CN110097674A - A kind of access control method and system based on two dimensional code - Google Patents

A kind of access control method and system based on two dimensional code Download PDF

Info

Publication number
CN110097674A
CN110097674A CN201910451082.4A CN201910451082A CN110097674A CN 110097674 A CN110097674 A CN 110097674A CN 201910451082 A CN201910451082 A CN 201910451082A CN 110097674 A CN110097674 A CN 110097674A
Authority
CN
China
Prior art keywords
dimensional code
management platform
user
background management
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910451082.4A
Other languages
Chinese (zh)
Inventor
王辉
高鹏
伦晓明
曹荣添
李承泽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hummingbird Intelligent Technology Co Ltd
Original Assignee
Hummingbird Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hummingbird Intelligent Technology Co Ltd filed Critical Hummingbird Intelligent Technology Co Ltd
Priority to CN201910451082.4A priority Critical patent/CN110097674A/en
Publication of CN110097674A publication Critical patent/CN110097674A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Abstract

This application discloses a kind of access control method and system based on two dimensional code is preset with Standard User information in background management platform, which comprises mobile terminal generates corresponding two dimensional code according to user right;The scanning recognition module of gate inhibition reads two dimensional code, obtains user right, and user right is sent to cloud communication module;User right is pushed to background management platform by cloud communication module, and background management platform parses user right, obtains user information corresponding with user right;If user information matches with Standard User information, background management platform generates door open command, and door open command is transmitted to door lock controller.In the application, without carrying IC card, practicability improves, and it is interim when there is visitor to come, the mobile terminal two dimensional code generated that oneself is carried can be shared with visitor by user, and visitor can be within the term of validity of the two dimensional code, voluntarily opening gate, user is practical without downstairs meeting in person.

