CN110503759B - Access control method and system based on WeChat public platform - Google Patents
Access control method and system based on WeChat public platform Download PDFInfo
- Publication number
- CN110503759B CN110503759B CN201910796716.XA CN201910796716A CN110503759B CN 110503759 B CN110503759 B CN 110503759B CN 201910796716 A CN201910796716 A CN 201910796716A CN 110503759 B CN110503759 B CN 110503759B
- Authority
- CN
- China
- Prior art keywords
- public platform
- wechat public
- authorization code
- user
- cloud server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Interoperability with other network applications or services
Abstract
The invention relates to the technical field of intelligent access control, in particular to an access control method and system based on a WeChat public platform, which comprises the following steps: s1, a user sends a door opening request instruction to a WeChat public platform through a user WeChat client; s2, the WeChat public platform receives the instruction and then forwards the instruction to a cloud server; s3, the cloud server returns an authorization code to the WeChat public platform according to the internal logic; s4, the WeChat public platform returns the authorization code to the user WeChat client; s5, the user wechat client receives the authorization code and then forwards the authorization code to the administrator wechat client; and S6, the administrator WeChat client receives the authorization code and forwards the authorization code to the WeChat public platform, and the WeChat public platform sends an unlocking instruction to the cloud server after confirming the authorization code. The invention realizes the opening control of the terminal electronic lock with lower cost, does not increase the cost due to the increase of the number of the door cards, does not need to memorize passwords when being used by a user, avoids the problem of door card loss, and has convenient use and high safety.
Description
Technical Field
The invention relates to the technical field of intelligent access control, in particular to an access control method and system based on a WeChat public platform.
Background
At present, many colleges and universities have special movable rooms, but for the communities with the scale of hundreds of people, each person is unrealistic and unsafe to be provided with a key, so that an electronic lock is installed in the movable rooms, the electronic lock comprises an entrance guard controller arranged at a building entrance, an RFID active tag storing identification information and a door lock controlled by the entrance guard controller, the entrance guard controller is connected with an RFID card reading module, the RFID active tag is held by hand and read by the RFID card reading module, the entrance guard controller matches the information of the RFID active tag with prestored information, and the door lock is controlled to be opened if the matching is successful. Although the installation of the electronic lock can conveniently give or cancel the door opening authority of the ordinary user at any time, the following steps are included: on one hand, the traditional electronic lock is high in cost, difficult to manage and prone to theft caused by loss of the electronic lock; on the other hand, if the key is forgotten when the door is out, the door cannot be opened to enter the door.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides an access control method and system based on a WeChat public platform.
In order to solve the technical problems, the invention adopts the technical scheme that:
the access control method based on the WeChat public platform comprises the following steps:
s1, a user sends a door opening request instruction to a WeChat public platform through a user WeChat client;
s2, after receiving the instruction, the WeChat public platform forwards the instruction to a cloud server, and meanwhile, the WeChat public platform sends the incidental information to the cloud server;
s3, the cloud server returns an authorization code to the WeChat public platform according to the internal logic;
s4, the WeChat public platform returns the authorization code to the user WeChat client;
s5, the user wechat client receives the authorization code and then forwards the authorization code to the administrator wechat client;
and S6, the administrator WeChat client receives the authorization code and forwards the authorization code to the WeChat public platform, the WeChat public platform confirms the authorization code and then sends an unlocking instruction to the cloud server, and the cloud server controls the terminal electronic lock to be unlocked.
According to the entrance guard control method based on the WeChat public platform, by means of the message event interface provided by the WeChat public platform, when a user and a public number send messages to each other, the cloud server can acquire the OpenID of the user, the OpenID can be used for uniquely identifying the user identity, and after the user identity is verified, the cloud server sends an unlocking instruction to the terminal electronic lock to drive the electronic lock to unlock. The invention realizes the opening control of the terminal electronic lock with lower cost, does not cause the cost increase due to the increase of the number of the door cards when the number of the users increases, does not need to memorize passwords when the users use the terminal electronic lock, avoids the problem caused by the loss of the door cards, and has convenient use and high safety.
Preferably, in step S1, the command requesting to open the DOOR is DOOR or open the DOOR. The command of requesting to open the DOOR is not limited to 'DOOR' or 'open the DOOR', and other texts which are convenient for the user to input and recognize can be adopted as the input command.
Preferably, in step S2, the supplementary information includes timestamp information, nonce information, and OpenID information, and the instruction and the supplementary information are packaged into an xml packet and forwarded to the cloud server. The cloud server can obtain the sent instruction and the accompanying information by analyzing the xml data packet, a developer searches whether the OpenID exists in a database, if not, the developer requires the user to be bound with the school number, and if so, a relevant reply is generated according to internal logic.
Preferably, in step S3, the internal logic includes the steps of:
s31, the cloud server receives an event message of the WeChat public platform;
s32, judging whether the event message is a text message: if so, analyzing the OpenID and the instruction content of the user; if not, returning to the temporary support;
s33, judging whether the event message is a command: if so, analyzing the parameters, skipping to the function corresponding to the command, and returning an authorization code according to the function running result; if not, judging whether the event message is an authorization code: if yes, go to step S34; if not, returning to the temporary support;
s34, decoding the authorization code, extracting the parameters, comparing the authorization code and the parameters with a database stored in a database system, and identifying whether authorization can be performed: if not, returning an error prompt; if the authorization is authorized, updating the authorization state and returning a success prompt;
and S35, the event message meets the door opening requirement, and a door opening instruction is sent to the terminal electronic lock.
Preferably, the method further comprises the step of performing user authentication and authorization when the user is used for the first time.
Preferably, the user authentication and authorization is performed according to the following steps:
s11, an administrator inputs identity information of a user in a database system, wherein the identity information comprises a name and an academic number, and binding of the identity information and OpenID is allowed;
s12, the user pays attention to the WeChat public number and sends 'BD school number': if the school number exists in the database system and is not bound, returning an authorization code; if the learning number does not exist in the database system, returning an error prompt;
s13, copying the authorization code by the user, and forwarding the authorization code to the administrator;
s14, after receiving the authorization code, the administrator checks whether the identity information of the requester in the authorization code is true: if the identity is true, an authorization code is forwarded to the WeChat public platform, and the identity information of the user is bound with the OpenID; if not, an error prompt is returned.
Preferably, a same token is agreed between the wechat public platform and the cloud server, and the communication between the wechat public platform and the cloud server is performed according to the following steps:
when the WeChat public platform sends a message containing url parameters to the cloud server, the url parameters comprise a time, nonce and signature fields, and the signature, the time, nonce and nonce fields and a first sha1 abstract corresponding to a character string formed by splicing token tokens in a lexicographic order;
after the cloud server receives the message from the WeChat public platform, the signature, the timestamp, the nonce field and the token are sorted and spliced according to the lexicographic order to form a second sha1 abstract corresponding to the character string;
when the first sha1 digest is the same as the second sha1 digest, then the verification is passed.
The sha1 abstract has low collision performance, different messages are difficult to generate the same sha1 abstract, if the token is only known by a transceiver and is not disclosed, the signature generated by any third party according to the rule can not pass verification, and the message source can be trusted.
Preferably, the communication between the terminal electronic lock and the cloud server adopts a double-signature verification mode, and the method comprises the following steps: the terminal electronic lock sends a message to the cloud server, wherein the message comprises fields of T1, N1, S1, T2 and N2; the cloud server verifies whether the message comes from the terminal electronic lock or not by using the fields T1, N1 and S1, and generates a signature S2 according to the fields T2 and N2 to reply to the electronic lock. S2 is generated from T2 and N2 that have just been transmitted, and is effective only in this communication, and therefore is time-efficient.
The invention also provides an access control system based on the WeChat public platform, which comprises a database system, a cloud server, a terminal electronic lock and the WeChat public platform, wherein the access control system comprises the following components: the database system is communicated with the cloud server and is used for an administrator to enter, check, modify and delete user information; the cloud server is connected with the WeChat public platform and used for intensively processing user requests and verifying user permissions, and is also connected with the terminal electronic lock and used for sending a door opening instruction to the terminal electronic lock to drive the terminal electronic lock to be unlocked; the wechat public platform is communicated with the wechat clients and used for receiving instructions sent by the wechat clients.
According to the entrance guard control system based on the WeChat public platform, a user initiates a door opening instruction, the cloud server establishes a session for the instruction, session parameters are coded in an authorization code, and then the authorization code is replied to the user to complete one-time interaction; and then the user forwards the authorization code to the administrator, if the administrator agrees to authorization, the authorization code is forwarded to the public number, the WeChat public platform decodes the parameters in the authorization code and compares the parameters with the parameters stored in the database system, and if the authorization code is consistent with the parameters, the cloud server is controlled to send a door opening instruction. The invention realizes the opening control of the terminal electronic lock with lower cost, does not cause the cost increase due to the increase of the number of the door cards when the number of the users increases, does not need to memorize passwords when the users use the terminal electronic lock, avoids the problem caused by the loss of the door cards, and has convenient use and high safety.
Furthermore, a single chip microcomputer is arranged in the terminal electronic lock, and the single chip microcomputer module accesses a network through an esp8266 module.
Compared with the prior art, the invention has the beneficial effects that:
the invention relates the interactive information of a plurality of different users to an authorization flow by an authorization code mechanism by virtue of a message event interface provided by a WeChat public platform, realizes the opening control of the terminal electronic lock at lower cost, does not cause the cost increase due to the increase of the number of the door cards when the number of the users increases, does not need to memorize passwords when the users use, also avoids the problem caused by the loss of the door cards, and has convenient use and high safety;
according to the invention, a sha1 signature verification mechanism is adopted for communication between the WeChat public platform and the cloud server, a double signature verification mechanism is adopted for communication between the terminal electronic lock and the cloud server, verification information comes from trusted equipment, and the electronic lock is reliably controlled and has high safety.
Drawings
FIG. 1 is a flowchart illustrating a door access control method based on the WeChat public platform according to an embodiment;
FIG. 2 is a flowchart of the internal logic of step S3;
fig. 3 is a schematic diagram of a signature verification mechanism of the terminal electronic lock and the cloud server;
fig. 4 is a system block diagram of the door access control system based on the wechat public platform in the second embodiment.
Detailed Description
The present invention will be further described with reference to the following embodiments. Wherein the showings are for the purpose of illustration only and are shown by way of illustration only and not in actual form, and are not to be construed as limiting the present patent; to better illustrate the embodiments of the present invention, some parts of the drawings may be omitted, enlarged or reduced, and do not represent the size of an actual product; it will be understood by those skilled in the art that certain well-known structures in the drawings and descriptions thereof may be omitted.
The same or similar reference numerals in the drawings of the embodiments of the present invention correspond to the same or similar components; in the description of the present invention, it should be understood that if there is an orientation or positional relationship indicated by the terms "upper", "lower", "left", "right", etc. based on the orientation or positional relationship shown in the drawings, it is only for convenience of describing the present invention and simplifying the description, but it is not intended to indicate or imply that the referred device or element must have a specific orientation, be constructed in a specific orientation, and be operated, and therefore, the terms describing the positional relationship in the drawings are only used for illustrative purposes and are not to be construed as limiting the present patent, and the specific meaning of the terms may be understood by those skilled in the art according to specific circumstances.
Example one
Fig. 1 to 3 show an embodiment of an access control method based on a wechat public platform according to the present invention, which includes the following steps:
s1, a user sends a door opening request instruction to a WeChat public platform through a user WeChat client;
s2, after receiving the instruction, the WeChat public platform forwards the instruction to a cloud server, and meanwhile, the WeChat public platform sends the incidental information to the cloud server;
s3, the cloud server returns an authorization code to the WeChat public platform according to the internal logic;
s4, the WeChat public platform returns the authorization code to the user WeChat client;
s5, the user wechat client receives the authorization code and then forwards the authorization code to the administrator wechat client;
and S6, the administrator WeChat client receives the authorization code and forwards the authorization code to the WeChat public platform, the WeChat public platform confirms the authorization code and then sends an unlocking instruction to the cloud server, and the cloud server controls the terminal electronic lock to be unlocked.
In this embodiment, the interactive messages of a plurality of different users are associated with one authorization process through an authorization code mechanism.
