A shared space is a space that is shared towards multiple users, for example, a single office may be shared for use by people throughout a building, or even by people throughout the society. Because the number of users facing the shared space is huge, the two-dimensional code encryption mode in the prior art can not meet the security requirement of the shared space for the entrance guard.
Disclosure of Invention
The invention solves the technical problem of how to improve the access control safety of a shared space.
In order to solve the above technical problem, an embodiment of the present invention provides a two-dimensional code encryption method, where the two-dimensional code encryption method includes: generating a first character string of a first system according to the user information; converting the first character string into a second character string of a second system by using a preset codebook, wherein the preset codebook is updated and replaced according to a preset period, and the cardinal number of the second system is larger than that of the first system; and generating a two-dimensional code by using the second character string.
Optionally, the first base is 10, and the second base is 64.
Optionally, the preset codebook includes a plurality of characters arranged in sequence, and the sequence is updated and replaced according to a preset period.
Optionally, the plurality of characters are selected from: numbers 0-9, capital letters A-Z, lowercase letters a-Z, punctuation marks.
Optionally, the user information includes a user identity, and the first character string includes characters corresponding to the user identity.
Optionally, the character corresponding to the user id is located in a preset position of the first character string.
The embodiment of the invention also discloses a two-dimensional code transmission system, which comprises: a server; sub-control devices provided in the respective shared spaces, the sub-control devices including: a sub-station; the two-dimensional code scanning device is suitable for scanning a two-dimensional code on the user terminal to obtain two-dimensional code carrying information and sending the two-dimensional code carrying information out through a sub radio station, the two-dimensional code is generated by the user terminal or a server according to the two-dimensional code encryption method, and the two-dimensional code carrying information comprises the second character string; an access controller coupled to the sub-station; the general radio station is wirelessly coupled with the sub radio stations in the sub control devices; and the master control equipment is coupled with the master radio station, and the master control equipment is communicated with the two-dimensional code scanning equipment and the access controller through the master radio station, the slave radio station and the two-dimensional code scanning equipment.
Optionally, the information carried by the two-dimensional code further includes a preset random character spliced behind the second character string.
Optionally, the master control device receives, via the master radio station, the two-dimensional code carrying information sent by the slave radio station, and compares the preset random character with the random character issued by the server, so as to determine whether the two-dimensional code carrying information is correct.
Optionally, the two-dimensional code scanning device generates a CRC code by using the second character string; the two-dimensional code carrying information also comprises the CRC code.
Optionally, the master control device receives, via the master radio station, information carried by the two-dimensional code sent by the slave radio station, calculates a new CRC code according to the received second character string again, and compares the new CRC code with the CRC code to determine whether the second character string is correct.
Optionally, the second string includes a timestamp; the master control equipment receives the two-dimension code carried information through the master radio station and feeds back an instruction aiming at the second character string; and after the general radio station receives feedback confirmation of the entrance guard controller aiming at the instruction, if the general radio station receives the second character string comprising the timestamp again, recording the abnormity.
The embodiment of the invention also discloses a storage medium, wherein a computer instruction is stored on the storage medium, and the steps of the two-dimensional code encryption method are executed when the computer instruction runs.
Compared with the prior art, the technical scheme of the embodiment of the invention has the following beneficial effects:
the technical scheme of the invention generates a first character string of a first system according to user information; converting the first character string into a second character string of a second system by using a preset codebook, wherein the preset codebook is updated and replaced according to a preset period, and the cardinal number of the second system is larger than that of the first system; and generating a two-dimensional code by using the second character string. According to the technical scheme, the first character string in the first system is converted into the second character string in the second system, so that the data volume of the second character string is smaller than that of the first character string, the length of the two-dimensional code can be reduced, and the recognition speed and the transmission speed of the two-dimensional code are improved. In addition, the preset codebook is updated and replaced according to the preset period, so that the same first character string can be converted into different second character strings in different preset periods, operations such as opening an access control by illegal personnel by using the same two-dimensional code are avoided, and the use safety of the two-dimensional code is ensured.
Further, the first base is 10, and the second base is 64. The larger the base number of the second system is, the smaller the data amount of the second character string is; however, the existence of special characters in the computer language can instruct the computer to execute specific operations, and the number of available characters in a second binary system is limited; therefore, the base number of the second system in the technical scheme of the invention is 64, and the usability of the second character string can be ensured while the data volume of the second character string is reduced.
Further, the user information comprises a user identity, and the first character string comprises characters corresponding to the user identity; and the character corresponding to the user identity mark is positioned at the preset position of the first character string. In the technical scheme of the invention, in order to distinguish different users, the first character string comprises characters corresponding to user identity marks. In addition, in order to enable subsequent scanning equipment to acquire the character corresponding to the user identity, the character can be located at the preset position of the first character string, so that the user identity can be accurately and quickly identified.
Drawings
Fig. 1 is a flowchart of a two-dimensional code encryption method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a two-dimensional code transmission system according to an embodiment of the present invention;
fig. 3 is a timing diagram illustrating interaction among devices of a two-dimensional code transmission system according to an embodiment of the present invention;
FIG. 4 is a schematic structural diagram of a sub-control apparatus according to an embodiment of the present invention;
fig. 5 is a timing diagram illustrating interaction among devices in another two-dimensional code transmission system according to an embodiment of the present invention.
Detailed Description
As described in the background, a shared space is a space shared toward a plurality of users, and for example, a single office may be shared for use by people throughout a building and even by people throughout the society. Because the number of users facing the shared space is huge, the two-dimensional code encryption mode in the prior art can not meet the security requirement of the shared space for the entrance guard.
According to the technical scheme, the first character string in the first system is converted into the second character string in the second system, so that the data volume of the second character string is smaller than that of the first character string, the length of the two-dimensional code can be reduced, and the recognition speed and the transmission speed of the two-dimensional code are improved. In addition, the preset codebook is updated and replaced according to the preset period, so that the same first character string can be converted into different second character strings in different preset periods, operations such as opening an access control by illegal personnel by using the same two-dimensional code are avoided, and the use safety of the two-dimensional code is ensured.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
Fig. 1 is a flowchart of a two-dimensional code encryption method according to an embodiment of the present invention.
The two-dimensional code encryption method shown in fig. 1 may include the following steps:
step S101: generating a first character string of a first system according to the user information;
step S102: converting the first character string into a second character string of a second system by using a preset codebook, wherein the preset codebook is updated and replaced according to a preset period, and the cardinal number of the second system is larger than that of the first system;
step S103: and generating a two-dimensional code by using the second character string.
In the specific implementation of step S101, the user information may be information necessary for generating the two-dimensional code carried information. Specifically, the user information may include a user ID, a timestamp, a longitude and latitude, a Service Set Identifier (SSID), and the like. The latitude and longitude may be Global Positioning information (GPS); the SSID may be a WiFi hotspot to which the user is currently connected.
In order to reduce the data amount of the finally formed two-dimensional code, in step S102, the first character string may be converted into a second character string of a second system, the cardinality of the second system being greater than the cardinality of the first system.
Specifically, the first base is 10, and the second base can be any value greater than 10.
In a specific implementation of step S102, the first string as a whole may be converted into a second string in a second binary system. Further, when the first character string includes a plurality of partial character strings, each partial character string may be converted into a second binary character string, and then each partial second character string may be spliced into a second character string corresponding to the user information. For example, when the user information includes a user ID, a timestamp, longitude and latitude, and an SSID, the first character strings corresponding to the user ID, the timestamp, the longitude and latitude, and the SSID may be converted into second character strings, and then the second character strings corresponding to the user ID, the timestamp, the longitude and latitude, and the SSID may be concatenated into the second character strings corresponding to the user information.
It should be noted that the preset codebook may provide the available characters of the second string. The specific process of converting the first string of the first system into the second string of the second system may refer to an existing system conversion algorithm, and is not described herein again.
Further, the preset codebook is updated and replaced according to a preset period. That is, the preset codebooks used for converting the first string into the second string of the second system in different preset periods are different. Then, the converted second character strings of the same first character string in different preset periods are different. Even if one of the second character strings is intercepted, the second character string cannot be used. For example, in an application scenario in which a two-dimensional code is used to open a door, even if an illegal person intercepts one of the two-dimensional codes, the two-dimensional code will not open the door.
Further, in the specific implementation of step S103, a two-dimensional code may be generated using the second character string.
It should be understood by those skilled in the art that the two-dimensional code may be generated by any algorithm that can be implemented in the prior art, and the embodiment of the present invention is not limited thereto.
According to the embodiment of the invention, the data volume of the second character string can be smaller than that of the first character string by converting the first character string of the first system into the second character string of the second system, so that the length of the two-dimensional code can be reduced, and the identification speed and the transmission speed of the two-dimensional code are further improved. In addition, the preset codebook is updated and replaced according to the preset period, so that the same first character string can be converted into different second character strings in different preset periods, operations such as opening an access control by illegal personnel by using the same two-dimensional code are avoided, and the use safety of the two-dimensional code is ensured.
In an application scenario of the invention, the two-dimensional code needs to be verified to trigger a specific operation, such as opening an access. In this case, the two-dimensional code is recognized as the second character string by the scanning device; the second character string can be directly subjected to authentication verification, and if the verification is passed, a specific operation can be triggered.
Optionally, the two-dimensional code is identified as a second character string by the scanning device; the second character string can be converted into the first character string by using a preset codebook, the information of each field carried by the first character string, such as the information of user ID, user longitude and latitude, and the like, is obtained, authentication verification is carried out, and if the verification is passed, specific operation can be triggered.
In a preferred embodiment of the present invention, the first base is 10, and the second base is 64.
In this embodiment, the first character string is usually represented in a 10-ary manner, and the first character string may include numbers and ASCII codes. The larger the base number of the second system is, the smaller the data amount of the second character string is; however, the existence of special characters in the computer language can instruct the computer to execute specific operations, and the number of available characters in a second binary system is limited; therefore, in the embodiment of the present invention, the base number of the second binary is 64, and the availability of the second character string can be ensured while the data amount of the second character string is reduced.
In another preferred embodiment of the present invention, the preset codebook includes a plurality of characters arranged in a sequence, and the sequence is updated and replaced according to a preset period.