Description

A kind of access control method and system based on two dimensional code
Technical field
This application involves field of security technology more particularly to a kind of access control methods and system based on two dimensional code.
Background technique
Access control system is new-modernization safety management system, also known as room entry/exit management control system, is a kind of administrative staff The intellectualized management system of disengaging.Access control system is for protection staff and property safety, and therefore, its own must have height Safety and reliability.Meanwhile as access control system more and more penetrates into production and living, so access control system also should Has higher practicability.
Currently, the control mode of access control system is usually that user carries IC card, is swiped the card using IC card and pass in and out gate inhibition.Wherein, In IC card be equipped with the matched relevant information of access control system, for user in brush IC card, IC card emits certain radiofrequency signal, gate inhibition System receives the radiofrequency signal, and judges whether the signal matches with itself, if matching, opens the door;Otherwise, it does not open the door.In addition, Before the use, or after access control system upgrading, IC card is required to the administrative departments such as property and is authorized again to it IC card, It needs writer to access in PC machine in licensing process, then authorized order is written in IC card by PC machine, to complete to IC The authorization of card.
It is swiped the card using IC card and passes in and out the premise of gate inhibition and be, it is necessary to assure IC card is carried, if forgetting to carry IC card Or IC card has lost, then can not open gate inhibition, cause inconvenience for user, also, interim when there is visitor to come, user needs It is met to doorway, practicability is lower.In addition, process is cumbersome when IC card needs to authorize again, low efficiency.Therefore, it needs to design A kind of more convenient and fast access control mode.
Summary of the invention
This application provides a kind of access control method and system based on two dimensional code is logical to solve user in the prior art Cross the convenience of IC card disengaging access control system and the technical problem that practicability is lower.
In order to solve the above-mentioned technical problem, the embodiment of the present application discloses following technical solution:
In a first aspect, the embodiment of the present application discloses a kind of access control method based on two dimensional code, background management platform In be preset with Standard User information, which comprises
Mobile terminal generates corresponding two dimensional code according to user right;
The scanning recognition module of gate inhibition reads the two dimensional code, obtains the user right, and the user right is sent out It send to cloud communication module;
The user right is pushed to the background management platform, the background management platform pair by the cloud communication module The user right is parsed, and user information corresponding with the user right is obtained;
If the user information matches with the Standard User information, the background management platform, which generates to open the door, to be referred to It enables, and the door open command is transmitted to door lock controller.
Optionally, in the above-mentioned access control method based on two dimensional code, mobile terminal generates corresponding according to user right Two dimensional code, comprising:
The mobile terminal obtains Standard User letter corresponding with the user right from the background management platform Breath, the Standard User information include geographical location, equipment number, device numbering and timestamp in permission;
The Standard User information is combined and is encrypted, extraction obtains corresponding two dimensional code.
Optionally, in the above-mentioned access control method based on two dimensional code, mobile terminal generates corresponding according to user right Two dimensional code, further includes:
The mobile terminal requests to send two dimensional code to the background management platform;
The background management platform detects whether the mobile terminal links internet;
If so, the mobile terminal generates dynamic two-dimension code, if it is not, then the background management system is whole to the movement End pushes fixed two dimensional code.
Optionally, in the above-mentioned access control method based on two dimensional code, the scanning recognition module of gate inhibition reads described two Code is tieed up, the user right is obtained, comprising:
The two dimensional code is read using the scanning recognition module, the scanning recognition module is that GM65 bidimensional image formula is swept Retouch identification module;
The two dimensional code is converted to the user right by the scanning recognition module, and the user right is hexadecimal Code.
Optionally, in the above-mentioned access control method based on two dimensional code, if the user information and the Standard User Information matches, then the background management platform generates door open command, and the door open command is transmitted to door lock controller, wraps It includes:
According to the user information, the background management platform is judged, the judgement includes: the geographical location of user Whether eligible, whether the user has the permission for opening gate inhibition, and whether the timestamp in the two dimensional code is expired;
If the judgement all passes through, the door open command that the background management platform generates, and by the enabling Instruction is transmitted to door lock controller.
Optionally, in the above-mentioned access control method based on two dimensional code, the door open command is being transmitted to door lock control After device processed, the method also includes:
If the door lock controller opens the door successfully, opening imformation is generated, and the unlatching is believed using cloud communication module Breath is sent to the background management platform, and the background management platform records the opening imformation.
Second aspect, the embodiment of the present application disclose a kind of access control system based on two dimensional code, the system comprises: Mobile terminal, background management platform, gate inhibition's plate and door lock controller, in which:
The communication of mobile terminal is connected to the background management platform, and for generating corresponding two according to user right Tie up code;
Gate inhibition's plate includes: scanning recognition module and cloud communication module, and the scanning recognition module is logical by the cloud News module is communicatively coupled to the background management platform, and the scanning recognition module obtains and institute for reading the two dimensional code State the corresponding user right of two dimensional code;
The door lock controller is communicatively coupled to the background management platform, the backstage pipe by the cloud communication module Platform is used to parse to obtain user information according to the user right, and the door lock according to the user information control controls Device.
Optionally, in the above-mentioned access control system based on two dimensional code, the two dimensional code display interface of the mobile terminal Including 4 two dimensional codes.
Optionally, in the above-mentioned access control system based on two dimensional code, gate inhibition's plate further includes IC identification module, institute It states IC identification module and is communicatively coupled to the door lock controller.
Optionally, in the above-mentioned access control system based on two dimensional code, the cloud communication module is embedded GPRS232-7S3 module.
Compared with prior art, the application has the beneficial effect that
This application provides a kind of access control method and system based on two dimensional code, is preset in background management platform Standard User information carries out related data if administrative staff can directly operate background management platform after access control system upgrading The modification of information, gate inhibition upgrade efficiency and greatly improve, which comprises according to user right, mobile terminal generates corresponding Two dimensional code, mobile terminal holder by the two dimensional code be aligned gate inhibition in scanning recognition module, scanning recognition module read described in Two dimensional code obtains user right corresponding with the two dimensional code.The user right by cloud communication module push to it is described after Platform manages platform, and the background management platform parses the user right, obtains user's letter corresponding with the user right Breath.If the user information obtained according to the two dimensional code and the user preset Standard User in background management platform Information matches, then the background management platform generates door open command, and the door open command is transmitted to door lock controller.Make With the access control method in the application, without carrying IC card, practicability is improved, and working as has visitor to come temporarily, user The mobile terminal two dimensional code generated that oneself is carried can be shared with visitor, visitor can be in the term of validity of the two dimensional code Interior, voluntarily opening gate, user can share authorization and open the door, without downstairs meeting in person.When access control system needs to upgrade When, only staff is needed to configure in background management platform to software, hardware can follow software upgrading, the application relative to It is more convenient, practical for the prior art.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The application can be limited.
Detailed description of the invention
In order to illustrate more clearly of the technical solution of the application, letter will be made to attached drawing needed in the embodiment below Singly introduce, it should be apparent that, for those of ordinary skills, without creative efforts, also Other drawings may be obtained according to these drawings without any creative labor.
Fig. 1 is a kind of flow diagram of the access control method based on two dimensional code provided in an embodiment of the present invention;
Fig. 2 is a kind of basic structure schematic diagram of the access control system based on two dimensional code provided in an embodiment of the present invention;
Description of symbols: 1, mobile terminal;2, background management platform;3, gate inhibition's plate;31, scanning recognition module;32, cloud Communication module;33, IC identification module;4, door lock controller.
Specific embodiment
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with the application reality The attached drawing in example is applied, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described implementation Example is only some embodiments of the present application, rather than whole embodiments.Based on the embodiment in the application, the common skill in this field The application protection all should belong in art personnel every other embodiment obtained without making creative work Range.
The access control method based on two dimensional code in the application, is preset with Standard User in background management platform first Information, the Standard User information include geographical location, equipment number and device numbering etc. in permission, for example, geographical Position is cell where user, and equipment number is that the user possesses several suite of rooms in affiliated subdistrict in permission, and equipment is compiled Number be specific location of the user in affiliated subdistrict.It is provided in an embodiment of the present invention a kind of based on two dimensional code referring to Fig. 1 Access control method flow diagram.In conjunction with Fig. 1, the described method comprises the following steps:
Step S110: mobile terminal generates corresponding two dimensional code according to user right;
In the application, user's hand-held mobile terminal, Xiang Suoshu background management platform obtains corresponding with the user right Standard User information, the Standard User information includes geographical location, equipment number, device numbering and timestamp in permission, The Standard User information is used for the judgement of background management platform.By being set in geographical location in the standard information, permission Standby number, device numbering etc. judge the user whether be the cell owner and specific flat floor etc., the mark Timestamp in quasi- user information, it can be shown that a data it is already existing, complete before some specific time, can The data of verifying, usually a character string, uniquely identify the time at certain a moment, which enables to the two dimension Code has timeliness.It after getting Standard User information, is being combined and is being encrypted, extraction obtains corresponding two dimensional code. Wherein, the mobile terminal may include mobile phone, notebook, tablet computer etc., and user can be logged in corresponding by mobile terminal APP or small routine etc. obtain two dimensional code.
In order to further optimize the above technical scheme, mobile terminal is according to user right, when generating corresponding two dimensional code, Further include: the mobile terminal requests to send two dimensional code to the background management platform, and background management platform receives the request Afterwards, detect whether the mobile terminal links internet.If the mobile terminal can be linked to internet, and network-like State is good, then the mobile terminal can generate dynamic two-dimension code, which has timeliness.If described mobile whole End can not be linked to internet or network state is very poor, then can not generate dynamic two-dimension code, at this time the background management system Detect that the mobile terminal in a short time without generating two dimensional code, then pushes fixed two dimensional code to the mobile terminal.It is logical Aforesaid operations are crossed, the practicability of access control method in the application is further improved.
Step S120: the scanning recognition module of gate inhibition reads the two dimensional code, obtains the user right, and by the use Family permission is sent to cloud communication module;
The two dimensional code is read using the scanning recognition module, the scanning recognition module is that GM65 bidimensional image formula is swept Retouch identification module, the GM65 bidimensional image formula scanning recognition module is low in energy consumption, operating current be less than 150mA, integrated design, Small volume, in addition, its image-type scanning technique for including can be suitable for a variety of application environments, can omnidirectional scan the two-dimensional code Or bar code, and being capable of sensitive identification label bar code and screen display label etc..The scanning recognition module is by described two Dimension code is converted to the user right, and the user right is heuristicimal code.
Step S130: the user right is pushed to the background management platform, the backstage by the cloud communication module Management platform parses the user right, obtains user information corresponding with the user right;
