CN109861827A - Terraced method, apparatus, computer equipment and storage medium are called together based on two dimensional code - Google Patents

Terraced method, apparatus, computer equipment and storage medium are called together based on two dimensional code Download PDF

Info

Publication number
CN109861827A
CN109861827A CN201910150965.1A CN201910150965A CN109861827A CN 109861827 A CN109861827 A CN 109861827A CN 201910150965 A CN201910150965 A CN 201910150965A CN 109861827 A CN109861827 A CN 109861827A
Authority
CN
China
Prior art keywords
information
terraced
configuration
key
dimensional code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910150965.1A
Other languages
Chinese (zh)
Other versions
CN109861827B (en
Inventor
张昌泰
苏涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGDONG ANJUBAO DIGITAL TECHNOLOGY Co Ltd
Original Assignee
GUANGDONG ANJUBAO DIGITAL TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGDONG ANJUBAO DIGITAL TECHNOLOGY Co Ltd filed Critical GUANGDONG ANJUBAO DIGITAL TECHNOLOGY Co Ltd
Priority to CN201910150965.1A priority Critical patent/CN109861827B/en
Publication of CN109861827A publication Critical patent/CN109861827A/en
Application granted granted Critical
Publication of CN109861827B publication Critical patent/CN109861827B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

This application involves a kind of to call terraced method, apparatus, computer equipment and storage medium together based on two dimensional code.The described method includes: terraced two dimensional code is called in scanning together, obtains anti-crack and call terraced information together;Identify it is described it is anti-crack call together in terraced information anti-and crack random mask, and from it is described it is anti-crack call together deleted in terraced information it is described it is anti-crack random mask, actually called together terraced information;Terraced information is actually called together according to described, generates elevator calling instruction;The elevator calling is instructed, lift facility is sent to by elevator gateway.Using this method, human configuration cost can be saved, the off line formula ladder keyholed back plate reason of layer control read head is realized, more enhances the safety for calling terraced two dimensional code together.

