CN110247880B - Generation method and generation system of elevator calling authentication code, and elevator calling authentication method and system - Google Patents

Generation method and generation system of elevator calling authentication code, and elevator calling authentication method and system Download PDF

Info

Publication number
CN110247880B
CN110247880B CN201810193864.8A CN201810193864A CN110247880B CN 110247880 B CN110247880 B CN 110247880B CN 201810193864 A CN201810193864 A CN 201810193864A CN 110247880 B CN110247880 B CN 110247880B
Authority
CN
China
Prior art keywords
calling
elevator
user
elevator calling
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810193864.8A
Other languages
Chinese (zh)
Other versions
CN110247880A (en
Inventor
谢伟杰
唐忠平
吴盛宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hitachi Building Technology Guangzhou Co Ltd
Original Assignee
Hitachi Building Technology Guangzhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hitachi Building Technology Guangzhou Co Ltd filed Critical Hitachi Building Technology Guangzhou Co Ltd
Priority to CN201810193864.8A priority Critical patent/CN110247880B/en
Publication of CN110247880A publication Critical patent/CN110247880A/en
Application granted granted Critical
Publication of CN110247880B publication Critical patent/CN110247880B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Lock And Its Accessories (AREA)
  • Elevator Control (AREA)

Abstract

The invention relates to a method for generating a calling elevator authentication code, which comprises the following steps: acquiring user information of a calling user generated by a client; searching a key matched with the elevator calling user from a key library according to the user information, and generating a challenge code of the elevator calling user; generating a first calling authentication code according to the secret key and the challenge code, and matching the first calling authentication code with a second calling authentication code; and the second calling authentication code is an authentication code generated by the client according to the secret key and the challenge code. The generation method generates the calling authentication code of the calling user by combining the secret key of the user and the randomly generated challenge code, and the first calling authentication code is matched with the second calling authentication code generated by the client to authenticate the identity of the calling user, so that the security of calling authentication can be improved, the security of identity information of the calling user is also ensured, and the accuracy of authenticating the identity of the calling user is also improved. The method and the system for generating the elevator calling authentication code are also related.