Step S140: if the user information matches with the Standard User information, the background management platform is raw Door lock controller is transmitted at door open command, and by the door open command.
According to being resolved to obtain the user information, user information that the background management platform obtains parsing and default Standard User information be compared judgement, the judgement includes: whether the geographical location of the user eligible, that is, is parsed Whether cell where obtained user and cell where preset user are consistent;Whether the user has the power for opening gate inhibition Whether the number of limit, that is, the affiliated building of the user parsed is consistent with the number in the affiliated building of preset user;In the two dimensional code Timestamp it is whether expired, that is, judge the two dimensional code whether in effective time limit.
If above-mentioned judgement all passes through, illustrate that the user has the permission for opening gate inhibition, then the back-stage management is flat Platform sends door open command to door lock controller, and door lock controller is opened.
In addition, after the door open command is transmitted to door lock controller, the method also includes: if the door lock control Device processed opens the door successfully, then generates opening imformation, and the opening imformation is sent to the back-stage management using cloud communication module Platform, the background management platform record the opening imformation.In this way, user opens the time of gate inhibition using two dimensional code Equal behavioral datas, are recorded in background management platform, use convenient for later period investigation, monitor the unlatching situation of gate inhibition in real time.
Access control method in the application has visitor's arriving without carrying IC card, practicability raising, and working as When, the mobile terminal two dimensional code generated that user can carry oneself is shared with visitor, visitor by short message or wechat etc. Can be within the term of validity of the two dimensional code, voluntarily opening gate, user can share authorization and open the door, without downstairs meeting in person It connects.When access control system needs to upgrade, only staff is needed to configure in background management platform to software, hardware Follow software upgrading, the application compared with the existing technology for, it is more convenient, practical.
Based on the same technical idea, the embodiment of the invention also provides a kind of access control systems based on two dimensional code. Fig. 2 is a kind of basic structure schematic diagram of the access control system based on two dimensional code provided in an embodiment of the present invention, such as Fig. 2 institute Show, the system comprises: mobile terminal 1, background management platform 2, gate inhibition's plate 3 and door lock controller 4, in which:
The mobile terminal 1 is communicatively coupled to the background management platform 2, and corresponding for being generated according to user right Two dimensional code;
Gate inhibition's plate 3 includes: scanning recognition module 31 and cloud communication module 32, and the scanning recognition module 31 passes through institute It states cloud communication module 32 and is communicatively coupled to the background management platform 2, the scanning recognition module 31 is for reading the two dimension Code, obtains user right corresponding with the two dimensional code;
The door lock controller 4 is communicatively coupled to the background management platform 2 by the cloud communication module 32, after described Platform management platform 2 according to the user right for parsing to obtain user information, and the door according to the user information control Lock controller 4.
Further, the two dimensional code display interface of the mobile terminal 1 includes 4 two dimensional codes.The display of mobile terminal 1 4 identical pattern in 2 D code are shown on interface simultaneously, as long as the scanning recognition module 31 on gate inhibition's plate 3 can recognize that Effective information can be sent to background management platform 2 by cloud communication module 32 by any one pattern in 2 D code.Pass through increasing If the interface of 4 identical pattern in 2 D code, barcode scanning distance, angle and the light filling effect of scanning recognition module 31 are optimized, it can be with The display interface of the mobile terminal 1 of easily reading different contrast, color and degree of reflection.
In addition, gate inhibition's plate 3 further includes IC identification module 33, the IC identification module 33 is communicatively coupled to the door lock Controller 4.In order to increase the door-opening mode of access control system, user experience is further promoted, in access control in the application IC identification module 33 is also had additional in system, user can also open gate inhibition by brush IC card.Certainly, it in the application, is controlled in gate inhibition After system upgrade processed, it is not necessary to replace the IC card in owner's hand, need to only upgrade in permission of the background management platform to IC card, door Prohibiting hardware will upgrade automatically, save the working time of owner and property.
In the application, the cloud communication module 32 is embedded GPRS232-7S3 module.The cloud communication module 32 uses The transparent transmissions such as compatible GPRS/WIFI, are connected in a manner of network Heartbeat packet and serial heartbeat packet with background management platform 2 It connects, pushes related data.Cloud communication module 32 also supports socket distribution protocol, after serial data is committed in a manner of http Platform management platform 2 is simultaneously distributed to different socket (socket), and four road socket is also supported to link, and the link of four tunnels is mutually only It is vertical.
Since embodiment of above is that reference combination is illustrated on other modes, have between different embodiments There is identical part, identical, similar part may refer to each other between each embodiment in this specification.Herein no longer in detail It illustrates.
It should be noted that in the present specification, the relational terms of such as " first " and " second " or the like are used merely to It distinguishes one entity or operation from another entity or operation, and not necessarily requires or imply these entities or operation Between there are any this actual relationship or sequences.Moreover, the terms "include", "comprise" or its any other variant are intended to Cover non-exclusive inclusion, so that the circuit structure, article or the equipment that include a series of elements not only include those Element, but also including other elements that are not explicitly listed, or further include for this circuit structure, article or equipment Intrinsic element.In the absence of more restrictions, the element for thering is sentence "including a ..." to limit, it is not excluded that There is also other identical elements in circuit structure, article or equipment including the element.
Those skilled in the art will readily occur to its of the application after considering specification and practicing the disclosure invented here His embodiment.This application is intended to cover any variations, uses, or adaptations of the invention, these modifications, purposes or Person's adaptive change follows the general principle of the application and including the undocumented common knowledge in the art of the application Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the application are wanted by right The content asked is pointed out.
Above-described the application embodiment does not constitute the restriction to the application protection scope.