In this embodiment, the preset codebook may include a plurality of characters, and the number of the characters is a base number of the second binary system. The conversion corresponding relation between the first character string and the second character string is influenced by the sequence of the characters in the preset password book. In other words, multiple characters in different orders used for the same first string will be converted into different second strings. Therefore, the safety of the second character string conversion can be ensured by updating and replacing the arrangement sequence of the characters according to the preset period.
Further, the plurality of characters are selected from: numbers 0-9, capital letters A-Z, lowercase letters a-Z, punctuation marks.
Specifically, the plurality of characters do not include special characters, such as a slash/, and &, an asterisk, etc., that instruct the computer to perform a specific operation. For example, the plurality of characters in the preset codebook may be: 0-9(10 bits), A-Z (26 bits), a-Z (26 bits), an exclamation mark! (position 1), underlined (position 1); arranging a plurality of characters in order may form a preset codebook, which may be, for example: "tB _ uTaJGzwkUS3xcpX7ns9OAgLq62WCoNEhdj5rf8ePylZi4DMQKVIHmYb01 vF! And R' is adopted.
In another preferred embodiment of the present invention, the user information includes a user id, and the first character string includes characters corresponding to the user id.
In specific implementation, users with different identity marks can have different rights, so that the identity marks of the users can be embodied in the two-dimensional code. That is, the first character string may include characters corresponding to the user id, and then the second character string also includes characters corresponding to the user id, and the two-dimensional code carries the id information of the user. For example, character a may represent a normal user; character B may represent a visitor, character S may represent an administrator, etc.
In the concrete application scene, under the condition that the user possesses the permission of opening gymnasium entrance guard, meeting room entrance guard and elevator entrance guard, through setting up the character that corresponds to user's identity, can avoid the user to show different two-dimensional codes at gymnasium entrance guard, meeting room entrance guard and elevator entrance guard, the user uses same two-dimensional code can open above-mentioned entrance guard, has promoted the convenience that the user used the two-dimensional code.
In the embodiment of the invention, in order to distinguish different users, the first character string comprises characters corresponding to the user identity identifications.
Further, the character corresponding to the user identity is located at a preset position of the first character string.
In the embodiment of the invention, in order to enable the subsequent scanning equipment to acquire the character corresponding to the user identity, the character can be located at the preset position of the first character string, so that the user identity can be accurately and quickly identified.
For example, character a may represent a normal user; character B may represent a visitor. If the user is a member in the platform, when the user displays the two-dimensional code at the terminal, the initial character of the content carried by the two-dimensional code may be a. If the visitor is the visitor, when the terminal displays the two-dimensional code, the initial character of the content carried by the two-dimensional code can be B.
Referring to fig. 2, fig. 2 is a schematic structural diagram of a two-dimensional code transmission system according to an embodiment of the present invention.
The two-dimensional code transmission system 1 may include a server 40, sub-control apparatuses 10 disposed in respective shared spaces, a general radio station 20, and a general control apparatus 30.
Wherein the sub control apparatus 10 may include: a sub-station 101; the two-dimensional code scanning device 102 is adapted to scan a two-dimensional code on the user terminal to obtain two-dimensional code carrying information, and send the two-dimensional code carrying information through the sub radio station 101, wherein the two-dimensional code is generated by the user terminal or the server 40, and the two-dimensional code carrying information includes the second character string; and the access controller 103 is coupled with the sub-station 101.
Further, the user terminal or the server 40 may generate the two-dimensional code by using the method shown in fig. 1. The periodic updating and replacing of the preset codebook may be completed by the server 40, and after the updating, the server 40 may send the updated codebook to the two-dimensional code scanning device 102 and the master control device 30 synchronously, so that the two-dimensional code scanning device 102 and the master control device 30 can analyze the received related information. In addition, if the two-dimensional code is generated by the user terminal, the server 40 needs to send the codebook to the user terminal for use.
More specifically, the two-dimensional code scanning device 102 may transmit the scanned two-dimensional code carrying information to a controller (not shown in the figure, for example, the controller may be a single chip microcomputer or other various general or special control circuits), and then the controller transmits the information to the sub-station 101.
The two-dimensional code scanning device 102 may be installed outside the shared space (for example, outside a shared conference room) to facilitate scanning of the user terminal. The sub-station 101 and the door access controller 103 may be installed outside or inside the shared space, preferably inside the shared space (e.g., inside a shared conference room) to improve security.
The door controller 103 may control opening or closing of doors of the shared space.
The general station 20 is wirelessly coupled with the sub-stations 101 in the respective sub-control devices.
The general control device 30 is coupled to the general radio station 20, and the general control device 30 communicates with the two-dimensional code scanning device 102 and the access controller 103 via the general radio station 20 and the sub radio station 101.
The server 40 may be a remote server with respect to the shared space, for example, a plurality of buildings, an overall control device 30 within a campus may be connected to the same server 40 by way of a wired network, a wireless network, or the like.
Further, the user terminal may be, for example, a mobile phone, a wearable device, or the like.
In a specific implementation, the overall control device 30 may receive, via the overall station 20 and the sub-station 101, the two-dimensional code carrying information acquired by the two-dimensional code scanning device 102. The overall control device 30 may send a message, for example, a control instruction, to the access controller 103 via the overall station 20 and the sub-station 101.
Specifically, the two-dimensional code scanned by the information scanning device 102 may carry information and be sent out through the sub station 101, and the general station 20 may receive the user information. The head station 20 can forward the two-dimensional code carrying information to the head control device 30.