Description

Terraced method, apparatus, computer equipment and storage medium are called together based on two dimensional code
Technical field
This application involves field of computer technology, call terraced method, apparatus, calculating together based on two dimensional code more particularly to a kind of Machine equipment and storage medium.
Background technique
With the rapid development of modern high-rise building, elevator has become essential tool in for people's lives.
Traditional two dimensional code calls terraced method together, generallys use two-dimensional code scanning device scanning, identifies the use called together in terraced two dimensional code Family information, the verification information according to included in user information, to judge to call the validity of terraced two dimensional code together, to be taking passage in elevator Provided with permission, more client provides safety assurance.
But traditional two dimensional code calls terraced method together, is only differentiated by verification information included in user information, or Person encrypts user information, and it includes the terraced two dimensional codes of calling together of user information to be still easy to by fraudulent copying, or is broken Solution, the safe coefficient for calling terraced two dimensional code together are still very low.
Therefore, traditional two dimensional code, which calls terraced method together, has that safety is low.
Summary of the invention
Based on this, it is necessary to call the terraced method technical problem low there is safety together based on two dimensional code for above-mentioned, mention Call together terraced method, apparatus, computer equipment and the storage based on two dimensional code that above-mentioned technical problem can rationally be solved for one kind are situated between Matter.
It is a kind of that terraced method is called together based on two dimensional code, include the following steps:
Terraced two dimensional code is called in scanning together, is obtained anti-crack and is called terraced information together;
Identify it is described it is anti-crack call together in terraced information anti-and crack random mask, and from it is described it is anti-crack to call together in terraced information delete It is described to prevent cracking random mask, actually called together terraced information;
Terraced information is actually called together according to described, generates elevator calling instruction;
The elevator calling is instructed, lift facility is sent to by elevator gateway.
Terraced two dimensional code is called together in the scanning in one of the embodiments, is obtained preventing cracking before calling terraced information together, also be wrapped It includes:
Scanning configuration two dimensional code, obtains configuration information;
Information configuration is carried out according to the configuration information;The configuration information is used to actually call together for the verifying of layer control read head is described Terraced information, and elevator is called after being proved to be successful.
The configuration information includes configuration check key and configuration device number, the basis in one of the embodiments, The configuration information carries out information configuration, comprising:
Determine the machine check key, and, determine factory's check key;
When the machine check key is identical as the factory check key, the machine check key is replaced with into institute State configuration check key.
In one of the embodiments, when the machine check key and the factory check key be not identical, by institute The machine check key is stated to be matched with the configuration check key;
When the machine check key and the configuration check key match, local equipment number is determined;
When the local equipment number and the configuration device number match, the information configuration of the layer control read head is carried out.
Described in one of the embodiments, actually to call terraced information together include signing messages, described actually to call ladder together according to described Information generates elevator calling instruction, comprising:
Detect the Information Authentication number of the signing messages;
According to the Information Authentication number, obtained and the Information Authentication number phase from the multiple user rights prestored The user right matched;The multiple user right matches with multiple Information Authentication numbers;
According to the user right, elevator calling instruction is generated.
The signing messages includes fixed key, random key, check key and equipment in one of the embodiments, Number, it is described according to the user right, generate elevator calling instruction, comprising:
Determine the configuration information prestored;The configuration information includes configuration fixed key, configuration private cipher key, configuration verification Key and configuration device number;
When the fixed key and the configuration fixed key match, the random key and the configuration private cipher key Match, the device number matches with the configuration device number and the check key and the configuration check key phase Timing generates elevator calling instruction according to the user right.
In one of the embodiments, further include:
The random key is decrypted by preset decryption rule, obtains private cipher key;
When the private cipher key and the configuration private cipher key match, elevator is called according to the user right.
A kind of to call ladder device together based on two dimensional code, described device includes:
Response Code scan module calls terraced two dimensional code together for scanning, and obtains anti-crack and calls terraced information together;
Call terraced data obtaining module together, for identification it is described it is anti-crack call together in terraced information anti-and crack random mask, and from institute State it is anti-crack call together deleted in terraced information it is described it is anti-crack random mask, actually called together terraced information;
Directive generation module generates elevator calling instruction for actually calling terraced information together according to described;
Instruction sending module is sent to lift facility by elevator gateway for instructing the elevator calling.
In one embodiment, a kind of computer equipment, including memory and processor, the memory storage are provided There is computer program, the processor performs the steps of when executing the computer program
Terraced two dimensional code is called in scanning together, is obtained anti-crack and is called terraced information together;
Identify it is described it is anti-crack call together in terraced information anti-and crack random mask, and from it is described it is anti-crack to call together in terraced information delete It is described to prevent cracking random mask, actually called together terraced information;
Terraced information is actually called together according to described, generates elevator calling instruction;
The elevator calling is instructed, lift facility is sent to by elevator gateway.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, it is described It is performed the steps of when computer program is executed by processor
Terraced two dimensional code is called in scanning together, is obtained anti-crack and is called terraced information together;
Identify it is described it is anti-crack call together in terraced information anti-and crack random mask, and from it is described it is anti-crack to call together in terraced information delete It is described to prevent cracking random mask, actually called together terraced information;
Terraced information is actually called together according to described, generates elevator calling instruction;
The elevator calling is instructed, lift facility is sent to by elevator gateway.
Above-mentioned to call terraced method, apparatus, system, computer equipment and storage medium together based on two dimensional code, layer control read head passes through Terraced two dimensional code is called in scanning together, is called anti-crack in terraced two dimensional code together with acquisition and is called terraced information together, and then identifies that anti-crack is called together in terraced information It is anti-crack random mask, crack random mask as the anti-of interference information to delete, actually called together terraced information, finally again According to terraced information is actually called together, elevator calling instruction is generated, and elevator calling instruction is sent to elevator by elevator gateway and is set It is standby.Using this method, user can not only be provided and realize that the calling to elevator is controlled by two dimensional code, and this calls terraced two dimensional code together Also have and prevents cracking interference information, i.e., it is anti-to crack random mask, enhance the safety that elevator uses.Meanwhile utilizing configuration two It ties up code and information configuration is carried out to layer control read head, save human configuration cost, by elevator gateway control lift facility, realize The off line formula ladder keyholed back plate reason of layer control read head.
Detailed description of the invention
Fig. 1 is the applied environment figure for calling terraced method together based on two dimensional code in one embodiment;
Fig. 2 is the flow diagram for calling terraced method together based on two dimensional code in one embodiment;
Fig. 3 is the flow diagram of information configuration step in one embodiment;
Fig. 4 is the flow diagram of elevator calling step in one embodiment;
Fig. 5 is the structural block diagram for calling ladder device together based on two dimensional code in one embodiment;
Fig. 6 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
It is provided by the present invention that terraced method is called together based on two dimensional code, it can be applied in application environment as shown in Figure 1.Its In, it include server 102, user terminal 104 and layer control read head 106.Server 102 passes through network and user terminal 104 It is communicated, user terminal 104 provides two dimensional code and layer control read head 106 carries out information exchange.Server 102 can be with independent The server cluster of server or multiple servers composition is realized.User terminal 104 can be, but not limited to be various People's computer, laptop, smart phone, tablet computer and portable wearable device.It is whole that layer control read head 106 parses user The two dimensional code that end 104 is shown generates control instruction using the information in two dimensional code, and the control instruction of all generations is sent to The controller of lift facility 108 executes related command by elevator gateway control lift facility 108 by controller.
In practical applications, layer control read head 106 realizes that the control to lift facility 108, i.e. layer control are read by elevator gateway First 106 can execute specified operation by elevator gateway control lift car, such as control lift car and rest against designated floor, or Person, the compartment door for controlling lift car manage the state of opening or closing etc..It may include thering is two-dimensional code scanning to set on layer control read head 106 It is standby, and there is two-dimensional code scanning camera lens, layer control read head 106 is aobvious to scan user terminal 104 by opening two-dimensional code scanning camera lens That shows calls terraced two dimensional code or configuration two dimensional code together, and then parses and obtain calling terraced information or configuration information together in two dimensional code.
In one embodiment, as shown in Fig. 2, provide it is a kind of terraced method is called together based on two dimensional code, apply in this way It is illustrated for layer control read head 106 in Fig. 1, comprising the following steps:
Terraced two dimensional code is called in step S210, scanning together, is obtained anti-crack and is called terraced information together.
Wherein, the two dimensional code that terraced two dimensional code can be displayed on the user terminals such as smart phone, tablet computer 104 is called together, Calling together includes the still to be tested or command information that lift facility 108 is controlled for layer control read head 106 in terraced two dimensional code.
In the specific implementation, layer control read head 106 scan user terminal 104 show screen display call terraced two dimensional code together after, can Parsing obtains anti-crack of specific system in two dimensional code and calls terraced information together, and then can call terraced information together according to anti-crack and carry out letter first Breath cracks, and then cracks and actually called together terraced information.
For example, user terminal 104, which shows one, calls terraced two dimensional code together, layer control read head 106 is first turned on two-dimensional code scanning camera lens, It scans this and calls terraced two dimensional code together, and then parse and obtain anti-crack and call terraced information together, this is anti-to crack and call terraced information together and can be arbitrary carry system Character information, especially for one group of hexadecimal character information.
Step S220, identify it is described it is anti-crack call together in terraced information anti-and crack random mask, and call ladder together from anti-crack Deleted in information it is described it is anti-crack random mask, actually called together terraced information.
Wherein, prevent that cracking random mask is to call together to prevent cracking interference code included in terraced two dimensional code, for terraced two-dimentional to calling together The identification process of code is interfered, and prevents the malfeasance of illegal user, it is ensured that call the information security of terraced two dimensional code together.It is anti-crack with Machine mask can be by the character set that one group random and multidigit character forms, and randomly place in calling terraced two dimensional code together, no fixation Byte position.
Wherein, actually call terraced information together and refer to and call together in terraced two dimensional code, delete it is anti-crack it is more after the interference codes such as random mask Item information to be verified, ready for use and instruction control information etc..For example, anti-crack for calling together in terraced two dimensional code calls terraced information together and is " 15ak89dmpw45mgkuob ", if the anti-random mask that cracks is " amwguo ", actually calling terraced information together is “15k89dp45kb”。
In the specific implementation, terraced two dimensional code is called in the scanning of layer control read head 106 together, identification obtains what one group of hexadecimal string indicated It is anti-crack call terraced information together after, further known one by one otherwise using single character, identify this it is anti-crack to call together deposited in terraced information It is anti-crack random mask, and the anti-random mask that cracks that will identify that is deleted.It deletes after preventing cracking random mask Anti- crack calls terraced information together, and character string is arranged by automatic leakage-repairing mode sequence, is actually called together terraced information.
For example, anti-crack that layer control read head 106 parses calls terraced information together as " 15ak89dmpw45mgkuob ", setting is prevented Cracking random mask is " amwguo ", then actually calling terraced information together is " 15k89dp45kb ".
Step S230 actually calls terraced information together according to described, generates elevator calling instruction.
In the specific implementation, before layer control read head 106 calls elevator by elevator gateway control lift facility 108, it will be according to obtaining The terraced information of actually calling together got generates elevator calling instruction, i.e., according to actually calling multinomial information to be verified included in terraced information together Carry out sequence verifying is determined whether to generate elevator calling instruction by verification result, referred to control lift facility 108 in response to this It enables, realizes and elevator controlling is called.
For example, actually call together include in terraced information key class information to be verified, layer control read head 106 first will be to key class Information verified, can be further according to the other information actually called together in terraced information, Lai Shengcheng after determining that it is proved to be successful Elevator calling instruction, the instruction rest against finger for being sent to lift facility 108, so that lift facility 108 controls lift car Determine floor, realizes the calling to elevator.
The elevator calling is instructed and is sent to lift facility by elevator gateway by step S240.
In the specific implementation, elevator gateway will be passed through after the elevator calling that layer control read head 106 generates control elevator instructs The instruction is sent to lift facility 108, so that lift facility 08 in response to the instruction, controls separate unit or multiple elevator carriage is stopped In designated floor.Wherein, after elevator gateway receives the instruction that layer control read head 106 is sent, first according to each vendor-protocol to finger It enables information carry out transcoding, and then the instruction after transcoding is sent to lift facility 108.
For example, elevator gateway carries out transcoding to instruction, and in transcoding after layer control read head 106 generates elevator calling instruction After be sent to lift facility 108, which is received by lift facility 108, so control its connection lift car rest against User is currently located the purpose floor of floor or user setting.
Above-mentioned calling together in terraced method based on two dimensional code, layer control read head call terraced two dimensional code together by scanning, call terraced two dimension together to obtain Anti- crack in code calls terraced information together, so identify this it is anti-crack call together in terraced information anti-and crack random mask, to delete conduct The anti-of interference information cracks random mask, is actually called together terraced information, finally generates elevator calling further according to actually calling terraced information together Instruction, and the elevator calling is instructed, lift facility is sent to by elevator gateway.Using this method, user can not only be provided Realize the calling control to elevator by two dimensional code, and this call terraced two dimensional code together also and have it is anti-crack interference information, i.e., it is anti-to crack Random mask enhances the safety that elevator uses.
In one embodiment, before the step S210, further includes:
Scanning configuration two dimensional code, obtains configuration information;Information configuration is carried out according to the configuration information;The configuration information For actually calling terraced information together for the verifying of layer control read head is described, and elevator is called after being proved to be successful.
Wherein, configuring includes the configuration information that Information Embedding is carried out to layer control read head 106 in two dimensional code, configures two dimensional code Included in configuration information, for for layer control read head 106 store after the terraced information of calling together called together in terraced two dimensional code is verified.
Wherein, configuration information refer to for be stored in layer control read head 106 it is local, for calling terraced information matches together to anti-crack The comparative information of verifying, for example, configuration fixed key, configuration device number etc..
In the specific implementation, after layer control read head 106 before terraced two dimensional code is called in scanning parsing together, needs to store information first to realize Continuous data processing task need to scan the configuration two dimensional code provided by engineering staff, carry out to the information in configuration two dimensional code It reads, storage, to obtain having the configuration information of verifying effect, layer control read head 106 realizes that the process of information configuration can refer to figure 3, Fig. 3 be the flow diagram of information configuration step in one embodiment.
It in practical applications, include that the verifying of layer control read head 106 calls together and prevents cracking and calling terraced letter together in terraced two dimensional code in configuration information The every terms of information of breath, for example, configuration device number, configuring cipher key, configuration effective time etc. further include moreover other as used Family permission, gate inhibition position number etc..Wherein, storage form of the user right in layer control read head 106 can be data mapping shape Formula, it can be the relevant mapping relations such as call floor-user right.
In one embodiment, the configuration information includes configuration check key and configures device number, described according to Configuration information carries out information configuration, comprising:
Determine the machine check key, and, determine factory's check key;When the machine check key and the factory-run school out Test key it is identical when, the machine check key is replaced with into the configuration check key.
Wherein, configuration check key refers to the information content for including in configuration two dimensional code, and configuration check key is for updating Factory check key in layer control read head 106, factory check key are the check key of 106 factory default setting of layer control read head, Common engineering personnel will do it modification, i.e. the factory verification of 106 initial default of update step control read head in configuration layer control read head 106 On the one hand key distinguishes each layer control read head 106, on the other hand improve degree of safety for the use of layer control read head 106.It needs to illustrate It is that configuration check key can be engineering staff using before configuring two dimensional code configuration layer control read head 106, passes through user terminal 104 keys that get of connection servers 102, the key can be the specific system symbol of any digit, for example, 5 16 into System 13579,123abc etc..
Wherein, the machine check key refers to layer control read head 106 before current-configuration, and actual storage is in local school Key is tested, which may be not updated the factory check key of processing by engineering staff, it is also possible to by engineering Personnel utilize the configured key of other configurations check key, for example, 00000,123abc etc..
In the specific implementation, being needed first before layer control read head 106 carries out information configuration using configuration two dimensional code to configuration two dimension Configuration information in code is verified, that is, judges to be currently configured whether meet preset requirement in the configuration information of layer control read head 106, And judge whether configuration information meets the requirements, first have to judge configuration information to be configured whether with current layer control read head 106 Matching corresponds to, then the machine check key for determining layer control read head 106 to be configured, and factory check key is needed, if the machine school It is identical as check key of dispatching from the factory to test key, can determine that current layer control read head 106 to be configured is still not configured, realizing information configuration Before, the machine check key need to be replaced with to configuration check key, Fig. 3, Fig. 3 can refer to the renewal process of the machine check key For the flow diagram of information configuration step in one embodiment.
For example, factory check key is " 00000 ", and the machine check key is similarly " 00000 ", then the layer control read head 106 are not yet configured, and the read head of layer control at this time 106 is by configuring the configuration check key in two dimensional code acquisition configuration information " 12345 ", and the machine check key is updated to " 12345 ".
It is in one embodiment, described that information configuration is carried out according to the configuration information, further includes:
When the machine check key and the factory check key it is not identical when, by the machine check key with it is described Configuration check key is matched;When the machine check key and the configuration check key match, determine that the machine is set Standby number;When the local equipment number and the configuration device number match, the information configuration of the layer control read head is carried out.
Wherein, local equipment number refers to 106 factory setting of floor control read head, by the unified default numerical digit, specific of setting of producer The device number of system symbol, for example, " 5469827c4a5ec7as1d " etc. of 18 hexadecimal characters.
Wherein, configuration device number is contained in configuration two dimensional code, passes through service using user terminal 104 by engineering staff The information that device 102 is got, for determining current information to be configured for layer control read head 106, if correspond to and set with identical Standby number floor control read head 106, for example, " 1234527c8q6ec7asey " etc..
In the specific implementation, layer control read head 106 is not if it is determined that the machine check key and factory check key be identical, then it represents that its Primary configuration was completed before carrying out this information configuration, if the machine check key of previous configuration is matched with what is be currently configured It is identical to set check key, then can further determine whether device number is consistent, if then carrying out information configuration, if otherwise terminating this Information configuration.
For example, the machine check key is " 12345 ", and check key of dispatching from the factory is " 00000 ", then the layer control read head 106 has been It is configured, the configuration check key " 12345 " that the read head of layer control at this time 106 is got, configuration check key and the machine check key Unanimously, floor control read head 106 is in turn by local equipment number " 5469827c4a5ec7as1d " and configuration device number " 5469827c4a5ec7as1d " is matched, and the two is consistent, can carry out the configuration of other information.
In one embodiment, described actually to call terraced information together include signing messages, and the step S230 includes:
Detect the Information Authentication number of the signing messages;According to the Information Authentication number, from the multiple users prestored The user right to match with the Information Authentication number is obtained in permission;The multiple user right and multiple Information Authentications time Number matches;According to the user right, elevator calling instruction is generated.
Wherein, signing messages refers to the information being made of fixed key, random key, device number and check key.Label Name information can be the hexadecimal string as made of character type or the conversion of other system characters, and fixed key is 6 16 System character string, random key are 4 hexadecimal strings, device number is 18 hexadecimal strings, check key 5 Position hexadecimal string.
Wherein, Information Authentication number, refer to layer control read head 106 to the verifying number of signing messages, for example, 1 time, twice, Three is inferior.The height of Information Authentication number determines user to the access right of elevator calling.
Wherein, user right can be including the division to user gradation, that is, include reaching designated floor to user Range of floors divides, for example, 1-10 layers, 1-5 layers etc..
Wherein, calling together may include multiple signatures in terraced two dimensional code, then layer control read head 106 needs the accordingly multiple signatures of multiple authentication Information, and layer control read head 106 is more to the verifying number of signing messages, user's goes floor range of choice bigger.
In the specific implementation, layer control read head 106 also needs to judge what it got before control elevator rests against designated floor It calls together in terraced information, whether the call floor of user's typing meets user right, then the present invention proposes the concept of signature number, that is, sets Set that call together in terraced two dimensional code may include at least one signature, number of signatures is more, then verifying time of the layer control read head 106 to signing messages Number is more, then can determine that this calls that the safety of terraced information is higher together, and then the access right of the user can be determined according to preset rules It is higher, bigger floor range of choice can be possessed.
For example, currently detected layer control read head is 3 times to the verifying number of signing messages, i.e., signature number is 3, according to The corresponding relationship of preset signature number and user right, it is 3 corresponding use that layer control read head 106, which finds Information Authentication number, Family permission is 1-30 layers, then the range of floors of going of active user is 1-30 layers, invalid except remaining floor, is unable to control Lift facility 108 calls elevator.
In one embodiment, the signing messages includes fixed key, random key, check key and device number, It is described according to the user right, generate elevator calling instruction, comprising:
Determine the configuration information prestored;The configuration information includes configuration fixed key, configuration private cipher key, configuration verification Key and configuration device number;When the fixed key matches with the configuration fixed key, the random key with it is described Configuration private cipher key matches, the device number and the configuration device number match and the check key and the configuration When check key matches, according to the user right, elevator calling instruction is generated.
Wherein, the fixed key in signing messages, random key are the keys generated by server 102, check key with Device number is the key according to 106 default setting of layer control read head or for managing editor.
Wherein, it is stored with pre-set configuration information in layer control read head 106, including configuration fixed key, configuration are privately owned Key, configuration check key and configuration device number.
In the specific implementation, the identification of layer control read head 106 obtains calling the signing messages in terraced two dimensional code together, first have to judge the signature Whether information is qualified effectively, i.e., judges the fixed key, random key, check key and the equipment that include in signing messages item by item Number, if it is consistent with preconfigured counterpart keys or device number, if so, determining signing messages and configuration A.L.S. manner of breathing Match, layer control read head 106 can further generate elevator calling instruction, call elevator to be sent to lift facility 108.
For example, including that multinomial configuring cipher key and configuration device number, layer control read head 106 are got in layer control read head 106 Key category information after calling the signing messages in terraced two dimensional code together, according to predetermined matching order, in sequence matching judgment signing messages It is whether consistent with configuring cipher key, if so, can further judge whether device number matches.
In one embodiment, the method also includes:
Judge whether the fixed key and the configuration fixed key are consistent;If so, further judgement is described with secret Whether key and the configuration private cipher key are consistent;If so, further judge the device number and the configuration device number whether one It causes;If so, further judging whether the check key and the configuration check key are consistent;If so, according to the call building Layer generates elevator calling instruction.
In the specific implementation, layer control read head 106 is stored with a sequence matching rule, that is, first determine whether close in signing messages Whether key is consistent with configuring cipher key, or, can further judge whether device number is consistent with configuration device number, if all need to match The information of verifying and accordant configuration information, then can generate elevator calling instruction, so that lift facility according to the call floor 108 calling elevators.
In one embodiment, the method also includes:
The random key is decrypted by preset decryption rule, obtains private cipher key;When the private cipher key with When the configuration private cipher key matches, the device number is matched with the configuration device number.
Wherein, preset decryption rule can be the decryption rule reversely set according to predetermined encryption algorithm, Encryption Algorithm It may include: SHA1 Encryption Algorithm (Secure Hash Algorithm, Secure Hash Algorithm), md5 encryption algorithm (MD5 message Digest algorithm, MD5Message-Digest Algorithm), Base64 Encryption Algorithm, AES (Advanced Encryption Standard, Advanced Encryption Standard) Encryption Algorithm, DES (Data Encrypt Standard, data base encryption standard) encryption Any one or more in algorithm.
Wherein, random key is the private cipher key that user terminal 104 is provided using server 102, according to preset encryption The random key that rule encryption generates, layer control read head 106 then according to corresponding decryption rule, are decrypted random key, with Improve the safety used elevator.
In the specific implementation, being stored with configuration private cipher key in layer control read head 106, layer control read head 106 calls terraced two dimension together in verifying In code before random key, random key should be generated private cipher key by preset decryption rule decryption first, then will be privately owned close Key is matched with configuration private cipher key.
In one embodiment, described actually to call terraced information together further include calling together terraced time and call floor, the step S230 Include:
By it is described call together the terraced time with configuration effective period of time match;When it is described call together the terraced time and it is described configuration it is effective when Between section when matching, elevator calling instruction is generated according to the call floor.
Wherein, configuration effective period of time is a pre-set period, calls ladder together for determining to call together in terraced two dimensional code Whether the time is in the effective period of time, for example, " am.10:00-pm.24:00 ".
In the specific implementation, the threshold value effective period of time stored in layer control read head 106, can be by engineering staff in configuration layer The effective period of time set when controlling read head 106, for limiting the time that uses for calling terraced two dimensional code together of the displaying of user terminal 104, increasing The safety of strong elevator calling.
For example, calling the terraced time together is " am.12:00 ", and configuring effective time is " am.10:00-pm.24:00 ", then calls ladder together The terraced time of calling together in two dimensional code matches with configuration effective period of time, and layer control read head 106 further can generate electricity according to call floor Ladder calling instruction.
The scheme provided according to embodiments of the present invention, layer control read head call terraced two dimensional code together in scanning, call terraced two dimension together by obtaining Terraced information is actually called together in code before calling elevator, also to have carried out information configuration, i.e., includes the configuration of configuration information by scanning Two dimensional code, realization are pre-stored configuration information, actually to call the information security in terraced information together using configuration information verifying And validity, it is ensured that actually call the every terms of information in terraced information together after being verified, can be used to call elevator.Using we Method can not only provide user and realize that the calling to elevator is controlled by two dimensional code, and this is called terraced two dimensional code together also and has anti-break Solve interference information, i.e., it is anti-to crack random mask, enhance the safety that elevator uses.Meanwhile using configuration two dimensional code to layer control Read head carries out information configuration, saves human configuration cost, by elevator gateway control lift facility 108, realizes layer control reading The off line formula ladder keyholed back plate reason of head.
It should be noted that in the present invention, layer control read head 106 scans user terminal 104 using two-dimensional code scanning device Terraced two dimensional code is called in display together, and realizes that the control flow of elevator calling control can refer to Fig. 4, Fig. 4 mono- using terraced two dimensional code is called together The flow diagram of elevator calling step in a specific embodiment.
In a specific embodiment, as shown in figure 4, ladder two is called in the scanning display of user terminal 104 of layer control read head 106 together Tie up code, obtain anti-crack and call terraced information together, identify, delete it is anti-crack after call together in terraced information anti-crack random mask, obtain To terraced information is actually called together, actually being called together in terraced information at this time includes a signing messages, such as unique key, random key, equipment Number and check key, further include calling terraced time and call floor together.Meanwhile configuration A.L.S. is prestored in layer control read head 106 Breath further includes when having to configure effective if configured unique key, configuration random key, configuration device number and configuration check key Between section and user right.
After layer control read head 106 gets and actually call terraced information together, signing messages therein is extracted first, utilization is pre-set Signing messages is configured, signing messages is verified, i.e., sequence judges fixed key, random key, equipment in signing messages Number and check key whether match with counterpart keys, that is, device number of configuration, if then further terraced information is actually called in judgement together In whether before the deadline call the terraced time together;If otherwise terminating this to control the calling of elevator.
Judgement actually calls in terraced information whether before the deadline to call the terraced time together together, i.e. judgement calls whether the terraced time is being configured with together It imitates in the period, if then further judging that call floor whether in user right, calls elevator together if otherwise terminating this Call out control.Wherein, the effective judgement for calling the terraced time together first has to determine configuration effective period of time, and configures effective period of time and depend on In engineering staff is supported to the concrete configuration time of layer control read head 106 and layer control read head 106 period, that is, works as engineering staff Layer control read head 106 is configured in 10 o'clock sharp of the morning, and the support period that layer control read head 106 is set as 1 hour, then configure Effective period of time is 11 o'clock sharp, i.e., am.10:00-am.11:00 on the same day in 10 o'clock sharp to the morning in the morning.
If layer control read head 106 need to judge actually to call together the call floor in terraced information whether in user right, can first determine Comprising the mapping relations between call floor-user gradation-user right three, i.e., one is stored in layer control read head 106 and reflected Rule is penetrated, if getting call floor, that is, can determine the user gradation of the typing call floor, and then get corresponding user Permission, if then the instruction of the elevator calling of generation is sent to elevator gateway by layer control read head 106, to elevator gateway according to each manufacturer After agreement is to instruction transcoding, the elevator calling instruction after transcoding is sent to lift facility 108, so that lift facility 108 controls Elevator rests against call floor position, controls if otherwise terminating this calling of elevator.
In one embodiment, it provides another kind and terraced method is called together based on two dimensional code, be applied to shown in Fig. 1 in this way It is illustrated for server 102 in application environment, comprising the following steps:
Terraced information is actually called in acquisition together, and, it determines and prevents cracking random mask;By the terraced information and described anti-broken of actually calling together Solution random mask is sent to the user terminal, and actually calls terraced information together and anti-crack is covered at random according to described for the user terminal Terraced two dimensional code is called in code, generation together.
In the specific implementation, can run the application-specific for calling ladder together on user terminal 104, server 102 can lead to It crosses application-specific to be communicated with user terminal 104, i.e., when server 102 is received by user terminal 104 by specific After the acquisition of information instruction that application program is sent, in response to the instruction, obtain be stored in server local actually call terraced information together, And it is determined according to locally store information and prevents cracking random mask.The acquisition of information that server 102 is sent in response to user terminal 104 Instruction will acquire and actually call terraced information together and prevent cracking random mask, user terminal 104 fed back to, for user terminal 104 Factually border calls terraced information together and prevents cracking random mask, generates and calls terraced two dimensional code together for the scanning parsing of layer control read head 106.
Above-mentioned to call terraced method together based on two dimensional code, server establishes communication connection by network and user terminal, realizes To actually calling terraced information and the anti-acquisition for cracking random mask together, and is had sent using the communication connection to user terminal and actually called together Terraced information and it is anti-crack random mask, for user terminal according to this it is practical call together terraced information and it is anti-crack random mask, generation is used for Terraced two dimensional code is called in layer control read head scanning together.Using method provided by the present application, human configuration cost is saved, keeps layer control read head real Existing off line formula ladder keyholed back plate reason, more enhances the safety for calling terraced two dimensional code together.
In one embodiment, it additionally provides another kind and terraced method is called together based on two dimensional code, be applied to Fig. 1 institute in this way Show and be illustrated for the user terminal 104 in application environment, comprising the following steps:
Reception actually calls terraced information together and prevents cracking random mask;According to it is described actually call together terraced information and it is described it is anti-crack it is random Terraced two dimensional code is called in mask, generation together;Call terraced two dimensional code described in displaying together;It is described to call terraced two dimensional code together for scanning to obtain reality for layer control read head After terraced information is called on border together, terraced information calling elevator is actually called together according to described.
In the specific implementation, user terminal 104 receives the reality that server 102 is sent for by the application-specific of installation It calls terraced information together and prevents cracking random mask in border.The terraced information of actually calling together that user terminal 104 receives the transmission of server 102 is broken with anti- Random mask is solved, first to terraced information is actually called together according to preset two dimensional code create-rule, two dimensional code is generated, is then cracked anti- Random mask is added in two-dimensional code data, and terraced two dimensional code is called in generation together.User terminal 104 can have an interactive interface, the friendship Mutual interface can show user terminal 104 using actually call together terraced information and it is anti-crack random mask generation call terraced two dimensional code together, for layer Control 106 scanning recognition of read head.
Wherein, user terminal 104 generates two dimensional code according to preset two dimensional code create-rule, can be raw using two dimensional code At Software Create, two dimensional code generation software is based primarily upon a preset two dimensional code generating algorithm or a two dimensional code is inserted Part after writing a calling software using different programming languages, i.e., is actually called terraced information together and is prevented using what server 102 was sent Random mask is cracked, terraced two dimensional code is called in generation together.
It should be noted that the anti-addition rule for cracking random mask be it is random, i.e., user terminal 104 is first with reality Border calls terraced information together and generates a two dimensional code, and then by the anti-any position cracking random mask and being added in the two-dimensional code data, It further generates one and calls terraced two dimensional code together.
For example, the terraced information of actually calling together that user terminal 104 is got is " 15k89dp45kb ", wherein different section bytes The different information of character mark, i.e., when actually call together include multinomial information in terraced information when, can be by different information in order Arrangement obtains corresponding information by the character of specified section byte for layer control read head 106.If preventing, cracking random mask is " amwguo " then anti-will crack random mask and be added at random and actually call together in terraced information, and what is ultimately generated calls together contained by terraced two dimensional code Information can be " 15ak89dmpw45mgkuob ".
Above-mentioned to call terraced method together based on two dimensional code, user terminal receives service by the communication connection between server Terraced information that device was sent actually call together and it is anti-crack random mask, and according to actually calling terraced information together and prevent that cracking random mask generates It calls terraced two dimensional code together, and then shows that this is called terraced two dimensional code together and actually calls terraced information together for the scanning acquisition of layer control read head.It is provided using the application Method, save human configuration cost, make layer control read head realize off line formula ladder keyholed back plate reason, more enhance the peace for calling terraced two dimensional code together Quan Xing.
It should be understood that although each step in the flow chart of Fig. 2-4 is successively shown according to the instruction of arrow, These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-4 Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately It executes.
In one embodiment, a kind of ladder device is called together based on two dimensional code as shown in figure 5, providing, comprising: two dimensional code is swept It retouches module 510, call terraced data obtaining module 520, directive generation module 530 and instruction sending module 540 together, in which:
Response Code scan module 510 calls terraced two dimensional code together for scanning, and obtains anti-crack and calls terraced information together;
Call terraced data obtaining module 520 together, for identification it is described it is anti-crack call together in terraced information anti-and crack random mask, and from It is described it is anti-crack call together deleted in terraced information it is described it is anti-crack random mask, actually called together terraced information;
Directive generation module 530 generates elevator calling instruction for actually calling terraced information together according to described;
Instruction sending module 540 is sent to lift facility by elevator gateway for instructing the elevator calling.According to Scheme provided in an embodiment of the present invention, layer control read head call terraced two dimensional code together by scanning, are cracked with obtaining call together in terraced two dimensional code anti- Call terraced information together, so identify this it is anti-crack call together in terraced information anti-and crack random mask, to delete as the anti-of interference information Random mask is cracked, is actually called together terraced information, is finally instructed further according to actually calling terraced Infomiation Production elevator calling together, and by elevator Calling instruction is sent to lift facility to call elevator by elevator gateway.Using this method, it is logical that user can not only be provided Two dimensional code is crossed to realize the calling control to elevator, and this call terraced two dimensional code together also and have it is anti-crack interference information, i.e., it is anti-crack with Machine mask enhances the safety that elevator uses.
In one embodiment, described device further include:
Configuration information obtains module, for scanning configuration two dimensional code, obtains configuration information;Information collocation module is used for root Information configuration is carried out according to the configuration information;The configuration information is used to actually call terraced information together for the verifying of layer control read head is described, and Elevator is called after being proved to be successful.
In one embodiment, the configuration information includes configuration check key and configuration device number, the information configuration Module, comprising:
Key determines submodule, for determining the machine check key, and, determine factory's check key;Key updating Module, for when the machine check key is identical as the factory check key, the machine check key to be replaced with The configuration check key.
In one embodiment, the information collocation module, further includes:
Check key matched sub-block is used for when the machine check key and the factory check key be not identical, The machine check key is matched with the configuration check key;Local equipment number determines submodule, for when described When the machine check key and the configuration check key match, local equipment number is determined;Information configuration submodule, for working as institute It states local equipment number and when the configuration device number matches, carries out the information configuration of the layer control read head.
It is in one embodiment, described that actually to call terraced information together include signing messages, described instruction generation module 530, comprising:
Signature number detection sub-module, for detecting the Information Authentication number of the signing messages;User right determines son Module, for being obtained and the Information Authentication number phase from the multiple user rights prestored according to the Information Authentication number Matched user right;The multiple user right matches with multiple Information Authentication numbers;Calling instruction generates submodule, uses According to the user right, elevator calling instruction is generated.
In one embodiment, the signing messages includes fixed key, random key, check key and device number, The calling instruction generates submodule, comprising:
Configuration information determination unit, for determining the configuration information prestored;The configuration information include configuration fixed key, Configure private cipher key, configuration check key and configuration device number;Configuration information matching unit, for when the fixed key with The configuration fixed key matches, the random key matches with the configuration private cipher key, the device number with it is described When configuration device number matches and the check key and the configuration check key match, according to the user right, Generate elevator calling instruction.
In one embodiment, the elevator calling submodule, further includes:
Random key decryption unit obtains privately owned for the random key to be decrypted by preset decryption rule Key;
Private cipher key matching unit, for when the private cipher key and the configuration private cipher key match, according to institute State user right calling elevator.
The scheme provided according to embodiments of the present invention, layer control read head call terraced two dimensional code together in scanning, call terraced two dimension together by obtaining Terraced information is actually called together in code before calling elevator, also to have carried out information configuration, i.e., includes the configuration of configuration information by scanning Two dimensional code, realization are pre-stored configuration information, actually to call the information security in terraced information together using configuration information verifying And validity, it is ensured that actually call the every terms of information in terraced information together after being verified, elevator calling instruction can be generated and be used for Call elevator.Using this method, user can not only be provided and realize that the calling to elevator is controlled by two dimensional code, and this calls ladder together Two dimensional code, which also has, to be prevented cracking interference information, i.e., anti-to crack random mask, enhances the safety that elevator uses.Meanwhile it utilizing It configures two dimensional code and information configuration is carried out to layer control read head, save human configuration cost, by elevator gateway control lift facility, Realize the off line formula ladder keyholed back plate reason of layer control read head.
It may refer to call ladder together above for based on two dimensional code about the specific restriction for calling ladder device together based on two dimensional code The restriction of method, details are not described herein.The above-mentioned modules called together in ladder device based on two dimensional code can be fully or partially through Software, hardware and combinations thereof are realized.Above-mentioned each module can be embedded in the form of hardware or independently of the place in computer equipment It manages in device, can also be stored in a software form in the memory in computer equipment, in order to which processor calls execution or more The corresponding operation of modules.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 6.The computer equipment include by system bus connect processor, memory, network interface and Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The database of machine equipment is for storing identification information and facility information.The network interface of the computer equipment is used for and external end End passes through network connection communication.A kind of terraced method is called together based on two dimensional code to realize when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Fig. 6, only part relevant to application scheme is tied The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, is stored in memory Computer program, the processor perform the steps of when executing computer program
Terraced two dimensional code is called in scanning together, is obtained anti-crack and is called terraced information together;
Identify it is described it is anti-crack call together in terraced information anti-and crack random mask, and from it is described it is anti-crack to call together in terraced information delete It is described to prevent cracking random mask, actually called together terraced information;
Terraced information is actually called together according to described, generates elevator calling instruction;
The elevator calling is instructed, lift facility is sent to by elevator gateway.
In one embodiment, it is also performed the steps of when processor executes computer program
Scanning configuration two dimensional code, obtains configuration information;Information configuration is carried out according to the configuration information;The configuration information For actually calling terraced information together for the verifying of layer control read head is described, and elevator is called after being proved to be successful.
In one embodiment, it is also performed the steps of when processor executes computer program
Determine the machine check key, and, determine factory's check key;When the machine check key and the factory-run school out Test key it is identical when, the machine check key is replaced with into the configuration check key.
In one embodiment, it is also performed the steps of when processor executes computer program
When the machine check key and the factory check key it is not identical when, by the machine check key with it is described Configuration check key is matched;When the machine check key and the configuration check key match, determine that the machine is set Standby number;When the local equipment number and the configuration device number match, the information configuration of the layer control read head is carried out.
In one embodiment, it is also performed the steps of when processor executes computer program
Detect the Information Authentication number of the signing messages;According to the Information Authentication number, from the multiple users prestored The user right to match with the Information Authentication number is obtained in permission;The multiple user right and multiple Information Authentications time Number matches;According to the user right, elevator calling instruction is generated.
In one embodiment, it is also performed the steps of when processor executes computer program
Determine the configuration information prestored;The configuration information includes configuration fixed key, configuration private cipher key, configuration verification Key and configuration device number;When the fixed key matches with the configuration fixed key, the random key with it is described Configuration private cipher key matches, the device number and the configuration device number match and the check key and the configuration When check key matches, according to the user right, elevator calling instruction is generated.
In one embodiment, it is also performed the steps of when processor executes computer program
The random key is decrypted by preset decryption rule, obtains private cipher key;When the private cipher key with When the configuration private cipher key matches, elevator is called according to the user right.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program performs the steps of when being executed by processor
Terraced two dimensional code is called in scanning together, is obtained anti-crack and is called terraced information together;
Identify it is described it is anti-crack call together in terraced information anti-and crack random mask, and from it is described it is anti-crack to call together in terraced information delete It is described to prevent cracking random mask, actually called together terraced information;
Terraced information is actually called together according to described, generates elevator calling instruction;
The elevator calling is instructed, lift facility is sent to by elevator gateway.
In one embodiment, it is also performed the steps of when computer program is executed by processor
Scanning configuration two dimensional code, obtains configuration information;Information configuration is carried out according to the configuration information;The configuration information For actually calling terraced information together for the verifying of layer control read head is described, and elevator is called after being proved to be successful.
In one embodiment, it is also performed the steps of when computer program is executed by processor
Determine the machine check key, and, determine factory's check key;When the machine check key and the factory-run school out Test key it is identical when, the machine check key is replaced with into the configuration check key.
In one embodiment, it is also performed the steps of when computer program is executed by processor
When the machine check key and the factory check key it is not identical when, by the machine check key with it is described Configuration check key is matched;When the machine check key and the configuration check key match, determine that the machine is set Standby number;When the local equipment number and the configuration device number match, the information configuration of the layer control read head is carried out.
In one embodiment, it is also performed the steps of when computer program is executed by processor
Detect the Information Authentication number of the signing messages;According to the Information Authentication number, from the multiple users prestored The user right to match with the Information Authentication number is obtained in permission;The multiple user right and multiple Information Authentications time Number matches;According to the user right, elevator calling instruction is generated.
In one embodiment, it is also performed the steps of when computer program is executed by processor
Determine the configuration information prestored;The configuration information includes configuration fixed key, configuration private cipher key, configuration verification Key and configuration device number;When the fixed key matches with the configuration fixed key, the random key with it is described Configuration private cipher key matches, the device number and the configuration device number match and the check key and the configuration When check key matches, elevator is called according to the user right.
In one embodiment, it is also performed the steps of when computer program is executed by processor
The random key is decrypted by preset decryption rule, obtains private cipher key;When the private cipher key with When the configuration private cipher key matches, elevator is called according to the user right.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of call terraced method together based on two dimensional code, which comprises the steps of:
Terraced two dimensional code is called in scanning together, is obtained anti-crack and is called terraced information together;
Identify it is described it is anti-crack call together in terraced information anti-and crack random mask, and from it is described it is anti-crack call together and deleted in terraced information described in It is anti-to crack random mask, actually called together terraced information;
Terraced information is actually called together according to described, generates elevator calling instruction;
The elevator calling is instructed, lift facility is sent to by elevator gateway.
2. obtaining anti-crack the method according to claim 1, wherein calling terraced two dimensional code together in the scanning and calling ladder together Before information, further includes:
Scanning configuration two dimensional code, obtains configuration information;
Information configuration is carried out according to the configuration information;The configuration information is used to actually call terraced letter together for the verifying of layer control read head is described Breath, and elevator is called after being proved to be successful.
3. according to the method described in claim 2, it is characterized in that, the configuration information include configuration check key with match install It is standby number, described that information configuration is carried out according to the configuration information, comprising:
Determine the machine check key, and, determine factory's check key;
When the machine check key is identical as the factory check key, the machine check key is replaced with into described match Set check key.
4. according to the method described in claim 3, it is characterized by further comprising:
When the machine check key and the factory check key be not identical, by the machine check key and the configuration Check key is matched;
When the machine check key and the configuration check key match, local equipment number is determined;
When the local equipment number and the configuration device number match, the information configuration of the layer control read head is carried out.
5. the method according to claim 1, wherein described, actually to call terraced information together include signing messages, described Terraced information is actually called together according to described, generates elevator calling instruction, comprising:
Detect the Information Authentication number of the signing messages;
According to the Information Authentication number, acquisition matches with the Information Authentication number from the multiple user rights prestored User right;The multiple user right matches with multiple Information Authentication numbers;
According to the user right, elevator calling instruction is generated.
6. according to the method described in claim 5, it is characterized in that, the signing messages includes fixed key, random key, school Key and device number are tested, it is described according to the user right, generate elevator calling instruction, comprising:
Determine the configuration information prestored;The configuration information includes configuration fixed key, configuration private cipher key, configuration check key And configuration device number;
When the fixed key matches with the configuration fixed key, the random key and the configuration private cipher key phase Match, the device number matches with the configuration device number and the check key matches with the configuration check key When, according to the user right, generate elevator calling instruction.
7. according to the method described in claim 6, it is characterized by further comprising:
The random key is decrypted by preset decryption rule, obtains private cipher key;
When the private cipher key and the configuration private cipher key match, elevator is called according to the user right.
8. a kind of call ladder device together based on two dimensional code, which is characterized in that described device includes:
Response Code scan module calls terraced two dimensional code together for scanning, and obtains anti-crack and calls terraced information together;
Call terraced data obtaining module together, for identification it is described it is anti-crack call together in terraced information anti-and crack random mask, and from described anti- Crack call together deleted in terraced information it is described it is anti-crack random mask, actually called together terraced information;
Directive generation module generates elevator calling instruction for actually calling terraced information together according to described;
Instruction sending module is sent to lift facility by elevator gateway for instructing the elevator calling.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In the step of processor realizes any one of claims 1 to 7 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
CN201910150965.1A 2019-02-28 2019-02-28 Calling method and device based on two-dimensional code, computer equipment and storage medium Active CN109861827B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910150965.1A CN109861827B (en) 2019-02-28 2019-02-28 Calling method and device based on two-dimensional code, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910150965.1A CN109861827B (en) 2019-02-28 2019-02-28 Calling method and device based on two-dimensional code, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109861827A true CN109861827A (en) 2019-06-07
CN109861827B CN109861827B (en) 2022-02-18

Family

ID=66899308

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910150965.1A Active CN109861827B (en) 2019-02-28 2019-02-28 Calling method and device based on two-dimensional code, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109861827B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110626896A (en) * 2019-08-26 2019-12-31 杭州优迈科技有限公司 Elevator control method and system based on two-dimensional code
CN113071961A (en) * 2021-03-22 2021-07-06 永安行科技股份有限公司 Call calling method and system based on intelligent terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090104933A1 (en) * 2005-08-17 2009-04-23 Motoyoshi Hasegawa Cellular phone, control method, control program, and face panel used for the cellular phone
CN104291170A (en) * 2013-07-19 2015-01-21 株式会社东芝 Elevator group management control device and elevator group management control method
WO2015171450A1 (en) * 2014-05-09 2015-11-12 Graphiclead LLC System and method for embedding of a two dimensional code with an image
CN105173933A (en) * 2015-10-12 2015-12-23 广州广日电梯工业有限公司 Control system and method for calling elevator by identifying encrypted two-dimensional code
CN109132741A (en) * 2018-10-18 2019-01-04 日立楼宇技术(广州)有限公司 It is a kind of that terraced method, apparatus is called together based on two dimensional code

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090104933A1 (en) * 2005-08-17 2009-04-23 Motoyoshi Hasegawa Cellular phone, control method, control program, and face panel used for the cellular phone
CN104291170A (en) * 2013-07-19 2015-01-21 株式会社东芝 Elevator group management control device and elevator group management control method
WO2015171450A1 (en) * 2014-05-09 2015-11-12 Graphiclead LLC System and method for embedding of a two dimensional code with an image
CN105173933A (en) * 2015-10-12 2015-12-23 广州广日电梯工业有限公司 Control system and method for calling elevator by identifying encrypted two-dimensional code
CN109132741A (en) * 2018-10-18 2019-01-04 日立楼宇技术(广州)有限公司 It is a kind of that terraced method, apparatus is called together based on two dimensional code

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110626896A (en) * 2019-08-26 2019-12-31 杭州优迈科技有限公司 Elevator control method and system based on two-dimensional code
CN113071961A (en) * 2021-03-22 2021-07-06 永安行科技股份有限公司 Call calling method and system based on intelligent terminal

Also Published As

Publication number Publication date
CN109861827B (en) 2022-02-18

Similar Documents

Publication Publication Date Title
US9525549B2 (en) Method and apparatus for securing a mobile application
US20180082050A1 (en) Method and a system for secure login to a computer, computer network, and computer website using biometrics and a mobile computing wireless electronic communication device
CN113168476A (en) Access control for personalized cryptography security in operating systems
CN106446632A (en) Hide display starting device and hide display starting method for application programs
KR102124838B1 (en) Access Control Method Using SmartKey AND Access Control System for Them
US10659451B2 (en) System and method for injecting a tag into a computing resource
WO2016019790A1 (en) Verification method, client, server and system for installation package
KR102109981B1 (en) Hotel smart key service method of hybrid security environment for different types of user terminals and hotel smart key management system for them
CN105975867B (en) A kind of data processing method
CN109214161A (en) A kind of two-dimension code safe label login system
CN105069333A (en) User domain access method, access system and terminal
US20180083773A1 (en) Information security device and information security method using accessibility
CN104751538A (en) Implementation method for opening access controller, and access control system
CN109861827A (en) Terraced method, apparatus, computer equipment and storage medium are called together based on two dimensional code
CN105956452A (en) Method and system for unlocking device
CN109150834A (en) A kind of embedded device license authorization management method
EP3203407B1 (en) Information processing method and information processing device
CN108876987A (en) Building access control method, Cloud Server and computer readable storage medium
CN109132741B (en) Ladder calling method and device based on two-dimensional code
CN107888608A (en) A kind of encryption system for protecting computer software
KR102112975B1 (en) Access Control Method Using SmartKey Based On Hybrid Security Environment AND Access Control System for Them
US11068579B2 (en) Method and system of performing an authorization mechanism between a service terminal system and a helpdesk system
KR101306569B1 (en) System of controlling of digital doorlock for mobile device using secure operating system and method thereof
WO2015154469A1 (en) Database operation method and device
CN108566389A (en) A kind of fingerprint identity validation method and device across application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant