CN110349301A - Gate inhibition's open method and device - Google Patents

Gate inhibition's open method and device Download PDF

Info

Publication number
CN110349301A
CN110349301A CN201910427662.XA CN201910427662A CN110349301A CN 110349301 A CN110349301 A CN 110349301A CN 201910427662 A CN201910427662 A CN 201910427662A CN 110349301 A CN110349301 A CN 110349301A
Authority
CN
China
Prior art keywords
card information
door lock
intelligent door
gate inhibition
decrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910427662.XA
Other languages
Chinese (zh)
Inventor
王绍军
赵阳
张付军
王克
吴现杰
王素梅
姜涛
端晓凯
梁亮
张小龙
李笑天
任超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hebei Jianji Network Information Technology Co Ltd
Original Assignee
Hebei Jianji Network Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hebei Jianji Network Information Technology Co Ltd filed Critical Hebei Jianji Network Information Technology Co Ltd
Priority to CN201910427662.XA priority Critical patent/CN110349301A/en
Publication of CN110349301A publication Critical patent/CN110349301A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the present invention provides a kind of gate inhibition's open method and device, belongs to field of security technology.It include: to obtain encrypted characters string that first movement terminal is sent by bluetooth and by preset times encryption;Encrypted characters string is decrypted, and according to the decrypted result of deciphering module, controls intelligent door lock and opens.Method provided in an embodiment of the present invention, by obtaining encrypted characters string that first movement terminal is sent by bluetooth and by preset times encryption.Encrypted characters string is decrypted, and according to the decrypted result of deciphering module, controls intelligent door lock and opens.It is opened since intelligent door lock can be realized by mobile terminal in user, to be not take up both hands and simple and easy and user experience is preferable.In addition, since intelligent door lock can be opened in such a way that multi-enciphering is decrypted, to improve the safety of intelligent door lock.

Description

Gate inhibition's open method and device
Technical field
The present invention relates to field of security technology more particularly to a kind of gate inhibition's open methods and device.
Background technique
With the high speed development of social economy, people start to pursue the living environment of comfortable safety, and intelligent building is fast therewith Exhibition is hailed, access control system is increasingly paid attention to as the significant element in intelligent building, and access control system is also known as gate inhibition's entrance Automated management system is related to many new technology necks such as electronics, machinery, optics, computer technology, the communication technology, biotechnology Domain has to multiple functions such as portal access and exit control, security and anti-theft, alarms, it mainly facilitates interior employee or resident to enter and leave, Du Exhausted nonnative personnel arbitrarily enters and leaves, and not only facilitates internal control, but also enhances internal security personnel.
In the related art, access control system mostly uses the identification authentication mode of coded lock or fingerprint recognition, it is desirable that personnel are close Distance operation, then seems extremely inconvenient when user's both hands are occupied, and when user fingerprints are impaired or password is forgotten, just It can not be by gate inhibition, so that customer experience is very poor.
Summary of the invention
To solve the above-mentioned problems, the embodiment of the present invention provides one kind and overcomes the above problem or at least be partially solved State the gate inhibition's open method and device of problem.
According to a first aspect of the embodiments of the present invention, a kind of gate inhibition's open method is provided, comprising:
Obtain encrypted characters string that first movement terminal is sent by bluetooth and by preset times encryption;
Encrypted characters string is decrypted, and according to the decrypted result of deciphering module, controls intelligent door lock and opens.
According to a second aspect of the embodiments of the present invention, a kind of gate inhibition's opening device is provided, comprising:
Module is obtained, for obtaining encrypted word that first movement terminal is sent by bluetooth and by preset times encryption Symbol string;
First opening module controls intelligence for encrypted characters string to be decrypted, and according to the decrypted result of deciphering module It can door lock unlatching.
According to a third aspect of the embodiments of the present invention, a kind of electronic equipment is provided, comprising:
At least one processor;And
At least one processor being connect with processor communication, in which:
Memory is stored with the program instruction that can be executed by processor, and the instruction of processor caller is able to carry out first party Gate inhibition's open method provided by any possible implementation in the various possible implementations in face.
According to the fourth aspect of the invention, a kind of non-transient computer readable storage medium, non-transient computer are provided Readable storage medium storing program for executing stores computer instruction, and computer instruction makes the various possible implementations of computer execution first aspect In gate inhibition's open method provided by any possible implementation.
Gate inhibition's open method and device provided in an embodiment of the present invention are sent by obtaining first movement terminal by bluetooth And by preset times encryption encrypted characters string.Encrypted characters string is decrypted, and according to the decryption knot of deciphering module Fruit, control intelligent door lock are opened.Due to user by mobile terminal can be realized intelligent door lock open, thus be not take up both hands and Simple and easy and user experience is preferable.In addition, since intelligent door lock can be opened in such a way that multi-enciphering is decrypted, thus Improve the safety of intelligent door lock.
It should be understood that above general description and following detailed description be it is exemplary and explanatory, can not Limit the embodiment of the present invention.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Bright some embodiments for those of ordinary skill in the art without creative efforts, can be with root Other attached drawings are obtained according to these attached drawings.
Fig. 1 is a kind of flow diagram of gate inhibition's open method provided in an embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram of gate inhibition's opening device provided in an embodiment of the present invention;
Fig. 3 is the block diagram of a kind of electronic equipment provided in an embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
For the problems in the relevant technologies, the embodiment of the invention provides a kind of gate inhibition's open methods.The execution of this method Main body can be intelligent door lock, and this method can be applied to enabling scene, cell gate inhibition's scene in different scenes, such as enterprise And enabling scene of room tenant etc., the present invention is not especially limit this.In order to make it easy to understand, the embodiment of the present invention For being applied to the enabling scene of room tenant, method flow is explained.Wherein, the enabling field of room tenant Scape generally refers to rent a house for a set of, corresponds to the entry door for being equipped with intelligent door lock, being rented a house due to the set might have very Multi-tenant, so that these tenants when entrance is rented a house, are required to open intelligent door lock.
Referring to Fig. 1, this method comprises: 101, acquisition first movement terminal is sent by bluetooth and process preset times add Close encrypted characters string;102, encrypted characters string is decrypted, and according to the decrypted result of deciphering module, controls intelligent door lock It opens.
Specifically, by taking tenant is the first user as an example, when the first user needs to open entry door, the first shifting can be opened The Bluetooth function of dynamic terminal, and by first movement terminal close to intelligent door lock.At this point, installed in first movement terminal with intelligence The relevant APP of door lock can send the character string for opening intelligent door lock by bluetooth to intelligent door lock.It should be noted that In order to guarantee safety during actual implementation, for first movement terminal when sending character string to intelligent door lock, APP can be to word Symbol string carries out preset times encryption, obtains encrypted characters string.
For first movement terminal after sending encrypted characters string to intelligent door lock, the bluetooth module in intelligent door lock is available Encrypted characters string.Bluetooth module in intelligent door lock, can be by deciphering module to encrypted characters after getting encrypted characters string String is decrypted.Door lock control module in intelligent door lock is used to open intelligent door what the first movement terminal got was sent After the character string of lock, obtained character string can be compared with the pre-stored character string library with unlocking authority.If should Character string is located in character string library, then controls unlatching intelligent door lock.Conversely, can then prompt unlocking authentication failed.
Method provided in an embodiment of the present invention, by obtaining that first movement terminal is sent by bluetooth and passing through default time The encrypted characters string of number encryption.Encrypted characters string is decrypted, and according to the decrypted result of deciphering module, controls intelligent door lock It opens.It is opened since intelligent door lock can be realized by mobile terminal in user, to be not take up both hands and simple and easy and user Experience is preferable.In addition, since intelligent door lock can be opened in such a way that multi-enciphering is decrypted, to improve intelligent door lock Safety.
Content based on the above embodiment, as a kind of alternative embodiment, encrypted characters string is based on 3 groups randomly selected What key and 3 group encryption algorithms obtained after being encrypted, preset times are 3 times.
Wherein, preset times can be 3 times, can specifically be encrypted in such a way that 3 secondary keys encrypt, the present invention is real It applies example and this is not especially limited.It should be noted that APP, can be close from preset 10 groups when carrying out the encryption of 3 secondary keys Key randomly chooses 3 group keys, and 3 group encryption algorithms are randomly choosed in preset 10 group encryption algorithm, and based on random selection 3 group keys and 3 group encryption algorithms, character string is encrypted, encrypted characters string is obtained.
It should be noted that as shown in the above, APP, can when encrypting to character string in first movement terminal It is encrypted with randomly choosing 3 group keys and 3 group encryption algorithms.Correspondingly, intelligent door lock can be preset 10 group keys and 10 group encryption algorithms, and 10 group key and 10 group encryption algorithms are based on, it is decrypted by 3 times, obtains decrypted result namely first Mobile terminal is used to open the character string of intelligent door lock.It should be noted that every time after the completion of the communication process of encrypting and decrypting, it is close Key can update simultaneously with Encryption Algorithm, and the present invention is not especially limit this.
Method provided in an embodiment of the present invention, since key and Encryption Algorithm can be randomly selected, to for opening intelligence The character string of energy door lock is repeatedly encrypted, so as to improve safety.
Content based on the above embodiment, as a kind of alternative embodiment, this method further include: reading identity card information, And ID card information is verified;According to the verification result to ID card information, controls intelligent door lock and open.
It specifically,, can be by the body of oneself when the first user needs to open entry door by taking tenant is the first user as an example Part is demonstrate,proved close to intelligent door lock.At this point, the identity card read module in intelligent door lock can be with reading identity card information.Wherein, identity The check code that information can be identity card is demonstrate,proved, the present invention is not especially limit this.Door lock control in intelligent door lock Module can verify ID card information after getting the ID card information that identity card read module is read.If verifying Success, then control unlatching intelligent door lock.Conversely, can then prompt unlocking authentication failed.
Method provided in an embodiment of the present invention is verified by reading identity card information, and to ID card information.According to To the verification result of ID card information, controls intelligent door lock and open.It is opened since intelligent door lock can be realized by identity card in user It opens, to be not take up both hands and simple and easy, and user experience is preferable.
Content based on the above embodiment, as a kind of alternative embodiment, the embodiment of the present invention is not to according to identity card The verification result of information, the mode that control intelligent door lock is opened specifically limit, including but not limited to: by ID card information and in advance The ID card information library first stored is compared;If ID card information is present in ID card information library, it is determined that identity card letter Breath is verified, and opens intelligent door lock.
Specifically, the door lock control module in intelligent door lock is getting the identity card letter that identity card read module reads After breath, ID card information can be compared with pre-stored ID card information library.If the ID card information is located at identity card In information bank, then unlatching intelligent door lock is controlled.Conversely, can then prompt unlocking authentication failed.Wherein, the body in ID card information library Part card information is that by real-name authentication and unlocking authority is awarded.
Method provided in an embodiment of the present invention, by comparing ID card information and pre-stored ID card information library It is right, if ID card information is present in ID card information library, it is determined that ID card information is verified, and opens intelligent door lock. Due to user by identity card can be realized intelligent door lock open, thus be not take up both hands and simple and easy and user experience compared with It is good.
Content based on the above embodiment, as a kind of alternative embodiment, this method further include: obtain first movement terminal Transmission by real-name authentication and the ID card information of unlocking authority is awarded, and be stored in ID card information library;Wherein, body Part card information is to carry out real-name authentication by first movement terminal and authorize unlocking authority by the second mobile terminal.
By the content of above-described embodiment it is found that the first user can open intelligent door lock by identity card.In order to guarantee to pacify Quan Xing, the ID card information of the first user need to pass through real-name authentication.For example, just in case tenant is the crime point of public security system record Son, can also be in time by finding by real-name authentication from the background, and is notified to public security system.By taking tenant is the first user as an example, if First user has passed through real-name authentication, and unlocking authority is awarded in the ID card information of the first user, then the first user can pass through The ID card information of itself is sent to intelligent door lock, is saved by intelligent door lock by the Bluetooth function of first movement terminal, with So that thus intelligent door lock can be formed by real-name authentication and with the ID card information library of unlocking authority.It wherein, is identity card Information authorizes the operation of unlocking authority, and by real-name authentication and the ID card information of unlocking authority will be awarded is sent to intelligence The operation of energy door lock can be executed by the APP installed in first movement terminal, and the embodiment of the present invention does not limit this specifically It is fixed.
Wherein, the first user can shoot itself facial image, the people that first movement terminal can be shot according to the first user The identity card head portrait of face image and the first user carry out real-name authentication to the first user.Specifically, the first user can open The APP relevant to intelligent door lock installed in first movement terminal, the facial image of itself is shot by first movement terminal.The One mobile terminal can prompt the first user of ground to input the identification card number of itself after the facial image for obtaining the first user shooting, To which identity-based card number transfers the identity card head portrait of the first user from public security system.If the two matches, first can determine User's real-name authentication passes through.It is on the contrary, it is determined that the failure of first user's real-name authentication.It should be noted that in addition to by the first user It inputs except the identification card number of itself, can also identify the identity card of the first user to obtain by way of optical character identification Identification card number, the present invention is not especially limit this.
Method provided in an embodiment of the present invention, since the ID card information for opening intelligent door lock is to need to pass through reality Name authenticates and needs to be awarded unlocking authority, so as to improve safety.
Content based on the above embodiment, as a kind of alternative embodiment, this method further include: obtain the second mobile terminal Transmission by real-name authentication and the ID card information of unlocking authority is awarded, and be stored in ID card information library;Wherein, body Part card information is to carry out real-name authentication by first movement terminal and authorize unlocking authority by the second mobile terminal.
Wherein, first movement terminal can send out the ID card information of the first user after first user's real-name authentication passes through It send to the second mobile terminal.Second mobile terminal can receive the ID card information that first movement terminal is sent, and use according to second The authorized order of family input authorizes unlocking authority to ID card information.Specifically, with tenant for the first user, landlord is the second use For family.For first user after carrying out real-name authentication by first movement terminal, first movement terminal can will be after real-name authentication ID card information be sent to the second mobile terminal, by second user by input authorized order, be the first user identity card Information authorizes unlocking authority, and the first user is passed through real-name authentication by the second mobile terminal and the identity of unlocking authority is awarded Card information is sent to intelligent door lock.