In step S1, the command requesting the DOOR open is DOOR or DOOR open. However, it should be noted that the instruction for requesting to open the DOOR is not limited to "DOOR" or "open the DOOR," and other texts that are convenient for the user to input and recognize may be used as the input instruction.
In step S2, the incidental information includes timestamp information, nonce information, and OpenID information, and the instruction and the incidental information are packaged as an xml packet and forwarded to the cloud server. The cloud server can obtain the sent instruction and the accompanying information by analyzing the xml data packet, a developer searches whether the OpenID exists in a database, if not, the developer requires the user to be bound with the school number, and if so, a relevant reply is generated according to program logic. The OpenID is adopted to identify the user, one user can be uniquely identified through the OpenID, and after the OpenID of the user is bound with the name and the school number, the user can be ensured to be operated by himself when the user sends messages to the public number.
As shown in fig. 2, in step S3, the internal logic includes the steps of:
s31, the cloud server receives an event message of the WeChat public platform;
s32, judging whether the event message is a text message: if so, analyzing the OpenID and the instruction content of the user; if not, returning to the temporary support;
s33, judging whether the event message is a command: if so, analyzing the parameters, skipping to the function corresponding to the command, and returning an authorization code according to the function running result; if not, judging whether the event message is an authorization code: if yes, go to step S34; if not, returning to the temporary support;
s34, decoding the authorization code, extracting the parameters, comparing the authorization code and the parameters with a database stored in a database system, and identifying whether authorization can be performed: if not, returning an error prompt; if the authorization is authorized, updating the authorization state and returning a success prompt;
and S35, the event message meets the door opening requirement, and a door opening instruction is sent to the terminal electronic lock.
In this embodiment, when the user uses the device for the first time, the device further includes a step of performing user identity authentication and authorization, specifically, the method includes the following steps:
s11, an administrator inputs identity information of a user in a database system, wherein the identity information comprises a name and an academic number, and binding of the identity information and OpenID is allowed;
s12, the user pays attention to the WeChat public number and sends 'BD school number': if the learning number exists in the database system and is not bound, returning an authorization code; if the database system does not have the school number, returning an error prompt;
s13, copying the authorization code by the user, and forwarding the authorization code to the administrator;
s14, after receiving the authorization code, the administrator checks whether the identity information of the requester in the authorization code is true: if the identity is true, the authorization code is forwarded to a WeChat public platform, and the identity information of the user is bound with the OpenID; if not, an error prompt is returned.
The WeChat public platform and the cloud server of this embodiment communicate with each other, and the cloud server and the terminal electronic lock communicate with each other.
A same token is agreed between the WeChat public platform and the cloud server, and communication between the WeChat public platform and the cloud server is carried out according to the following steps:
when the WeChat public platform sends a message containing url parameters to the cloud server, the url parameters comprise time, nonce and signature fields, and the signature, the time, nonce and nonce fields and a first sha1 abstract corresponding to a character string formed by splicing token tokens in a lexicographical order;
after the cloud server receives the message from the WeChat public platform, the signature, the timestamp, the nonce field and the token are sorted and spliced according to the lexicographic order to form a second sha1 abstract corresponding to the character string;
when the first sha1 digest is the same as the second sha1 digest, then the verification is passed.
The sha1 abstract has low collision performance, different messages are difficult to generate the same sha1 abstract, if the token is only known by a transceiver and is not disclosed, the signature generated by any third party according to the rule can not pass verification, and the message source can be trusted. The communication between the WeChat public platform and the cloud server avoids intermediate manual work through a sha1 signature verification mechanism. In order to improve the safety, the embodiment can also screen the timeframe and only accept the signature in the recent period of time.
The terminal electronic lock of the embodiment is provided with the embedded system, and the embedded system and the cloud server confirm the reliability of the message source in a double-signature verification mode. As shown in fig. 3, T, N, S represent the timestamp, nonce, and signature fields, respectively, followed by a number: the terminal electronic lock sends a message to the cloud server, wherein the message comprises fields T1, N1, S1, T2 and N2; the cloud server verifies whether the message comes from the terminal electronic lock or not by using the fields T1, N1 and S1, and generates a signature S2 according to the fields T2 and N2 to reply to the electronic lock. S2 is generated from T2 and N2 that have just been transmitted, and is effective only in this communication, and therefore is time-efficient.
Through the steps, the unlocking control of the terminal electronic lock is realized at lower cost, the cost increase caused by the increase of the number of the door cards can be avoided when the number of the users is increased, the password does not need to be memorized when the user uses the terminal electronic lock, the problem caused by the loss of the door cards is also avoided, the use is convenient, and the safety is high.
Example two
Fig. 4 shows an embodiment of the door access control system based on the wechat public platform, which includes a database system, a cloud server, a terminal electronic lock, and the wechat public platform: the database system is communicated with the cloud server and is used for an administrator to enter, check, modify and delete user information; the cloud server is connected with the WeChat public platform and used for intensively processing user requests and verifying user permissions, and is also connected with the terminal electronic lock and used for sending a door opening instruction to the terminal electronic lock to drive the terminal electronic lock to unlock; the wechat public platform is communicated with the wechat clients and used for receiving instructions sent by the wechat clients. The terminal electronic lock is internally provided with a single chip microcomputer, and the single chip microcomputer module accesses a network through an esp8266 module.
In the implementation of the embodiment, a user initiates a door opening instruction, the cloud server establishes a session for the instruction, encodes session parameters in an authorization code, and then replies the authorization code to the user to complete one-time interaction; and then the user forwards the authorization code to the administrator, if the administrator agrees to authorization, the authorization code is forwarded to the public number, the WeChat public platform decodes the parameters in the authorization code and compares the parameters with the parameters stored in the database system, and if the authorization code is consistent with the parameters, the cloud server is controlled to send a door opening instruction.
It should be understood that the above-described embodiments of the present invention are merely examples for clearly illustrating the present invention, and are not intended to limit the embodiments of the present invention. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. And are neither required nor exhaustive of all embodiments. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the claims of the present invention.
Claims (10)
1. An access control method based on a WeChat public platform is characterized by comprising the following steps:
s1, the user sends the order of opening the door to the WeChat public platform through the information interface by the user WeChat client;
s2, after receiving the instruction, the WeChat public platform forwards the instruction to the cloud server, and meanwhile, the WeChat public platform sends the incidental information to the cloud server;
s3, the cloud server returns an authorization code to the WeChat public platform according to the internal logic;
s4, the WeChat public platform returns the authorization code to the user WeChat client through the message interface;
s5, the user wechat client receives the authorization code and then forwards the authorization code to the administrator wechat client;
s6, after receiving the authorization code, the administrator wechat client forwards the authorization code to the wechat public platform through the message interface, the wechat public platform sends an unlocking instruction to the cloud server after confirming the authorization code, and the cloud server controls the terminal electronic lock to be unlocked;
the message interface is a 'sending message-passive reply message' interface of the WeChat public number.
2. The access control method based on the WeChat public platform according to claim 1, wherein in step S1, the command requesting to open the DOOR is DOOR or open the DOOR.
3. The access control method based on the WeChat public platform according to claim 1, wherein in step S2, the incidental information includes timestamp information, nonce information, and OpenID information, and the instruction and the incidental information are packaged into an xml packet and forwarded to the cloud server.
4. The access control method based on the WeChat public platform according to claim 1, wherein in step S3, the internal logic includes the following steps:
s31, the cloud server receives the event message of the WeChat public platform;
s32, judging whether the event message is a text message: if so, analyzing the OpenID and the instruction content of the user; if not, returning to the temporary support;
s33, judging whether the event message is a command: if so, analyzing the parameters, skipping to the function corresponding to the command, and returning an authorization code according to the function running result; if not, judging whether the event message is an authorization code: if yes, go to step S34; if not, returning to the temporary support;
s34, decoding the authorization code, extracting the session parameter, comparing the authorization code and the session parameter with the database stored in the database system, and identifying whether authorization can be given: if not, returning an error prompt; if the authorization is authorized, updating the authorization state and returning a success prompt;
and S35, the event message meets the door opening requirement and sends a door opening instruction to the terminal electronic lock.
5. The access control method based on the WeChat public platform according to claim 1, further comprising the steps of user authentication and authorization when the user is used for the first time.
6. The access control method based on the WeChat public platform according to claim 5, wherein the user identity authentication and authorization are performed according to the following steps:
s11, the administrator inputs the identity information of the user in the database system, wherein the identity information comprises a name and a school number, and the binding of the identity information and the OpenID is allowed;
s12, user pays attention to WeChat public number, sending "BD school number": if the school number exists in the database system and is not bound, returning an authorization code; if the learning number does not exist in the database system, returning an error prompt;
s13, copying the authorization code by the user and forwarding the authorization code to the administrator;
s14, after receiving the authorization code, the administrator checks whether the identity information of the requester in the authorization code is true: if the identity is true, an authorization code is forwarded to the WeChat public platform, and the identity information of the user is bound with the OpenID; if not, an error prompt is returned.
7. The access control method based on the WeChat public platform as claimed in any one of claims 1 to 6, wherein a same token is agreed between the WeChat public platform and the cloud server, and the communication between the WeChat public platform and the cloud server is performed according to the following steps:
when the WeChat public platform sends a message containing url parameters to the cloud server, the url parameters comprise a time, nonce and signature fields, and the signature, the time, nonce and nonce fields and a first sha1 abstract corresponding to a character string formed by splicing token tokens in a lexicographic order;
after the cloud server receives the message from the WeChat public platform, the signature, the timestamp, the nonce field and the token are sorted and spliced according to the lexicographic order to form a second sha1 abstract corresponding to the character string;
when the first sha1 digest is the same as the second sha1 digest, then the verification is passed.
8. The access control method based on the WeChat public platform according to claim 7, wherein the communication between the terminal electronic lock and the cloud server adopts a double-signature verification mode, comprising the following steps:
the terminal electronic lock sends a message to the cloud server, wherein the message comprises fields of T1, N1, S1, T2 and N2; the cloud server verifies whether the message comes from the terminal electronic lock or not by using the fields T1, N1 and S1, and generates a signature S2 according to the fields T2 and N2 to reply to the electronic lock.
9. An access control system applying the access control method based on the WeChat public platform according to any one of claims 1 to 8, which is characterized by comprising a database system, a cloud server, a terminal electronic lock and the WeChat public platform: the database system is communicated with the cloud server and is used for an administrator to enter, check, modify and delete user information; the cloud server is connected with the WeChat public platform and used for intensively processing user requests and verifying user permissions, and is also connected with the terminal electronic lock and used for sending a door opening instruction to the terminal electronic lock to drive the terminal electronic lock to be unlocked; the WeChat public platform is communicated with a plurality of WeChat clients and is used for receiving instructions sent by the WeChat clients; the user initiates a door opening instruction, the cloud server establishes a session for the purpose, session parameters are coded in the authorization code, and then the authorization code is replied to the user to complete one-time interaction; and then the user forwards the authorization code to the administrator, if the administrator agrees to authorization, the authorization code is forwarded to the public number, the WeChat public platform decodes the parameters in the authorization code and compares the parameters with the parameters stored in the database system, and if the authorization code is consistent with the parameters, the cloud server is controlled to send a door opening instruction.
10. The access control system of claim 9, wherein a single chip microcomputer is built in the terminal electronic lock, and the single chip microcomputer module accesses a network through an esp8266 module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910796716.XA CN110503759B (en) | 2019-08-27 | 2019-08-27 | Access control method and system based on WeChat public platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910796716.XA CN110503759B (en) | 2019-08-27 | 2019-08-27 | Access control method and system based on WeChat public platform |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110503759A CN110503759A (en) | 2019-11-26 |
CN110503759B true CN110503759B (en) | 2021-05-07 |
Family
ID=68589835
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910796716.XA Active CN110503759B (en) | 2019-08-27 | 2019-08-27 | Access control method and system based on WeChat public platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110503759B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103679903A (en) * | 2014-01-02 | 2014-03-26 | 苏州众天力信息科技有限公司 | Access control method based on WeChat |
CN105139482A (en) * | 2015-06-18 | 2015-12-09 | 深圳市幸福立方科技有限公司 | WeChat-based control method, cloud server and system |
CN107492168A (en) * | 2017-07-21 | 2017-12-19 | 厦门狄耐克智能科技股份有限公司 | A kind of access control system of residential community and door opening method based on cloud service |
CN110021093A (en) * | 2018-10-29 | 2019-07-16 | 深圳市微开互联科技有限公司 | Access control method based on openid |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1134703A1 (en) * | 2000-03-14 | 2001-09-19 | BRITISH TELECOMMUNICATIONS public limited company | Secure services |
US9773364B2 (en) * | 2014-07-28 | 2017-09-26 | Dan Kerning | Security and public safety application for a mobile device with audio/video analytics and access control authentication |
CN110021092B (en) * | 2018-10-29 | 2021-09-28 | 深圳市微开互联科技有限公司 | Tenant access control method based on openid |
CN109902842A (en) * | 2019-02-23 | 2019-06-18 | 长沙开雅电子科技有限公司 | A kind of seat Management System of Library and design method |
-
2019
- 2019-08-27 CN CN201910796716.XA patent/CN110503759B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103679903A (en) * | 2014-01-02 | 2014-03-26 | 苏州众天力信息科技有限公司 | Access control method based on WeChat |
CN105139482A (en) * | 2015-06-18 | 2015-12-09 | 深圳市幸福立方科技有限公司 | WeChat-based control method, cloud server and system |
CN107492168A (en) * | 2017-07-21 | 2017-12-19 | 厦门狄耐克智能科技股份有限公司 | A kind of access control system of residential community and door opening method based on cloud service |
CN110021093A (en) * | 2018-10-29 | 2019-07-16 | 深圳市微开互联科技有限公司 | Access control method based on openid |
Non-Patent Citations (1)
Title |
---|
基于Android系统的远程多人监控智能家居系统;马景祥,师文庆;《机电工程技术》;20171019;第46卷(第10期);第17-19,105页 * |
Also Published As
Publication number | Publication date |
---|---|
CN110503759A (en) | 2019-11-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110213246B (en) | Wide-area multi-factor identity authentication system | |
CN103248484B (en) | Access control system and method | |
CN102187701B (en) | User authentication management | |
US6748530B1 (en) | Certification apparatus and method | |
CN110149328B (en) | Interface authentication method, device, equipment and computer readable storage medium | |
US20100138659A1 (en) | Electronic notary | |
US20080320588A1 (en) | System of Assigning Permissions to a User by Password | |
CN108684041A (en) | The system and method for login authentication | |
CN110401655A (en) | Access control right management system based on user and role | |
US20180359635A1 (en) | Securitization of Temporal Digital Communications Via Authentication and Validation for Wireless User and Access Devices | |
AU2018263282B2 (en) | Access control system | |
US20170104749A1 (en) | System and method for managing certificate based secure network access with a certificate having a buffer period prior to expiration | |
JP4857657B2 (en) | Access management system and access management method | |
US20100180324A1 (en) | Method for protecting passwords using patterns | |
EP1445917A2 (en) | Identification system for admission into protected area by means of an additional password | |
JP2002041469A (en) | System and method for managing electronic equipment | |
CN113487321A (en) | Identity identification and verification method and system based on block chain wallet | |
CN107196914A (en) | Identity identifying method and device | |
CN112543184A (en) | Block chain-based equipment authentication activation method | |
US11301943B2 (en) | Systems and methods for authentication of database transactions with an authentication server | |
CN110322610A (en) | A kind of computer room cabinet operation permission information matching process | |
CN110503759B (en) | Access control method and system based on WeChat public platform | |
KR20160016244A (en) | Method for Authentication between Controller and User Terminal through Near Field Communication | |
CN111161454A (en) | Intelligent lock safety networking and control method | |
KR102339318B1 (en) | System for controlling entrance using public key infrastructure |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220210 Address after: 510700 Room 201, building 2, No. 42, Dongzhong Road, Huangpu District, Guangzhou, Guangdong Province (room 225) Patentee after: Guangzhou Jiuyi Digital Technology Co.,Ltd. Address before: 524088 No. 1 Haida Road, Mazhang District, Zhanjiang City, Guangdong Province Patentee before: Guangdong Ocean University |
|
TR01 | Transfer of patent right |