CN110349301A - Gate inhibition's open method and device - Google Patents
Gate inhibition's open method and device Download PDFInfo
- Publication number
- CN110349301A CN110349301A CN201910427662.XA CN201910427662A CN110349301A CN 110349301 A CN110349301 A CN 110349301A CN 201910427662 A CN201910427662 A CN 201910427662A CN 110349301 A CN110349301 A CN 110349301A
- Authority
- CN
- China
- Prior art keywords
- card information
- door lock
- intelligent door
- gate inhibition
- decrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Lock And Its Accessories (AREA)
Abstract
The embodiment of the present invention provides a kind of gate inhibition's open method and device, belongs to field of security technology.It include: to obtain encrypted characters string that first movement terminal is sent by bluetooth and by preset times encryption;Encrypted characters string is decrypted, and according to the decrypted result of deciphering module, controls intelligent door lock and opens.Method provided in an embodiment of the present invention, by obtaining encrypted characters string that first movement terminal is sent by bluetooth and by preset times encryption.Encrypted characters string is decrypted, and according to the decrypted result of deciphering module, controls intelligent door lock and opens.It is opened since intelligent door lock can be realized by mobile terminal in user, to be not take up both hands and simple and easy and user experience is preferable.In addition, since intelligent door lock can be opened in such a way that multi-enciphering is decrypted, to improve the safety of intelligent door lock.
Description
Technical field
The present invention relates to field of security technology more particularly to a kind of gate inhibition's open methods and device.
Background technique
With the high speed development of social economy, people start to pursue the living environment of comfortable safety, and intelligent building is fast therewith
Exhibition is hailed, access control system is increasingly paid attention to as the significant element in intelligent building, and access control system is also known as gate inhibition's entrance
Automated management system is related to many new technology necks such as electronics, machinery, optics, computer technology, the communication technology, biotechnology
Domain has to multiple functions such as portal access and exit control, security and anti-theft, alarms, it mainly facilitates interior employee or resident to enter and leave, Du
Exhausted nonnative personnel arbitrarily enters and leaves, and not only facilitates internal control, but also enhances internal security personnel.
In the related art, access control system mostly uses the identification authentication mode of coded lock or fingerprint recognition, it is desirable that personnel are close
Distance operation, then seems extremely inconvenient when user's both hands are occupied, and when user fingerprints are impaired or password is forgotten, just
It can not be by gate inhibition, so that customer experience is very poor.
Summary of the invention
To solve the above-mentioned problems, the embodiment of the present invention provides one kind and overcomes the above problem or at least be partially solved
State the gate inhibition's open method and device of problem.
According to a first aspect of the embodiments of the present invention, a kind of gate inhibition's open method is provided, comprising:
Obtain encrypted characters string that first movement terminal is sent by bluetooth and by preset times encryption;
Encrypted characters string is decrypted, and according to the decrypted result of deciphering module, controls intelligent door lock and opens.
According to a second aspect of the embodiments of the present invention, a kind of gate inhibition's opening device is provided, comprising:
Module is obtained, for obtaining encrypted word that first movement terminal is sent by bluetooth and by preset times encryption
Symbol string;
First opening module controls intelligence for encrypted characters string to be decrypted, and according to the decrypted result of deciphering module
It can door lock unlatching.
According to a third aspect of the embodiments of the present invention, a kind of electronic equipment is provided, comprising:
At least one processor;And
At least one processor being connect with processor communication, in which:
Memory is stored with the program instruction that can be executed by processor, and the instruction of processor caller is able to carry out first party
Gate inhibition's open method provided by any possible implementation in the various possible implementations in face.
According to the fourth aspect of the invention, a kind of non-transient computer readable storage medium, non-transient computer are provided
Readable storage medium storing program for executing stores computer instruction, and computer instruction makes the various possible implementations of computer execution first aspect
In gate inhibition's open method provided by any possible implementation.