Claims (10)

1. a kind of access control method based on two dimensional code, which is characterized in that be preset with Standard User letter in background management platform Breath, which comprises
Mobile terminal generates corresponding two dimensional code according to user right;
The scanning recognition module of gate inhibition reads the two dimensional code, obtains the user right, and the user right is sent to Cloud communication module;
The user right is pushed to the background management platform by the cloud communication module, and the background management platform is to described User right is parsed, and user information corresponding with the user right is obtained;
If the user information matches with the Standard User information, the background management platform generates door open command, and The door open command is transmitted to door lock controller.
2. the access control method according to claim 1 based on two dimensional code, which is characterized in that mobile terminal is according to user Permission generates corresponding two dimensional code, comprising:
The mobile terminal obtains Standard User information corresponding with the user right, institute from the background management platform Stating Standard User information includes geographical location, equipment number, device numbering and timestamp in permission;
The Standard User information is combined and is encrypted, extraction obtains corresponding two dimensional code.
3. the access control method according to claim 2 based on two dimensional code, which is characterized in that mobile terminal is according to user Permission generates corresponding two dimensional code, further includes:
The mobile terminal requests to send two dimensional code to the background management platform;
The background management platform detects whether the mobile terminal links internet;
If so, the mobile terminal generates dynamic two-dimension code, if it is not, then the background management system is pushed away to the mobile terminal Send fixed two dimensional code.
4. the access control method according to claim 1 based on two dimensional code, which is characterized in that the scanning recognition mould of gate inhibition Block reads the two dimensional code, obtains the user right, comprising:
The two dimensional code is read using the scanning recognition module, the scanning recognition module is that the scanning of GM65 bidimensional image formula is known Other module;
The two dimensional code is converted to the user right by the scanning recognition module, and the user right is heuristicimal code.
5. the access control method according to claim 1 based on two dimensional code, which is characterized in that if the user information with The Standard User information matches, then the background management platform generates door open command, and the door open command is transmitted to Door lock controller, comprising:
According to the user information, the background management platform is judged, it is described judgement include: user geographical location whether Eligible, whether the user has the permission for opening gate inhibition, and whether the timestamp in the two dimensional code is expired;
If the judgement all passes through, the door open command that the background management platform generates, and by the door open command It is transmitted to door lock controller.
6. the access control method according to claim 5 based on two dimensional code, which is characterized in that by the door open command It is transmitted to after door lock controller, the method also includes:
If the door lock controller opens the door successfully, opening imformation is generated, and the opening imformation is sent out using cloud communication module It send to the background management platform, the background management platform records the opening imformation.
7. a kind of access control system based on two dimensional code, which is characterized in that the system comprises: mobile terminal, back-stage management Platform, gate inhibition's plate and door lock controller, in which:
The communication of mobile terminal is connected to the background management platform, and for generating corresponding two dimension according to user right Code;
Gate inhibition's plate includes: scanning recognition module and cloud communication module, and the scanning recognition module communicates mould by the cloud Block is communicatively coupled to the background management platform, and the scanning recognition module obtains and described two for reading the two dimensional code Tie up the corresponding user right of code;
The door lock controller is communicatively coupled to the background management platform by the cloud communication module, and the back-stage management is flat Platform according to the user right for parsing to obtain user information, and the door lock controller according to the user information control.
8. the access control system according to claim 7 based on two dimensional code, which is characterized in that the two of the mobile terminal Tieing up code display interface includes 4 two dimensional codes.
9. the access control system according to claim 7 based on two dimensional code, which is characterized in that gate inhibition's plate further includes IC identification module, the IC identification module are communicatively coupled to the door lock controller.
10. the access control system according to claim 7 based on two dimensional code, which is characterized in that the cloud communication module For embedded GPRS232-7S3 module.
CN201910451082.4A 2019-05-28 2019-05-28 A kind of access control method and system based on two dimensional code Pending CN110097674A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910451082.4A CN110097674A (en) 2019-05-28 2019-05-28 A kind of access control method and system based on two dimensional code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910451082.4A CN110097674A (en) 2019-05-28 2019-05-28 A kind of access control method and system based on two dimensional code