It should be noted that for the intelligent door lock newly installed, need to bind a management user, management user can be with Possess all permissions of intelligent door lock, such as managing user can be landlord, and landlord can authorize different user and pass through its identity card The unlocking authority unlocked.Specifically, second user can pass through the two dimensional code mark on the second mobile scanning terminal intelligent door lock Know, with the administration authority for second user binding to intelligent door lock.
Certainly, it to be landlord that user is managed in actual implementation, but as super keepe.Wherein, super management Member can also have the permission for authorizing unlocking authority namely super keepe that can award other than having and authorizing unlocking authority Giving user has the permission for authorizing other users unlocking authority, and the present invention is not especially limit this.
It should also be noted that, either landlord or tenant are required to carry out real-name authentication in actual implementation, so as to The facial image that ID card information and user are shot is sent to the server of public security system, so that real-name authentication is realized, to mention High security.
Content based on the above embodiment, as a kind of alternative embodiment, this method further include: IC card data are read, and According to the verification result to IC card data, controls door lock and open.
Specifically, by tenant be the first user for, when the first user needs to open entry door, can by IC card close to Intelligent door lock.At this point, the IC card read module in intelligent door lock can read IC card data.Door lock in intelligent door lock controls mould IC card data can be had unlocking authority with pre-stored after getting the IC card data that IC card read module is read by block IC card database be compared.If the IC card data are located in IC card database, unlatching intelligent door lock is controlled.Conversely, then It can prompt unlocking authentication failed.
Method provided in an embodiment of the present invention obtains IC card data by IC card read module, and according to IC card data control Door lock processed is opened.It is opened since intelligent door lock can be realized by IC card in user, to be not take up both hands and simple and easy and use Family experience is preferable.
Content based on the above embodiment, the embodiment of the invention provides a kind of gate inhibition's opening device, which opens dress It sets for executing the gate inhibition's open method provided in above method embodiment.Referring to fig. 2, which includes:
Module 201 is obtained, for obtaining first movement terminal is sent by bluetooth and adding by preset times encryption Close character string;
First opening module 202, for encrypted characters string to be decrypted, and according to the decrypted result of deciphering module, control Intelligent door lock processed is opened.
As a kind of alternative embodiment, encrypted characters string is carried out based on 3 group keys randomly selected and 3 group encryption algorithms It is obtained after encryption, preset times are 3 times.
As a kind of alternative embodiment, the device further include:
Authentication module is used for reading identity card information, and verifies to ID card information;
Second opening module, for according to the verification result to ID card information, control intelligent door lock to be opened.
As a kind of alternative embodiment, the second opening module, for believing ID card information and pre-stored identity card Breath library is compared;If ID card information is present in ID card information library, it is determined that ID card information is verified, and is opened Intelligent door lock, the ID card information in ID card information library is that by real-name authentication and unlocking authority is awarded.
As a kind of alternative embodiment, the device further include:
First memory module, for obtain first movement terminal transmission by real-name authentication and unlocking authority is awarded ID card information, and be stored in ID card information library;Wherein, ID card information is to carry out real name by first movement terminal to recognize It demonstrate,proves and authorizes unlocking authority by the second mobile terminal.
As a kind of alternative embodiment, the device further include:
Second memory module, for obtain the second mobile terminal transmission by real-name authentication and unlocking authority is awarded ID card information, and be stored in ID card information library;Wherein, ID card information is to carry out real name by first movement terminal to recognize It demonstrate,proves and authorizes unlocking authority by the second mobile terminal.
As a kind of alternative embodiment, the device further include:
Third opening module controls door lock and opens for reading IC card data, and according to the verification result to IC card data It opens.
Device provided in an embodiment of the present invention, by obtaining that first movement terminal is sent by bluetooth and passing through default time The encrypted characters string of number encryption.Encrypted characters string is decrypted, and according to the decrypted result of deciphering module, controls intelligent door lock It opens.It is opened since intelligent door lock can be realized by mobile terminal in user, to be not take up both hands and simple and easy and user Experience is preferable.In addition, since intelligent door lock can be opened in such a way that multi-enciphering is decrypted, to improve intelligent door lock Safety.
Fig. 3 illustrates the entity structure schematic diagram of a kind of electronic equipment, as shown in figure 3, the electronic equipment may include: place Manage device (processor) 310, communication interface (Communications Interface) 320,330 He of memory (memory) Communication bus 340, wherein processor 310, communication interface 320, memory 330 complete mutual lead to by communication bus 340 Letter.Processor 310 can call the logical order in memory 330, to execute following method: obtaining first movement terminal and pass through Encrypted characters string that bluetooth is sent and by preset times encryption;Encrypted characters string is decrypted, and according to deciphering module Decrypted result, control intelligent door lock open.
In addition, the logical order in above-mentioned memory 330 can be realized by way of SFU software functional unit and conduct Independent product when selling or using, can store in a computer readable storage medium.Based on this understanding, originally Substantially the part of the part that contributes to existing technology or the technical solution can be in other words for the technical solution of invention The form of software product embodies, which is stored in a storage medium, including some instructions to So that a computer equipment (can be personal computer, electronic equipment or the network equipment etc.) executes each reality of the present invention Apply all or part of the steps of a method.And storage medium above-mentioned include: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. it is various It can store the medium of program code.
The embodiment of the present invention also provides a kind of non-transient computer readable storage medium, is stored thereon with computer program, The computer program is implemented to carry out the various embodiments described above offer method when being executed by processor, for example, obtain first Encrypted characters string that mobile terminal is sent by bluetooth and by preset times encryption;Encrypted characters string is decrypted, and According to the decrypted result of deciphering module, controls intelligent door lock and open.
The apparatus embodiments described above are merely exemplary, wherein unit can be as illustrated by the separation member Or may not be and be physically separated, component shown as a unit may or may not be physical unit, i.e., It can be located in one place, or may be distributed over multiple network units.It can select according to the actual needs therein Some or all of the modules achieves the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creative labor In the case where dynamic, it can understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can It realizes by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, on Stating technical solution, substantially the part that contributes to existing technology can be embodied in the form of software products in other words, should Computer software product may be stored in a computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including several fingers It enables and using so that a computer equipment (can be personal computer, server or the network equipment etc.) executes each implementation Method described in certain parts of example or embodiment.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features; And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and Range.

Claims (10)

1. a kind of gate inhibition's open method characterized by comprising
Obtain encrypted characters string that first movement terminal is sent by bluetooth and by preset times encryption;
The encrypted characters string is decrypted, and according to the decrypted result of the deciphering module, controls intelligent door lock and opens.
2. gate inhibition's open method according to claim 1, which is characterized in that the encrypted characters string is to be based on randomly selecting 3 group keys and 3 group encryption algorithms encrypted after obtain, the preset times are 3 times.
3. gate inhibition's open method according to claim 1, which is characterized in that further include:
Reading identity card information, and the ID card information is verified;
According to the verification result to the ID card information, controls intelligent door lock and open.
4. gate inhibition's open method according to claim 3, which is characterized in that the basis tests the ID card information Card is as a result, control intelligent door lock is opened, comprising:
The ID card information is compared with pre-stored ID card information library;
If the ID card information is present in the ID card information library, it is determined that the ID card information is verified, and Intelligent door lock is opened, the ID card information in the ID card information library is that by real-name authentication and unlocking authority is awarded 's.
5. gate inhibition's open method according to claim 4, which is characterized in that further include:
Obtain that first movement terminal sends by real-name authentication and the ID card information of unlocking authority is awarded, and be stored in institute It states in ID card information library;Wherein, the ID card information is to carry out real-name authentication by first movement terminal and moved by second Dynamic terminal authorizes unlocking authority.
6. gate inhibition's open method according to claim 4, which is characterized in that further include:
Obtain the transmission of the second mobile terminal by real-name authentication and the ID card information of unlocking authority is awarded, and be stored in institute It states in ID card information library;Wherein, the ID card information is to carry out real-name authentication by first movement terminal and moved by second Dynamic terminal authorizes unlocking authority.
7. gate inhibition's open method according to claim 1, which is characterized in that further include:
IC card data are read, and according to the verification result to the IC card data, controls door lock and opens.
8. a kind of gate inhibition's opening device characterized by comprising
Module is obtained, for obtaining encrypted characters that first movement terminal is sent by bluetooth and by preset times encryption String;
First opening module, for the encrypted characters string to be decrypted, and according to the decrypted result of the deciphering module, control Intelligent door lock processed is opened.
9. a kind of electronic equipment characterized by comprising
At least one processor;And
At least one processor being connect with the processor communication, in which:
The memory is stored with the program instruction that can be executed by the processor, and the processor calls described program to instruct energy Enough methods executed as described in claim 1 to 7 is any.
10. a kind of non-transient computer readable storage medium, which is characterized in that the non-transient computer readable storage medium is deposited Computer instruction is stored up, the computer instruction makes the computer execute the method as described in claim 1 to 7 is any.
CN201910427662.XA 2019-05-22 2019-05-22 Gate inhibition's open method and device Pending CN110349301A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910427662.XA CN110349301A (en) 2019-05-22 2019-05-22 Gate inhibition's open method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910427662.XA CN110349301A (en) 2019-05-22 2019-05-22 Gate inhibition's open method and device

Publications (1)

Publication Number Publication Date
CN110349301A true CN110349301A (en) 2019-10-18

Family

ID=68174658

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910427662.XA Pending CN110349301A (en) 2019-05-22 2019-05-22 Gate inhibition's open method and device

Country Status (1)

Country Link
CN (1) CN110349301A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110910543A (en) * 2019-12-12 2020-03-24 京东方科技集团股份有限公司 Intelligent unlocking system and unlocking method thereof
CN113808316A (en) * 2021-11-19 2021-12-17 正方软件股份有限公司 College personnel safety management method and system based on intelligent mobile terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110910543A (en) * 2019-12-12 2020-03-24 京东方科技集团股份有限公司 Intelligent unlocking system and unlocking method thereof
CN113808316A (en) * 2021-11-19 2021-12-17 正方软件股份有限公司 College personnel safety management method and system based on intelligent mobile terminal
CN113808316B (en) * 2021-11-19 2022-02-22 正方软件股份有限公司 College personnel safety management method and system based on intelligent mobile terminal

Similar Documents

Publication Publication Date Title
US10706141B2 (en) Methods and systems for identity creation, verification and management
CN110213246B (en) Wide-area multi-factor identity authentication system
RU2718226C2 (en) Biometric data safe handling systems and methods
CN110149328B (en) Interface authentication method, device, equipment and computer readable storage medium
US20040117636A1 (en) System, method and apparatus for secure two-tier backup and retrieval of authentication information
CN106537403A (en) System for accessing data from multiple devices
EP2513834B1 (en) System and method for verifying the identity of an individual by employing biometric data features associated with the individual as well as a computer program product for performing said method
CN108600213B (en) Composite identity authentication method and composite identity authentication system applying same
JP2006209697A (en) Individual authentication system, and authentication device and individual authentication method used for the individual authentication system
CN107180173A (en) unlocking method and device
CN110766850B (en) Visitor information management method, access control system, server and storage medium
CN110349301A (en) Gate inhibition's open method and device
US20100125734A1 (en) Encrypted image with matryoshka structure and mutual agreement authentication system and method using the same
CN106101140B (en) A kind of method and server of authentification of message
CN109617703B (en) Key management method and device, electronic equipment and storage medium
CN109522694A (en) A kind of identification system based on computer network
Cavoukian et al. Keynote paper: Biometric encryption: Technology for strong authentication, security and privacy
CN110415406A (en) A kind of double nets are mutual to monitor security intelligent door lock system for speech recognition
JP4303952B2 (en) Multiple authentication system, computer program, and multiple authentication method
CN110246246A (en) Access control management method and device
CN110335373A (en) Intelligent door lock and intelligent access control system
US20220277102A1 (en) Process using one-way hashing function for secure collection, presentation and storage of PII
Catuogno et al. Flexible and robust enterprise right management
CN113704732A (en) User identity verification method and device and electronic equipment
CN108492214B (en) Mobile terminal, server, management system and self-service check-in system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20191018

WD01 Invention patent application deemed withdrawn after publication