Gate inhibition's open method and device provided in an embodiment of the present invention are sent by obtaining first movement terminal by bluetooth
And by preset times encryption encrypted characters string.Encrypted characters string is decrypted, and according to the decryption knot of deciphering module
Fruit, control intelligent door lock are opened.Due to user by mobile terminal can be realized intelligent door lock open, thus be not take up both hands and
Simple and easy and user experience is preferable.In addition, since intelligent door lock can be opened in such a way that multi-enciphering is decrypted, thus
Improve the safety of intelligent door lock.
It should be understood that above general description and following detailed description be it is exemplary and explanatory, can not
Limit the embodiment of the present invention.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair
Bright some embodiments for those of ordinary skill in the art without creative efforts, can be with root
Other attached drawings are obtained according to these attached drawings.
Fig. 1 is a kind of flow diagram of gate inhibition's open method provided in an embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram of gate inhibition's opening device provided in an embodiment of the present invention;
Fig. 3 is the block diagram of a kind of electronic equipment provided in an embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
For the problems in the relevant technologies, the embodiment of the invention provides a kind of gate inhibition's open methods.The execution of this method
Main body can be intelligent door lock, and this method can be applied to enabling scene, cell gate inhibition's scene in different scenes, such as enterprise
And enabling scene of room tenant etc., the present invention is not especially limit this.In order to make it easy to understand, the embodiment of the present invention
For being applied to the enabling scene of room tenant, method flow is explained.Wherein, the enabling field of room tenant
Scape generally refers to rent a house for a set of, corresponds to the entry door for being equipped with intelligent door lock, being rented a house due to the set might have very
Multi-tenant, so that these tenants when entrance is rented a house, are required to open intelligent door lock.
Referring to Fig. 1, this method comprises: 101, acquisition first movement terminal is sent by bluetooth and process preset times add
Close encrypted characters string;102, encrypted characters string is decrypted, and according to the decrypted result of deciphering module, controls intelligent door lock
It opens.
Specifically, by taking tenant is the first user as an example, when the first user needs to open entry door, the first shifting can be opened
The Bluetooth function of dynamic terminal, and by first movement terminal close to intelligent door lock.At this point, installed in first movement terminal with intelligence
The relevant APP of door lock can send the character string for opening intelligent door lock by bluetooth to intelligent door lock.It should be noted that
In order to guarantee safety during actual implementation, for first movement terminal when sending character string to intelligent door lock, APP can be to word
Symbol string carries out preset times encryption, obtains encrypted characters string.
For first movement terminal after sending encrypted characters string to intelligent door lock, the bluetooth module in intelligent door lock is available
Encrypted characters string.Bluetooth module in intelligent door lock, can be by deciphering module to encrypted characters after getting encrypted characters string
String is decrypted.Door lock control module in intelligent door lock is used to open intelligent door what the first movement terminal got was sent
After the character string of lock, obtained character string can be compared with the pre-stored character string library with unlocking authority.If should
Character string is located in character string library, then controls unlatching intelligent door lock.Conversely, can then prompt unlocking authentication failed.
Method provided in an embodiment of the present invention, by obtaining that first movement terminal is sent by bluetooth and passing through default time
The encrypted characters string of number encryption.Encrypted characters string is decrypted, and according to the decrypted result of deciphering module, controls intelligent door lock
It opens.It is opened since intelligent door lock can be realized by mobile terminal in user, to be not take up both hands and simple and easy and user
Experience is preferable.In addition, since intelligent door lock can be opened in such a way that multi-enciphering is decrypted, to improve intelligent door lock
Safety.
Content based on the above embodiment, as a kind of alternative embodiment, encrypted characters string is based on 3 groups randomly selected
What key and 3 group encryption algorithms obtained after being encrypted, preset times are 3 times.
Wherein, preset times can be 3 times, can specifically be encrypted in such a way that 3 secondary keys encrypt, the present invention is real
It applies example and this is not especially limited.It should be noted that APP, can be close from preset 10 groups when carrying out the encryption of 3 secondary keys
Key randomly chooses 3 group keys, and 3 group encryption algorithms are randomly choosed in preset 10 group encryption algorithm, and based on random selection
3 group keys and 3 group encryption algorithms, character string is encrypted, encrypted characters string is obtained.
It should be noted that as shown in the above, APP, can when encrypting to character string in first movement terminal
It is encrypted with randomly choosing 3 group keys and 3 group encryption algorithms.Correspondingly, intelligent door lock can be preset 10 group keys and
10 group encryption algorithms, and 10 group key and 10 group encryption algorithms are based on, it is decrypted by 3 times, obtains decrypted result namely first
Mobile terminal is used to open the character string of intelligent door lock.It should be noted that every time after the completion of the communication process of encrypting and decrypting, it is close
Key can update simultaneously with Encryption Algorithm, and the present invention is not especially limit this.
Method provided in an embodiment of the present invention, since key and Encryption Algorithm can be randomly selected, to for opening intelligence
The character string of energy door lock is repeatedly encrypted, so as to improve safety.
Content based on the above embodiment, as a kind of alternative embodiment, this method further include: reading identity card information,
And ID card information is verified;According to the verification result to ID card information, controls intelligent door lock and open.
It specifically,, can be by the body of oneself when the first user needs to open entry door by taking tenant is the first user as an example
Part is demonstrate,proved close to intelligent door lock.At this point, the identity card read module in intelligent door lock can be with reading identity card information.Wherein, identity
The check code that information can be identity card is demonstrate,proved, the present invention is not especially limit this.Door lock control in intelligent door lock
Module can verify ID card information after getting the ID card information that identity card read module is read.If verifying
Success, then control unlatching intelligent door lock.Conversely, can then prompt unlocking authentication failed.
Method provided in an embodiment of the present invention is verified by reading identity card information, and to ID card information.According to
To the verification result of ID card information, controls intelligent door lock and open.It is opened since intelligent door lock can be realized by identity card in user
It opens, to be not take up both hands and simple and easy, and user experience is preferable.
Content based on the above embodiment, as a kind of alternative embodiment, the embodiment of the present invention is not to according to identity card
The verification result of information, the mode that control intelligent door lock is opened specifically limit, including but not limited to: by ID card information and in advance
The ID card information library first stored is compared;If ID card information is present in ID card information library, it is determined that identity card letter
Breath is verified, and opens intelligent door lock.
Specifically, the door lock control module in intelligent door lock is getting the identity card letter that identity card read module reads
After breath, ID card information can be compared with pre-stored ID card information library.If the ID card information is located at identity card
In information bank, then unlatching intelligent door lock is controlled.Conversely, can then prompt unlocking authentication failed.Wherein, the body in ID card information library
Part card information is that by real-name authentication and unlocking authority is awarded.
Method provided in an embodiment of the present invention, by comparing ID card information and pre-stored ID card information library
It is right, if ID card information is present in ID card information library, it is determined that ID card information is verified, and opens intelligent door lock.
Due to user by identity card can be realized intelligent door lock open, thus be not take up both hands and simple and easy and user experience compared with
It is good.
Content based on the above embodiment, as a kind of alternative embodiment, this method further include: obtain first movement terminal
Transmission by real-name authentication and the ID card information of unlocking authority is awarded, and be stored in ID card information library;Wherein, body
Part card information is to carry out real-name authentication by first movement terminal and authorize unlocking authority by the second mobile terminal.
By the content of above-described embodiment it is found that the first user can open intelligent door lock by identity card.In order to guarantee to pacify
Quan Xing, the ID card information of the first user need to pass through real-name authentication.For example, just in case tenant is the crime point of public security system record
Son, can also be in time by finding by real-name authentication from the background, and is notified to public security system.By taking tenant is the first user as an example, if
First user has passed through real-name authentication, and unlocking authority is awarded in the ID card information of the first user, then the first user can pass through
The ID card information of itself is sent to intelligent door lock, is saved by intelligent door lock by the Bluetooth function of first movement terminal, with
So that thus intelligent door lock can be formed by real-name authentication and with the ID card information library of unlocking authority.It wherein, is identity card
Information authorizes the operation of unlocking authority, and by real-name authentication and the ID card information of unlocking authority will be awarded is sent to intelligence
The operation of energy door lock can be executed by the APP installed in first movement terminal, and the embodiment of the present invention does not limit this specifically
It is fixed.
Wherein, the first user can shoot itself facial image, the people that first movement terminal can be shot according to the first user
The identity card head portrait of face image and the first user carry out real-name authentication to the first user.Specifically, the first user can open
The APP relevant to intelligent door lock installed in first movement terminal, the facial image of itself is shot by first movement terminal.The
One mobile terminal can prompt the first user of ground to input the identification card number of itself after the facial image for obtaining the first user shooting,
To which identity-based card number transfers the identity card head portrait of the first user from public security system.If the two matches, first can determine
User's real-name authentication passes through.It is on the contrary, it is determined that the failure of first user's real-name authentication.It should be noted that in addition to by the first user
It inputs except the identification card number of itself, can also identify the identity card of the first user to obtain by way of optical character identification
Identification card number, the present invention is not especially limit this.
Method provided in an embodiment of the present invention, since the ID card information for opening intelligent door lock is to need to pass through reality
Name authenticates and needs to be awarded unlocking authority, so as to improve safety.
Content based on the above embodiment, as a kind of alternative embodiment, this method further include: obtain the second mobile terminal
Transmission by real-name authentication and the ID card information of unlocking authority is awarded, and be stored in ID card information library;Wherein, body
Part card information is to carry out real-name authentication by first movement terminal and authorize unlocking authority by the second mobile terminal.
Wherein, first movement terminal can send out the ID card information of the first user after first user's real-name authentication passes through
It send to the second mobile terminal.Second mobile terminal can receive the ID card information that first movement terminal is sent, and use according to second
The authorized order of family input authorizes unlocking authority to ID card information.Specifically, with tenant for the first user, landlord is the second use
For family.For first user after carrying out real-name authentication by first movement terminal, first movement terminal can will be after real-name authentication
ID card information be sent to the second mobile terminal, by second user by input authorized order, be the first user identity card
Information authorizes unlocking authority, and the first user is passed through real-name authentication by the second mobile terminal and the identity of unlocking authority is awarded
Card information is sent to intelligent door lock.
It should be noted that for the intelligent door lock newly installed, need to bind a management user, management user can be with
Possess all permissions of intelligent door lock, such as managing user can be landlord, and landlord can authorize different user and pass through its identity card
The unlocking authority unlocked.Specifically, second user can pass through the two dimensional code mark on the second mobile scanning terminal intelligent door lock
Know, with the administration authority for second user binding to intelligent door lock.
Certainly, it to be landlord that user is managed in actual implementation, but as super keepe.Wherein, super management
Member can also have the permission for authorizing unlocking authority namely super keepe that can award other than having and authorizing unlocking authority
Giving user has the permission for authorizing other users unlocking authority, and the present invention is not especially limit this.
It should also be noted that, either landlord or tenant are required to carry out real-name authentication in actual implementation, so as to
The facial image that ID card information and user are shot is sent to the server of public security system, so that real-name authentication is realized, to mention
High security.
Content based on the above embodiment, as a kind of alternative embodiment, this method further include: IC card data are read, and
According to the verification result to IC card data, controls door lock and open.
Specifically, by tenant be the first user for, when the first user needs to open entry door, can by IC card close to
Intelligent door lock.At this point, the IC card read module in intelligent door lock can read IC card data.Door lock in intelligent door lock controls mould
IC card data can be had unlocking authority with pre-stored after getting the IC card data that IC card read module is read by block
IC card database be compared.If the IC card data are located in IC card database, unlatching intelligent door lock is controlled.Conversely, then
It can prompt unlocking authentication failed.
Method provided in an embodiment of the present invention obtains IC card data by IC card read module, and according to IC card data control
Door lock processed is opened.It is opened since intelligent door lock can be realized by IC card in user, to be not take up both hands and simple and easy and use
Family experience is preferable.
Content based on the above embodiment, the embodiment of the invention provides a kind of gate inhibition's opening device, which opens dress
It sets for executing the gate inhibition's open method provided in above method embodiment.Referring to fig. 2, which includes:
Module 201 is obtained, for obtaining first movement terminal is sent by bluetooth and adding by preset times encryption
Close character string;
First opening module 202, for encrypted characters string to be decrypted, and according to the decrypted result of deciphering module, control
Intelligent door lock processed is opened.
As a kind of alternative embodiment, encrypted characters string is carried out based on 3 group keys randomly selected and 3 group encryption algorithms
It is obtained after encryption, preset times are 3 times.
As a kind of alternative embodiment, the device further include:
Authentication module is used for reading identity card information, and verifies to ID card information;
Second opening module, for according to the verification result to ID card information, control intelligent door lock to be opened.
As a kind of alternative embodiment, the second opening module, for believing ID card information and pre-stored identity card
Breath library is compared;If ID card information is present in ID card information library, it is determined that ID card information is verified, and is opened
Intelligent door lock, the ID card information in ID card information library is that by real-name authentication and unlocking authority is awarded.
As a kind of alternative embodiment, the device further include:
First memory module, for obtain first movement terminal transmission by real-name authentication and unlocking authority is awarded
ID card information, and be stored in ID card information library;Wherein, ID card information is to carry out real name by first movement terminal to recognize
It demonstrate,proves and authorizes unlocking authority by the second mobile terminal.
As a kind of alternative embodiment, the device further include:
Second memory module, for obtain the second mobile terminal transmission by real-name authentication and unlocking authority is awarded
ID card information, and be stored in ID card information library;Wherein, ID card information is to carry out real name by first movement terminal to recognize
It demonstrate,proves and authorizes unlocking authority by the second mobile terminal.
As a kind of alternative embodiment, the device further include:
Third opening module controls door lock and opens for reading IC card data, and according to the verification result to IC card data
It opens.
Device provided in an embodiment of the present invention, by obtaining that first movement terminal is sent by bluetooth and passing through default time
The encrypted characters string of number encryption.Encrypted characters string is decrypted, and according to the decrypted result of deciphering module, controls intelligent door lock
It opens.It is opened since intelligent door lock can be realized by mobile terminal in user, to be not take up both hands and simple and easy and user
Experience is preferable.In addition, since intelligent door lock can be opened in such a way that multi-enciphering is decrypted, to improve intelligent door lock
Safety.
Fig. 3 illustrates the entity structure schematic diagram of a kind of electronic equipment, as shown in figure 3, the electronic equipment may include: place
Manage device (processor) 310, communication interface (Communications Interface) 320,330 He of memory (memory)
Communication bus 340, wherein processor 310, communication interface 320, memory 330 complete mutual lead to by communication bus 340
Letter.Processor 310 can call the logical order in memory 330, to execute following method: obtaining first movement terminal and pass through
Encrypted characters string that bluetooth is sent and by preset times encryption;Encrypted characters string is decrypted, and according to deciphering module
Decrypted result, control intelligent door lock open.
In addition, the logical order in above-mentioned memory 330 can be realized by way of SFU software functional unit and conduct
Independent product when selling or using, can store in a computer readable storage medium.Based on this understanding, originally
Substantially the part of the part that contributes to existing technology or the technical solution can be in other words for the technical solution of invention
The form of software product embodies, which is stored in a storage medium, including some instructions to
So that a computer equipment (can be personal computer, electronic equipment or the network equipment etc.) executes each reality of the present invention
Apply all or part of the steps of a method.And storage medium above-mentioned include: USB flash disk, mobile hard disk, read-only memory (ROM,
Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. it is various
It can store the medium of program code.
The embodiment of the present invention also provides a kind of non-transient computer readable storage medium, is stored thereon with computer program,
The computer program is implemented to carry out the various embodiments described above offer method when being executed by processor, for example, obtain first
Encrypted characters string that mobile terminal is sent by bluetooth and by preset times encryption;Encrypted characters string is decrypted, and
According to the decrypted result of deciphering module, controls intelligent door lock and open.
The apparatus embodiments described above are merely exemplary, wherein unit can be as illustrated by the separation member
Or may not be and be physically separated, component shown as a unit may or may not be physical unit, i.e.,
It can be located in one place, or may be distributed over multiple network units.It can select according to the actual needs therein
Some or all of the modules achieves the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creative labor
In the case where dynamic, it can understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can
It realizes by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, on
Stating technical solution, substantially the part that contributes to existing technology can be embodied in the form of software products in other words, should
Computer software product may be stored in a computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including several fingers
It enables and using so that a computer equipment (can be personal computer, server or the network equipment etc.) executes each implementation
Method described in certain parts of example or embodiment.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although
Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used
To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features;
And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and
Range.
Claims (10)
1. a kind of gate inhibition's open method characterized by comprising
Obtain encrypted characters string that first movement terminal is sent by bluetooth and by preset times encryption;
The encrypted characters string is decrypted, and according to the decrypted result of the deciphering module, controls intelligent door lock and opens.
2. gate inhibition's open method according to claim 1, which is characterized in that the encrypted characters string is to be based on randomly selecting
3 group keys and 3 group encryption algorithms encrypted after obtain, the preset times are 3 times.
3. gate inhibition's open method according to claim 1, which is characterized in that further include:
Reading identity card information, and the ID card information is verified;
According to the verification result to the ID card information, controls intelligent door lock and open.
4. gate inhibition's open method according to claim 3, which is characterized in that the basis tests the ID card information
Card is as a result, control intelligent door lock is opened, comprising:
The ID card information is compared with pre-stored ID card information library;
If the ID card information is present in the ID card information library, it is determined that the ID card information is verified, and
Intelligent door lock is opened, the ID card information in the ID card information library is that by real-name authentication and unlocking authority is awarded
's.
5. gate inhibition's open method according to claim 4, which is characterized in that further include:
Obtain that first movement terminal sends by real-name authentication and the ID card information of unlocking authority is awarded, and be stored in institute
It states in ID card information library;Wherein, the ID card information is to carry out real-name authentication by first movement terminal and moved by second
Dynamic terminal authorizes unlocking authority.
6. gate inhibition's open method according to claim 4, which is characterized in that further include:
Obtain the transmission of the second mobile terminal by real-name authentication and the ID card information of unlocking authority is awarded, and be stored in institute
It states in ID card information library;Wherein, the ID card information is to carry out real-name authentication by first movement terminal and moved by second
Dynamic terminal authorizes unlocking authority.
7. gate inhibition's open method according to claim 1, which is characterized in that further include:
IC card data are read, and according to the verification result to the IC card data, controls door lock and opens.
8. a kind of gate inhibition's opening device characterized by comprising
Module is obtained, for obtaining encrypted characters that first movement terminal is sent by bluetooth and by preset times encryption
String;
First opening module, for the encrypted characters string to be decrypted, and according to the decrypted result of the deciphering module, control
Intelligent door lock processed is opened.
9. a kind of electronic equipment characterized by comprising
At least one processor;And
At least one processor being connect with the processor communication, in which:
The memory is stored with the program instruction that can be executed by the processor, and the processor calls described program to instruct energy
Enough methods executed as described in claim 1 to 7 is any.
10. a kind of non-transient computer readable storage medium, which is characterized in that the non-transient computer readable storage medium is deposited
Computer instruction is stored up, the computer instruction makes the computer execute the method as described in claim 1 to 7 is any.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910427662.XA CN110349301A (en) | 2019-05-22 | 2019-05-22 | Gate inhibition's open method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910427662.XA CN110349301A (en) | 2019-05-22 | 2019-05-22 | Gate inhibition's open method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110349301A true CN110349301A (en) | 2019-10-18 |
Family
ID=68174658
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910427662.XA Pending CN110349301A (en) | 2019-05-22 | 2019-05-22 | Gate inhibition's open method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110349301A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110910543A (en) * | 2019-12-12 | 2020-03-24 | 京东方科技集团股份有限公司 | Intelligent unlocking system and unlocking method thereof |
CN113808316A (en) * | 2021-11-19 | 2021-12-17 | 正方软件股份有限公司 | College personnel safety management method and system based on intelligent mobile terminal |
-
2019
- 2019-05-22 CN CN201910427662.XA patent/CN110349301A/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110910543A (en) * | 2019-12-12 | 2020-03-24 | 京东方科技集团股份有限公司 | Intelligent unlocking system and unlocking method thereof |
CN113808316A (en) * | 2021-11-19 | 2021-12-17 | 正方软件股份有限公司 | College personnel safety management method and system based on intelligent mobile terminal |
CN113808316B (en) * | 2021-11-19 | 2022-02-22 | 正方软件股份有限公司 | College personnel safety management method and system based on intelligent mobile terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10706141B2 (en) | Methods and systems for identity creation, verification and management | |
CN110213246B (en) | Wide-area multi-factor identity authentication system | |
RU2718226C2 (en) | Biometric data safe handling systems and methods | |
CN110149328B (en) | Interface authentication method, device, equipment and computer readable storage medium | |
US20040117636A1 (en) | System, method and apparatus for secure two-tier backup and retrieval of authentication information | |
CN106537403A (en) | System for accessing data from multiple devices | |
EP2513834B1 (en) | System and method for verifying the identity of an individual by employing biometric data features associated with the individual as well as a computer program product for performing said method | |
CN108600213B (en) | Composite identity authentication method and composite identity authentication system applying same | |
JP2006209697A (en) | Individual authentication system, and authentication device and individual authentication method used for the individual authentication system | |
CN107180173A (en) | unlocking method and device | |
CN110766850B (en) | Visitor information management method, access control system, server and storage medium | |
CN110349301A (en) | Gate inhibition's open method and device | |
US20100125734A1 (en) | Encrypted image with matryoshka structure and mutual agreement authentication system and method using the same | |
CN106101140B (en) | A kind of method and server of authentification of message | |
CN109617703B (en) | Key management method and device, electronic equipment and storage medium | |
CN109522694A (en) | A kind of identification system based on computer network | |
Cavoukian et al. | Keynote paper: Biometric encryption: Technology for strong authentication, security and privacy | |
CN110415406A (en) | A kind of double nets are mutual to monitor security intelligent door lock system for speech recognition | |
JP4303952B2 (en) | Multiple authentication system, computer program, and multiple authentication method | |
CN110246246A (en) | Access control management method and device | |
CN110335373A (en) | Intelligent door lock and intelligent access control system | |
US20220277102A1 (en) | Process using one-way hashing function for secure collection, presentation and storage of PII | |
Catuogno et al. | Flexible and robust enterprise right management | |
CN113704732A (en) | User identity verification method and device and electronic equipment | |
CN108492214B (en) | Mobile terminal, server, management system and self-service check-in system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20191018 |
|
WD01 | Invention patent application deemed withdrawn after publication |