The general control device 30 may be any practicable computer device with information processing capability, and may be a micro-host with an android operating system installed, for example.
Further, the communication process between the sub-station 101 and the general station 20 may be a point-to-point communication. When receiving the two-dimensional code carried information sent by the sub radio station 101, the general radio station 20 may also obtain the identifier of the sub radio station 101, and further obtain the identifier of the shared space where the sub radio station 101 is located.
In a specific implementation, one sub-control device 10 may be provided for each shared space. Each master station 20 can be wirelessly coupled with a plurality of sub-stations 101, and each master control device 30 can communicate with a plurality of two-dimensional code scanning devices 102 and a plurality of access controllers 103. For example, a plurality of shared conference rooms may be provided in the same building or campus, one sub-control apparatus 10 may be provided for each conference room, and then only one general station 20 and one general control apparatus 30 may be provided in the building or campus to communicate with the respective sub-control apparatuses 10. Of course, multiple radio complexes 20 and multiple control complexes 30 may be located within a building or campus, especially where the building or campus is large in area.
It should be noted that the number of the sub-stations 101 wirelessly coupled to each general station 20 may be determined according to the actual application requirement and the communication distance, and the embodiment of the present invention is not limited thereto.
In this embodiment, the sub-station 101 and the general station 20 may communicate using an open radio frequency band, or may also communicate using the following wireless communication technologies: global System for mobile communication (GSM), LoRa radio, and the like.
In a specific embodiment of the present invention, the general control device 30 receives, via the general radio station 20 and the sub radio station 101, two-dimensional code carried information sent by the sub radio station 101.
In a preferred embodiment of the present invention, the information carried by the two-dimensional code further includes a preset random character spliced behind the second character string. In a specific implementation, the preset random character may be spliced after the second character string by the server 40 or the user terminal when generating the two-dimensional code, or spliced after the information scanning device 102 recognizes the two-dimensional code.
Specifically, when the user terminal generates the two-dimensional code, the preset random character may be previously transmitted to the user terminal by the server 40. When the information scanning device 102 splices the preset random characters, the preset random characters may be sent to the information scanning device 102 by the server 40 in advance.
Further, the master control device 30 receives the two-dimensional code carrying information sent by the sub radio station 101 through the master radio station 20, and compares the preset random character with the random character sent by the server 40 to determine whether the two-dimensional code carrying information is correct.
According to the embodiment of the invention, the correctness of the two-dimension code carried information is verified through the preset random characters in the two-dimension code carried information, the condition that the two-dimension code carried information is illegally used after being stolen is avoided, and the safety of the two-dimension code carried information in the transmission process can be ensured.
In another preferred embodiment of the present invention, the two-dimensional code scanning device 102 generates a CRC code by using the second character string; the two-dimensional code carrying information also comprises the CRC code.
Further, the general control device 30 receives, via the general radio station 20, the two-dimensional code carrying information sent by the sub radio station 101, and calculates a new CRC code according to the received second character string, and compares the new CRC code with the CRC code to determine whether the second character string is correct.
In this embodiment, the CRC code calculated by the two-dimensional code scanning device 102 is compared with the new CRC code calculated by the master control device 30, and if the CRC code is identical to the new CRC code, which indicates that the second character string is correctly transmitted in the transmission process, the second character string may be used to generate an instruction to instruct the access controller 103 to open the access; if the CRC code is not consistent with the new CRC code, indicating that the second character string is erroneously transmitted during transmission, the instruction generated using the second character string may instruct the door controller 103 to close the door.
In yet another preferred embodiment of the present invention, the second string includes a time stamp; the master control device 30 receives the two-dimensional code carried information through the master radio station 20, and feeds back an instruction for the second character string; after receiving the feedback confirmation of the entrance guard controller 103 for the instruction, the general radio station 20 records an abnormality if receiving the second character string including the time stamp again.
In this embodiment, since the second character string includes the time stamp, every two second character strings are not repeated.
The general radio station 20 may record the second character string in the two-dimensional code carried information each time after receiving the two-dimensional code carried information. In addition, the central station 20 may record feedback confirmation of the access controller 103 for each control instruction. If the general station receives the same second character string again after receiving the feedback confirmation aiming at the second character string (namely the content of the second character string is the same), the general station indicates that the second character string is illegally used, and the record is abnormal. Furthermore, the central station 20 will not transmit the same second character string received again to the central control device 30. Therefore, the abnormal second character string can not be used for controlling the access controller 103, and the use safety of the two-dimensional code carrying information is guaranteed.
In a specific application scenario of the present invention, referring to fig. 3, the server 40 may execute step S101 and step S102 to generate a two-dimensional code, and send the two-dimensional code to the user terminal 2. Alternatively, the user terminal 2 executes step S103 to generate a two-dimensional code.
It should be noted that, the process of generating the two-dimensional code by the server 40 or the process of generating the two-dimensional code by the user terminal 2 may refer to the embodiment shown in fig. 1, and details are not described here.
In step S104, the two-dimensional code reader 60 scans the two-dimensional code provided by the user terminal 2 to obtain information carried by the two-dimensional code. In step S105, the two-dimensional code reader 60 calculates a CRC code and concatenates the second character string. In step S106 and step S107, the two-dimensional code carrying information is transmitted to the overall control apparatus 30 via the sub station 101 and the main station 20. In step S108, overall control device 30 may calculate a new CRC code and verify with the received CRC; if the verification results are consistent, in step S109 and step S111, a control instruction is sent to the access controller 103 via the general station 20 and the sub-station 101. In step S112 and step S113, after the entrance guard controller 103 executes the instruction, a feedback confirmation may be sent to the central station 20. And at this time, the flow execution of the complete two-dimension code carrying information reading, instruction issuing and instruction execution result receiving is completed.
Further, if an illegal interception signal is encountered on the way of the transmission of the two-dimensional code carrying information from the sub-station 101 to the main station 20, the signal is reproduced. The primary station 20 will perform normally when it receives the first time and will discard the same content when it receives the second time, and the primary station 20 may record a log of this abnormal behavior (e.g., suspected of being a replay attack).
Optionally, the master control device 30 may also perform authentication verification on the two-dimensional code carried information, generate a control instruction according to an authentication verification result, and send the control instruction to the sub-control device 10 via the master radio station 20, where the control instruction is at least used to control the access controller 103 to open or close the access of the shared space.
In this embodiment, the total control device 30 may generate a control instruction according to the authentication result. Specifically, when the authentication verification result shows that the two-dimensional code carrying information passes verification, a first control instruction (namely, a door opening instruction) capable of controlling the door access of the shared space to be opened is generated; and when the authentication verification result shows that the information carried by the two-dimensional code is not verified, generating a second control instruction (namely, an instruction for keeping closing the door) which can control the entrance guard of the shared space to forbid opening.
After the master control device 30 generates the control command, the control command can be sent out via the master station 20. The sub-station 101 may receive the control instruction sent by the general station 20, the sub-station 101 forwards the received control instruction to the access controller 103, and the access controller 103 may execute the control instruction. More specifically, the sub-station 101 may transmit the received control instruction to the controller, and the controller may forward the control instruction to the access controller 103.
In the technical scheme of the invention, the master control device 30 synchronizes the authentication data from the server 40 to the local and locally authenticates and verifies the user information, so that the authentication and verification speed can be increased, and the access control efficiency of a shared space can be improved. Furthermore, by performing authentication verification within a local area network (the total control apparatus 30 and the sub-control apparatus 10 may be in the same local area network), the problem of heavy load caused by frequent access to the server 40 can be avoided.
Specifically, when the master control device 30 authenticates the user information according to the authentication data, the user information may be compared with the authorized user information in the authentication data. If the user information is consistent with the authorized user information, the user information is verified; otherwise, the user information is not verified.
In this embodiment, the master control device 30 synchronizes the authentication data from the server 40 to the local, and performs authentication verification on the user information locally, so as to improve the speed of authentication verification and improve the control efficiency of the shared space; in addition, when the network environment is unstable and the network is blocked, the normal operation of communication with the sub-control device 10 in the shared space can be ensured by performing authentication verification in the local area network, and the user experience is further improved.
Still referring to fig. 2, in another preferred embodiment of the present invention, the overall control device 30 may send the user information to the server 40 for authentication verification, and receive the authentication verification result from the server 40.
In this embodiment, the server 40 may generate authentication data. The server 40 may also receive the two-dimensional code carrying information from the overall control device 30, and perform authentication verification on the two-dimensional code carrying information by using the generated authentication data. After the authentication verification is completed, the server 40 sends the authentication verification result to the overall control device 30. Further, the server 40 may also generate and transmit control instructions to the overall control apparatus 30.
It can be understood that the process of performing authentication verification on the information carried by the two-dimensional code by using the generated authentication data by the server 40 is consistent with the process of performing authentication verification on the user information by the general control device 30 according to the authentication data, and details are not repeated here.
Optionally, the overall control device 30 receives the authentication verification result from the server 40, and generates a control instruction according to the authentication verification result.
Further, the overall control device 30 is further adapted to encrypt the control command, and the control command sent to the sub-control device 10 is the encrypted control command.
In this embodiment, in order to ensure the security of control instruction transmission, the overall control device 30 may encrypt the control instruction. The overall control device 30 may encrypt the control command by static encryption or dynamic encryption.
Preferably, the overall control device 30 may encrypt the control command in a dynamic encryption manner, where the encrypted control command is different each time. Specifically, the overall control device 30 may calculate a key from the received user information, and encrypt the control instruction with the key.
With continued reference to fig. 2, the server 40 may generate and transmit a two-dimensional code to the user terminal. For example, the user may log in the server 40 through the user terminal, reserve a specific shared space, input a user ID, and the server 40 generates the two-dimensional code according to information input by the user.
In a specific implementation, the two-dimensional code generated by the server 40 can be scanned and read by the two-dimensional code scanning device 102. For example, the server 40 may generate a two-dimensional code, which carries identification information.
The server 40 generates the two-dimensional code by using the method shown in fig. 1, and the data volume of the two-dimensional code can be reduced. Since the master control device 30 is in wireless communication with the two-dimension code scanning device 102 and the access controller 103, the available open radio frequency is low, and the radio frequency is easy to attenuate and interfere, in order to ensure the data transmission speed and the transmission quality, the two-dimension code is transmitted by using the sub radio station 101 and the master radio station 20, so that the normal communication between the master control device 30 and the sub control devices 10 in the shared space can be ensured.
Further, the server 40 receives heartbeat information of each of the sub radio stations 101 and the overall control device 30 from the overall control device 30, and monitors the sub control devices 10 and the overall control device 30 according to the heartbeat information.
In a specific implementation, the sub-station 101 may send heartbeat information of the sub-station 101 to the overall control device 30 via the overall station 20. The master control device 30 reports the heartbeat information of itself and the heartbeat information of the sub radio station 101 to the server 40. The server 40 can monitor whether the sub radio station 101 and the overall control device 30 are abnormal according to the heartbeat information reported by the overall control device 30.
Specifically, the total control device 30 may report heartbeat information of itself and heartbeat information of the sub radio station 101 to the server 40 according to a preset period. If the server 40 does not receive the heartbeat information of the sub-radio station 101 or the heartbeat information of the total control device 30 within the preset period, it indicates that the sub-radio station 101 or the total control device 30 is abnormal, and the server 40 can give an alarm, so that relevant personnel can timely troubleshoot the sub-radio station 101 or the total control device 30.
Further, the server 40 may be provided with a shared space registration module (not shown), a user registration module (not shown), and a search module (not shown).
The shared space registration module is suitable for recording space information of each shared space, and the space information comprises a position, an area, a rent and an internal facility; the user registration module is suitable for recording the user information, and the user information comprises a user identifier; the search module is suitable for searching the shared space matched with the search condition according to the search condition of the user.
Specifically, the user can access the server 40 using the user terminal; the user inputs the user identification, and the user registration module records the user identification to complete user registration. The user can also input a search condition for the shared space, and the search module compares the search condition with the space information of the shared space recorded by the shared space registration module to determine the shared space matched with the search condition input by the user. The user completes the reservation of the shared space.
Referring to fig. 2 and 4 together, in another embodiment of the present invention, the sub-control device 10 further includes: the controller 104, coupled to the two-dimensional code scanning device 102 and the sub-station 101, is adapted to receive the two-dimensional code carried information and calculate a key according to the user information, where the key is used to decrypt the encrypted control instruction. Specifically, the controller 104 and the overall control device 30 may calculate the key by using the same algorithm, and the key calculated by the controller 104 is consistent with the key calculated by the overall control device 30; the key calculated by the controller 104 may be used to decrypt the encrypted control instructions.
In another embodiment of the present invention, referring to fig. 2 and 4, the sub-control device 10 further includes a relay 105 connected to a strong electric circuit of the shared space, and the relay 105 communicates with the main control device 30 via the sub-station 101 and the main station 20.
In this embodiment, the relay 105 is connected to a strong electric circuit in the shared space, and the relay 105 can control the connection or disconnection of the strong electric circuit. For example, when the relay 105 is turned on, the strong electric circuit is communicated with the power supply, so that the equipment such as a socket and lighting equipment can be normally used; when the relay 105 is turned off, the strong electric circuit is disconnected from the power supply, and the socket, the lighting, and the like are disabled.
In a specific implementation, the general control device 30 sends a control instruction to the relay 105 via the general station 20 and the sub station 101, and the relay 105 can control the strong electric circuit to be turned on or off in response to the control instruction.
Specifically, the access controller 103 may be implemented using a weak current circuit. Therefore, the entrance guard controller 103 and the relay 105 jointly realize linkage control of the strong and weak current circuits in the shared space, so that the labor and operation cost are saved, and the door lock is energy-saving and environment-friendly.
In a specific application scenario, please refer to fig. 5 for an interaction process between each device of the two-dimensional code transmission system and the user terminal 2.
In this embodiment, the user terminal 2 may execute step S11 by using a web page, a public number, an application program, or the like, to search for an available shared space from the server 40, for example, to search for an available shared space by using various conditions such as price, distance, area, and internal facilities.
In step S12, the server 40 returns the searched available shared space to the user terminal 2 for presentation to the user. In step S13, the user terminal 2 selects a shared space, locks a period of using the shared space, and makes payment. In step S14, the server 40 may transmit a reservation success message to the user terminal 2. And executes step S15 and step S16 to transmit the authentication data to the overall control device 30 via the internet of things gateway 50. The authentication data comprises the user ID of the user terminal 2 and the selected shared space ID.
The server 40 executes step S17, generates a two-dimensional code, and issues the two-dimensional code to the user terminal 2. The two-dimensional code can be sent to other terminal equipment in a screenshot or WeChat sharing mode. Specifically, the server 40 may compress and encrypt the two-dimensional code and then send the two-dimensional code to the user terminal 2. In step S18, the user terminal 2 provides the two-dimensional code for scanning by the number of minutes (for example, 10 minutes) set in advance at the beginning of the selected period, and the two-dimensional code reader 60 may scan the two-dimensional code provided by the user terminal 2.
In step S19, the two-dimensional code reader 60 sends the scanned two-dimensional code carrying information to the controller 104, specifically, the two-dimensional code carrying information includes user information. The controller 104 may dynamically generate a key from the two-dimensional code content, which may be stored in the controller 104 and used to decrypt control instructions in subsequent steps.