Description

Generation method and generation system of elevator calling authentication code, and elevator calling authentication method and system
Technical Field
The invention relates to the technical field of elevators, in particular to a generation method and a generation system of elevator calling authentication codes, an elevator calling authentication method and an elevator calling authentication system, computer equipment and a computer readable storage medium.
Background
Along with the development of the technology, a plurality of elevator calling technologies are born in an elevator system, the existing authority elevator calling mode generally adopts modes such as an IC card, a two-dimensional code or a fingerprint, the identity authentication of elevator calling users in a mode of scanning the two-dimensional code is more and more convenient, and the user experience is also improved.
The traditional technology usually adopts a static two-dimensional code generated by utilizing user personal information as an authentication code or an identification code of a calling user to authenticate the identity of the calling user, but the two-dimensional code adopted by the technology only generally keeps the authority information of the user, and the user information recorded by the two-dimensional code is static, so that the leakage and the copy of the user information are easily caused, and the safety is low.
Disclosure of Invention
In view of the above, it is necessary to provide a method and a system for generating a calling authentication code, a calling authentication method and a calling authentication system, a computer device, and a computer-readable storage medium, for solving the problem of low security in the conventional technology.
A generation method of elevator calling authentication codes comprises the following steps:
acquiring user information of a calling user generated by a client;
searching a key matched with the elevator calling user from a key library according to the user information, and generating a challenge code of the elevator calling user;
generating a first calling authentication code according to the secret key and the challenge code, and matching the first calling authentication code with a second calling authentication code; and the second calling authentication code is an authentication code generated by the client according to the secret key and the challenge code.
According to the method for generating the elevator calling authentication code, the user information of the elevator calling user generated by the client is obtained, the key matched with the elevator calling user is searched from the key library according to the user information, the challenge code of the elevator calling user is generated, the first elevator calling authentication code is generated according to the key and the challenge code of the elevator calling user, the elevator calling authentication code of the elevator calling user is generated by combining the key of the user and the challenge code generated randomly, the first elevator calling authentication code is matched with the second elevator calling authentication code generated by the client, the identity of the elevator calling user is authenticated, the security of the elevator calling authentication can be improved, the security of the identity information of the elevator calling user is also ensured, and the accuracy of the identity authentication of the elevator calling user is also improved.
In one embodiment, the method for generating the elevator calling authentication code further includes the following steps:
generating a first secret key of the elevator calling user according to the user information registered and input by the elevator calling user;
transmitting the user information to the client, and triggering the client to generate a second key of the elevator calling user according to the user information;
acquiring the second key generated by the client;
and combining the first key and the second key to obtain the key of the elevator calling user.
In one embodiment, the method for generating the elevator calling authentication code further includes the following steps:
acquiring the floor number of each floor;
the step of generating a first elevator calling authentication code according to the secret key and the challenge code comprises:
and combining the secret key and the challenge code matched with the elevator calling user with the floor number of each floor respectively to generate a first elevator calling authentication code of each floor.
In one embodiment, a method for generating an elevator calling authentication code is provided, and the method comprises the following steps:
generating user information of elevator calling users, and acquiring prestored secret keys of the elevator calling users according to the user information;
acquiring a challenge code of the elevator calling user generated by an elevator calling device; the challenge code of the elevator calling user is generated by the elevator calling device according to the user information of the elevator calling user;
generating a second elevator calling authentication code of the elevator calling user according to the secret key and the challenge code of the elevator calling user, and matching the second elevator calling authentication code with the first elevator calling authentication code; and the first elevator calling authentication code is an authentication code generated by the elevator calling device according to the key and the challenge code matched with the elevator calling user.
According to the method for generating the elevator calling user authentication code, the user information of the elevator calling user is generated, the pre-stored key of the elevator calling user is obtained according to the user information, the challenge code of the elevator calling user generated by the elevator calling device is obtained, the second elevator calling authentication code of the elevator calling user is generated according to the key and the challenge code of the elevator calling user, the elevator calling authentication code of the elevator calling user is generated by combining the key of the user and the randomly generated challenge code, the second elevator calling authentication code is matched with the first elevator calling authentication code generated by the elevator calling device, the identity of the elevator calling user is authenticated, the security of the elevator calling authentication can be improved, the security of the identity information of the elevator calling user is also ensured, and the accuracy of the identity authentication of the elevator calling user is also improved.
In one embodiment, the method for generating the elevator calling authentication code further includes the following steps:
acquiring user information and a first key registered and input by the elevator calling user, which are transmitted by the elevator calling device;
generating a second secret key of the elevator calling user according to the user information;
and combining the first key and the second key to obtain the key of the elevator calling user.
In one embodiment, the method for generating the elevator calling authentication code further includes the following steps:
acquiring a target floor number input by the elevator calling user;
the step of generating a second elevator calling authentication code of the elevator calling user according to the secret key and the challenge code of the elevator calling user comprises the following steps:
and combining the secret key, the challenge code and the target floor number of the elevator calling user to generate a second elevator calling authentication code of the elevator calling user.
In one embodiment, a calling elevator authentication method is provided, which includes the steps of:
generating a first calling authentication code and a second calling authentication code by using the method for generating the calling authentication codes in any embodiment;
and matching the first calling elevator authentication code with the second calling elevator authentication code, and if the first calling elevator authentication code is the same as the second calling elevator authentication code, authenticating that the calling elevator user is a legal calling elevator user.
The elevator calling authentication method provided by the embodiment generates the first elevator calling authentication code and the second elevator calling authentication code of the elevator calling user by combining the secret key of the elevator calling user and the randomly generated challenge code, matches the first elevator calling authentication code and the second elevator calling authentication code, authenticates the identity of the elevator calling user, can improve the security of the elevator calling authentication, also ensures the security of the identity information of the elevator calling user, and also improves the accuracy of authenticating the identity of the elevator calling user.
In one embodiment, a generation system of elevator calling authentication codes is provided, and the generation system comprises:
the information acquisition module is used for acquiring user information of the elevator calling user generated by the client;
the key searching module is used for searching the key matched with the elevator calling user from a key library according to the user information and generating a challenge code of the elevator calling user;
the first generation module is used for generating a first calling authentication code according to the secret key and the challenge code and matching the first calling authentication code with a second calling authentication code; and the second calling authentication code is an authentication code generated by the client according to the secret key and the challenge code.
According to the generation system of the elevator calling authentication code, the user information of the elevator calling user generated by the client is acquired through the information acquisition module, the key matched with the elevator calling user is searched from the key library by the key search module according to the user information, the challenge code of the elevator calling user is generated, the first elevator calling authentication code is generated through the first generation module according to the key and the challenge code of the elevator calling user, the elevator calling authentication code of the elevator calling user is generated by combining the key of the user and the randomly generated challenge code, the first elevator calling authentication code is matched with the second elevator calling authentication code generated by the client, the identity of the elevator calling user is authenticated, the security of the elevator calling authentication can be improved, the security of the identity information of the elevator calling user is also ensured, and the accuracy of the identity authentication of the elevator calling user is also improved.
In one embodiment, a generation system of elevator calling authentication codes is provided, and the generation system comprises:
the information generation module is used for generating user information of elevator calling users and acquiring prestored secret keys of the elevator calling users according to the user information;
the challenge code acquisition module is used for acquiring the challenge code of the elevator calling user generated by the elevator calling device; the challenge code of the elevator calling user is generated by the elevator calling device according to the user information of the elevator calling user;
the second generation module is used for generating a second elevator calling authentication code of the elevator calling user according to the secret key and the challenge code of the elevator calling user and matching the second elevator calling authentication code with the first elevator calling authentication code; and the first elevator calling authentication code is an authentication code generated by the elevator calling device according to the key and the challenge code matched with the elevator calling user.
According to the method for generating the elevator calling authentication code, the user information of the elevator calling user is generated through the information generation module, the prestored secret key of the elevator calling user is acquired according to the user information, the challenge code of the elevator calling user generated by the elevator calling device is acquired through the challenge code acquisition module, the second elevator calling authentication code of the elevator calling user is generated through the second generation module according to the secret key of the elevator calling user and the challenge code, the elevator calling authentication code of the elevator calling user is generated by combining the secret key of the user and the randomly generated challenge code, the second elevator calling authentication code is matched with the first elevator calling authentication code generated by the elevator calling device, the identity of the elevator calling user is authenticated, the security of the elevator calling authentication can be improved, the security of the identity information of the elevator calling user is also ensured, and the accuracy of the identity authentication of the elevator calling user is also improved.
In one embodiment, there is provided an elevator calling authentication system, the authentication system comprising:
the authentication code generation module is used for generating a first elevator calling authentication code and a second elevator calling authentication code by using the elevator calling authentication code generation method in any embodiment;
and the authentication module is used for matching the first calling elevator authentication code with the second calling elevator authentication code, and if the first calling elevator authentication code is the same as the second calling elevator authentication code, the authentication calling elevator user is a legal calling elevator user.
The ladder calling authentication system provided by the embodiment generates the first ladder calling authentication code and the second ladder calling authentication code of the ladder calling user by combining the key of the ladder calling user and the randomly generated challenge code through the authentication code generation module, matches the first ladder calling authentication code and the second ladder calling authentication code by using the authentication module, authenticates the identity of the ladder calling user, can improve the security of the ladder calling authentication, also ensures the security of the identity information of the ladder calling user, and also improves the accuracy of authentication of the identity of the ladder calling user.
In one embodiment, a computer device is provided, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and the processor implements the generation method of the elevator calling authentication code or the elevator calling authentication method according to any one of the above embodiments when executing the computer program.
According to the computer equipment, through the computer program running on the processor, the security of calling elevator authentication is improved, the security of identity information of calling elevator users is also ensured, and the accuracy of authenticating the identities of the calling elevator users is also improved.
A computer-readable storage medium, on which a computer program is stored, which when executed by a processor implements a method for generating a call authentication code or a method for call authentication as described in any of the above embodiments.
According to the computer-readable storage medium, the security of elevator calling authentication is improved through the stored computer program, the security of the identity information of the elevator calling users is also ensured, and the accuracy of authentication of the identities of the elevator calling users is also improved.
Drawings
FIG. 1 is a diagram of an exemplary implementation of a method for generating an elevator challenge code;
FIG. 2 is a flow diagram illustrating a method for generating an elevator call authorization code according to an embodiment;
FIG. 3 is a flow diagram that illustrates a method for key generation, in one embodiment;
FIG. 4 is a flowchart illustrating a method for generating an elevator call authorization code according to another embodiment;
FIG. 5 is a flowchart illustrating a key generation method according to another embodiment;
FIG. 6 is a flow diagram of a method of calling a stairway in one embodiment;
FIG. 7 is a schematic illustration of an escalator panel in one embodiment;
FIG. 8 is a schematic diagram of an elevator terminal in one embodiment;
FIG. 9 is a block diagram of a system for generating elevator call authorization codes in one embodiment;
fig. 10 is a block diagram showing a system for generating a call authentication code according to another embodiment;
FIG. 11 is a diagram of the internal structure of a computer device in one embodiment;
fig. 12 is an internal structural view of a computer device in another embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
It should be noted that the terms "first \ second \ third" related to the embodiments of the present invention are merely used for distinguishing similar objects, and do not represent a specific ordering for the objects, and it should be understood that "first \ second \ third" may exchange a specific order or sequence order if allowed. It should be understood that the terms first, second, and third, as used herein, are interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in other sequences than those illustrated or otherwise described herein.
The method for generating a calling authentication code according to an embodiment of the present invention can be applied to an application environment shown in fig. 1, where fig. 1 is an application environment diagram of the method for generating a calling authentication code according to an embodiment.
The elevator calling system 20 may include a plurality of elevators 210 disposed at respective floors, elevators 230 disposed at different floors, and an elevator management system 220 that manages the elevators 210 and 230, respectively.
When calling a ladder, the user information of the calling user can be generated by using the terminal 10 such as a smart phone, the user information of the calling user is transmitted to the calling device 210, the calling device 210 can read and analyze the user information, and when the calling user is authenticated to be a legal calling user, a relevant calling instruction can be sent to the elevator management system 220 to call the elevator 230 of the corresponding floor for the calling user to take.
In an embodiment, a method for generating a call elevator authentication code is provided, referring to fig. 2, fig. 2 is a schematic flow chart of the method for generating a call elevator authentication code in an embodiment, which is described by applying the method to the call elevator in fig. 1, and the method may include the following steps:
and step S101, acquiring user information of the elevator calling user generated by the client.
The user information of the elevator calling user refers to information used for an elevator calling device or a client to identify the identity of the elevator calling user, and may include an identification number automatically allocated to the elevator calling user by an elevator system when the elevator calling user registers, a user-defined account number when the elevator calling user registers, or contact information of the user, such as a telephone number or an address, and the like, and the information may be stored in the elevator calling client of the user in advance.
In this step, when a calling user calls a call, the client may first obtain user information such as an identification number of the calling user, generate an identification code carrying the user information, which may include a barcode or a two-dimensional code, and display the identification code, and the calling device may scan the identification code generated by the client to extract the user information.
And S102, searching a key matched with the elevator calling user from a key library according to the user information, and generating a challenge code of the elevator calling user.
The key bank is a database storing keys of all registered users, the keys of all registered users are respectively matched and bound with user information of all users, the keys of corresponding users can be searched by taking the user information as an index, the challenge code is an encrypted password randomly generated for the elevator calling user, and the challenge code can be generated by an elevator calling device or a system and is transmitted to the elevator calling device by the elevator calling system.
When a user calls a ladder, the ladder calling device searches a key matched with the user calling the ladder from the key library by using the user information transmitted by the client, randomly generates a challenge code of the user calling the ladder, can prevent an illegal user from stealing the user information of a legal user to illegally call the ladder, and is favorable for improving the safety and the accuracy of the authentication of the user calling the ladder.
And step S103, generating a first elevator calling authentication code according to the secret key and the challenge code.
The elevator calling device in the step generates a first elevator calling authentication code by using the secret key and the challenge code, and is used for matching a second challenge code generated by the client so as to authenticate the identity of the elevator calling user.
The client side can acquire a secret key of the elevator calling user pre-stored in the client side according to the user information of the elevator calling user, the elevator calling device can transmit the generated challenge code of the elevator calling user to the client side, and the client side generates a second elevator calling authentication code by using the secret key and the challenge code after acquiring the challenge code.
The calling device can compare a first calling authentication code generated by the calling device with a second calling authentication code generated by the client, authenticate the identity of a calling user, transmit the first calling authentication code to the client, enable the client to compare the first calling authentication code with the second calling authentication code, and authenticate the identity of the calling user.
According to the method for generating the elevator calling authentication code, the user information of the elevator calling user generated by the client is obtained, the key matched with the elevator calling user is searched from the key library according to the user information, the challenge code of the elevator calling user is generated, the first elevator calling authentication code is generated according to the key and the challenge code of the elevator calling user, the elevator calling authentication code of the elevator calling user is generated by combining the key of the user and the challenge code generated randomly, the first elevator calling authentication code and the second elevator calling authentication code generated by the client are adopted for matching, the identity of the elevator calling user does not need to be connected with public network authentication, the security of elevator calling authentication can be improved, the security of the identity information of the elevator calling user is also ensured, and the accuracy of authenticating the identity of the elevator calling user is also improved.
In one embodiment, the obtaining of the user information of the elevator calling user generated by the client in step S101 may include:
scanning a two-dimensional code generated by a client; and extracting the user information of the elevator calling user from the two-dimensional code.
Because some hold together terraced system and adopt the mode of two-dimensional code to carry out the scanning of user information, the customer end can carry out information transfer with user information in the form of two-dimensional code, and the terraced ware of holding together of this embodiment draws user information through the two-dimensional code that the scanning customer end shows for user information hides in the two-dimensional code, improves the security.
In an embodiment, referring to fig. 3, fig. 3 is a flowchart of a key generation method in an embodiment, before searching for a key matched with an elevator calling user from a key repository according to user information in step S102, a key of the elevator calling user may be generated by the following method, where the method may include the following steps:
step S201, generating a first key of the elevator calling user according to the user information registered and input by the elevator calling user.
The elevator calling system can enter relevant user information for users during registration of elevator calling users, for example, an administrator can allocate a user name to each elevator calling user through the elevator calling system as one of user information, and the elevator calling device can randomly generate a first key for the elevator calling user with the user name.
The method mainly comprises the step that a calling elevator device randomly generates a section of key as a first key of a calling elevator user by utilizing user information input by the calling elevator user during registration.
Step S202, the user information is transmitted to the client, and the client is triggered to generate a second secret key of the elevator calling user according to the user information.
In this step, the elevator calling device transmits the user information of the elevator calling user to the client, so that the client can randomly generate a key at the other end for the elevator calling user as a second key of the elevator calling user according to the user information.
Step S203, acquiring the second key generated by the client. The elevator calling device can acquire a second secret key of the elevator calling user randomly generated by the client according to the user information.
And step S204, combining the first key and the second key to obtain the key of the elevator calling user.
The elevator calling device can splice the first key and the second key respectively as a first half key and a second half key to obtain the key of the elevator calling user.
The following describes the key generation scheme of this embodiment by taking a two-dimensional code elevator calling device as an example:
a calling user can install a calling APP by himself, and the APP obtains the authorities of a mobile phone camera and the like; the administrator can enter the information of the elevator calling user in advance through the elevator calling system, or the user can enter the information at the client by himself; after the user information is confirmed, the two-dimensional code elevator calling device can generate and display a two-dimensional code carrying the user information and the first half section of secret key; the elevator calling user can scan the two-dimensional code by using the client, and extract and store the user information and the first half section of the key, for example: the user name is C123456, and the first half section of the key is ABCAbc; the client may generate the second half key of the elevator user, such as 123! @ # () _ and transmits the second-half-segment key to generate a corresponding two-dimensional code to the elevator calling device; the elevator calling device and the client respectively splice the first half section and the second half section of the key to obtain the key of the elevator calling user, namely ABCAbbc 123! @ # () _.
According to the scheme for generating the elevator calling user key, the elevator calling device and the client carry out information interaction, the first key and the second key are generated according to the user information respectively, the two-dimensional code of the elevator calling user is obtained by combining the first key and the second key, the defect that the two-dimensional code generated by the elevator calling device or the client in a unified mode is easy to steal is avoided, the security of key generation is guaranteed, and the security and the accuracy of authentication by using the key are improved.
In one embodiment, the step of generating the challenge code of the elevator calling user in step S102 may include:
acquiring data of deterministic events and non-deterministic events of the elevator calling system; a challenge code is generated from a data combination of the deterministic event and the non-deterministic event.
The data of the deterministic event can be data of a time counter of the elevator calling system, and generally, the time counter is automatically increased by 1 every 1 millisecond; non-deterministic events may include events such as system power consumption, in-car weight, instantaneous current value, elevator run time, temperature, humidity, etc. of the elevator calling system.
In this embodiment, the data of the time counter and the non-deterministic event of the elevator calling system can be spliced and combined to calculate a random number; further, the time counter of the elevator calling system after splicing combination and the data of the non-deterministic event can be substituted into an encryption algorithm such as MD5, SM3, etc. to calculate a random number as a challenge code.
According to the technical scheme of the embodiment, the challenge code is randomly generated by combining the deterministic event and the data of the non-deterministic time of the elevator calling system, and the safety of generating the authentication code and the accuracy of authentication are further improved.
In one embodiment, the step of generating the first elevator calling authentication code according to the key and the challenge code of step S103 may include:
and encrypting the key and the challenge code by using an encryption algorithm to obtain a first elevator calling authentication code.
In this embodiment, the key and the challenge code may be encrypted by using an encryption algorithm such as MD5 or SM3, and the encrypted data is used as the first elevator calling authentication code; and the client side also encrypts the key and the challenge code by adopting the same encryption algorithm to obtain a second calling authentication code for matching with the first calling authentication code.
In the embodiment, the encryption algorithm is adopted to encrypt the key and the challenge code, so that the defect that the security is reduced due to tampering of the key and the challenge code in the first elevator calling authentication code generation process can be prevented, the security of authentication code generation is further improved, and the accuracy of user identification is also improved.
In one embodiment, before the step of generating the first elevator calling authentication code of the elevator calling user in step S103, the floor number of each floor may be acquired;
the step of generating the first elevator calling authentication code according to the key and the challenge code of step S103 may include:
and combining the secret key and the challenge code matched with the elevator calling user with the floor number of each floor respectively to generate a first elevator calling authentication code of each floor.
In consideration of the situation that a user inputs a target floor number to a client when calling a elevator, and the client generates an authentication code according to information such as a key and the target floor number and provides the authentication code for the elevator calling device for authentication, in this embodiment, a first elevator calling authentication code of each floor is generated by acquiring the floor number of each floor and combining the key and the challenge code matched with the elevator calling user with the floor number of each floor respectively, and the second elevator calling authentication codes provided by the client are used for being matched one by one, so that the first elevator calling authentication code of the corresponding floor identical to the second elevator calling authentication code can be matched, the target floor to which the elevator calling user wants to go can be further determined while the elevator calling user is authenticated, and the elevator calling authentication efficiency is improved.
In one embodiment, the step of combining the key and the challenge code matched with the elevator calling user with the floor number of each floor respectively to generate the first elevator calling authentication code of each floor in step S103 may include:
and respectively encrypting the secret key and the challenge code matched with the elevator calling user and the floor number of each floor by using an encryption algorithm to obtain a first elevator calling authentication code of each floor.
In this embodiment, the secret key, the challenge code, and the floor number may be encrypted by using an encryption algorithm such as MD5 or SM3, and the encrypted data may be used as the first elevator calling authentication code; and the client side also encrypts the key, the challenge code and the target floor number by adopting the same encryption algorithm to obtain a second calling authentication code for matching with each first calling authentication code.
In the embodiment, the encryption algorithm is adopted to encrypt the key and the challenge code floor number, so that the defect that the security is reduced due to tampering of the key, the challenge code and the floor number in the first elevator calling authentication code generation process can be avoided, the security of authentication code generation is further improved, and the accuracy of user identification is also improved.
In an embodiment, a method for generating a call elevator authentication code is provided, referring to fig. 4, fig. 4 is a schematic flow chart of a method for generating a call elevator authentication code in another embodiment, which is described by applying the method to the client in fig. 1, and the method may include the following steps:
step S401, generating user information of a calling user, and acquiring a pre-stored key of the calling user according to the user information.
The method mainly comprises the steps that when a calling user calls a elevator, a client can generate identification numbers, user-defined account numbers or contact information and the like of the calling user, the information can be stored in the client in advance, a secret key can be stored in the client in advance when the user registers and is bound with user information, and the client searches the prestored secret key bound with the user information according to the generated user information as an index.
Step S402, the challenge code of the elevator calling user generated by the elevator calling device is obtained.
In this step, the challenge code is an encrypted password randomly generated by the elevator calling user, and the challenge code may be generated by the elevator calling device or generated by the elevator calling system, and is transferred to the elevator calling device by the elevator calling system. The elevator calling device can generate the challenge code of the elevator calling user according to the user information of the elevator calling user transmitted by the client.
The elevator calling device can display the generated challenge code in a two-dimensional code mode, the client can display the two-dimensional code carrying the challenge code through the elevator calling device in a scanning mode, and the challenge code of the elevator calling user is extracted from the two-dimensional code.
When the user calls the elevator, the client side acquires the challenge code of the elevator calling user randomly generated by the elevator calling device, so that the illegal user can be prevented from stealing the user information of the legal user to illegally call the elevator, and the safety and accuracy of the authentication of the elevator calling user can be improved.
Step S403, generating a second elevator calling authentication code of the elevator calling user according to the key and the challenge code of the elevator calling user.
In the step, the client generates a second calling elevator authentication code of the calling elevator user by using the key and the challenge code, and the second calling elevator authentication code is used for matching the first calling elevator authentication code generated by the calling elevator device, so that the identity of the calling elevator user is authenticated.
The client side can transmit user information of the elevator calling user to the elevator calling device, so that the elevator calling device searches a secret key of the elevator calling user from a secret key library according to the user information, randomly generates a challenge code of the user according to the user information, and generates a first elevator calling authentication code according to the secret key and the challenge code.
The client can compare the first elevator calling authentication code generated by the client with the second elevator calling authentication code generated by the client, authenticate the identity of the elevator calling user, and also can send the first elevator calling authentication code to the elevator calling device, so that the elevator calling device compares the first elevator calling authentication code generated by the client with the second elevator calling authentication code generated by the client, and authenticates the identity of the elevator calling user.
According to the method for generating the elevator calling user authentication code, the user information of the elevator calling user is generated, the pre-stored key of the elevator calling user is obtained according to the user information, the challenge code of the elevator calling user generated by the elevator calling device is obtained, the second elevator calling authentication code of the elevator calling user is generated according to the key and the challenge code of the elevator calling user, the elevator calling authentication code of the elevator calling user is generated by combining the key of the user and the randomly generated challenge code, the second elevator calling authentication code is matched with the first elevator calling authentication code generated by the elevator calling device, the identity of the elevator calling user is authenticated, the security of the elevator calling authentication can be improved, the security of the identity information of the elevator calling user is also ensured, and the accuracy of the identity authentication of the elevator calling user is also improved.
In one embodiment, after the step of generating the user information of the elevator calling user in step S401, the following steps may be further included:
and transmitting the user information to the elevator calling device in a two-dimensional code form.
In this embodiment, a two-dimensional code carrying user information of the elevator calling user is mainly generated and transmitted to the elevator calling device, and the elevator calling device is instructed to extract the user information from the two-dimensional code.
Because some calling systems adopt the mode of two-dimensional code to scan user information, the client can carry out information transfer with user information in the form of two-dimensional code, triggers calling device to extract user information through the two-dimensional code that the scanning client shows for user information hides in the two-dimensional code, improves the security.
In an embodiment, before the step of obtaining the pre-stored key of the elevator calling user according to the user information in step S401, the following method may be adopted to generate the key of the elevator calling user, referring to fig. 5, where fig. 5 is a schematic flow chart of a key generation method in another embodiment, and the method may include the following steps:
step S501, user information and a first secret key registered and input by the elevator calling user and transmitted by the elevator calling device are obtained.
The elevator calling system can enter relevant user information for users during registration of elevator calling users, for example, an administrator can allocate a user name to each elevator calling user through the elevator calling system as one of user information, the elevator calling device can randomly generate a first key for the elevator calling user with the user name, and the user information and the first key can be transmitted to the client.
In the step, the client side obtains user information which is input by the elevator calling user and is transmitted by the elevator calling device during registration and a first key of the elevator calling user, which is generated by the elevator calling device. Because the elevator calling device can display the user information and the first key in the form of the two-dimensional code, the client can scan the two-dimensional code and extract the user information and the first key from the two-dimensional code. The user information and the secret key are transmitted in a two-dimensional code mode, and the safety of information transmission can be improved.
Step S502, generating a second key of the elevator calling user according to the user information.
The client side in this step can randomly generate the second key of the elevator calling user according to the user information transmitted by the elevator calling device. The client can also transmit the generated second key to the elevator convener, so that the elevator convener can combine the first key and the second key to obtain the key of the elevator convener user.
Step S503, combining the first key and the second key to obtain the key of the elevator calling user.
The client may use the first key as a first-half key and the second key as a second-half key, so that the first-half key and the second-half key are spliced and combined to obtain the key of the elevator calling user.
According to the scheme for generating the elevator calling user key, the elevator calling device and the client carry out information interaction, the first key and the second key are generated according to the user information respectively, the two-dimensional code of the elevator calling user is obtained by combining the first key and the second key, the defect that the two-dimensional code generated by the elevator calling device or the client in a unified mode is easy to steal is avoided, the security of key generation is guaranteed, and the security and the accuracy of authentication by using the key are improved.
In one embodiment, the step S403 of generating the second elevator calling authentication code of the elevator calling user according to the key and the challenge code of the elevator calling user may include the following steps:
and encrypting the key and the challenge code by using an encryption algorithm to obtain a second elevator calling authentication code.
In this embodiment, the key and the challenge code may be encrypted by using an encryption algorithm such as MD5 or SM3, and the encrypted data may be used as the second elevator calling authentication code; and the elevator calling device also encrypts the key and the challenge code by adopting the same encryption algorithm to obtain a first elevator calling authentication code for matching with a second elevator calling authentication code.
In the embodiment, the encryption algorithm is adopted to encrypt the key and the challenge code, so that the defect that the security is reduced due to tampering of the key and the challenge code in the second elevator calling authentication code generation process can be avoided, the security of authentication code generation is further improved, and the accuracy of user identification is also improved.
In one embodiment, before the step of generating the second elevator calling authentication code of the elevator calling user according to the key and the challenge code of the elevator calling user in step S403, the target floor number input by the elevator calling user may be acquired;
the step of generating a second elevator calling authentication code of the elevator calling user according to the key and the challenge code of the elevator calling user in step S403 may include:
and combining the secret key, the challenge code and the target floor number of the elevator calling user to generate a second elevator calling authentication code of the elevator calling user.
Considering the situation that some elevator calling systems require a user to input a target floor number in a client to call an elevator, the client can acquire the target floor number input by an elevator calling user, and generates a second elevator calling authentication code of the elevator calling user according to the combination of a key, a challenge code and the target floor number of the elevator calling user, wherein the second elevator calling authentication code is used for being matched with a plurality of first elevator calling authentication codes generated by an elevator calling device.
Wherein, call terraced ware can call terraced user's secret key and challenge code and combine with the floor number of each floor respectively, generate the first terraced authentication code of calling out of each floor, make and call terraced ware can call terraced authentication code and each first terraced authentication code of calling out with the second and match one by one, the matching is out and calls out terraced authentication code with the second and calls out the first terraced authentication code of calling out of the same corresponding floor of terraced authentication code, when accomplishing to call terraced user and carrying out the authentication, can also make and call terraced ware further confirm the target floor that calls terraced user and want to go, improve and call terraced authentication efficiency.
In one embodiment, the step of combining the key, the challenge code and the target floor number of the elevator calling user in step S403 to generate a second elevator calling authentication code of the elevator calling user may include:
and respectively encrypting the secret key and the challenge code of the elevator calling user and the target floor number by using an encryption algorithm to obtain a second elevator calling authentication code.
In this embodiment, the secret key, the challenge code, and the target floor number may be encrypted by using an encryption algorithm such as MD5 or SM3, and the encrypted data may be used as the second elevator calling authentication code; the elevator calling device also encrypts the key, the challenge code and the floor number of each floor by adopting the same encryption algorithm to obtain a first elevator calling authentication code for matching a second elevator calling authentication code.
In the embodiment, the encryption algorithm is adopted to encrypt the key, the challenge code and the target floor number, so that the defect that the security is reduced due to tampering of the key, the challenge code and the target floor number in the second elevator calling authentication code generation process can be prevented, the security of authentication code generation is further improved, and the accuracy of user identification is also improved.
In one embodiment, a call-to-elevator authentication method is provided, which may include the steps of:
generating a first calling authentication code and a second calling authentication code by using the method for generating the calling authentication code according to any one of the embodiments; and matching the first calling authentication code with the second calling authentication code, and authenticating that the calling user is a legal calling user if the first calling authentication code is the same as the second calling authentication code.
In this embodiment, the first elevator calling authentication code of the elevator calling device and the second elevator calling authentication code of the client may be generated by using the method for generating the elevator calling authentication code according to any one of the above embodiments, the first elevator calling authentication code and the second elevator calling authentication code may be matched by the client, and if the first elevator calling authentication code and the second elevator calling authentication code are the same, the elevator calling user is authenticated as a legal elevator calling user, and a confirmation instruction is sent to the elevator calling device to complete the authentication; the first calling authentication code and the second calling authentication code can be matched through the calling device, and if the first calling authentication code and the second calling authentication code are the same, the calling user is authenticated to be a legal calling user, and authentication is completed.
The elevator calling authentication method provided by the embodiment generates the first elevator calling authentication code and the second elevator calling authentication code of the elevator calling user by combining the secret key of the elevator calling user and the randomly generated challenge code, matches the first elevator calling authentication code and the second elevator calling authentication code, authenticates the identity of the elevator calling user, can improve the security of the elevator calling authentication, also ensures the security of the identity information of the elevator calling user, and also improves the accuracy of authenticating the identity of the elevator calling user.
In order to more clearly illustrate the technical solution of the present invention, in an embodiment, taking a ladder calling system based on a two-dimensional code ladder calling device as an example, a ladder calling method is provided, referring to fig. 6, fig. 6 is a schematic flow chart of the ladder calling method in an embodiment, and the method may include the following steps:
s1, scanning the two-dimensional code to obtain two-dimensional code information;
the elevator calling device can scan two-dimensional code information displayed by the client, and the two-dimensional code information carries user information of elevator calling users.
Referring to fig. 7, fig. 7 is a schematic structural diagram of a ladder calling panel in an embodiment, a two-dimensional code generating area 410 and a two-dimensional code reading area 420 may be arranged on the ladder calling panel 40, and a first camera 421 may be arranged in the two-dimensional code reading area 420; referring to fig. 8, fig. 8 is a schematic structural diagram of an elevator terminal in an embodiment, and the client 50 may be provided with a second camera 510 and a display area 520.
The elevator calling device can read the two-dimensional code displayed in the display area by the client 50 through the first camera 421; the client may also read the two-dimensional code displayed in the two-dimensional code generation area 410 through the second camera 510.
s2, extracting user information and sending the user information to the elevator group control system;
the elevator calling device can extract the user information of the elevator calling user from the two-dimensional code and send the user information to the elevator group control system.
s3, the group control system returns the user key and challenge code and determines if the user is authorized?
The elevator group control system can search the user key matched with the user information, randomly generate a challenge code of the elevator calling user, return the user key and the challenge code to the elevator calling device, and also judge whether the user is an authorized elevator calling user, if so, execute s4, otherwise execute s1 to acquire the two-dimensional code information again.
s4, generating an authentication code according to the user key, each floor number and the challenge code;
the elevator calling device can encrypt through an encryption algorithm such as MD5 and SM3 according to a user key, each floor number and a challenge code fed back by the elevator group control system to generate a first elevator calling authentication code.
s5, is there a match with the scanned information?
The elevator calling device can scan a second elevator calling authentication code displayed by the client, compare and authenticate the first elevator calling authentication code and the second elevator calling authentication code, judge whether the first elevator calling authentication code and the second elevator calling authentication code are consistent, if so, execute s6, otherwise execute s1 to obtain the two-dimensional code information again; further, after the information is scanned to be consistent, s1 to s5 may be rapidly repeated to ensure that the two-dimensional code is not copied.
s6, sending a calling elevator request to the elevator group control system, and acquiring a calling elevator number;
and when the calling user is a legal calling user, sending a calling request of the calling user to the elevator group control system, calling the corresponding elevator for the calling user, and acquiring a called elevator number.
And s7, displaying a ladder number to prompt the user to take the car.
The elevator number of the calling elevator is displayed, and the calling user can be prompted to take the corresponding elevator in modes of voice and the like.
According to the elevator calling method, the first elevator calling authentication code and the second elevator calling authentication code of the elevator calling user are generated by combining the secret key and the challenge code of the elevator calling user, the first elevator calling authentication code and the second elevator calling authentication code are matched, the identity of the elevator calling user is authenticated, the security of the elevator calling authentication can be improved, the security of identity information of the elevator calling user is also ensured, the accuracy of authentication of the identity of the elevator calling user is improved, and the elevator calling efficiency is also improved.
In an embodiment, a system for generating a call ladder authorization code is provided, and referring to fig. 9, fig. 9 is a block diagram of a system for generating a call ladder authorization code in an embodiment, where the system may include:
the information acquisition module 101 is configured to acquire user information of a calling user generated by a client;
the key searching module 102 is configured to search a key matched with the elevator calling user from a key library according to the user information, and generate a challenge code of the elevator calling user;
the first generating module 103 is configured to generate a first calling authentication code according to the secret key and the challenge code, and match the first calling authentication code with a second calling authentication code; and the second calling authentication code is an authentication code generated by the client according to the secret key and the challenge code.
In the generation system of the elevator calling authentication code, the user information of the elevator calling user generated by the client is acquired through the information acquisition module 101, the key matched with the elevator calling user is searched from the key library by using the key search module 102 according to the user information, the challenge code of the elevator calling user is generated, the first elevator calling authentication code is generated by using the first generation module 103 according to the key and the challenge code of the elevator calling user, the elevator calling authentication code of the elevator calling user is generated by combining the key of the user and the randomly generated challenge code, the first elevator calling authentication code is matched with the second elevator calling authentication code generated by the client, the identity of the elevator calling user is authenticated, the security of the elevator calling authentication can be improved, the security of the identity information of the elevator calling user is also ensured, and the accuracy of the identity authentication of the elevator calling user is also improved.
In an embodiment, a system for generating a calling authentication code is further provided, referring to fig. 10, fig. 10 is a block diagram of a system for generating a calling authentication code in another embodiment, where the system may include:
the information generating module 401 is configured to generate user information of a calling user, and obtain a pre-stored key of the calling user according to the user information;
a challenge code obtaining module 402, configured to obtain a challenge code of the elevator calling user generated by an elevator calling device; the challenge code of the elevator calling user is generated by the elevator calling device according to the user information of the elevator calling user;
a second generating module 403, configured to generate a second elevator calling authentication code of the elevator calling user according to the key and the challenge code of the elevator calling user, and match the second elevator calling authentication code with the first elevator calling authentication code; and the first elevator calling authentication code is an authentication code generated by the elevator calling device according to the key and the challenge code matched with the elevator calling user.
According to the method for generating the elevator calling authentication code, the user information of the elevator calling user is generated through the information generating module 401, the pre-stored key of the elevator calling user is obtained according to the user information, the challenge code of the elevator calling user generated by the elevator calling device is obtained through the challenge code obtaining module 402, the second elevator calling authentication code of the elevator calling user is generated through the second generating module 403 according to the key of the elevator calling user and the challenge code, the elevator calling authentication code of the elevator calling user is generated according to the scheme by combining the key of the user and the randomly generated challenge code, the second elevator calling authentication code is matched with the first elevator calling authentication code generated by the elevator calling device, the identity of the elevator calling user is authenticated, the security of the elevator calling authentication can be improved, the security of the identity information of the elevator calling user is also ensured, and the accuracy of the identity authentication of the elevator calling user is also improved.
In one embodiment, there is also provided an elevator calling authentication system, which may include:
the authentication code generation module is used for generating a first elevator calling authentication code and a second elevator calling authentication code by using the elevator calling authentication code generation method in any embodiment;
and the authentication module is used for matching the first calling elevator authentication code with the second calling elevator authentication code, and if the first calling elevator authentication code is the same as the second calling elevator authentication code, the authentication calling elevator user is a legal calling elevator user.
The ladder calling authentication system provided by the embodiment generates the first ladder calling authentication code and the second ladder calling authentication code of the ladder calling user by combining the key of the ladder calling user and the randomly generated challenge code through the authentication code generation module, matches the first ladder calling authentication code and the second ladder calling authentication code by using the authentication module, authenticates the identity of the ladder calling user, can improve the security of the ladder calling authentication, also ensures the security of the identity information of the ladder calling user, and also improves the accuracy of authentication of the identity of the ladder calling user.
The generation system or the calling authentication system of the calling authentication code of the invention is in one-to-one correspondence with the generation method or the calling authentication method of the calling authentication code of the invention, and the technical characteristics and the beneficial effects described in the embodiment of the generation method or the calling authentication method of the calling authentication code are all applicable to the embodiment of the generation system or the calling authentication system of the calling authentication code, so the invention is declared.
Based on the examples described above, there is also provided in one embodiment a computer device including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor executes the program to implement the generation method or the elevator calling authentication method of any one of the above embodiments.
In one embodiment, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
acquiring user information of a calling user generated by a client; searching a key matched with the elevator calling user from a key library according to the user information, and generating a challenge code of the elevator calling user; and generating a first elevator calling authentication code according to the secret key and the challenge code.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
generating a first key of the elevator calling user according to user information registered and input by the elevator calling user; transmitting the user information to the client, and triggering the client to generate a second key of the elevator calling user according to the user information; acquiring the second key generated by the client; and combining the first key and the second key to obtain the key of the elevator calling user.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
acquiring the floor number of each floor; and combining the secret key and the challenge code matched with the elevator calling user with the floor number of each floor respectively to generate a first elevator calling authentication code of each floor.
In one embodiment, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
generating user information of the elevator calling users, and acquiring prestored keys of the elevator calling users according to the user information; acquiring a challenge code of a calling user generated by a calling device; and generating a second elevator calling authentication code of the elevator calling user according to the secret key and the challenge code of the elevator calling user.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
acquiring user information and a first key registered and input by elevator calling users transmitted by an elevator calling device; generating a second key of the elevator calling user according to the user information; and combining the first key and the second key to obtain the key of the elevator calling user.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
acquiring a target floor number input by a calling user; and combining the secret key, the challenge code and the target floor number of the elevator calling user to generate a second elevator calling authentication code of the elevator calling user.
In one embodiment, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
executing the steps of the method for generating a calling authentication code according to any one of the above embodiments to generate a first calling authentication code and a second calling authentication code; and matching the first calling elevator authentication code with the second calling elevator authentication code, and if the first calling elevator authentication code is the same as the second calling elevator authentication code, authenticating that the calling elevator user is a legal calling elevator user.
In one embodiment, a computer device is provided, which may be a server of a elevator calling system, and its internal structure diagram may be as shown in fig. 11. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer equipment is used for storing data generated in the generation method of the elevator calling authentication code or the flow of the elevator calling authentication method. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to realize a calling elevator authentication code generation method or a calling elevator authentication method.
In one embodiment, a computer device is provided, and the computer device may be a terminal device for calling a ladder, and the internal structure diagram thereof may be as shown in fig. 12. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to realize a calling elevator authentication code generation method or a calling elevator authentication method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the configurations shown in fig. 11 or fig. 12 are only block diagrams of some of the configurations relevant to the present application, and do not constitute a limitation on the computer apparatus to which the present application is applied, and a particular computer apparatus may include more or less components than those shown in the drawings, or may combine some components, or have a different arrangement of components.
The computer device provided by any of the above embodiments, through the computer program running on the processor, improves security of elevator calling authentication, also ensures security of identity information of elevator calling users, and also improves accuracy of authentication of identities of elevator calling users.
It will be understood by those skilled in the art that all or part of the processes in the methods of the above embodiments may be implemented by a computer program, which is stored in a non-volatile computer readable storage medium, and in the embodiments of the present invention, the program may be stored in the storage medium of a computer system and executed by at least one processor in the computer system to implement the processes including the embodiments of the sleep assistance methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
Accordingly, in an embodiment, a computer-readable storage medium is further provided, on which a computer program is stored, wherein the program, when executed by a processor, implements the generation method or the elevator calling authentication method of any one of the above embodiments.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
acquiring user information of a calling user generated by a client; searching a key matched with the elevator calling user from a key library according to the user information, and generating a challenge code of the elevator calling user; and generating a first elevator calling authentication code according to the secret key and the challenge code.
In one embodiment, the computer program when executed by the processor further performs the steps of:
generating a first key of the elevator calling user according to user information registered and input by the elevator calling user; transmitting the user information to the client, and triggering the client to generate a second key of the elevator calling user according to the user information; acquiring the second key generated by the client; and combining the first key and the second key to obtain the key of the elevator calling user.
In one embodiment, the computer program when executed by the processor further performs the steps of:
acquiring the floor number of each floor; and combining the secret key and the challenge code matched with the elevator calling user with the floor number of each floor respectively to generate a first elevator calling authentication code of each floor.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
generating user information of the elevator calling users, and acquiring prestored keys of the elevator calling users according to the user information; acquiring a challenge code of a calling user generated by a calling device; and generating a second elevator calling authentication code of the elevator calling user according to the secret key and the challenge code of the elevator calling user.
In one embodiment, the computer program when executed by the processor further performs the steps of:
acquiring user information and a first key registered and input by elevator calling users transmitted by an elevator calling device; generating a second key of the elevator calling user according to the user information; and combining the first key and the second key to obtain the key of the elevator calling user.
In one embodiment, the computer program when executed by the processor further performs the steps of:
acquiring a target floor number input by a calling user; and combining the secret key, the challenge code and the target floor number of the elevator calling user to generate a second elevator calling authentication code of the elevator calling user.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
executing the steps of the method for generating a calling authentication code according to any one of the above embodiments to generate a first calling authentication code and a second calling authentication code; and matching the first calling elevator authentication code with the second calling elevator authentication code, and if the first calling elevator authentication code is the same as the second calling elevator authentication code, authenticating that the calling elevator user is a legal calling elevator user.
According to the computer-readable storage medium, the security of elevator calling authentication is improved through the stored computer program, the security of the identity information of the elevator calling users is also ensured, and the accuracy of authentication of the identities of the elevator calling users is also improved.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A generation method of elevator calling authentication codes is characterized by comprising the following steps:
acquiring user information of a calling user generated by a client;
searching a key matched with the elevator calling user from a key library according to the user information, and generating a challenge code of the elevator calling user;
generating a first calling authentication code according to the secret key and the challenge code, and matching the first calling authentication code with a second calling authentication code; the second elevator calling authentication code is an authentication code generated by the client according to the secret key and the challenge code;
the generation mode of the key of the elevator calling user is as follows: generating a first secret key of the elevator calling user according to the user information registered and input by the elevator calling user; transmitting the user information to the client, and triggering the client to generate a second key of the elevator calling user according to the user information; acquiring the second key generated by the client; and combining the first key and the second key to obtain the key of the elevator calling user.
2. The method for generating elevator calling authentication code according to claim 1, further comprising the steps of:
acquiring the floor number of each floor;
the step of generating a first elevator calling authentication code according to the secret key and the challenge code comprises:
and combining the key and the challenge code matched with the elevator calling user as a whole with the floor number of each floor respectively to generate a first elevator calling authentication code of each floor.
3. A generation method of elevator calling authentication codes is characterized by comprising the following steps:
generating user information of elevator calling users, and acquiring prestored secret keys of the elevator calling users according to the user information;
acquiring a challenge code of the elevator calling user generated by an elevator calling device; the challenge code of the elevator calling user is generated by the elevator calling device according to the user information of the elevator calling user;
generating a second elevator calling authentication code of the elevator calling user according to the secret key and the challenge code of the elevator calling user, and matching the second elevator calling authentication code with the first elevator calling authentication code; the first elevator calling authentication code is an authentication code generated by the elevator calling device according to a secret key and a challenge code matched with the elevator calling user;
the generation mode of the key of the elevator calling user is as follows: acquiring user information and a first key registered and input by the elevator calling user, which are transmitted by the elevator calling device; generating a second secret key of the elevator calling user according to the user information; and combining the first key and the second key to obtain the key of the elevator calling user.
4. The method for generating elevator calling authentication code according to claim 3, further comprising the steps of:
acquiring a target floor number input by the elevator calling user;
the step of generating a second elevator calling authentication code of the elevator calling user according to the secret key and the challenge code of the elevator calling user comprises the following steps:
and combining the secret key, the challenge code and the target floor number of the elevator calling user to generate a second elevator calling authentication code of the elevator calling user.
5. A calling authentication method is characterized by comprising the following steps:
generating a first elevator calling authentication code and a second elevator calling authentication code by using the method for generating elevator calling authentication codes according to any one of claims 1 to 4;
and matching the first calling elevator authentication code with the second calling elevator authentication code, and if the first calling elevator authentication code is the same as the second calling elevator authentication code, authenticating that the calling elevator user is a legal calling elevator user.
6. A generation system of elevator calling authentication codes is characterized by comprising:
the information acquisition module is used for acquiring user information of the elevator calling user generated by the client;
the key searching module is used for searching the key matched with the elevator calling user from a key library according to the user information and generating a challenge code of the elevator calling user;
the first generation module is used for generating a first calling authentication code according to the secret key and the challenge code and matching the first calling authentication code with a second calling authentication code; the second elevator calling authentication code is an authentication code generated by the client according to the secret key and the challenge code;
the generation mode of the key of the elevator calling user is as follows: generating a first secret key of the elevator calling user according to the user information registered and input by the elevator calling user; transmitting the user information to the client, and triggering the client to generate a second key of the elevator calling user according to the user information; acquiring the second key generated by the client; and combining the first key and the second key to obtain the key of the elevator calling user.
7. A generation system of elevator calling authentication codes is characterized by comprising:
the information generation module is used for generating user information of elevator calling users and acquiring prestored secret keys of the elevator calling users according to the user information;
the challenge code acquisition module is used for acquiring the challenge code of the elevator calling user generated by the elevator calling device; the challenge code of the elevator calling user is generated by the elevator calling device according to the user information of the elevator calling user;
the second generation module is used for generating a second elevator calling authentication code of the elevator calling user according to the secret key and the challenge code of the elevator calling user and matching the second elevator calling authentication code with the first elevator calling authentication code; the first elevator calling authentication code is an authentication code generated by the elevator calling device according to a secret key and a challenge code matched with the elevator calling user;
the generation mode of the key of the elevator calling user is as follows: acquiring user information and a first key registered and input by the elevator calling user, which are transmitted by the elevator calling device; generating a second secret key of the elevator calling user according to the user information; and combining the first key and the second key to obtain the key of the elevator calling user.
8. An elevator calling authentication system, comprising:
an authentication code generation module, configured to generate a first elevator calling authentication code and a second elevator calling authentication code by using the elevator calling authentication code generation method according to any one of claims 1 to 4;
and the authentication module is used for matching the first calling elevator authentication code with the second calling elevator authentication code, and if the first calling elevator authentication code is the same as the second calling elevator authentication code, the authentication calling elevator user is a legal calling elevator user.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 5.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 5.
CN201810193864.8A 2018-03-09 2018-03-09 Generation method and generation system of elevator calling authentication code, and elevator calling authentication method and system Active CN110247880B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810193864.8A CN110247880B (en) 2018-03-09 2018-03-09 Generation method and generation system of elevator calling authentication code, and elevator calling authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810193864.8A CN110247880B (en) 2018-03-09 2018-03-09 Generation method and generation system of elevator calling authentication code, and elevator calling authentication method and system

Publications (2)

Publication Number Publication Date
CN110247880A CN110247880A (en) 2019-09-17
CN110247880B true CN110247880B (en) 2021-08-03

Family

ID=67882620

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810193864.8A Active CN110247880B (en) 2018-03-09 2018-03-09 Generation method and generation system of elevator calling authentication code, and elevator calling authentication method and system

Country Status (1)

Country Link
CN (1) CN110247880B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN203025807U (en) * 2012-12-18 2013-06-26 咏动科技股份有限公司 QR (Quick Response) code door control system
CN103955982A (en) * 2014-05-22 2014-07-30 国家电网公司 Method and device for identifying time-varying dynamic two-dimensional code entrance guard
CN104780043A (en) * 2014-01-14 2015-07-15 中国电信股份有限公司 Access control method and system based on two-dimension code
CN104851174A (en) * 2015-06-16 2015-08-19 赵旭东 High-reliability machine room intelligent entrance guard opening method and opening system
CN205087727U (en) * 2015-10-12 2016-03-16 广州广日电梯工业有限公司 Encrypt control system that ladder was called together to two -dimensional code through discernment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN203025807U (en) * 2012-12-18 2013-06-26 咏动科技股份有限公司 QR (Quick Response) code door control system
CN104780043A (en) * 2014-01-14 2015-07-15 中国电信股份有限公司 Access control method and system based on two-dimension code
CN103955982A (en) * 2014-05-22 2014-07-30 国家电网公司 Method and device for identifying time-varying dynamic two-dimensional code entrance guard
CN104851174A (en) * 2015-06-16 2015-08-19 赵旭东 High-reliability machine room intelligent entrance guard opening method and opening system
CN205087727U (en) * 2015-10-12 2016-03-16 广州广日电梯工业有限公司 Encrypt control system that ladder was called together to two -dimensional code through discernment

Also Published As

Publication number Publication date
CN110247880A (en) 2019-09-17

Similar Documents

Publication Publication Date Title
CN109325342B (en) Identity information management method, device, computer equipment and storage medium
JP5592742B2 (en) Entrance / exit management system and method
CN109992949B (en) Equipment authentication method, over-the-air card writing method and equipment authentication device
JPWO2007094165A1 (en) Identification system and program, and identification method
KR102124838B1 (en) Access Control Method Using SmartKey AND Access Control System for Them
JP6717108B2 (en) Information processing apparatus, information processing system, program, and information processing method
US20210234858A1 (en) Authentication system, authentication method and authentication apparatus
US10764049B2 (en) Method for determining approval for access to gate through network, and server and computer-readable recording media using the same
CN115758398B (en) Access control data processing method and device, access control system and storage medium
CN112200949A (en) Entrance guard starting method and device and identity verification system
CN110713084A (en) Visitor management method, device and system for elevator
CN110247879B (en) Generation method and generation system of elevator calling authentication code, and elevator calling authentication method and system
WO2012001768A1 (en) Mobile communication terminal, method for activating same, and network communication system
KR102112975B1 (en) Access Control Method Using SmartKey Based On Hybrid Security Environment AND Access Control System for Them
JP2011134030A (en) Biometric authentication system
CN113221095A (en) Application program protection method and device, electronic equipment and storage medium
CN110516427B (en) Terminal user identity authentication method and device, storage medium and computer equipment
WO2013118302A1 (en) Authentication management system, authentication management method, and authentication management program
CN110247880B (en) Generation method and generation system of elevator calling authentication code, and elevator calling authentication method and system
KR102104823B1 (en) Method and system for protecting personal information infringement using division of authentication process and biometrics authentication
CN110719257A (en) Method, device and equipment for managing authority of single-page application and storage medium
CN114448722B (en) Cross-browser login method and device, computer equipment and storage medium
CN111835692B (en) Information management and distribution system and method
CN111478770A (en) Security verification method and device, computer equipment and storage medium
EP4329241A1 (en) Data management system, data management method, and non-transitory recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant