CN109272609A - A kind of CPU safety door inhibition control method and system - Google Patents
A kind of CPU safety door inhibition control method and system Download PDFInfo
- Publication number
- CN109272609A CN109272609A CN201810945001.1A CN201810945001A CN109272609A CN 109272609 A CN109272609 A CN 109272609A CN 201810945001 A CN201810945001 A CN 201810945001A CN 109272609 A CN109272609 A CN 109272609A
- Authority
- CN
- China
- Prior art keywords
- card
- access
- uid
- key
- control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention relates to a kind of CPU safety door inhibition control method and system, method therein includes: the only identifier UID that access-control card reader reads access card, generates authentication command and random number and is sent to access card;Access card does cryptographic calculation with cryptographic algorithm to random number with card key, obtains authentication data and back to access-control card reader;Access-control card reader is using UID as dispersion factor, disperse to obtain card key using system root key cryptographic algorithm, operation is decrypted to authentication data using card key, the data that decryption obtains are compared with random number, if consistent, UID is sent to access controller, otherwise the process of swiping the card terminates;Access controller issues enabling information to gate inhibition executing agency, generates card using information according to UID and is sent to background management system.The present invention by dynamic random number authenticated in the way of prevent access card to be replicated;Key dispersion is carried out using UID, realizes that a card one is close;The unified management of background management system realization card using information.
Description
Technical field
The present invention relates to gate inhibition's technical fields, and in particular to a kind of CPU safety door inhibition control method and system.
Background technique
While providing safety door inhibition service for user, its own may also will receive following existing access control system
The attack of kind potential threat:
(1) steal card sending system carries out hair fastener;
(2) personation legitimate user, which swipes the card, enters;
(3) steal or cryptographic algorithm and association key in CPU safety door prohibition system are distorted;
(4) equipment in height safety door access control system is lost;
(5) channel is ravesdropping or maloperation causes ciphertext and part of key to be trapped.
Summary of the invention
The present invention provides a kind of CPU safety door inhibition control method and system according to the analysis above to potential security risk,
Certain safety precautions is taken, threat resulting from is reduced.
The technical scheme to solve the above technical problems is that a kind of CPU safety door inhibition control method, comprising:
Access-control card reader reads the only identifier UID of access card when detecting access card;
Access-control card reader generates authentication command and random number and is sent to access card;
Access card is in response to the authentication command, with there are the card keys in card to the random number cryptographic algorithm
Cryptographic calculation is done, obtains authentication data and back to access-control card reader;
Access-control card reader utilizes the system being stored in access-control card reader in PSAM card using the UID as dispersion factor
Root key cryptographic algorithm disperses to obtain the card key, and fortune is decrypted to the authentication data using the card key
It calculates;
The data that decryption obtains are compared by access-control card reader with the random number, if unanimously, continued to execute next
Step, otherwise identifies and does not pass through, swipe the card unsuccessfully, the process of swiping the card terminates;
The UID is sent to access controller by access-control card reader;
Access controller issues enabling information to gate inhibition executing agency, generates card using information according to the UID and is sent to
Background management system.
For achieving the above object, the present invention also provides a kind of CPU safety door inhibition control systems, comprising: gate inhibition's card reading
Device, access card and access controller;
The access card includes:
First storage unit is used for memory card key;
Encryption unit, the authentication command for being generated in response to the access-control card reader, with the card key to described
The random number that access-control card reader generates does cryptographic calculation with cryptographic algorithm, obtains authentication data and back to gate inhibition's card reading
Device;
The access-control card reader includes:
Reading unit, for when detecting the access card, reading the only identifier UID of the access card;
First generation unit, for generating authentication command and random number and being sent to the access card;
Second storage unit is used for storage system root key;
Decryption unit, for being dispersed using the system root key cryptographic algorithm using the UID as dispersion factor
To card key, operation is decrypted to authentication data using the card key;
Comparing unit, the data for obtaining decryption are compared with the random number, when comparison result is inconsistent,
Terminate process of swiping the card;
Transmission unit, for the comparison result in the comparing unit be it is consistent when, the UID is sent to access control
Device;
The access controller includes:
Execution unit generates card using information according to the UID and transmits for issuing enabling information to gate inhibition executing agency
To background management system.
The beneficial effects of the present invention are: by dynamic random number authenticated in the way of prevent access card to be replicated;Benefit
Key dispersion is carried out with the UID of access card, realizes that a card one is close;The unified management of background management system realization card using information.
Detailed description of the invention
Fig. 1 is a kind of system architecture schematic diagram of CPU safety door inhibition control system provided in an embodiment of the present invention;
It is interacted between each component in a kind of Fig. 2 CPU safety door inhibition control system provided in an embodiment of the present invention
Signaling process figure;
Fig. 3 is a kind of flow chart of CPU safety door inhibition control method provided in an embodiment of the present invention;
Fig. 4 is the flow chart of another kind CPU safety door inhibition control method provided in an embodiment of the present invention.
Specific embodiment
The principle and features of the present invention will be described below with reference to the accompanying drawings, and the given examples are served only to explain the present invention, and
It is non-to be used to limit the scope of the invention.
Fig. 1 is a kind of system architecture schematic diagram of CPU safety door inhibition control system provided in an embodiment of the present invention.Such as Fig. 1
It is shown, application system involved in the system and key management and card sending system, wherein application system is by access card, PSAM card, door
Prohibit card reader, access controller and background management system to constitute, provides password peace to system by the crypto module in each equipment
Full guard.Including:
(1) crypto module in access card: (identify access card when blocking to gate inhibition for access-control card reader and carry out identity identification
It is whether legal) cryptographic service (as calculated authentication code) is provided;
(2) crypto module in access-control card reader: it is (such as close that cryptographic service is provided when carrying out identity identification for blocking to gate inhibition
Key dispersion, verifying authentication code etc.).In the safety Design of CPU safety door prohibition system, adapted crypto module in access-control card reader
PSAM card.
The function of key management and card sending system is to generate key for the cipher application of important access control system, and pass through password
The distribution of module issuing equipment (initialization and injection key) crypto module, by card-issuing equipment to access card hair fastener (initialization, note
Enter key and write-in application message).Encryption device in key management and card sending system provide key generate, key dispersion and
The cryptographic services such as identity identification when to access card hair fastener.
Access controller and access-control card reader are separator, and access controller can be set when installation on backstage
In environment where Tomcat-AdminPortal, user can not distort the communication number between access controller and background management system
According to guaranteeing the safety of custom system.
The administrative login of background management system needs password identification, it is ensured that the secure log of system.It can use simultaneously
The mode of human attendance guarantees the safety of whole system operation.
It is interacted between each component in a kind of Fig. 2 CPU safety door inhibition control system provided in an embodiment of the present invention
Signaling process figure.As shown in Fig. 2, the process includes:
1, access-control card reader reads the only identifier of card (UID) of access card;
2, access-control card reader sends an authentication command to access card, random number R a is sent to access card, in access card
Cryptographic calculation does with SM1 cryptographic algorithm to random number R a with there are the card key Keyc in card in portion, after obtaining encryption
Data Ra ' and back to access-control card reader;
3, access-control card reader is using the UID of access card as dispersion factor, using being stored in card reader in PSAM card
System root key Keyr SM1 cryptographic algorithm disperses the card key Keyc for obtaining access card, adds to what access card was sent
Operation is decrypted in ciphertext data Ra ', obtains data Ra ' ', compares data Ra ' ' and random number R a, if unanimously, continued to execute down
One step, otherwise identifies and does not pass through, swipes the card unsuccessfully, the process of swiping the card terminates.
4, UID is sent to access controller after access-control card reader decryption passes through.
5, whether the only identifier UID of access controller comparison card is blacklist, if not, card is in system
Legal access card issues enabling information to gate inhibition executing agency, opens the door and card using information is sent to background management system.
In terms of communications between all parts, this system supports four kinds of data-transmission modes: plaintext mode, plaintext
Checking mode, ciphertext mode and ciphertext checking mode.
1. plaintext mode
Safety, integrality and the reliability of data transmission are not required, then use plaintext mode.In data exchange
In, the data field in data field and response message in command message is referred to as in plain text without any mode directly exchanged that converts
Mode.
2. checking mode (MAC verification)
To guarantee integrality and reliability of the data in exchange, checking mode should be used.Checking mode is reported to order
All data in text carry out mathematic(al) manipulation and obtain the check code (MAC) of 4 bytes, check code be follow closely command message data field it
After send.The message structure of checking mode calculation command message MAC check code is as shown in table 1 below.
The message structure table of 1 checking mode calculation command message MAC check code of table
3. ciphertext mode
To guarantee safety of the data in exchange process, ciphertext mode should be used.Ciphertext mode reports order or response
Data in text are sent after being encrypted.The message structure of encrypted test mode calculation command message ciphertext is as shown in table 2 below.
The message structure table of 2 encrypted test mode calculation command message ciphertext of table
4. ciphertext checking mode
In the transmission of data, the safety of data had not only been required, but also has required the integrality of data, cryptographic check mould can be used
Formula.Cryptographic check mode are as follows: the advanced row data enciphering transformation of data of order or the data field in response message, then order
Or all data in response message carry out the check code (MAC) that 4 bytes are calculated in data check, then verification is piled up and is being ordered
After order or response message data field.Ciphertext checking mode calculates ciphertext and the message structure of MAC is as shown in table 3 below.
The message structure table of 3 ciphertext checking mode of table calculating ciphertext and MAC
This system uses the format of different messages on transmission line according to different needs.When transmitting data, adopt
Guarantee the safety on route with ciphertext mode or ciphertext checking mode, it is therefore prevented that in transaction and communication, ciphertext and key quilt
It gives away secrets caused by intercepting and capturing.
Fig. 3 is a kind of flow chart of CPU safety door inhibition control method provided in an embodiment of the present invention, the CPU of the embodiment
The safety door inhibition control method property of can be exemplified is realized based on system shown in Figure 1.As shown in figure 3, this method comprises:
S301, access-control card reader read the only identifier UID of access card when detecting access card;
S302, access-control card reader generate authentication command and random number and are sent to access card;
S303, access card in response to the authentication command, with there are the card key in card to the random number with close
Code algorithm does cryptographic calculation, obtains authentication data and back to access-control card reader;
Wherein, card key is 16 byte datas, by the root PSAM card in card sending system according to gate inhibition's card information system
Root key carries out key dispersion and forms and be stored in the access card.System root key is by raw when root PSAM card initialization
At.The key is generated by the real random number generator of root PSAM card.The key length is 16 bytes.
S304, access-control card reader are using the UID as dispersion factor, using being stored in access-control card reader in PSAM card
System root key cryptographic algorithm disperses to obtain the card key, is solved using the card key to the authentication data
Close operation;
The data that decryption obtains are compared by S305, access-control card reader with the random number, if unanimously, continued to execute
In next step, otherwise identify and do not pass through, swipe the card unsuccessfully, the process of swiping the card terminates;
The UID is sent to access controller by S306, access-control card reader;
S307, access controller issue enabling information to gate inhibition executing agency, generate card using information according to the UID and pass
It send to background management system.
A kind of CPU safety door inhibition control method provided in an embodiment of the present invention, is authenticated using dynamic random number
Mode prevents access card to be replicated;Key dispersion is carried out using the UID of access card, realizes that a card one is close;Background management system is real
The unified management of existing card using information
Optionally, in as an embodiment of the present invention, as shown in figure 4, this method comprises:
S401, access-control card reader read the only identifier UID of access card when detecting access card;
S402, access-control card reader generate authentication command and random number and are sent to access card;
S403, access card in response to the authentication command, with there are the card key in card to the random number with close
Code algorithm does cryptographic calculation, obtains authentication data and back to access-control card reader;
S404, access-control card reader are using the UID as dispersion factor, using being stored in access-control card reader in PSAM card
System root key cryptographic algorithm disperses to obtain the card key, is solved using the card key to the authentication data
Close operation;
The data that decryption obtains are compared by S405, access-control card reader with the random number, if unanimously, executing step
S406, otherwise go to step S409;
The UID is sent to access controller by S406, access-control card reader;
S407, access controller judge that the UID whether in blacklist, if then terminating, is thened follow the steps if not
S408;
S408, access controller issue enabling information to gate inhibition executing agency, generate card using information according to the UID and pass
It send to background management system, terminates;
S409, access-control card reader reset to the count value of the number of attempt counter of the system root key in PSAM card just
Value;
The count value of the number of attempt counter of system root key in PSAM card is subtracted 1 by S410, access-control card reader;
S411, when the count value of the number of attempt counter of the system root key in the PSAM card of access-control card reader be 0 when,
The system root key is locked preset time by access-control card reader, and also the UID is added in the blacklist of access controller.
A kind of CPU safety door inhibition control method provided in an embodiment of the present invention, can be realized blacklist safeguard function, can be with
Locking a period of time when user reaches preset number using the number that illegal access card attempts failure, and the card is set
Into blacklist, anti-illegal-inbreak, in addition it is also possible to be set in the case where gate inhibition's subscriber card is lost by background management system
It sets the card user and enters blacklist, that is, the card is set and enters failure state, it is ensured that system will not be made safely after blocking by losing
At influence.
Optionally, in this embodiment, further includes:
Access card issuing equipment verifies the PIN code of therein PSAM card, and after checking PIN code success, access card distribution is set
Standby to obtain the UID to access card, the UID is imported into access card issuing equipment by access card, and access card issuing equipment is adopted
Key dispersion is carried out to the UID with system root key, generates the card key of access card, access card issuing equipment is by the card
Piece key sends access card to.
Correspondingly, the embodiment of the present invention also provides a kind of CPU safety door inhibition control system, which includes: gate inhibition's card reading
Device, access card and access controller;
The access card includes:
First storage unit is used for memory card key;
Encryption unit, the authentication command for being generated in response to the access-control card reader, with the card key to described
The random number that access-control card reader generates does cryptographic calculation with cryptographic algorithm, obtains authentication data and back to gate inhibition's card reading
Device;
Specifically, as shown in Figure 1, the first storage unit generallys use number and storage circuit realization, and encryption unit is logical
It is realized frequently with crypto module, built-in hardware SM1 cryptographic algorithm, access card are led to access-control card reader by radio frequency interface
Letter.
The access-control card reader includes:
Reading unit, for when detecting the access card, reading the only identifier UID of the access card;
First generation unit, for generating authentication command and random number and being sent to the access card;
Second storage unit is used for storage system root key;
Decryption unit, for being dispersed using the system root key cryptographic algorithm using the UID as dispersion factor
To card key, operation is decrypted to authentication data using the card key;
Comparing unit, the data for obtaining decryption are compared with the random number, when comparison result is inconsistent,
Terminate process of swiping the card;
Transmission unit, for the comparison result in the comparing unit be it is consistent when, the UID is sent to access control
Device;
The access controller includes:
Execution unit generates card using information according to the UID and transmits for issuing enabling information to gate inhibition executing agency
To background management system.
Optionally, in this embodiment, the access controller further include:
Judging unit, for judging the UID whether in blacklist;
The execution unit, for issuing enabling information when the judging unit judges the UID not in blacklist
To gate inhibition executing agency.
Optionally, in this embodiment, the access-control card reader further include:
Counting unit, for when the comparison result of the comparing unit be it is consistent when, by the trial of the system root key
The count value of number resets to initial value;It is also used to when the comparison result of the comparing unit is inconsistent, by the system root
The count value of the number of attempt of key subtracts 1;
Lock cell, when being preset for when the count value of the counting unit is 0, the system root key to be locked
Between.
Optionally, in this embodiment, the access-control card reader further include:
Adding unit, for when the count value of the number of attempt counter is 0, the UID to be added to the door
In the blacklist for prohibiting controller.
Optionally, in this embodiment, which further includes access card issuing equipment, the access card issuing equipment packet
It includes:
Verification unit, for the PIN code for verifying therein PSAM card;
Acquiring unit, for obtaining the UID to the access card after verification unit checking PIN code success;
Second generation unit generates the access card for carrying out key dispersion to the UID using system root key
Card key sends the card key to the access card.
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and
Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.
Claims (10)
1. a kind of CPU safety door inhibition control method characterized by comprising
Access-control card reader reads the only identifier UID of access card when detecting access card;
Access-control card reader generates authentication command and random number and is sent to access card;
Access card adds the random number with cryptographic algorithm with there are the card keys in card in response to the authentication command
Close operation obtains authentication data and back to access-control card reader;
Access-control card reader is close using the system root being stored in access-control card reader in PSAM card using the UID as dispersion factor
Key cryptographic algorithm disperses to obtain the card key, and operation is decrypted to the authentication data using the card key;
The data that decryption obtains are compared by access-control card reader with the random number, no if unanimously, continued to execute in next step
Then identify and do not pass through, swipes the card unsuccessfully, the process of swiping the card terminates;
The UID is sent to access controller by access-control card reader;
Access controller issues enabling information to gate inhibition executing agency, generates card using information according to the UID and is sent to backstage
Management system.
2. the method according to claim 1, wherein issuing enabling information in access controller executes machine to gate inhibition
Before structure, further includes:
Whether access controller judges the UID in blacklist;
When access controller judges the UID not in blacklist, the step for issuing enabling information to gate inhibition executing agency is executed
Suddenly.
3. according to the method described in claim 2, it is characterized by further comprising:
When the result that the data that decryption obtains are compared by access-control card reader with the random number is consistent, access-control card reader
The count value of the number of attempt counter of system root key in PSAM card is reset into initial value;
When the result that the data that decryption obtains are compared by access-control card reader with the random number is inconsistent, gate inhibition's card reading
The count value of the number of attempt counter of system root key in PSAM card is subtracted 1 by device;
When the count value of the number of attempt counter of the system root key in the PSAM card of access-control card reader is 0, gate inhibition's card reading
The system root key is locked preset time by device.
4. according to the method described in claim 3, it is characterized by further comprising:
When the count value of the number of attempt counter of the system root key in the PSAM card of access-control card reader is 0, gate inhibition's card reading
The UID is added in the blacklist of access controller by device.
5. method according to claim 1-4, which is characterized in that further include:
Access card issuing equipment verifies the PIN code of therein PSAM card, after checking PIN code success, access card issuing equipment to
Access card obtains the UID, and the UID is imported into access card issuing equipment by access card, and access card issuing equipment is using system
Root key of uniting carries out key dispersion to the UID, generates the card key of access card, access card issuing equipment is close by the card
Key sends access card to.
6. a kind of CPU safety door inhibition control system characterized by comprising access-control card reader, access card and access controller;
The access card includes:
First storage unit is used for memory card key;
Encryption unit, the authentication command for being generated in response to the access-control card reader, with the card key to the gate inhibition
The random number that card reader generates does cryptographic calculation with cryptographic algorithm, obtains authentication data and back to the access-control card reader;
The access-control card reader includes:
Reading unit, for when detecting the access card, reading the only identifier UID of the access card;
First generation unit, for generating authentication command and random number and being sent to the access card;
Second storage unit is used for storage system root key;
Decryption unit, for dispersing card using the system root key cryptographic algorithm using the UID as dispersion factor
Operation is decrypted to authentication data using the card key in piece key;
Comparing unit, the data for obtaining decryption are compared with the random number, when comparison result is inconsistent, are terminated
It swipes the card process;
Transmission unit, for the comparison result in the comparing unit be it is consistent when, the UID is sent to access controller;
The access controller includes:
Execution unit, for issuing enabling information to gate inhibition executing agency, after generating card using information according to the UID and be sent to
Platform management system.
7. system according to claim 6, which is characterized in that the access controller further include:
Judging unit, for judging the UID whether in blacklist;
The execution unit, for when the judging unit judges the UID not in blacklist, issuing enabling information to door
Prohibit executing agency.
8. system according to claim 7, which is characterized in that the access-control card reader further include:
Counting unit, for when the comparison result of the comparing unit be it is consistent when, by the number of attempt of the system root key
Count value reset to initial value;It is also used to when the comparison result of the comparing unit is inconsistent, by the system root key
The count value of number of attempt subtract 1;
Lock cell, for when the count value of the counting unit is 0, the system root key to be locked preset time.
9. system according to claim 8, which is characterized in that the access-control card reader further include:
Adding unit, for the UID being added to the gate inhibition and is controlled when the count value of the number of attempt counter being 0
In the blacklist of device processed.
10. according to the described in any item systems of claim 6-9, which is characterized in that further include access card issuing equipment, the door
Prohibiting card issuing equipment includes:
Verification unit, for the PIN code for verifying therein PSAM card;
Acquiring unit, for obtaining the UID to the access card after verification unit checking PIN code success;
Second generation unit generates the card of the access card for carrying out key dispersion to the UID using system root key
Key sends the card key to the access card.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810945001.1A CN109272609A (en) | 2018-08-19 | 2018-08-19 | A kind of CPU safety door inhibition control method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810945001.1A CN109272609A (en) | 2018-08-19 | 2018-08-19 | A kind of CPU safety door inhibition control method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109272609A true CN109272609A (en) | 2019-01-25 |
Family
ID=65153816
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810945001.1A Pending CN109272609A (en) | 2018-08-19 | 2018-08-19 | A kind of CPU safety door inhibition control method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109272609A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109741506A (en) * | 2019-02-28 | 2019-05-10 | 北京中金国信科技有限公司 | A kind of method for unlocking, device and equipment |
CN111292089A (en) * | 2020-02-12 | 2020-06-16 | 北京智慧云测科技有限公司 | PSAM card protection management method and PSAM card |
CN113327371A (en) * | 2021-05-21 | 2021-08-31 | 福建星云电子股份有限公司 | Card swiping authentication method and system for charging pile |
CN114495343A (en) * | 2021-12-31 | 2022-05-13 | 深圳亿达天下科技有限公司 | Access control management system and access control management method |
CN115758398A (en) * | 2022-10-31 | 2023-03-07 | 鼎铉商用密码测评技术(深圳)有限公司 | Access control data processing method and device, access control system and storage medium |
CN116543488A (en) * | 2023-07-06 | 2023-08-04 | 鼎铉商用密码测评技术(深圳)有限公司 | Entrance guard unlocking method, entrance guard system and readable storage medium |
CN116580489A (en) * | 2023-07-13 | 2023-08-11 | 鼎铉商用密码测评技术(深圳)有限公司 | Access control equipment, access control card and card sender control method, equipment and medium |
CN116844266A (en) * | 2023-09-01 | 2023-10-03 | 鼎铉商用密码测评技术(深圳)有限公司 | Access control method, access control system and storage medium |
CN118172853A (en) * | 2024-03-11 | 2024-06-11 | 深圳市博西尼电子有限公司 | Entrance guard data encryption method and system based on commercial cryptographic algorithm |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE29814427U1 (en) * | 1998-08-11 | 1998-12-10 | SCM Microsystems GmbH, 85276 Pfaffenhofen | security system |
CN101840592A (en) * | 2010-05-18 | 2010-09-22 | 上海集成通信设备有限公司 | IC (Integrate Circuit) card access terminal adopting commercial cipher and operation method thereof |
CN102800141A (en) * | 2012-07-24 | 2012-11-28 | 东信和平科技股份有限公司 | Entrance guard controlling method and system based on bidirectional authentication |
CN104376631A (en) * | 2014-12-09 | 2015-02-25 | 天津光电安辰信息技术有限公司 | Commercial cipher algorithm based security access control system and implementation method thereof |
CN105756440A (en) * | 2016-04-22 | 2016-07-13 | 邱庆霖 | Electronic lock opening device and method |
CN107195035A (en) * | 2017-05-11 | 2017-09-22 | 广东汇泰龙科技有限公司 | A kind of remote controlled cloud lock awakening method, system |
-
2018
- 2018-08-19 CN CN201810945001.1A patent/CN109272609A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE29814427U1 (en) * | 1998-08-11 | 1998-12-10 | SCM Microsystems GmbH, 85276 Pfaffenhofen | security system |
CN101840592A (en) * | 2010-05-18 | 2010-09-22 | 上海集成通信设备有限公司 | IC (Integrate Circuit) card access terminal adopting commercial cipher and operation method thereof |
CN102800141A (en) * | 2012-07-24 | 2012-11-28 | 东信和平科技股份有限公司 | Entrance guard controlling method and system based on bidirectional authentication |
CN104376631A (en) * | 2014-12-09 | 2015-02-25 | 天津光电安辰信息技术有限公司 | Commercial cipher algorithm based security access control system and implementation method thereof |
CN105756440A (en) * | 2016-04-22 | 2016-07-13 | 邱庆霖 | Electronic lock opening device and method |
CN107195035A (en) * | 2017-05-11 | 2017-09-22 | 广东汇泰龙科技有限公司 | A kind of remote controlled cloud lock awakening method, system |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109741506A (en) * | 2019-02-28 | 2019-05-10 | 北京中金国信科技有限公司 | A kind of method for unlocking, device and equipment |
CN111292089A (en) * | 2020-02-12 | 2020-06-16 | 北京智慧云测科技有限公司 | PSAM card protection management method and PSAM card |
CN113327371A (en) * | 2021-05-21 | 2021-08-31 | 福建星云电子股份有限公司 | Card swiping authentication method and system for charging pile |
CN113327371B (en) * | 2021-05-21 | 2022-08-05 | 福建星云电子股份有限公司 | Card swiping authentication method and system for charging pile |
CN114495343A (en) * | 2021-12-31 | 2022-05-13 | 深圳亿达天下科技有限公司 | Access control management system and access control management method |
CN114495343B (en) * | 2021-12-31 | 2024-02-13 | 深圳亿达天下科技有限公司 | Entrance guard safety control management system and entrance guard safety control management method |
CN115758398B (en) * | 2022-10-31 | 2023-07-21 | 鼎铉商用密码测评技术(深圳)有限公司 | Access control data processing method and device, access control system and storage medium |
CN115758398A (en) * | 2022-10-31 | 2023-03-07 | 鼎铉商用密码测评技术(深圳)有限公司 | Access control data processing method and device, access control system and storage medium |
CN116543488A (en) * | 2023-07-06 | 2023-08-04 | 鼎铉商用密码测评技术(深圳)有限公司 | Entrance guard unlocking method, entrance guard system and readable storage medium |
CN116580489A (en) * | 2023-07-13 | 2023-08-11 | 鼎铉商用密码测评技术(深圳)有限公司 | Access control equipment, access control card and card sender control method, equipment and medium |
CN116580489B (en) * | 2023-07-13 | 2023-09-29 | 鼎铉商用密码测评技术(深圳)有限公司 | Access control equipment, access control card and card sender control method, equipment and medium |
CN116844266A (en) * | 2023-09-01 | 2023-10-03 | 鼎铉商用密码测评技术(深圳)有限公司 | Access control method, access control system and storage medium |
CN116844266B (en) * | 2023-09-01 | 2023-11-24 | 鼎铉商用密码测评技术(深圳)有限公司 | Access control method, access control system and storage medium |
CN118172853A (en) * | 2024-03-11 | 2024-06-11 | 深圳市博西尼电子有限公司 | Entrance guard data encryption method and system based on commercial cryptographic algorithm |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109272609A (en) | A kind of CPU safety door inhibition control method and system | |
CN108055235B (en) | Control method of intelligent lock, related equipment and system | |
US6073237A (en) | Tamper resistant method and apparatus | |
CN101300808B (en) | Method and arrangement for secure autentication | |
US7178025B2 (en) | Access system utilizing multiple factor identification and authentication | |
CN107038777A (en) | A kind of safety communicating method and its intelligent door lock system based on intelligent door lock system | |
KR20060116822A (en) | Method for the authentication of applications | |
CN100353787C (en) | Security guarantee for memory data information of mobile terminal | |
CN106790064B (en) | The method that both sides are communicated in credible root server-cloud computing server model | |
CN101483654A (en) | Method and system for implementing authentication and data safe transmission | |
CN106027473B (en) | Identity card card-reading terminal and cloud authentication platform data transmission method and system | |
CN111954211B (en) | Novel authentication key negotiation system of mobile terminal | |
CN101140605A (en) | Data safety reading method and safety storage apparatus thereof | |
EP1472816A2 (en) | Access system utilizing multiple factor identification and authentication | |
CN109474419A (en) | A kind of living body portrait photo encryption and decryption method and encrypting and deciphering system | |
CN100456884C (en) | Re-identifying method in wireless communication system | |
CN104144411B (en) | Encryption, decryption terminal and the encryption and decryption approaches applied to terminal | |
CN101192927B (en) | Authorization based on identity confidentiality and multiple authentication method | |
CN111583482A (en) | Access control system based on two-dimensional code and control method thereof | |
CN101262669B (en) | A secure guarantee method for information stored in a mobile terminal | |
CN106792669A (en) | Information of mobile terminal encryption method and device based on Hybrid Encryption algorithm | |
CN110738764A (en) | Security control system and method based on intelligent lock | |
CN106855924A (en) | Embedded intelligent chip equipment and background application system | |
CN107786978B (en) | NFC authentication system based on quantum encryption | |
CN103944721A (en) | Method and device for protecting terminal data security on basis of web |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190125 |
|
RJ01 | Rejection of invention patent application after publication |