In steps S20, 21, and 22, the two-dimensional code carrying information is transmitted to the overall control apparatus 30 via the sub station 101 and the overall station 20. The total control device 30 executes step S23 to authenticate and verify the user information in the two-dimensional code carrying information, and determine a control instruction, such as whether to open an access control or open a strong point circuit. Further, after receiving the encrypted two-dimensional code carrying information, the master control device 30 may decrypt the encrypted two-dimensional code carrying information first, and then perform authentication verification on the decrypted two-dimensional code carrying information.
In step S24, the overall control apparatus 30 can generate and encrypt the control instruction using the key from the two-dimensional code content. In steps 25 and 26, the control command is transmitted to the controller 104 via the base station 20 and the child station 101, and the controller 104 decrypts the control command based on the key calculated in step S19.
In steps 27 and 28, the controller 104 sends the decrypted control command to the relay 105 and/or the door access controller 103. For example, the door access controller 103 executes a command to open the door, and the relay 105 executes a command to supply power to a strong electric circuit. To this end, the user may enter and use the selected shared space.
For more details of the interaction process between each device of the two-dimensional code transmission system and the user terminal 2, reference may be made to the relevant description in fig. 1 to 4, which is not described herein again.
The embodiment of the invention also discloses a storage medium, wherein computer instructions are stored on the storage medium, and when the computer instructions are operated, the steps of the two-dimensional code encryption method shown in the figure 1 can be executed. The storage medium may include ROM, RAM, magnetic or optical disks, etc. The storage medium may further include a non-volatile memory (non-volatile) or a non-transitory memory (non-transient), and the like.
Although the present invention is disclosed above, the present invention is not limited thereto. Various changes and modifications may be effected therein by one skilled in the art without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (11)

1. A two-dimensional code transmission system, comprising:
a server;
sub-control devices provided in the respective shared spaces, the sub-control devices including:
a sub-station;
the two-dimension code scanning device is suitable for scanning a two-dimension code on a user terminal to obtain two-dimension code carried information and sending the two-dimension code carried information out through a sub radio station, the two-dimension code is generated by the user terminal or a server according to a two-dimension code encryption method, and the two-dimension code carried information comprises a second character string;
an access controller coupled to the sub-station;
the general radio station is wirelessly coupled with the sub radio stations in the sub control devices;
the master control equipment is coupled with the master radio station and is communicated with the two-dimensional code scanning equipment and the access controller through the master radio station and the slave radio station;
the two-dimensional code encryption method comprises the following steps:
generating a first character string of a first system according to the user information;
converting the first character string into a second character string of a second system by using a preset codebook, wherein the preset codebook is updated and replaced according to a preset period, and the cardinal number of the second system is larger than that of the first system;
and generating a two-dimensional code by using the second character string.
2. The two-dimensional code transmission system according to claim 1, wherein the information carried by the two-dimensional code further includes a preset random character spliced behind the second character string.
3. The two-dimensional code transmission system according to claim 2, wherein the master control device receives the two-dimensional code carrying information sent by the sub radio station via the master radio station, and compares the preset random character with the random character sent by the server to determine whether the two-dimensional code carrying information is correct.
4. The two-dimensional code transmission system according to claim 1, wherein the two-dimensional code scanning device generates a CRC code using the second character string; the two-dimensional code carrying information also comprises the CRC code.
5. The two-dimensional code transmission system according to claim 4, wherein the master control device receives the two-dimensional code carrying information sent by the sub radio station via the master radio station, calculates a new CRC code again according to the received second character string, and compares the new CRC code with the CRC code to determine whether the second character string is correct.
6. The two-dimensional code transmission system according to claim 1, wherein the second character string includes a time stamp;
the master control equipment receives the two-dimension code carried information through the master radio station and feeds back an instruction aiming at the second character string;
and after the general radio station receives feedback confirmation of the entrance guard controller aiming at the instruction, if the general radio station receives the second character string comprising the timestamp again, recording the abnormity.
7. The two-dimensional code transmission system according to claim 1, wherein the first base is 10, and the second base is 64.
8. The two-dimensional code transmission system according to claim 1, wherein the preset codebook includes a plurality of characters arranged in a sequence, and the sequence is updated and replaced according to a preset period.
9. The two-dimensional code transmission system according to claim 8, wherein the plurality of characters are selected from the group consisting of: numbers 0-9, capital letters A-Z, lowercase letters a-Z, punctuation marks.
10. The two-dimensional code transmission system according to claim 1, wherein the user information includes a user identification, and the first character string includes characters corresponding to the user identification.
11. The two-dimensional code transmission system according to claim 10, wherein the character corresponding to the user id is located at a preset position of the first character string.
CN201810562967.7A 2018-04-26 2018-06-04 Two-dimensional code encryption method, two-dimensional code transmission system and storage medium Active CN109002875B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201810562967.7A CN109002875B (en) 2018-06-04 2018-06-04 Two-dimensional code encryption method, two-dimensional code transmission system and storage medium
US16/489,014 US20210326665A1 (en) 2018-04-26 2018-08-17 Two-dimensional barcode encryption method, two-dimensional barcode transmission system and storage medium
PCT/CN2018/100983 WO2019205357A1 (en) 2018-04-26 2018-08-17 Two-dimensional code encryption method, two-dimensional code transmission system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810562967.7A CN109002875B (en) 2018-06-04 2018-06-04 Two-dimensional code encryption method, two-dimensional code transmission system and storage medium

Publications (2)

Publication Number Publication Date
CN109002875A CN109002875A (en) 2018-12-14
CN109002875B true CN109002875B (en) 2020-06-12

Family

ID=64573595

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810562967.7A Active CN109002875B (en) 2018-04-26 2018-06-04 Two-dimensional code encryption method, two-dimensional code transmission system and storage medium

Country Status (1)

Country Link
CN (1) CN109002875B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110012455B (en) * 2019-01-25 2021-10-22 创新先进技术有限公司 Account information management method and device and electronic equipment
CN110853202A (en) * 2019-11-05 2020-02-28 合肥优尔电子科技有限公司 Control method, device and system of two-dimensional code cabinet remotely controlled by Internet of things
CN110956724A (en) * 2019-12-11 2020-04-03 浩云科技股份有限公司 Compatible method of multi-type card number verification equipment
CN112307495A (en) * 2020-10-26 2021-02-02 浪潮云信息技术股份公司 Electronic certificate sharing application model and method based on certificate two-dimensional code
CN112686072A (en) * 2020-12-28 2021-04-20 重庆医药高等专科学校 Control method for human resource equipment device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009104451A (en) * 2007-10-24 2009-05-14 A T Communications Co Ltd Logo-included two-dimensional code
CN102760242A (en) * 2012-05-16 2012-10-31 孟智平 Encoding and decoding method for three-dimensional codes and using method
CN103248480A (en) * 2012-02-10 2013-08-14 李宏光 Method and system for encrypting, saving and verifying account data
CN105374099A (en) * 2015-12-14 2016-03-02 讯美电子科技有限公司 Access control system with inlet and outlet dynamic opening passwords
CN107342854A (en) * 2017-06-20 2017-11-10 杭州高锦科技有限公司 The encrypting and decrypting method and intelligent access control system of gate inhibition's Quick Response Code authority information

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104243160A (en) * 2014-07-24 2014-12-24 秦锋 Identity authentication management method and identity authentication method and device
JP6298583B2 (en) * 2016-07-15 2018-03-20 レノボ・シンガポール・プライベート・リミテッド Personal information protection method, electronic device, and computer program
CN107016499B (en) * 2017-03-23 2020-12-15 国家电网公司 Transformer substation equipment inspection method based on two-dimensional code encryption identification
CN207424971U (en) * 2017-10-26 2018-05-29 厦门兴南洋智慧物联科技有限公司 A kind of intelligent access control system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009104451A (en) * 2007-10-24 2009-05-14 A T Communications Co Ltd Logo-included two-dimensional code
CN103248480A (en) * 2012-02-10 2013-08-14 李宏光 Method and system for encrypting, saving and verifying account data
CN102760242A (en) * 2012-05-16 2012-10-31 孟智平 Encoding and decoding method for three-dimensional codes and using method
CN105374099A (en) * 2015-12-14 2016-03-02 讯美电子科技有限公司 Access control system with inlet and outlet dynamic opening passwords
CN107342854A (en) * 2017-06-20 2017-11-10 杭州高锦科技有限公司 The encrypting and decrypting method and intelligent access control system of gate inhibition's Quick Response Code authority information

Also Published As

Publication number Publication date
CN109002875A (en) 2018-12-14

Similar Documents

Publication Publication Date Title
CN109002875B (en) Two-dimensional code encryption method, two-dimensional code transmission system and storage medium
CN105118127B (en) A kind of guest system and control method thereof
CN102262793B (en) Entrance guard control method and entrance guard control system
KR101211477B1 (en) Method for mobile-key service
KR100674792B1 (en) Mobile telephone auto pc logon
CN105427416A (en) Two-dimension code unlocking method and system
CN106850209A (en) A kind of identity identifying method and device
CN105303670A (en) Access control management method, device and system
CN103825871A (en) Authentication system and emission terminal, reception terminal and authority authentication method thereof
US20190385392A1 (en) Digital door lock having unique master key and method of operating the digital door
CN103929748A (en) Internet of things wireless terminal, configuration method thereof and wireless network access point
CN106100845B (en) Identity authentication method and system using sound wave communication
KR101329520B1 (en) Device for entering and location authentication of smart device using sequential wireless authentication and method for entering and location authentication using the same
CN104282058A (en) Unlocking method of Bluetooth-based safety intelligent lock system with video monitoring function
US11403380B2 (en) Method for managing fingerprint and system thereof
CN105261100A (en) Entrance guard unlocking method and system
CN104282061A (en) Safety intelligent lock system and unlocking and locking methods thereof
CN104299300A (en) Unlocking and locking method for NFC based security intelligent lock system
KR101907184B1 (en) Mobile device for entrance and exit of security area and method for operating thereof
CN104282060A (en) Method for unlocking safety intelligent lock system
WO2019205357A1 (en) Two-dimensional code encryption method, two-dimensional code transmission system and storage medium
CN105279831A (en) Method for controlling locking based on mobile equipment audio coding
CN104282059A (en) Bluetooth-based safety intelligent lock system with video monitoring function and unlocking and locking methods
CN104618356A (en) Identity verification method and device
CN210038899U (en) Intelligent lock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant