CN109685948A - One kind being based on mobile device dynamic two-dimension code visitor's method - Google Patents

One kind being based on mobile device dynamic two-dimension code visitor's method Download PDF

Info

Publication number
CN109685948A
CN109685948A CN201811526292.7A CN201811526292A CN109685948A CN 109685948 A CN109685948 A CN 109685948A CN 201811526292 A CN201811526292 A CN 201811526292A CN 109685948 A CN109685948 A CN 109685948A
Authority
CN
China
Prior art keywords
visitor
dimensional code
owner
gate inhibition
mobile device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811526292.7A
Other languages
Chinese (zh)
Inventor
刘明铭
黄清华
易波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
All Things On Earth Connection Co Ltd Of Shenzhen
Original Assignee
All Things On Earth Connection Co Ltd Of Shenzhen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by All Things On Earth Connection Co Ltd Of Shenzhen filed Critical All Things On Earth Connection Co Ltd Of Shenzhen
Priority to CN201811526292.7A priority Critical patent/CN109685948A/en
Publication of CN109685948A publication Critical patent/CN109685948A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/21Individual registration on entry or exit involving the use of a pass having a variable access code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/0042Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
    • G07C2009/00476Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

The present invention relates to visitor's method and technology fields, in particular a kind of to be based on mobile device dynamic two-dimension code visitor's method, include the following steps: that (1) visitor informs that owner calls on a thing;It (2) is reception visitor, owner generates two dimensional code with mobile phone;(3) server of gate inhibition receives owner's information and two dimensional code suitable parameters generate unique two dimensional code, and this two dimensional code is fed back to owner;(4) owner shares two dimensional code to visitor;(5) visitor uses two dimensional code;(6) equipment for connecting gate inhibition verifies the two dimensional code barcode scanning that visitor uses, and drives gate inhibition to open by server after verifying, visitor enters access business.The present invention, visitor's visiting is by connection owner (by visiting person), and owner directly generates two dimensional code on mobile phone and is shared with visitor, and visitor can be entered at gate inhibition by two dimensional code, and two dimensional code can adjust entry-into-force time and applicable cell according to demand.

Description

One kind being based on mobile device dynamic two-dimension code visitor's method
Technical field
The present invention relates to visitor's method and technology fields, specially a kind of to be based on mobile device dynamic two-dimension code visitor's method.
Background technique
Nowadays, in order to Strengthen Safety Management, domestic many communities, office building and colleges and universities gradually upgrade gate inhibition, enable new Emerging face recognition door control system is as the bodyguard for guarding building safety.Recognition of face gate inhibition saves the one of identity veritification really The sequence of maneuvers time, but when there is visitor's visiting, it is still desirable to carrying out identity information to be inputted can just allow access into.In safety From the point of view of, this is reasonable, but also has drawback: being cost problem first, visitor's visiting is disposed near gate inhibition and is set It is standby, and the maintenance of equipment is also necessary;Secondly, identity information verification can also expend certain time, so in summary Two o'clock, this method or not satisfactory.
Summary of the invention
The purpose of the present invention is to provide one kind to be based on mobile device dynamic two-dimension code visitor's method, to solve above-mentioned background The problem of being proposed in technology.Method should be called on based on mobile device dynamic two-dimension code visitor method visitor, simplified to a certain extent The process of entering of visitor's visiting, saves the time.
To achieve the above object, the invention provides the following technical scheme:
One kind being based on mobile device dynamic two-dimension code visitor's method, includes the following steps:
(1) visitor informs that owner calls on a thing;
It (2) is reception visitor, owner generates two dimensional code with mobile phone;
(3) server of gate inhibition receives owner's information and two dimensional code suitable parameters and generates unique two dimensional code, and by this two Dimension code feeds back to owner;
(4) owner shares two dimensional code to visitor;
(5) visitor uses two dimensional code;
(6) equipment for connecting gate inhibition verifies the two dimensional code barcode scanning that visitor uses, and is driven by server after verifying Gate inhibition opens, and visitor enters access business.
Further, in step (3) gate inhibition server by received owner id, be applicable in access control equipment id and it is expired when Between information generate json object, and be stored in redis database and save, then des symmetric cryptography, two dimensional code parameter is set, it is raw At unique two dimensional code.
Further, the equipment of connection gate inhibition identifies the two dimensional code that visitor uses first in step (6), and is parsed into character String obtains current device ip, is then verified according to character string and ip, and decides whether to open door according to verification success or not Prohibit.
Further, if character string des successful decryption in step (6), json object after carrying decryption to redis Middle carry out data comparison, successful then gate inhibition open, and visitor can open the door;Such as the json after the non-successful decryption of character string des, decryption Object and redis comparison fail, then need to rescan the two dimensional code that visitor uses.
Further, the json object in step (6) after decryption includes whether redis wraps with redis progress data comparison Whether can be used containing associated user and two dimensional code.
Compared with prior art, the beneficial effects of the present invention are:
For visitor's visiting by connection owner (by visiting person), owner directly generates two dimensional code sharing on mobile phone in the present invention To visitor, visitor can be entered at gate inhibition by two dimensional code, and two dimensional code can adjust entry-into-force time and applicable according to demand Cell.
The present invention, changing identity information typing authorization to open the door is that owner authorizes enabling, simplifies visitor's visiting to a certain extent Process of entering, save the time.Later period to investigate visitor, can be found in the database and keep on file to shine when time barcode scanning Piece can also understand related news by proprietor;Need not deployment identity information recording device, reduce the operation of property side at This.
Detailed description of the invention
Fig. 1 is flow diagram of the present invention.
Fig. 2 is that server of the present invention generates unique two dimensional code flow diagram.
Fig. 3 is that the equipment of present invention connection gate inhibition carries out verifying flow diagram to the two dimensional code barcode scanning that visitor uses.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that term " up/down end ", "inner", "outside" " front end ", " rear end ", The orientation or positional relationship of the instructions such as " both ends ", " one end ", " other end " is to be based on the orientation or positional relationship shown in the drawings, only It is that for the convenience of describing the present invention and simplifying the description, rather than the device or element of indication or suggestion meaning must have specifically Orientation is constructed and operated in a specific orientation, therefore is not considered as limiting the invention.In addition, term " first ", " the Two " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance.
In the description of the present invention, it should be noted that unless otherwise clearly defined and limited, term " installation " " is set Set/be arranged with ", " socket ", " connection " etc., shall be understood in a broad sense, such as " connection ", may be a fixed connection, being also possible to can Dismantling connection, or be integrally connected;It can be mechanical connection, be also possible to be electrically connected;It can be directly connected, can also pass through Intermediary is indirectly connected, and can be the connection inside two elements.For the ordinary skill in the art, can have Body situation understands the concrete meaning of above-mentioned term in the present invention.
Fig. 1-3 is please referred to, the present invention provides a kind of technical solution:
One kind being based on mobile device dynamic two-dimension code visitor's method, includes the following steps:
(1) visitor informs that owner calls on a thing;
It (2) is reception visitor, owner generates two dimensional code with mobile phone;
(3) server of gate inhibition receives owner's information and two dimensional code suitable parameters and generates unique two dimensional code, and by this two Dimension code feeds back to owner;
(4) owner shares two dimensional code to visitor;
(5) visitor uses two dimensional code;
(6) equipment for connecting gate inhibition verifies the two dimensional code barcode scanning that visitor uses, and is driven by server after verifying Gate inhibition opens, and visitor enters access business.
The server of gate inhibition is raw by received owner id, applicable access control equipment id and expired time information in step (3) It at json object, and is stored in redis database and saves, then des symmetric cryptography, two dimensional code parameter is set, generate unique two Tie up code.
The equipment of connection gate inhibition identifies the two dimensional code that visitor uses first in step (6), and is parsed into character string, and acquisition is worked as Preceding equipment ip, is then verified according to character string and ip, and decides whether to open gate inhibition, character string according to verification success or not Des successful decryption, then the json object after carrying decryption carry out data comparison into redis, and successful then gate inhibition opens, Fang Keke To open the door.
As after the non-successful decryption of character string des, decryption json object and redis comparison fail, then need to rescan The two dimensional code that visitor uses, json object and redis after decryption carry out data comparison and include whether redis includes associated user And whether two dimensional code can be used.
The method of the present invention is solved in place of increasing cost and time consumption in the prior art, and is increased to a certain extent Safety.That is by connection owner (by visiting person), owner directly generates two dimensional code on mobile phone and is shared with visit for visitor's visiting Visitor, visitor can be entered at gate inhibition by two dimensional code, and two dimensional code can adjust entry-into-force time and applicable cell according to demand.
It is that owner authorizes enabling that the present invention, which changes identity information typing authorization to open the door, simplifies visitor's visiting to a certain extent It enters process, saves the time.Later period to investigate visitor, can find the photo of keeping on file when time barcode scanning in the database, Related news can also be understood by proprietor;Identity information recording device need not be disposed, the operating cost of property side is reduced.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding And modification, the scope of the present invention is defined by the appended.

Claims (5)

1. one kind is based on mobile device dynamic two-dimension code visitor's method, which comprises the steps of:
(1) visitor informs that owner calls on a thing;
It (2) is reception visitor, owner generates two dimensional code with mobile phone;
(3) server of gate inhibition receives owner's information and two dimensional code suitable parameters and generates unique two dimensional code, and by this two dimensional code Feed back to owner;
(4) owner shares two dimensional code to visitor;
(5) visitor uses two dimensional code;
(6) equipment for connecting gate inhibition verifies the two dimensional code barcode scanning that visitor uses, and drives gate inhibition by server after verifying It opens, visitor enters access business.
2. according to claim 1 a kind of based on mobile device dynamic two-dimension code visitor's method, it is characterised in that: step (3) received owner id, applicable access control equipment id and expired time information are generated json object by the server of gate inhibition in, and It is saved in deposit redis database, then des symmetric cryptography, two dimensional code parameter is set, unique two dimensional code is generated.
3. according to claim 1 a kind of based on mobile device dynamic two-dimension code visitor's method, it is characterised in that: step (6) equipment of connection gate inhibition identifies the two dimensional code that visitor uses first in, and is parsed into character string, obtains current device ip, so It is verified afterwards according to character string and ip, and decides whether to open gate inhibition according to verification success or not.
4. according to claim 3 a kind of based on mobile device dynamic two-dimension code visitor's method, it is characterised in that: if step Suddenly character string des successful decryption in (6), then the json object after carrying decryption carry out data comparison, successful then door into redis Prohibit and open, visitor can open the door;As after the non-successful decryption of character string des, decryption json object and redis comparison fail, then Need to rescan the two dimensional code that visitor uses.
5. according to claim 4 a kind of based on mobile device dynamic two-dimension code visitor's method, it is characterised in that: step (6) whether it includes associated user and two dimensional code is that json object and redis progress data comparison in after decryption include redis It is no available.
CN201811526292.7A 2018-12-13 2018-12-13 One kind being based on mobile device dynamic two-dimension code visitor's method Pending CN109685948A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811526292.7A CN109685948A (en) 2018-12-13 2018-12-13 One kind being based on mobile device dynamic two-dimension code visitor's method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811526292.7A CN109685948A (en) 2018-12-13 2018-12-13 One kind being based on mobile device dynamic two-dimension code visitor's method

Publications (1)

Publication Number Publication Date
CN109685948A true CN109685948A (en) 2019-04-26

Family

ID=66187784

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811526292.7A Pending CN109685948A (en) 2018-12-13 2018-12-13 One kind being based on mobile device dynamic two-dimension code visitor's method

Country Status (1)

Country Link
CN (1) CN109685948A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111583482A (en) * 2020-04-29 2020-08-25 三仟(杭州)数字科技有限公司 Access control system based on two-dimensional code and control method thereof
CN112530067A (en) * 2020-11-27 2021-03-19 远光软件股份有限公司 Visitor management method, related device, storage medium and system
CN112837458A (en) * 2021-03-05 2021-05-25 北京德风新征程科技有限公司 Personnel supervision method and device based on big data and storage medium
CN115147968A (en) * 2022-06-20 2022-10-04 云南财经大学 Identity verification method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103532564A (en) * 2013-05-27 2014-01-22 Tcl集团股份有限公司 Two-dimensional code data encoding method, decoding method, system and intelligent device
CN105741394A (en) * 2016-02-02 2016-07-06 成都优家生活科技有限公司 Intelligent access control system based on mobile phone control
CN105741395A (en) * 2016-02-03 2016-07-06 慧锐通智能科技股份有限公司 Entrance guard access method and system based on two-dimension code and face identification
CN105913527A (en) * 2016-05-03 2016-08-31 武汉睿和智云科技有限公司 Intelligent visitor two-dimensional code verification system and intelligent visitor two-dimensional code verification method based on community cloud
CN106408689A (en) * 2015-07-29 2017-02-15 北京千丁互联科技有限公司 Visitor reservation management method and visitor reservation management system
CN106572098A (en) * 2016-11-01 2017-04-19 雷飏 Two-dimensional code form virtual key method, corresponding device and user terminal
JP2018092338A (en) * 2016-12-01 2018-06-14 Necネッツエスアイ株式会社 Visitor entry management system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103532564A (en) * 2013-05-27 2014-01-22 Tcl集团股份有限公司 Two-dimensional code data encoding method, decoding method, system and intelligent device
CN106408689A (en) * 2015-07-29 2017-02-15 北京千丁互联科技有限公司 Visitor reservation management method and visitor reservation management system
CN105741394A (en) * 2016-02-02 2016-07-06 成都优家生活科技有限公司 Intelligent access control system based on mobile phone control
CN105741395A (en) * 2016-02-03 2016-07-06 慧锐通智能科技股份有限公司 Entrance guard access method and system based on two-dimension code and face identification
CN105913527A (en) * 2016-05-03 2016-08-31 武汉睿和智云科技有限公司 Intelligent visitor two-dimensional code verification system and intelligent visitor two-dimensional code verification method based on community cloud
CN106572098A (en) * 2016-11-01 2017-04-19 雷飏 Two-dimensional code form virtual key method, corresponding device and user terminal
JP2018092338A (en) * 2016-12-01 2018-06-14 Necネッツエスアイ株式会社 Visitor entry management system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111583482A (en) * 2020-04-29 2020-08-25 三仟(杭州)数字科技有限公司 Access control system based on two-dimensional code and control method thereof
CN112530067A (en) * 2020-11-27 2021-03-19 远光软件股份有限公司 Visitor management method, related device, storage medium and system
CN112837458A (en) * 2021-03-05 2021-05-25 北京德风新征程科技有限公司 Personnel supervision method and device based on big data and storage medium
CN115147968A (en) * 2022-06-20 2022-10-04 云南财经大学 Identity verification method and device
CN115147968B (en) * 2022-06-20 2023-08-25 云南财经大学 Identity verification method and device

Similar Documents

Publication Publication Date Title
CN109685948A (en) One kind being based on mobile device dynamic two-dimension code visitor's method
CN101432980B (en) Time sync-type otp generation device and method for mobile phones
US8350525B2 (en) Charging vehicles in a parking area
EP1487228A2 (en) Authentication of several wireless communication devices using a single SIM (Subscriber Identity Module) card
US20080034217A1 (en) Security For A Personal Communication Device
EP3267620A1 (en) Secure remote authentication through an untrusted network
CN101611588A (en) Secure access for limited resources
CN103874965A (en) Systems and methods for activation and deactivation of appliances
US11758599B2 (en) Bluetooth™ low energy data transfer communication system and method
CN101366260A (en) Method off-line authentication on a limited-resource device
CN103733591B (en) Removable modules is tied to access terminal
CN103942684A (en) Data security interactive system
CN105243542B (en) Dynamic electronic certificate authentication method
CN102542451B (en) Electronic paying method, system and device thereof
CN103942685A (en) Data security interactive system
CN117413278A (en) Powering bluetooth communication card-to-phone using NFC field from phone
CN111091377B (en) Method for preventing two-dimension code from being stolen and brushed in mobile payment
CN110335394A (en) A kind of smart lock control method and system based on cipher code set
US20100105322A1 (en) Method and device for controlling the execution of at least one function in a short range wireless communication module of a mobile phone
CN102892096B (en) System, method, business operation support system (BOSS) and equipment for realizing account recharge
US20040029570A1 (en) Method and apparatus for electronic payment through mobile communication devices
AU2841399A (en) Mobile telephone system with prepaid card
WO2018218411A1 (en) Authentication method and equipment
CN114999045A (en) Passing system and method based on two-dimensional code encryption
CN105654295A (en) Transaction control method and client

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190426

RJ01 Rejection of invention patent application after publication