Publications (1)

Publication Number Publication Date
CN110097674A true CN110097674A (en) 2019-08-06

Family

ID=67449611

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910451082.4A Pending CN110097674A (en) 2019-05-28 2019-05-28 A kind of access control method and system based on two dimensional code

Country Status (1)

Country Link
CN (1) CN110097674A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110503762A (en) * 2019-09-19 2019-11-26 南泽(广东)科技股份有限公司 A kind of access control method and the access control system using this method
CN111402481A (en) * 2020-03-29 2020-07-10 北京年管家信息科技有限公司 Intelligent access control system with body temperature measuring function, control method and computer readable storage medium
CN111583482A (en) * 2020-04-29 2020-08-25 三仟(杭州)数字科技有限公司 Access control system based on two-dimensional code and control method thereof
CN112349007A (en) * 2020-09-28 2021-02-09 湖北民族大学 Offline gate authentication device and time synchronization method
CN113487765A (en) * 2021-06-08 2021-10-08 福建新大陆通信科技股份有限公司 CTID (computer telephony integration) access control method and system supporting dynamic encryption
CN113643462A (en) * 2021-08-09 2021-11-12 厦门立林科技有限公司 Access control management system and method based on aging permission group and storage medium
CN113808311A (en) * 2021-08-30 2021-12-17 广州大学 Two-dimensional code access control system with hierarchical authorization and control method thereof
TWI777484B (en) * 2021-04-09 2022-09-11 中興保全科技股份有限公司 Access management device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105069868A (en) * 2015-07-21 2015-11-18 杭州晟元数据安全技术股份有限公司 Intelligent district cloud system base on mobile phone dynamic safety two dimension code recognition
CN105472037A (en) * 2016-01-06 2016-04-06 深圳市呤云科技有限公司 Method and device for opening entrance guard through scanning two-dimension code
CN106447870A (en) * 2016-10-26 2017-02-22 江苏金米智能科技有限责任公司 Door control system based on two-dimensional code recognition
CN106652135A (en) * 2016-12-22 2017-05-10 深圳市麦驰安防技术有限公司 Access control method and system based on cloud technology and two-dimensional code technology
CN108171851A (en) * 2018-01-15 2018-06-15 广安众道电子商务有限公司 A kind of intelligent door lock system and control method with scanning function

