CN109685948A - One kind being based on mobile device dynamic two-dimension code visitor's method - Google Patents
One kind being based on mobile device dynamic two-dimension code visitor's method Download PDFInfo
- Publication number
- CN109685948A CN109685948A CN201811526292.7A CN201811526292A CN109685948A CN 109685948 A CN109685948 A CN 109685948A CN 201811526292 A CN201811526292 A CN 201811526292A CN 109685948 A CN109685948 A CN 109685948A
- Authority
- CN
- China
- Prior art keywords
- visitor
- dimensional code
- owner
- gate inhibition
- mobile device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/21—Individual registration on entry or exit involving the use of a pass having a variable access code
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/0042—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
- G07C2009/00476—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
Abstract
The present invention relates to visitor's method and technology fields, in particular a kind of to be based on mobile device dynamic two-dimension code visitor's method, include the following steps: that (1) visitor informs that owner calls on a thing;It (2) is reception visitor, owner generates two dimensional code with mobile phone;(3) server of gate inhibition receives owner's information and two dimensional code suitable parameters generate unique two dimensional code, and this two dimensional code is fed back to owner;(4) owner shares two dimensional code to visitor;(5) visitor uses two dimensional code;(6) equipment for connecting gate inhibition verifies the two dimensional code barcode scanning that visitor uses, and drives gate inhibition to open by server after verifying, visitor enters access business.The present invention, visitor's visiting is by connection owner (by visiting person), and owner directly generates two dimensional code on mobile phone and is shared with visitor, and visitor can be entered at gate inhibition by two dimensional code, and two dimensional code can adjust entry-into-force time and applicable cell according to demand.
Description
Technical field
The present invention relates to visitor's method and technology fields, specially a kind of to be based on mobile device dynamic two-dimension code visitor's method.
Background technique
Nowadays, in order to Strengthen Safety Management, domestic many communities, office building and colleges and universities gradually upgrade gate inhibition, enable new
Emerging face recognition door control system is as the bodyguard for guarding building safety.Recognition of face gate inhibition saves the one of identity veritification really
The sequence of maneuvers time, but when there is visitor's visiting, it is still desirable to carrying out identity information to be inputted can just allow access into.In safety
From the point of view of, this is reasonable, but also has drawback: being cost problem first, visitor's visiting is disposed near gate inhibition and is set
It is standby, and the maintenance of equipment is also necessary;Secondly, identity information verification can also expend certain time, so in summary
Two o'clock, this method or not satisfactory.
Summary of the invention
The purpose of the present invention is to provide one kind to be based on mobile device dynamic two-dimension code visitor's method, to solve above-mentioned background
The problem of being proposed in technology.Method should be called on based on mobile device dynamic two-dimension code visitor method visitor, simplified to a certain extent
The process of entering of visitor's visiting, saves the time.
To achieve the above object, the invention provides the following technical scheme:
One kind being based on mobile device dynamic two-dimension code visitor's method, includes the following steps:
(1) visitor informs that owner calls on a thing;
It (2) is reception visitor, owner generates two dimensional code with mobile phone;
(3) server of gate inhibition receives owner's information and two dimensional code suitable parameters and generates unique two dimensional code, and by this two
Dimension code feeds back to owner;
(4) owner shares two dimensional code to visitor;
(5) visitor uses two dimensional code;
(6) equipment for connecting gate inhibition verifies the two dimensional code barcode scanning that visitor uses, and is driven by server after verifying
Gate inhibition opens, and visitor enters access business.
Further, in step (3) gate inhibition server by received owner id, be applicable in access control equipment id and it is expired when
Between information generate json object, and be stored in redis database and save, then des symmetric cryptography, two dimensional code parameter is set, it is raw
At unique two dimensional code.
Further, the equipment of connection gate inhibition identifies the two dimensional code that visitor uses first in step (6), and is parsed into character
String obtains current device ip, is then verified according to character string and ip, and decides whether to open door according to verification success or not
Prohibit.
Further, if character string des successful decryption in step (6), json object after carrying decryption to redis
Middle carry out data comparison, successful then gate inhibition open, and visitor can open the door;Such as the json after the non-successful decryption of character string des, decryption
Object and redis comparison fail, then need to rescan the two dimensional code that visitor uses.
Further, the json object in step (6) after decryption includes whether redis wraps with redis progress data comparison
Whether can be used containing associated user and two dimensional code.
Compared with prior art, the beneficial effects of the present invention are:
For visitor's visiting by connection owner (by visiting person), owner directly generates two dimensional code sharing on mobile phone in the present invention
To visitor, visitor can be entered at gate inhibition by two dimensional code, and two dimensional code can adjust entry-into-force time and applicable according to demand
Cell.
The present invention, changing identity information typing authorization to open the door is that owner authorizes enabling, simplifies visitor's visiting to a certain extent
Process of entering, save the time.Later period to investigate visitor, can be found in the database and keep on file to shine when time barcode scanning
Piece can also understand related news by proprietor;Need not deployment identity information recording device, reduce the operation of property side at
This.
Detailed description of the invention
Fig. 1 is flow diagram of the present invention.
Fig. 2 is that server of the present invention generates unique two dimensional code flow diagram.
Fig. 3 is that the equipment of present invention connection gate inhibition carries out verifying flow diagram to the two dimensional code barcode scanning that visitor uses.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that term " up/down end ", "inner", "outside" " front end ", " rear end ",
The orientation or positional relationship of the instructions such as " both ends ", " one end ", " other end " is to be based on the orientation or positional relationship shown in the drawings, only
It is that for the convenience of describing the present invention and simplifying the description, rather than the device or element of indication or suggestion meaning must have specifically
Orientation is constructed and operated in a specific orientation, therefore is not considered as limiting the invention.In addition, term " first ", " the
Two " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance.
In the description of the present invention, it should be noted that unless otherwise clearly defined and limited, term " installation " " is set
Set/be arranged with ", " socket ", " connection " etc., shall be understood in a broad sense, such as " connection ", may be a fixed connection, being also possible to can
Dismantling connection, or be integrally connected;It can be mechanical connection, be also possible to be electrically connected;It can be directly connected, can also pass through
Intermediary is indirectly connected, and can be the connection inside two elements.For the ordinary skill in the art, can have
Body situation understands the concrete meaning of above-mentioned term in the present invention.
Fig. 1-3 is please referred to, the present invention provides a kind of technical solution:
One kind being based on mobile device dynamic two-dimension code visitor's method, includes the following steps:
(1) visitor informs that owner calls on a thing;
It (2) is reception visitor, owner generates two dimensional code with mobile phone;
(3) server of gate inhibition receives owner's information and two dimensional code suitable parameters and generates unique two dimensional code, and by this two
Dimension code feeds back to owner;
(4) owner shares two dimensional code to visitor;
(5) visitor uses two dimensional code;
(6) equipment for connecting gate inhibition verifies the two dimensional code barcode scanning that visitor uses, and is driven by server after verifying
Gate inhibition opens, and visitor enters access business.
The server of gate inhibition is raw by received owner id, applicable access control equipment id and expired time information in step (3)
It at json object, and is stored in redis database and saves, then des symmetric cryptography, two dimensional code parameter is set, generate unique two
Tie up code.
The equipment of connection gate inhibition identifies the two dimensional code that visitor uses first in step (6), and is parsed into character string, and acquisition is worked as
Preceding equipment ip, is then verified according to character string and ip, and decides whether to open gate inhibition, character string according to verification success or not
Des successful decryption, then the json object after carrying decryption carry out data comparison into redis, and successful then gate inhibition opens, Fang Keke
To open the door.
As after the non-successful decryption of character string des, decryption json object and redis comparison fail, then need to rescan
The two dimensional code that visitor uses, json object and redis after decryption carry out data comparison and include whether redis includes associated user
And whether two dimensional code can be used.
The method of the present invention is solved in place of increasing cost and time consumption in the prior art, and is increased to a certain extent
Safety.That is by connection owner (by visiting person), owner directly generates two dimensional code on mobile phone and is shared with visit for visitor's visiting
Visitor, visitor can be entered at gate inhibition by two dimensional code, and two dimensional code can adjust entry-into-force time and applicable cell according to demand.
It is that owner authorizes enabling that the present invention, which changes identity information typing authorization to open the door, simplifies visitor's visiting to a certain extent
It enters process, saves the time.Later period to investigate visitor, can find the photo of keeping on file when time barcode scanning in the database,
Related news can also be understood by proprietor;Identity information recording device need not be disposed, the operating cost of property side is reduced.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with
A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding
And modification, the scope of the present invention is defined by the appended.
Claims (5)
1. one kind is based on mobile device dynamic two-dimension code visitor's method, which comprises the steps of:
(1) visitor informs that owner calls on a thing;
It (2) is reception visitor, owner generates two dimensional code with mobile phone;
(3) server of gate inhibition receives owner's information and two dimensional code suitable parameters and generates unique two dimensional code, and by this two dimensional code
Feed back to owner;
(4) owner shares two dimensional code to visitor;
(5) visitor uses two dimensional code;
(6) equipment for connecting gate inhibition verifies the two dimensional code barcode scanning that visitor uses, and drives gate inhibition by server after verifying
It opens, visitor enters access business.
2. according to claim 1 a kind of based on mobile device dynamic two-dimension code visitor's method, it is characterised in that: step
(3) received owner id, applicable access control equipment id and expired time information are generated json object by the server of gate inhibition in, and
It is saved in deposit redis database, then des symmetric cryptography, two dimensional code parameter is set, unique two dimensional code is generated.
3. according to claim 1 a kind of based on mobile device dynamic two-dimension code visitor's method, it is characterised in that: step
(6) equipment of connection gate inhibition identifies the two dimensional code that visitor uses first in, and is parsed into character string, obtains current device ip, so
It is verified afterwards according to character string and ip, and decides whether to open gate inhibition according to verification success or not.
4. according to claim 3 a kind of based on mobile device dynamic two-dimension code visitor's method, it is characterised in that: if step
Suddenly character string des successful decryption in (6), then the json object after carrying decryption carry out data comparison, successful then door into redis
Prohibit and open, visitor can open the door;As after the non-successful decryption of character string des, decryption json object and redis comparison fail, then
Need to rescan the two dimensional code that visitor uses.
5. according to claim 4 a kind of based on mobile device dynamic two-dimension code visitor's method, it is characterised in that: step
(6) whether it includes associated user and two dimensional code is that json object and redis progress data comparison in after decryption include redis
It is no available.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811526292.7A CN109685948A (en) | 2018-12-13 | 2018-12-13 | One kind being based on mobile device dynamic two-dimension code visitor's method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811526292.7A CN109685948A (en) | 2018-12-13 | 2018-12-13 | One kind being based on mobile device dynamic two-dimension code visitor's method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109685948A true CN109685948A (en) | 2019-04-26 |
Family
ID=66187784
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811526292.7A Pending CN109685948A (en) | 2018-12-13 | 2018-12-13 | One kind being based on mobile device dynamic two-dimension code visitor's method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109685948A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111583482A (en) * | 2020-04-29 | 2020-08-25 | 三仟(杭州)数字科技有限公司 | Access control system based on two-dimensional code and control method thereof |
CN112530067A (en) * | 2020-11-27 | 2021-03-19 | 远光软件股份有限公司 | Visitor management method, related device, storage medium and system |
CN112837458A (en) * | 2021-03-05 | 2021-05-25 | 北京德风新征程科技有限公司 | Personnel supervision method and device based on big data and storage medium |
CN115147968A (en) * | 2022-06-20 | 2022-10-04 | 云南财经大学 | Identity verification method and device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103532564A (en) * | 2013-05-27 | 2014-01-22 | Tcl集团股份有限公司 | Two-dimensional code data encoding method, decoding method, system and intelligent device |
CN105741394A (en) * | 2016-02-02 | 2016-07-06 | 成都优家生活科技有限公司 | Intelligent access control system based on mobile phone control |
CN105741395A (en) * | 2016-02-03 | 2016-07-06 | 慧锐通智能科技股份有限公司 | Entrance guard access method and system based on two-dimension code and face identification |
CN105913527A (en) * | 2016-05-03 | 2016-08-31 | 武汉睿和智云科技有限公司 | Intelligent visitor two-dimensional code verification system and intelligent visitor two-dimensional code verification method based on community cloud |
CN106408689A (en) * | 2015-07-29 | 2017-02-15 | 北京千丁互联科技有限公司 | Visitor reservation management method and visitor reservation management system |
CN106572098A (en) * | 2016-11-01 | 2017-04-19 | 雷飏 | Two-dimensional code form virtual key method, corresponding device and user terminal |
JP2018092338A (en) * | 2016-12-01 | 2018-06-14 | Necネッツエスアイ株式会社 | Visitor entry management system |
-
2018
- 2018-12-13 CN CN201811526292.7A patent/CN109685948A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103532564A (en) * | 2013-05-27 | 2014-01-22 | Tcl集团股份有限公司 | Two-dimensional code data encoding method, decoding method, system and intelligent device |
CN106408689A (en) * | 2015-07-29 | 2017-02-15 | 北京千丁互联科技有限公司 | Visitor reservation management method and visitor reservation management system |
CN105741394A (en) * | 2016-02-02 | 2016-07-06 | 成都优家生活科技有限公司 | Intelligent access control system based on mobile phone control |
CN105741395A (en) * | 2016-02-03 | 2016-07-06 | 慧锐通智能科技股份有限公司 | Entrance guard access method and system based on two-dimension code and face identification |
CN105913527A (en) * | 2016-05-03 | 2016-08-31 | 武汉睿和智云科技有限公司 | Intelligent visitor two-dimensional code verification system and intelligent visitor two-dimensional code verification method based on community cloud |
CN106572098A (en) * | 2016-11-01 | 2017-04-19 | 雷飏 | Two-dimensional code form virtual key method, corresponding device and user terminal |
JP2018092338A (en) * | 2016-12-01 | 2018-06-14 | Necネッツエスアイ株式会社 | Visitor entry management system |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111583482A (en) * | 2020-04-29 | 2020-08-25 | 三仟(杭州)数字科技有限公司 | Access control system based on two-dimensional code and control method thereof |
CN112530067A (en) * | 2020-11-27 | 2021-03-19 | 远光软件股份有限公司 | Visitor management method, related device, storage medium and system |
CN112837458A (en) * | 2021-03-05 | 2021-05-25 | 北京德风新征程科技有限公司 | Personnel supervision method and device based on big data and storage medium |
CN115147968A (en) * | 2022-06-20 | 2022-10-04 | 云南财经大学 | Identity verification method and device |
CN115147968B (en) * | 2022-06-20 | 2023-08-25 | 云南财经大学 | Identity verification method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109685948A (en) | One kind being based on mobile device dynamic two-dimension code visitor's method | |
CN101432980B (en) | Time sync-type otp generation device and method for mobile phones | |
US8350525B2 (en) | Charging vehicles in a parking area | |
EP1487228A2 (en) | Authentication of several wireless communication devices using a single SIM (Subscriber Identity Module) card | |
US20080034217A1 (en) | Security For A Personal Communication Device | |
EP3267620A1 (en) | Secure remote authentication through an untrusted network | |
CN101611588A (en) | Secure access for limited resources | |
CN103874965A (en) | Systems and methods for activation and deactivation of appliances | |
US11758599B2 (en) | Bluetooth™ low energy data transfer communication system and method | |
CN101366260A (en) | Method off-line authentication on a limited-resource device | |
CN103733591B (en) | Removable modules is tied to access terminal | |
CN103942684A (en) | Data security interactive system | |
CN105243542B (en) | Dynamic electronic certificate authentication method | |
CN102542451B (en) | Electronic paying method, system and device thereof | |
CN103942685A (en) | Data security interactive system | |
CN117413278A (en) | Powering bluetooth communication card-to-phone using NFC field from phone | |
CN111091377B (en) | Method for preventing two-dimension code from being stolen and brushed in mobile payment | |
CN110335394A (en) | A kind of smart lock control method and system based on cipher code set | |
US20100105322A1 (en) | Method and device for controlling the execution of at least one function in a short range wireless communication module of a mobile phone | |
CN102892096B (en) | System, method, business operation support system (BOSS) and equipment for realizing account recharge | |
US20040029570A1 (en) | Method and apparatus for electronic payment through mobile communication devices | |
AU2841399A (en) | Mobile telephone system with prepaid card | |
WO2018218411A1 (en) | Authentication method and equipment | |
CN114999045A (en) | Passing system and method based on two-dimensional code encryption | |
CN105654295A (en) | Transaction control method and client |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190426 |
|
RJ01 | Rejection of invention patent application after publication |