CN111047750A - Method, device and system for controlling offline access control device - Google Patents

Method, device and system for controlling offline access control device Download PDF

Info

Publication number
CN111047750A
CN111047750A CN201811189355.4A CN201811189355A CN111047750A CN 111047750 A CN111047750 A CN 111047750A CN 201811189355 A CN201811189355 A CN 201811189355A CN 111047750 A CN111047750 A CN 111047750A
Authority
CN
China
Prior art keywords
configuration
dimensional code
access control
equipment
control equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811189355.4A
Other languages
Chinese (zh)
Inventor
毕化镭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision Digital Technology Co Ltd
Original Assignee
Hangzhou Hikvision Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision Digital Technology Co Ltd filed Critical Hangzhou Hikvision Digital Technology Co Ltd
Priority to CN201811189355.4A priority Critical patent/CN111047750A/en
Publication of CN111047750A publication Critical patent/CN111047750A/en
Pending legal-status Critical Current

Links

Images

Abstract

The application discloses a method for controlling an offline access control device, which is applied to an intelligent device, and comprises the following steps: generating a configuration two-dimensional code, scanning the configuration two-dimensional code to access control equipment, and configuring the access control equipment; and generating a door opening two-dimensional code, scanning the door opening two-dimensional code to the access control equipment, and controlling the access control equipment. Corresponding to the method, the application also provides a system for controlling the offline access control device, which is applied to the access control device, and a corresponding intelligent device, the access control device, a nonvolatile computer readable storage medium and an electronic device. By using the technical scheme disclosed by the application, convenient, quick and safe access control can be realized.

Description

Method, device and system for controlling offline access control device
Technical Field
The present application relates to the field of access control technologies, and in particular, to a method, a device, and a system for controlling an offline access control device.
Background
The two-dimensional code scheme that present entrance guard's equipment adopted mainly has following several:
one is that the remote server is connected through a wired network or a wireless network, the remote server sends an information comparison result to the access control equipment, and the access control equipment controls the opening and closing of the door according to the information comparison result. Such a solution, as in patent application CN107967730A, would result in the situation that the access control device is offline, and the user cannot recognize the access control device, so that the door cannot be opened.
The other method is that the information of each access control user is stored in a database of the access control equipment, and when the two-dimensional code is scanned, the information carried by the two-dimensional code is compared with the local two-dimensional code information, so that whether the door is opened or not is judged. Although this solution can be implemented offline, when there are more users, the valuable storage resources of the front-end access control device, such as CN204256822U, will be occupied more.
Disclosure of Invention
The application provides a method and device for controlling an offline access control device, a nonvolatile computer readable storage medium and an electronic device, so that convenient, quick and safe access control is realized through interaction of two-dimension codes of the access control device and an intelligent device.
The application provides a method for controlling an offline access control device, which is applied to intelligent equipment and comprises the following steps:
generating a configuration two-dimensional code, scanning the configuration two-dimensional code to access control equipment, and configuring the access control equipment;
and generating a door opening two-dimensional code, scanning the door opening two-dimensional code to the access control equipment, and controlling the access control equipment.
Preferably, the generating the configuration two-dimensional code includes:
encrypting the configuration information to generate a configuration two-dimensional code;
the configuration information at least includes: the number of the access control equipment, the configuration password of the access control equipment, a private key, a public key and the validity period of the two-dimensional code for opening the door;
or, the configuration information at least includes: the door control equipment number, the private key, the public key and the valid period of the two-dimensional code for opening the door.
Preferably, the generating the door opening two-dimensional code includes:
generating a random password in a set encryption mode according to information of access control users, timestamp information, an APP random number and a public key corresponding to access control equipment;
and generating a door opening two-dimensional code according to the random password, the information of the access control user, the timestamp information and the APP random number.
The present application further provides an intelligent device, including: configure two-dimensional code generation module and open door two-dimensional code generation module, wherein:
the configuration two-dimensional code generation module is used for generating a configuration two-dimensional code, scanning the configuration two-dimensional code to the access control equipment and configuring the access control equipment;
the door opening two-dimensional code generation module is used for generating a door opening two-dimensional code, scanning the door opening two-dimensional code to the access control equipment, and controlling the access control equipment.
The application also provides a method for controlling the off-line access control equipment, which is applied to the access control equipment and is characterized by comprising the following steps:
the access control equipment scans the configuration two-dimensional code of the intelligent equipment, performs configuration authority verification according to the configuration two-dimensional code, and receives and stores configuration information of the intelligent equipment when the configuration authority verification is passed;
the entrance guard equipment scans the door opening two-dimensional code of the intelligent equipment, the door opening two-dimensional code is used for passing authority verification, and the entrance guard equipment is correspondingly controlled according to the result of the passing authority verification.
Preferably, the checking the configuration permission according to the configuration two-dimensional code includes:
if the configuration two-dimensional code carries the configuration password, the access control equipment compares the configuration password with the configuration password stored in the access control equipment, and when the comparison is successful, the configuration permission verification is judged to be passed, otherwise, the configuration permission verification is judged to be failed;
and if the configuration two-dimensional code does not contain the configuration password, the access control equipment receives the configuration password from the intelligent equipment, compares the received configuration password with the configuration password stored in the access control equipment, judges that the configuration authority passes the verification when the comparison is successful, and otherwise judges that the configuration authority fails to verify.
Preferably, the checking the passing permission according to the door opening two-dimensional code comprises:
the door opening two-dimensional code is analyzed by a public key and a secret key which are locally stored in the access control equipment, a random password is obtained, the obtained random password is compared with a random password carried by the door opening two-dimensional code, when the comparison is successful, the validity period is judged further according to the validity period of the door opening two-dimensional code stored in the access control equipment and a timestamp in the door opening two-dimensional code, when the validity period is valid, the passing permission check is judged, otherwise, the passing permission check is judged to fail.
The present application also provides an access control device, which is characterized by comprising: configuring a permission verification module and a passing permission verification module, wherein:
the configuration authority verification module is used for scanning a configuration two-dimensional code of the intelligent device, verifying the configuration authority according to the configuration two-dimensional code, and receiving and storing configuration information of the intelligent device when the configuration authority passes verification;
the access control device comprises a door opening two-dimensional code, a door opening permission checking module and a passing permission checking module, wherein the door opening permission checking module is used for scanning the door opening two-dimensional code of the intelligent device, performing passing permission checking according to the door opening two-dimensional code, and performing corresponding control on the access control device according to the result of the passing permission checking.
The application provides a system for controlling off-line entrance guard equipment, include: smart machine and access control system, wherein:
the intelligent equipment generates a configuration two-dimensional code;
the access control equipment scans the configuration two-dimensional code of the intelligent equipment, performs configuration authority verification according to the configuration two-dimensional code, and receives and stores configuration information of the intelligent equipment when the configuration authority verification is passed;
the intelligent equipment generates a door opening two-dimensional code;
the entrance guard equipment scans the door opening two-dimensional code of the intelligent equipment, checks the passing authority according to the door opening two-dimensional code, and correspondingly controls the entrance guard equipment according to the result of the passing authority check.
Preferably, the generating and configuring the two-dimensional code by the smart device includes:
the intelligent equipment encrypts the configuration information to generate a configuration two-dimensional code;
the configuration information at least includes: the number of the access control equipment, the configuration password of the access control equipment, a private key, a public key and the validity period of the two-dimensional code for opening the door;
or, the configuration information at least includes: the door control equipment number, the private key, the public key and the valid period of the two-dimensional code for opening the door.
Preferably, the checking of the configuration permission of the access control device according to the configuration two-dimensional code includes:
if the configuration two-dimensional code carries a configuration password, the access control equipment compares the configuration password with a configuration password stored in the access control equipment, and when the comparison is successful, the configuration permission verification is judged to be passed, otherwise, the configuration permission verification is judged to be failed;
and if the configuration two-dimensional code does not contain the configuration password, the access control equipment receives the configuration password from the intelligent equipment, compares the received configuration password with the configuration password stored in the access control equipment, judges that the configuration authority passes the verification when the comparison is successful, and otherwise judges that the configuration authority fails to verify.
Preferably, the smart device generates a door-opening two-dimensional code and includes:
the intelligent equipment generates a random password in a set encryption mode according to the information of the access control user, the timestamp information, the APP random number and a public key corresponding to the access control equipment;
the intelligent device generates a door opening two-dimensional code according to the random password, the information of the access control user, the timestamp information and the APP random number.
Preferably, the access control equipment according to the two-dimensional code that opens the door carries out the check of permission including:
the door opening two-dimensional code is analyzed by a public key and a secret key which are locally stored in the access control equipment, a random password is obtained, the obtained random password is compared with a random password carried by the door opening two-dimensional code, when the comparison is successful, the validity period is judged further according to the validity period of the door opening two-dimensional code stored in the access control equipment and a timestamp in the door opening two-dimensional code, when the validity period is valid, the passing permission check is judged, otherwise, the passing permission check is judged to fail.
The present application also provides a non-transitory computer-readable storage medium storing instructions that, when executed by a processor, cause the processor to perform the steps of the method for controlling an offline access control device as previously described, applied to a smart device.
The present application also provides an electronic device comprising a non-volatile computer-readable storage medium as described above, and the processor having access to the non-volatile computer-readable storage medium.
The present application also provides a non-transitory computer-readable storage medium storing instructions, wherein the instructions, when executed by a processor, cause the processor to perform the steps of the method for controlling an offline access control device as applied to an access control device as described above.
The present application also provides an electronic device comprising a non-volatile computer-readable storage medium as described above, and the processor having access to the non-volatile computer-readable storage medium.
The present application also discloses a non-transitory computer-readable storage medium storing instructions that, when executed by a processor, cause the processor to perform the steps of the method of controlling an offline access control device as described above.
The application also discloses an electronic device comprising the non-volatile computer-readable storage medium as described above, and the processor having access to the non-volatile computer-readable storage medium.
According to the technical scheme, the access control equipment is configured by the configuration two-dimensional code generated by the intelligent equipment, and the access control equipment is controlled by the opening two-dimensional code generated by the intelligent equipment, so that the offline access control equipment is controlled conveniently, quickly and safely.
Because the two-dimensional code is always stored in the access control equipment by adopting the technical scheme of the application, compared with the scheme of storing all card numbers and human faces in the access control equipment in the prior art, the requirement on the storage space is obviously reduced. And under the condition of network off-line, the device management personnel can also use the configuration two-dimensional code in the mobile phone to configure the access control device, and the use and the management of the access control device are not influenced.
Drawings
Fig. 1 is a flowchart illustrating a method for controlling an offline access control device according to an embodiment of the present disclosure;
fig. 2 is a system framework diagram for controlling an offline access control device according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a preferred smart device according to the present application;
fig. 4 is a schematic view of a structure of a preferred door access device according to the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is further described in detail below by referring to the accompanying drawings and examples.
The access control system is a modern safety management system, and generally comprises password access control, inductive card swiping access control, fingerprint identification access control, human face access control and the like. As a mode with low cost, high circulation and good safety factor, the two-dimensional code has better advantages in the aspect of visitors or temporary personnel by combining management such as a mobile phone application program (APP).
In view of this, the present application provides a method for controlling an offline access control device, in which an intelligent device (including various devices capable of generating two-dimensional codes such as a mobile phone and a tablet computer) is used to generate a configuration two-dimensional code and a door-opening two-dimensional code, a door control system is configured by the configuration two-dimensional code, and the door control system is controlled to be opened and closed by the door-opening two-dimensional code, so that the offline access control device is conveniently, quickly and safely controlled.
The following first presents a brief description of several concepts related to the present application:
configuring a two-dimensional code: the two-dimensional code is used for managing or configuring the access control device by a device manager (such as a property worker).
Two-dimensional code opens the door: is a two-dimensional code for an access control user (such as a resident, a temporary person or a visitor in a building) to open the access control device.
Configuring a password: and the password is used for judging whether the equipment management personnel has the configuration permission to the access control equipment by the access control equipment. The configuration password is matched with the configuration two-dimensional code for use or is carried in the configuration two-dimensional code.
Random password: and the password is used for judging whether the access control user has the passing permission to the access control equipment by the access control equipment. The random password is carried in the two-dimensional code for opening the door.
The application access control equipment include the access control equipment under the various building systems, for example: witness equipment with a camera, equipment externally connected with a two-dimensional code scanner and the like.
The present application provides methods for controlling an offline access control device, which are applied to an intelligent device side and an access control device side, respectively, and are described in detail below.
The method for controlling the offline access control equipment applied to the intelligent equipment comprises the following steps:
generating a configuration two-dimensional code, scanning the configuration two-dimensional code to access control equipment, and configuring the access control equipment;
and generating a door opening two-dimensional code, scanning the door opening two-dimensional code to the access control equipment, and controlling the access control equipment.
Wherein the generating the configuration two-dimensional code comprises: encrypting the configuration information to generate a configuration two-dimensional code;
the configuration information at least includes: the number of the access control equipment, the configuration password of the access control equipment, a private key, a public key and the validity period of the two-dimensional code for opening the door;
or, the configuration information at least includes: the door control equipment number, the private key, the public key and the valid period of the two-dimensional code for opening the door.
Wherein, the generation of the two-dimensional code for opening the door comprises:
generating a random password in a set encryption mode according to information of access control users, timestamp information, an APP random number and a public key corresponding to access control equipment;
and generating a door opening two-dimensional code according to the random password, the information of the access control user, the timestamp information and the APP random number.
The method for controlling the offline access control equipment applied to the access control equipment comprises the following steps:
the access control equipment scans the configuration two-dimensional code of the intelligent equipment, performs configuration authority verification according to the configuration two-dimensional code, and receives and stores configuration information of the intelligent equipment when the configuration authority verification is passed;
the entrance guard equipment scans the door opening two-dimensional code of the intelligent equipment, the door opening two-dimensional code is used for passing authority verification, and the entrance guard equipment is correspondingly controlled according to the result of the passing authority verification.
Wherein, the verifying the configuration permission according to the configuration two-dimensional code comprises:
if the configuration two-dimensional code carries the configuration password, the access control equipment compares the configuration password with the configuration password stored in the access control equipment, and when the comparison is successful, the configuration permission verification is judged to be passed, otherwise, the configuration permission verification is judged to be failed;
and if the configuration two-dimensional code does not contain the configuration password, the access control equipment receives the configuration password from the intelligent equipment, compares the received configuration password with the configuration password stored in the access control equipment, judges that the configuration authority passes the verification when the comparison is successful, and otherwise judges that the configuration authority fails to verify.
Wherein, the pass permission verification according to the door opening two-dimensional code comprises:
the door opening two-dimensional code is analyzed by a public key and a secret key which are locally stored in the access control equipment, a random password is obtained, the obtained random password is compared with a random password carried by the door opening two-dimensional code, when the comparison is successful, the validity period is judged further according to the validity period of the door opening two-dimensional code stored in the access control equipment and a timestamp in the door opening two-dimensional code, when the validity period is valid, the passing permission check is judged, otherwise, the passing permission check is judged to fail.
The technical solution of the present application is further described in detail by a preferred embodiment.
Fig. 1 is a flowchart of a method for controlling an offline access control device according to an embodiment of the present application, where a left half of the flow is a flow for configuring an access control device by configuring a two-dimensional code, and a right half of the flow is a flow for controlling an access control device by opening a door with a two-dimensional code. The details are described below.
Firstly, configuring access control equipment by configuring a two-dimensional code:
p1: and the entrance guard equipment is restored to factory settings.
When the access control equipment is configured for the first time or the configuration password is forgotten to be reset, the access control equipment needs to be restored to factory settings. The entrance guard equipment is restored to the factory setting in order to ensure that the equipment is in a state capable of being configured by using the configuration two-dimensional code, only in the state, the configuration password of the configuration two-dimensional code can be set, and the subsequent operations of modifying the private key, the public key and the like all need the configuration password to be verified.
P2: and generating a configuration two-dimensional code.
According to different implementation modes, APP, public numbers, WeChat applets and the like in the intelligent equipment can be used for generating the configuration two-dimensional codes, and then property workers acquire the configuration two-dimensional codes through the APP, public numbers, WeChat applets and the like in the intelligent equipment. To simplify the description, those skilled in the art will appreciate that the portion described below as "smart device" may correspond to "APP in smart device, public number, wechat applet, etc.
The application provides two better ways for generating and configuring the two-dimensional code:
the first mode is as follows: and encrypting configuration information such as the number of the access control equipment, the configuration password of the access control equipment, a private key, a public key, the validity period of the two-dimensional code for opening the door and the like to generate a two-dimensional code for configuration. The configuration two-dimensional code generated in this way already carries the configuration password, and therefore, in the subsequent processing, the configuration password does not need to be input again.
The second mode is as follows: and encrypting information such as the number of the access control equipment, a private key, a public key and the validity period of the two-dimensional code for opening the door to generate a configuration two-dimensional code. The configuration two-dimensional code generated in this way does not carry a configuration password, so that in the following processing, the configuration password needs to be input to the mobile phone application program to configure the access control device.
The unique correspondence of the equipment can be guaranteed by the access control equipment number, and whether the configuration is allowed or not can be determined by comparing the access control equipment number when the configuration password is firstly set.
In a building access control system, a private key, a public key and the like correspond to information such as positions of different access control devices in the building access control system, and when the positions of the access control devices are changed, the corresponding private key and the corresponding public key need to be changed.
The valid period of the two-dimensional code for opening the door is used for managing the valid period of the two-dimensional code for opening the door.
When the door access device is shipped, the configuration password of the door access device can be set to be an initial password of 000000, 123456 and the like. The device management personnel can input the initial password to APP, public numbers, WeChat small programs and the like in the intelligent device to open the configuration function of the access control device, and set a new password under the prompting of the intelligent device, or the APP, public numbers, WeChat small programs and the like in the intelligent device can embed the initial password and open the configuration function of the access control device through the embedded initial password, and prompt the device management personnel to set a new password.
P3: and the access control equipment scans the configuration two-dimensional code and verifies the configuration permission according to the configuration two-dimensional code and the configuration password.
In this step, can aim at the equipment that possesses the two-dimensional code and read the function such as entrance guard's equipment camera or the external scanning rifle of entrance guard's equipment with the configuration two-dimensional code that intelligent equipment generated, the configuration two-dimensional code is read the back successfully, and entrance guard's equipment can adopt some mode to indicate (like bee calling organ prompt tone).
As mentioned earlier, the configuration two-dimensional code is used for equipment management personnel to dispose entrance guard's equipment, and according to above-mentioned P2, this application provides two kinds of different modes of generating configuration two-dimensional code. According to different ways of generating and configuring the two-dimensional code, the ways of verifying the configuration authority in this step are also divided into two different cases:
corresponding to a first way of generating a configuration two-dimensional code: the generated configuration two-dimensional code carries a configuration password, and the access control equipment can directly compare the configuration password with the configuration password stored in the access control equipment so as to judge whether an equipment manager has the authority to configure the access control equipment. Namely: and when the comparison is successful, judging that the configuration authority verification is successful, otherwise, judging that the configuration authority verification is failed.
Corresponding to a second way of generating the configuration two-dimensional code: the generated configuration two-dimensional code does not contain a configuration password, equipment managers are prompted to input the configuration password by the intelligent equipment, and then the access control equipment compares the configuration password with the configuration password stored in the access control equipment to judge whether the equipment managers have the authority to configure the access control equipment. Namely: and when the comparison is successful, judging that the configuration authority verification is successful, otherwise, judging that the configuration authority verification is failed.
P4: and after the configuration authority is verified successfully, the access control equipment stores the configuration two-dimensional code.
The two-dimensional code is written into the storage medium of the access control system, and corresponding configuration files are not lost unless factory settings are restored. If the configuration password is reset by the equipment management personnel, the access control equipment still needs to store a new configuration password in the step. In the subsequent processing flow, the functions of the information stored in the access control device include: when the door-opening two-dimensional code is received, the stored information is read to judge whether the corresponding personnel have the permission to pass or not, and when the equipment management personnel use the configuration password to modify the public key and the private key, the corresponding configuration password is compared to judge whether the equipment management personnel have the permission to configure.
Because the two-dimensional code that adopts this application technical scheme to keep at entrance guard's equipment only one configuration two-dimensional code forever, compare in prior art with all card numbers and the scheme that the people's face was kept at entrance guard's equipment, show to reduce the requirement of memory space. And under the condition of network off-line, the device management personnel can also use the configuration two-dimensional code in the mobile phone to configure the access control device, and the use and the management of the access control device are not influenced.
Secondly, the access control equipment is controlled through the two-dimension code that opens the door:
k1: APP, public numbers, WeChat small programs and the like in the intelligent equipment generate door-opening two-dimensional codes carrying random passwords.
Entrance guard's user of service passes through modes authentication login such as APP, public number, little letter applet in the smart machine, fills in corresponding entrance guard's equipment's information, and the information that the configuration two-dimensional code that will guarantee to fill in is the same with entrance guard's equipment is corresponding, can include: information of access control user (such as telephone number information) and timestamp information.
APP, public numbers, WeChat small programs and the like in the intelligent equipment generate random passwords in a set encryption mode according to information, timestamp information, APP random numbers of access control users and public keys corresponding to the access control equipment, and then generate door opening two-dimensional codes according to the random passwords, the information, the timestamp information and the APP random numbers of the access control users. And a public key of the access control equipment is stored in an APP, a public number and a WeChat applet in the intelligent equipment. In order to ensure the safety, the two-dimension code for opening the door does not carry the public key information of the corresponding access control equipment.
Preferably, the two-dimensional code for opening the door can carry a plurality of sets of random passwords for opening the access control equipment at different positions.
K2: and the access control equipment scans the door opening two-dimensional code.
As mentioned earlier, the two-dimensional code that opens the door mainly used entrance guard's user uses. When the intelligent door control device is used, the two-dimensional code generated by the intelligent device is aligned to the camera of the door control device or the external scanning gun of the door control device and other devices with the two-dimensional code reading function, and after the two-dimensional code is successfully read, the door control device can adopt a certain mode to prompt (such as buzzer prompt sound).
And K3, the access control equipment carries out pass authority verification according to the door opening two-dimensional code.
As described above, in order to ensure security, the two-dimensional door opening code does not carry public key information of the corresponding access control device. After the door access control equipment scans the door opening two-dimensional code, the door access control equipment can restore a corresponding encryption field by combining a public key in the door access control equipment to obtain a random password. In this step, the specific method for checking the passing authority according to the door opening two-dimensional code includes:
the public key secret key of local storage of entrance guard's equipment is analyzed to the two-dimensional code that opens the door, obtains random password to compare the random password who obtains and the random password that the two-dimensional code that opens the door carried, judge whether entrance guard's user has the right of passage, and judge the validity period according to the information such as the timestamp in the two-dimensional code that opens the door that this entrance guard's equipment stored validity period and the two-dimensional code that opens the door, decide whether to open the door, thereby reinforcing security level.
K4: and carrying out voice broadcasting, UI display, door opening and other operations according to the judgment result.
The above mode ensures that the door opening authentication can be carried out even if the access control equipment is off-line. If the access control device is on-line, some door opening events can be reported to the server platform for display and/or storage.
It should be noted that: the two-dimensional code configuration and the door opening two-dimensional code can be distinguished by the access control equipment in a data head mode and/or a verification mode.
Fig. 2 is a system framework diagram for controlling an offline access control device according to an embodiment of the present application. The system framework is described by taking an intelligent device as a mobile phone as an example, and according to the system framework shown in fig. 2:
for configuration of the two-dimensional code, the mobile phone generates the two-dimensional code and sends the two-dimensional code to the access control equipment, and a two-dimensional code recognizer (such as a camera module in the access control equipment) of the access control equipment performs two-dimensional code recognition and configuration authority verification.
For the door opening two-dimensional code, after the two-dimensional code is generated by the mobile phone, the two-dimensional code is sent to the access control equipment, a two-dimensional code recognizer (such as a camera module in the access control equipment) of the access control equipment carries out two-dimensional code recognition, the passing authority is verified, and finally, a display and voice playing module in the relay and the access control equipment is correspondingly controlled.
Based on the system framework shown in fig. 2, the system for controlling the offline access control device includes: smart machine and access control system, wherein:
the intelligent equipment generates a configuration two-dimensional code;
the access control equipment scans the configuration two-dimensional code of the intelligent equipment, performs configuration authority verification according to the configuration two-dimensional code, and receives and stores configuration information of the intelligent equipment when the configuration authority verification is passed;
the intelligent equipment generates a door opening two-dimensional code;
the entrance guard equipment scans the door opening two-dimensional code of the intelligent equipment, checks the passing authority according to the door opening two-dimensional code, and correspondingly controls the entrance guard equipment according to the result of the passing authority check.
Preferably, the generating and configuring the two-dimensional code by the smart device includes:
the intelligent equipment encrypts the configuration information to generate a configuration two-dimensional code;
the configuration information at least includes: the number of the access control equipment, the configuration password of the access control equipment, a private key, a public key and the validity period of the two-dimensional code for opening the door;
or, the configuration information at least includes: the door control equipment number, the private key, the public key and the valid period of the two-dimensional code for opening the door.
Preferably, the checking of the configuration permission of the access control device according to the configuration two-dimensional code includes:
if the configuration two-dimensional code carries a configuration password, the access control equipment compares the configuration password with a configuration password stored in the access control equipment, and when the comparison is successful, the configuration permission verification is judged to be passed, otherwise, the configuration permission verification is judged to be failed;
and if the configuration two-dimensional code does not contain the configuration password, the access control equipment receives the configuration password from the intelligent equipment, compares the received configuration password with the configuration password stored in the access control equipment, judges that the configuration authority passes the verification when the comparison is successful, and otherwise judges that the configuration authority fails to verify.
Preferably, the smart device generates a door-opening two-dimensional code and includes:
the intelligent equipment generates a random password in a set encryption mode according to the information of the access control user, the timestamp information, the APP random number and a public key corresponding to the access control equipment;
the intelligent device generates a door opening two-dimensional code according to the random password, the information of the access control user, the timestamp information and the APP random number.
Preferably, the access control equipment according to the two-dimensional code that opens the door carries out the check of permission including:
the door opening two-dimensional code is analyzed by a public key and a secret key which are locally stored in the access control equipment, a random password is obtained, the obtained random password is compared with a random password carried by the door opening two-dimensional code, when the comparison is successful, the validity period is judged further according to the validity period of the door opening two-dimensional code stored in the access control equipment and a timestamp in the door opening two-dimensional code, when the validity period is valid, the passing permission check is judged, otherwise, the passing permission check is judged to fail.
The invention provides a whole set of technical scheme for configuring access control equipment by configuring a two-dimension code and controlling the door opening of an access control system by using a door opening two-dimension code. The scheme mainly solves the defect that two-dimension code judgment operation of some access control equipment can only be sent to a remote cloud server or a remote platform for off-line use. The scheme occupies less space in storage, has strong flexibility, and can be better used as an access control solution for temporary personnel or visitors. The check comparison mode between the two-dimensional codes is innovative.
Corresponding to the above method, the present application provides an intelligent device, whose composition structure is shown in fig. 3, including: configure two-dimensional code generation module and open door two-dimensional code generation module, wherein:
the configuration two-dimensional code generation module is used for generating a configuration two-dimensional code, scanning the configuration two-dimensional code to the access control equipment and configuring the access control equipment;
the door opening two-dimensional code generation module is used for generating a door opening two-dimensional code, scanning the door opening two-dimensional code to the access control equipment, and controlling the access control equipment.
Corresponding to the above method, the present application further provides an access control device, whose composition structure is shown in fig. 4, including: configuring a permission verification module and a passing permission verification module, wherein:
the configuration authority verification module is used for scanning a configuration two-dimensional code of the intelligent device, verifying the configuration authority according to the configuration two-dimensional code, and receiving and storing configuration information of the intelligent device when the configuration authority passes verification;
the access control device comprises a door opening two-dimensional code, a door opening permission checking module and a passing permission checking module, wherein the door opening permission checking module is used for scanning the door opening two-dimensional code of the intelligent device, performing passing permission checking according to the door opening two-dimensional code, and performing corresponding control on the access control device according to the result of the passing permission checking.
Furthermore, the present application also provides a non-transitory computer-readable storage medium storing instructions that, when executed by a processor, cause the processor to perform the steps of the method for controlling an offline access control device as previously described, applied to a smart device. The present application also provides an electronic device comprising a non-volatile computer-readable storage medium as described above, and the processor having access to the non-volatile computer-readable storage medium.
Furthermore, the present application also provides a non-transitory computer-readable storage medium storing instructions that, when executed by a processor, cause the processor to perform the steps of the method for controlling an offline access control device as applied to an access control device as described above. The present application also provides an electronic device comprising a non-volatile computer-readable storage medium as described above, and the processor having access to the non-volatile computer-readable storage medium.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.

Claims (17)

1. The utility model provides a method for controlling off-line entrance guard equipment, is applied to intelligent equipment, which is characterized in that, includes:
generating a configuration two-dimensional code, scanning the configuration two-dimensional code to access control equipment, and configuring the access control equipment;
and generating a door opening two-dimensional code, scanning the door opening two-dimensional code to the access control equipment, and controlling the access control equipment.
2. The method of claim 1, wherein generating the configuration two-dimensional code comprises:
encrypting the configuration information to generate a configuration two-dimensional code;
the configuration information at least includes: the number of the access control equipment, the configuration password of the access control equipment, a private key, a public key and the validity period of the two-dimensional code for opening the door;
or, the configuration information at least includes: the door control equipment number, the private key, the public key and the valid period of the two-dimensional code for opening the door.
3. The method of claim 1 or 2, wherein the generating the door open two-dimensional code comprises:
generating a random password in a set encryption mode according to information of access control users, timestamp information, an APP random number and a public key corresponding to access control equipment;
and generating a door opening two-dimensional code according to the random password, the information of the access control user, the timestamp information and the APP random number.
4. A smart device, comprising: configure two-dimensional code generation module and open door two-dimensional code generation module, wherein:
the configuration two-dimensional code generation module is used for generating a configuration two-dimensional code, scanning the configuration two-dimensional code to the access control equipment and configuring the access control equipment;
the door opening two-dimensional code generation module is used for generating a door opening two-dimensional code, scanning the door opening two-dimensional code to the access control equipment, and controlling the access control equipment.
5. The utility model provides a method for controlling off-line entrance guard equipment, is applied to entrance guard equipment, its characterized in that includes:
the access control equipment scans the configuration two-dimensional code of the intelligent equipment, performs configuration authority verification according to the configuration two-dimensional code, and receives and stores configuration information of the intelligent equipment when the configuration authority verification is passed;
the entrance guard equipment scans the door opening two-dimensional code of the intelligent equipment, the door opening two-dimensional code is used for passing authority verification, and the entrance guard equipment is correspondingly controlled according to the result of the passing authority verification.
6. The method of claim 5, wherein the checking configuration permission according to the configuration two-dimensional code comprises:
if the configuration two-dimensional code carries the configuration password, the access control equipment compares the configuration password with the configuration password stored in the access control equipment, and when the comparison is successful, the configuration permission verification is judged to be passed, otherwise, the configuration permission verification is judged to be failed;
and if the configuration two-dimensional code does not contain the configuration password, the access control equipment receives the configuration password from the intelligent equipment, compares the received configuration password with the configuration password stored in the access control equipment, judges that the configuration authority passes the verification when the comparison is successful, and otherwise judges that the configuration authority fails to verify.
7. The method according to claim 5 or 6, wherein the checking the right of passage according to the door opening two-dimensional code comprises:
the door opening two-dimensional code is analyzed by a public key and a secret key which are locally stored in the access control equipment, a random password is obtained, the obtained random password is compared with a random password carried by the door opening two-dimensional code, when the comparison is successful, the validity period is judged further according to the validity period of the door opening two-dimensional code stored in the access control equipment and a timestamp in the door opening two-dimensional code, when the validity period is valid, the passing permission check is judged, otherwise, the passing permission check is judged to fail.
8. An access control device, comprising: configuring a permission verification module and a passing permission verification module, wherein:
the configuration authority verification module is used for scanning a configuration two-dimensional code of the intelligent device, verifying the configuration authority according to the configuration two-dimensional code, and receiving and storing configuration information of the intelligent device when the configuration authority passes verification;
the access control device comprises a door opening two-dimensional code, a door opening permission checking module and a passing permission checking module, wherein the door opening permission checking module is used for scanning the door opening two-dimensional code of the intelligent device, performing passing permission checking according to the door opening two-dimensional code, and performing corresponding control on the access control device according to the result of the passing permission checking.
9. The utility model provides a system for controlling off-line entrance guard equipment which characterized in that includes: smart machine and access control system, wherein:
the intelligent equipment generates a configuration two-dimensional code;
the access control equipment scans the configuration two-dimensional code of the intelligent equipment, performs configuration authority verification according to the configuration two-dimensional code, and receives and stores configuration information of the intelligent equipment when the configuration authority verification is passed;
the intelligent equipment generates a door opening two-dimensional code;
the entrance guard equipment scans the door opening two-dimensional code of the intelligent equipment, checks the passing authority according to the door opening two-dimensional code, and correspondingly controls the entrance guard equipment according to the result of the passing authority check.
10. The system of claim 9, wherein the smart device generating the configuration two-dimensional code comprises:
the intelligent equipment encrypts the configuration information to generate a configuration two-dimensional code;
the configuration information at least includes: the number of the access control equipment, the configuration password of the access control equipment, a private key, a public key and the validity period of the two-dimensional code for opening the door;
or, the configuration information at least includes: the door control equipment number, the private key, the public key and the valid period of the two-dimensional code for opening the door.
11. The system of claim 10, wherein the checking of the configuration permission of the access control device according to the configuration two-dimensional code comprises:
if the configuration two-dimensional code carries a configuration password, the access control equipment compares the configuration password with a configuration password stored in the access control equipment, and when the comparison is successful, the configuration permission verification is judged to be passed, otherwise, the configuration permission verification is judged to be failed;
and if the configuration two-dimensional code does not contain the configuration password, the access control equipment receives the configuration password from the intelligent equipment, compares the received configuration password with the configuration password stored in the access control equipment, judges that the configuration authority passes the verification when the comparison is successful, and otherwise judges that the configuration authority fails to verify.
12. The system of any one of claims 9 to 11, wherein the smart device generating a door open two-dimensional code comprises:
the intelligent equipment generates a random password in a set encryption mode according to the information of the access control user, the timestamp information, the APP random number and a public key corresponding to the access control equipment;
the intelligent device generates a door opening two-dimensional code according to the random password, the information of the access control user, the timestamp information and the APP random number.
13. The system of claim 12, wherein the access control device performing the pass permission check according to the door opening two-dimensional code comprises:
the door opening two-dimensional code is analyzed by a public key and a secret key which are locally stored in the access control equipment, a random password is obtained, the obtained random password is compared with a random password carried by the door opening two-dimensional code, when the comparison is successful, the validity period is judged further according to the validity period of the door opening two-dimensional code stored in the access control equipment and a timestamp in the door opening two-dimensional code, when the validity period is valid, the passing permission check is judged, otherwise, the passing permission check is judged to fail.
14. A non-transitory computer-readable storage medium storing instructions which, when executed by a processor, cause the processor to perform the steps of the method of controlling an offline access control device according to any one of claims 1 to 3.
15. An electronic device comprising the non-volatile computer-readable storage medium of claim 14, and the processor having access to the non-volatile computer-readable storage medium.
16. A non-transitory computer-readable storage medium storing instructions which, when executed by a processor, cause the processor to perform the steps of the method of controlling an offline access control device according to any of claims 5 to 7.
17. An electronic device comprising the non-volatile computer-readable storage medium of claim 16, and the processor having access to the non-volatile computer-readable storage medium.
CN201811189355.4A 2018-10-12 2018-10-12 Method, device and system for controlling offline access control device Pending CN111047750A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811189355.4A CN111047750A (en) 2018-10-12 2018-10-12 Method, device and system for controlling offline access control device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811189355.4A CN111047750A (en) 2018-10-12 2018-10-12 Method, device and system for controlling offline access control device

Publications (1)

Publication Number Publication Date
CN111047750A true CN111047750A (en) 2020-04-21

Family

ID=70229662

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811189355.4A Pending CN111047750A (en) 2018-10-12 2018-10-12 Method, device and system for controlling offline access control device

Country Status (1)

Country Link
CN (1) CN111047750A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111510661A (en) * 2020-04-22 2020-08-07 西安艾润物联网技术服务有限责任公司 Two-dimensional code-based network talkback method, related equipment and readable storage medium
CN113973048A (en) * 2020-07-23 2022-01-25 熵基科技股份有限公司 Configuration method and configuration terminal of attendance access control equipment and attendance access control equipment
CN115359595A (en) * 2022-07-15 2022-11-18 广东城启科技有限公司 Guangdong residential code access control method based on two-dimensional code as carrier

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103916842A (en) * 2012-12-30 2014-07-09 北京握奇数据系统有限公司 Method for binding and validating user ID and external device
CN103955982A (en) * 2014-05-22 2014-07-30 国家电网公司 Method and device for identifying time-varying dynamic two-dimensional code entrance guard
EP2732579A4 (en) * 2011-07-12 2015-04-08 Assa Abloy Ab Event driven second factor credential authentication
CN105337733A (en) * 2015-11-25 2016-02-17 杭州晟元数据安全技术股份有限公司 Two-dimensional code locking control method based on combination of synchronous-asynchronous secret key verification
CN105472037A (en) * 2016-01-06 2016-04-06 深圳市呤云科技有限公司 Method and device for opening entrance guard through scanning two-dimension code
CN205281618U (en) * 2015-12-11 2016-06-01 北京梦想加科技有限公司 Intelligence two -dimensional code system of opening door
CN205320109U (en) * 2016-01-06 2016-06-15 深圳市呤云科技有限公司 System for entrance guard is opened to scanning two -dimensional code
CN106652135A (en) * 2016-12-22 2017-05-10 深圳市麦驰安防技术有限公司 Access control method and system based on cloud technology and two-dimensional code technology
CN107492162A (en) * 2017-06-01 2017-12-19 景德镇学院 Intelligent access control system based on ciphering type Quick Response Code and WiFi technology
CN107945331A (en) * 2017-11-21 2018-04-20 广州思加特科技有限公司 A kind of access control method, apparatus and system
CN207409010U (en) * 2017-07-11 2018-05-25 广东能兴科技发展有限公司 The newer temporary password access control system of encryption parameter dynamic
CN108259447A (en) * 2016-12-29 2018-07-06 长城汽车股份有限公司 Control method, control system and the vehicle of onboard system

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2732579A4 (en) * 2011-07-12 2015-04-08 Assa Abloy Ab Event driven second factor credential authentication
CN103916842A (en) * 2012-12-30 2014-07-09 北京握奇数据系统有限公司 Method for binding and validating user ID and external device
CN103955982A (en) * 2014-05-22 2014-07-30 国家电网公司 Method and device for identifying time-varying dynamic two-dimensional code entrance guard
CN105337733A (en) * 2015-11-25 2016-02-17 杭州晟元数据安全技术股份有限公司 Two-dimensional code locking control method based on combination of synchronous-asynchronous secret key verification
CN205281618U (en) * 2015-12-11 2016-06-01 北京梦想加科技有限公司 Intelligence two -dimensional code system of opening door
CN105472037A (en) * 2016-01-06 2016-04-06 深圳市呤云科技有限公司 Method and device for opening entrance guard through scanning two-dimension code
CN205320109U (en) * 2016-01-06 2016-06-15 深圳市呤云科技有限公司 System for entrance guard is opened to scanning two -dimensional code
CN106652135A (en) * 2016-12-22 2017-05-10 深圳市麦驰安防技术有限公司 Access control method and system based on cloud technology and two-dimensional code technology
CN108259447A (en) * 2016-12-29 2018-07-06 长城汽车股份有限公司 Control method, control system and the vehicle of onboard system
CN107492162A (en) * 2017-06-01 2017-12-19 景德镇学院 Intelligent access control system based on ciphering type Quick Response Code and WiFi technology
CN207409010U (en) * 2017-07-11 2018-05-25 广东能兴科技发展有限公司 The newer temporary password access control system of encryption parameter dynamic
CN107945331A (en) * 2017-11-21 2018-04-20 广州思加特科技有限公司 A kind of access control method, apparatus and system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111510661A (en) * 2020-04-22 2020-08-07 西安艾润物联网技术服务有限责任公司 Two-dimensional code-based network talkback method, related equipment and readable storage medium
CN113973048A (en) * 2020-07-23 2022-01-25 熵基科技股份有限公司 Configuration method and configuration terminal of attendance access control equipment and attendance access control equipment
CN115359595A (en) * 2022-07-15 2022-11-18 广东城启科技有限公司 Guangdong residential code access control method based on two-dimensional code as carrier

Similar Documents

Publication Publication Date Title
US10755507B2 (en) Systems and methods for multifactor physical authentication
US7616091B2 (en) Actuating a security system using a wireless device
US20170264608A1 (en) Visual biometric authentication supplemented with a time-based secondary authentication factor
CN109767534B (en) Access control access method, system, management terminal and access control terminal based on block chain
US6747564B1 (en) Security guarantee method and system
KR101270941B1 (en) System and Method for authentication security using of user terminal
CN111047750A (en) Method, device and system for controlling offline access control device
CN114360114B (en) User authority management method and system
CN101298817B (en) Lock body control device and method thereof
KR102019097B1 (en) Vehicle access control system and method through code display
EP1445917A2 (en) Identification system for admission into protected area by means of an additional password
CN112907788A (en) Door lock control method and device, door lock and storage medium
CN105096423A (en) Two-dimension code-based intelligent student apartment access control system and control method thereof
CN115758398A (en) Access control data processing method and device, access control system and storage medium
CN111415443A (en) Remote unlocking method and device
KR101834181B1 (en) Access control system using certification schedule of multi certification device
CN110084947B (en) Access control information updating method and device
JP2005115485A (en) Authentication system and computer readable storage medium
KR102304731B1 (en) Illegal Admission Checking system By Block Chain and Method thereof
CN110516427B (en) Terminal user identity authentication method and device, storage medium and computer equipment
CN110738759A (en) fingerprint storage method, identity verification method, device and system
CN110349301A (en) Gate inhibition's open method and device
CN115242488A (en) Domestic network security operation and maintenance system and method
KR102060563B1 (en) Method and apparatus for providing authentication using voice and facial data
US10645070B2 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200421

RJ01 Rejection of invention patent application after publication