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105069868A (en) * 2015-07-21 2015-11-18 杭州晟元数据安全技术股份有限公司 Intelligent district cloud system base on mobile phone dynamic safety two dimension code recognition
CN105472037A (en) * 2016-01-06 2016-04-06 深圳市呤云科技有限公司 Method and device for opening entrance guard through scanning two-dimension code
CN106447870A (en) * 2016-10-26 2017-02-22 江苏金米智能科技有限责任公司 Door control system based on two-dimensional code recognition
CN106652135A (en) * 2016-12-22 2017-05-10 深圳市麦驰安防技术有限公司 Access control method and system based on cloud technology and two-dimensional code technology
CN108171851A (en) * 2018-01-15 2018-06-15 广安众道电子商务有限公司 A kind of intelligent door lock system and control method with scanning function

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110503762A (en) * 2019-09-19 2019-11-26 南泽(广东)科技股份有限公司 A kind of access control method and the access control system using this method
CN111402481A (en) * 2020-03-29 2020-07-10 北京年管家信息科技有限公司 Intelligent access control system with body temperature measuring function, control method and computer readable storage medium
CN111583482A (en) * 2020-04-29 2020-08-25 三仟(杭州)数字科技有限公司 Access control system based on two-dimensional code and control method thereof
CN112349007A (en) * 2020-09-28 2021-02-09 湖北民族大学 Offline gate authentication device and time synchronization method
TWI777484B (en) * 2021-04-09 2022-09-11 中興保全科技股份有限公司 Access management device
CN113487765A (en) * 2021-06-08 2021-10-08 福建新大陆通信科技股份有限公司 CTID (computer telephony integration) access control method and system supporting dynamic encryption
CN113643462A (en) * 2021-08-09 2021-11-12 厦门立林科技有限公司 Access control management system and method based on aging permission group and storage medium
CN113643462B (en) * 2021-08-09 2023-06-27 厦门立林科技有限公司 Access control management system, method and storage medium based on aging permission group
CN113808311A (en) * 2021-08-30 2021-12-17 广州大学 Two-dimensional code access control system with hierarchical authorization and control method thereof

Similar Documents

Publication Publication Date Title
CN110097674A (en) A kind of access control method and system based on two dimensional code
CN106056015B (en) Utilize the cell potential of RFID tag assessment peripheral equipment
CN104134253A (en) Entrance guard system and entrance guard opening method
CN110070660A (en) A kind of gate inhibition and the integrated control method of terraced control and system
CN105491133A (en) Intelligent visit system for visitors and intelligent electronic visit list formation method
CN205263913U (en) Regional access control system of two -dimensional code lock
CN103229184A (en) Method and system for accessing secure resources
CN105551125A (en) Control method of city safety system and city safety system
CN204926231U (en) Entrance guard and access control system
CN205354152U (en) Intelligent gate inhibition system
KR101514029B1 (en) Method and apparatus for entry authentication using user terminal
CN106454831A (en) Mobile hotspot access method, terminal and peripheral equipment
CN103116924B (en) Electronic lock system based on images and mobile communication network
CN207264475U (en) A kind of intelligent lock control system based on eID certifications
CN110065858A (en) A kind of ladder control method and system based on two dimensional code
CN101002213A (en) Network system, control method thereof and program
CN208460087U (en) A kind of intelligent door lock management system
CN103116923A (en) Security and protection method based on images and mobile communication network
CN103544749A (en) Cloud control access control management system and authentication method thereof
CN106612291A (en) Net bar Internet surfing method and system
CN206557867U (en) Gate control system based on dynamic two-dimension code
CN106686754A (en) Data interaction method and data interaction system
CN108460876A (en) A kind of time sync-type Quick Response Code guard method and system
CN109903446A (en) A kind of smart lock long-distance video exchange method
CN104656885A (en) Handheld eye-controlled eye contact device, password input device and method thereof, and computer readable recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination