CN111243138B - Real-time access control authentication method - Google Patents

Real-time access control authentication method Download PDF

Info

Publication number
CN111243138B
CN111243138B CN202010033303.9A CN202010033303A CN111243138B CN 111243138 B CN111243138 B CN 111243138B CN 202010033303 A CN202010033303 A CN 202010033303A CN 111243138 B CN111243138 B CN 111243138B
Authority
CN
China
Prior art keywords
time
access control
terminal
real
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010033303.9A
Other languages
Chinese (zh)
Other versions
CN111243138A (en
Inventor
李纪玺
滕立勇
丁凯
李文
俞丰姣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wpg Shanghai Smart Water Public Co ltd
Original Assignee
Wpg Shanghai Smart Water Public Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wpg Shanghai Smart Water Public Co ltd filed Critical Wpg Shanghai Smart Water Public Co ltd
Priority to CN202010033303.9A priority Critical patent/CN111243138B/en
Publication of CN111243138A publication Critical patent/CN111243138A/en
Application granted granted Critical
Publication of CN111243138B publication Critical patent/CN111243138B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/08Mechanical actuation by opening, e.g. of door, of window, of drawer, of shutter, of curtain, of blind
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a real-time access authentication method, which is applied to an access control system. Through this technical scheme, can realize the dual authentication of real-time entrance guard, increase substantially access control system's security and traceability, can guarantee the smooth promotion of dual authentication simultaneously under user authentication terminal networking and non-networking state simultaneously, have splendid special environmental suitability.

Description

Real-time access control authentication method
Technical Field
The invention relates to the field of access control, in particular to a real-time access control authentication method.
Background
At present most access control system adopts modes such as lock, entrance guard's card, password to realize security protection encryption demand, and above three kinds of access control modes all take place following problem and hidden danger easily: 1) the safety coefficient is not high: if the key, the access card and the password are lost or stolen, the protection area corresponding to the access system is easy to be invaded by lawbreakers; 2) keys, access cards and passwords have no authority verification setting, and are easy to be copied by lawbreakers; 3) the entrance guard condition often does not have the record, if meet the problem in the later stage and be difficult to form effective retrospection.
Disclosure of Invention
Aiming at the problems in the prior art, a real-time access control authentication method is provided, and the specific technical scheme is as follows:
a real-time entrance guard authentication method is applied to an entrance guard system, and the entrance guard system comprises an entrance guard verification terminal, a user verification terminal, an entrance guard control terminal and a server side;
the access control verification terminal is connected with the access control terminal;
the server is remotely connected with the access control terminal and the user terminal;
the access control verification terminal is provided with an access control characteristic;
the user verifies that the terminal has a user characteristic;
each access control feature corresponds to a plurality of user features;
the real-time access control authentication method specifically comprises the following steps:
step S1, the entrance guard terminal continuously displays entrance guard verification information, the entrance guard verification information is refreshed every a preset time interval, and the entrance guard verification information comprises encrypted entrance guard characteristics and refreshing time;
step S2, determining whether the server maintains remote connection with the user terminal:
if not, go to step S3;
if yes, go to step S9;
step S3, the access control verification information is decrypted through the user verification terminal to obtain the refreshing time;
step S4, determining whether the refresh time belongs to a preset time interval:
if yes, go to step S5;
if not, displaying unlocking failure through the user verification terminal and quitting;
step S5, encrypting the user characteristics and the refreshing time to obtain a verification character string and outputting the verification character string to the access verification terminal;
step S6, the access control verification terminal decrypts the verification character string to obtain the user characteristics and the refreshing time;
step S7, determining whether the user characteristic corresponds to the access control characteristic, and determining whether a difference between the refresh time and the current time is less than a first preset threshold:
if the user characteristic corresponds to the entrance guard characteristic and the difference value is smaller than a first preset threshold value, turning to step S8;
if the user characteristic does not correspond to the access control characteristic or the difference value is larger than or equal to a first preset threshold value, displaying unlocking failure through the user verification terminal and quitting;
step S8, the entrance guard verification terminal sends an unlocking instruction to the entrance guard control terminal, and then the step S13 is turned to;
step S9, decrypting the access control verification information through the user verification terminal to obtain the refreshing time and the access control characteristics;
step S10, the entrance guard characteristics, the user characteristics and the refreshing time are sent to a server side;
step S11, the server determines whether the user characteristic corresponds to the access control characteristic, and determines whether the difference between the refresh time and the current time is smaller than a second preset threshold:
if the user characteristic corresponds to the entrance guard characteristic and the difference value is smaller than a second preset threshold value, turning to step S12;
if the user characteristic does not correspond to the access control characteristic or the difference value is larger than or equal to a second threshold value, displaying unlocking failure through the user verification terminal and quitting;
step S12, the server side sends an unlocking instruction to the access control terminal, and then the step S13 is turned to;
and step S13, unlocking the door control terminal according to the unlocking instruction.
Preferably, the access control feature includes a device number corresponding to the access control verification terminal.
Preferably, the user characteristics include a device number corresponding to the user authentication terminal and corresponding user identity information.
Preferably, the real-time access authentication method further includes the following steps:
step A1, the access control terminal continuously monitors the opening state of the corresponding door lock from the closing time and continuously outputs a real-time state;
step A2, judging whether the real-time state changes and whether the access control terminal receives an unlocking instruction:
if the real-time state changes and the entrance guard control terminal does not receive the unlocking instruction, turning to the step A3;
if the real-time state is not changed or the entrance guard control terminal receives an unlocking instruction, returning to the step A1;
and step A3, the access control terminal sends alarm information to the server.
Preferably, the real-time access authentication method further includes the following steps:
step B1, the access control terminal continuously monitors the opening state of the corresponding door lock from the closing time and continuously outputs a real-time state;
step B2, judging whether the real-time state changes:
if the real-time status changes, go to step B3;
if the real-time state is not changed, returning to the step B1;
and step B3, the access control terminal sends access history information to the server.
Preferably, the real-time access authentication method includes that the access history information includes a corresponding time when the real-time status changes and a corresponding user characteristic when the real-time status changes.
Preferably, in the real-time access authentication method, in steps S1 to S13, a dynamically updated key is introduced into each encryption process, and the key is stored in the server and updated periodically.
Preferably, the real-time access authentication method, wherein the periodic updating of the key includes the following steps:
step C1, every a preset time interval, the server updates the secret key;
step C2, the server updates the secret key in the user authentication terminal;
step C3, determining whether the key in the user authentication terminal is successfully updated:
if yes, go to step C4;
if not, the server side restores the secret key to the state of not updating, and then returns to the step C1;
and step C4, the server side updates the secret key in the access control verification terminal.
This technical scheme has following advantage or beneficial effect:
through this technical scheme, can realize the dual authentication of real-time entrance guard, increase substantially access control system's security and traceability, can guarantee the smooth promotion of dual authentication simultaneously under user authentication terminal networking and non-networking state simultaneously, have splendid special environmental suitability.
Drawings
Fig. 1 is a schematic flow chart of a real-time access authentication method according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the embodiments and features of the embodiments may be combined with each other without conflict.
The invention is further described with reference to the following drawings and specific examples, which are not intended to be limiting.
Aiming at the problems in the prior art, a real-time access control authentication method is provided, and the specific technical scheme is as follows:
a real-time entrance guard authentication method is applied to an entrance guard system, and the entrance guard system comprises an entrance guard verification terminal, a user verification terminal, an entrance guard control terminal and a server side;
the access control verification terminal is connected with the access control terminal;
the server is remotely connected with the access control terminal and the user terminal;
the access control verification terminal is provided with an access control characteristic;
the user verifies that the terminal has a user characteristic;
each access control feature corresponds to a plurality of user features;
as shown in fig. 1, the real-time access authentication method specifically includes:
step S1, the entrance guard terminal continuously displays entrance guard verification information, the entrance guard verification information is refreshed every a preset time interval, and the entrance guard verification information comprises encrypted entrance guard characteristics and refreshing time;
step S2, determining whether the server maintains remote connection with the user terminal:
if not, go to step S3;
if yes, go to step S9;
step S3, the access control verification information is decrypted through the user verification terminal to obtain the refreshing time;
step S4, determining whether the refresh time belongs to a preset time interval:
if yes, go to step S5;
if not, displaying unlocking failure through the user verification terminal and quitting;
step S5, encrypting the user characteristics and the refreshing time to obtain a verification character string and outputting the verification character string to the access verification terminal;
step S6, the access control verification terminal decrypts the verification character string to obtain the user characteristics and the refreshing time;
step S7, determining whether the user characteristic corresponds to the access control characteristic, and determining whether a difference between the refresh time and the current time is less than a first preset threshold:
if the user characteristic corresponds to the entrance guard characteristic and the difference value is smaller than a first preset threshold value, turning to step S8;
if the user characteristic does not correspond to the access control characteristic or the difference value is larger than or equal to a first preset threshold value, displaying unlocking failure through the user verification terminal and quitting;
step S8, the entrance guard verification terminal sends an unlocking instruction to the entrance guard control terminal, and then the step S13 is turned to;
step S9, decrypting the access control verification information through the user verification terminal to obtain the refreshing time and the access control characteristics;
step S10, the entrance guard characteristics, the user characteristics and the refreshing time are sent to a server side;
step S11, the server determines whether the user characteristic corresponds to the access control characteristic, and determines whether the difference between the refresh time and the current time is smaller than a second preset threshold:
if the user characteristic corresponds to the entrance guard characteristic and the difference value is smaller than a second preset threshold value, turning to step S12;
if the user characteristic does not correspond to the access control characteristic or the difference value is larger than or equal to a second threshold value, displaying unlocking failure through the user verification terminal and quitting;
step S12, the server side sends an unlocking instruction to the access control terminal, and then the step S13 is turned to;
and step S13, unlocking the door control terminal according to the unlocking instruction.
In a preferred embodiment of the present invention, the real-time access authentication method is applied to an access control system, the access control system includes an access verification terminal, a user verification terminal, an access control terminal and a server, the server is respectively connected to the access control terminal and the user terminal in a remote manner, and the real-time access authentication system adopts a secondary authentication mode: when the user terminal can be networked and is kept connected with the server side, the server side is adopted for secondary authentication, so that the safety of the access control system is improved; when the user terminal is in the non-networking state and can not be connected with the server side, the access control verification terminal performs secondary authentication instead, so that the requirement of performing real-time authentication in both the networking state and the non-networking state is met.
Particularly, in the above preferred embodiment, when the access control terminal is used for performing the secondary authentication instead, the risk is higher than that of performing the secondary authentication through the remote server, so that the user terminal is used to authenticate the information at the refresh time first, thereby ensuring the security of the real-time authentication method.
As a preferred implementation manner, the real-time access authentication method includes that the access characteristic includes a device number corresponding to the access authentication terminal.
As a preferred implementation manner, the real-time access authentication method includes that the user characteristics include a device number corresponding to the user authentication terminal and corresponding user identity information.
As a preferred embodiment, the real-time access authentication method further includes the following steps:
step A1, the access control terminal continuously monitors the opening state of the corresponding door lock from the closing time and continuously outputs a real-time state;
step A2, judging whether the real-time state changes and whether the access control terminal receives an unlocking instruction:
if the real-time state changes and the entrance guard control terminal does not receive the unlocking instruction, turning to the step A3;
if the real-time state is not changed or the entrance guard control terminal receives an unlocking instruction, returning to the step A1;
and step A3, the access control terminal sends alarm information to the server.
In another preferred embodiment of the present invention, the real-time access authentication method further comprises an alarm mechanism, which can issue an alarm in an abnormal state in which the state of the access control terminal changes but the unlocking instruction is not received, so as to warn about possible illegal intrusion.
As a preferred embodiment, the real-time access authentication method further includes the following steps:
step B1, the access control terminal continuously monitors the opening state of the corresponding door lock from the closing time and continuously outputs a real-time state;
step B2, judging whether the real-time state changes:
if the real-time status changes, go to step B3;
if the real-time state is not changed, returning to the step B1;
and step B3, the access control terminal sends access history information to the server.
As a preferred embodiment, the real-time access authentication method includes that the access history information includes a corresponding time when the real-time status changes and a corresponding user characteristic when the real-time status changes.
In another preferred embodiment of the present invention, the real-time access authentication method further includes an access history information uploading mechanism, so as to realize the later traceability of the access opening/closing amount.
In a preferred embodiment, in steps S1 to S13, a dynamically updated key is introduced into each encryption process, and the key is stored in the server and updated periodically.
Preferably, the real-time access authentication method, wherein the periodic updating of the key includes the following steps:
step C1, every a preset time interval, the server updates the secret key;
step C2, the server updates the secret key in the user authentication terminal;
step C3, determining whether the key in the user authentication terminal is successfully updated:
if yes, go to step C4;
if not, the server side restores the secret key to the state of not updating, and then returns to the step C1;
and step C4, the server side updates the secret key in the access control verification terminal.
In another preferred embodiment of the present invention, for each step from step S1 to step S13 that requires encryption, an encryption factor that is updated regularly is introduced in addition to the conventionally set encryption algorithm, so as to further improve the difficulty of cracking and the overall security of the access control system. The secret key is safely stored in the server and is periodically updated by the server, and the updating period can be one day or one week, which depends on the opening frequency of the access control system applying the real-time authentication method.
In the above preferred embodiment, the server is configured to update the secret key periodically, and in order to ensure that the encryption secret keys in the user authentication terminal and the access control authentication terminal are always consistent, the server first updates the user authentication terminal, and if the user authentication terminal fails to be updated because the user authentication terminal is not networked, the server gives up updating, restores the secret key to an un-updated state, and waits for a next update period to continue to perform an update attempt, so as to ensure that the secret keys of the user authentication terminal and the access control authentication terminal are consistent.
In conclusion, by the technical scheme, the real-time dual authentication of the access control can be realized, the safety and traceability of the access control system are greatly improved, meanwhile, the smooth promotion of the dual authentication can be simultaneously ensured under the networking and non-networking states of the user verification terminal, and the method has excellent special environment adaptability.
While the invention has been described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention.

Claims (8)

1. A real-time access authentication method is characterized in that the real-time access authentication method is applied to an access control system, and the access control system comprises an access control verification terminal, a user verification terminal, an access control terminal and a server side;
the access control verification terminal is connected with the access control terminal;
the server is respectively and remotely connected with the access control terminal and the user verification terminal;
the access control verification terminal is provided with an access control feature;
the user verification terminal is due to a user characteristic;
each access control feature corresponds to a plurality of user features;
the real-time access control authentication method specifically comprises the following steps:
step S1, the entrance guard verification terminal continuously displays entrance guard verification information, the entrance guard verification information is refreshed every a preset time interval, and the entrance guard verification information comprises encrypted entrance guard characteristics and refreshing time;
step S2, determining whether the server maintains a remote connection with the user authentication terminal:
if not, go to step S3;
if yes, go to step S9;
step S3, decrypting the access control verification information through the user verification terminal to obtain the refreshing time;
step S4, determining whether the refresh time belongs to a preset time interval:
if yes, go to step S5;
if not, displaying unlocking failure through the user verification terminal and quitting;
step S5, encrypting the user characteristics and the refreshing time to obtain a verification character string and outputting the verification character string to the access control verification terminal;
step S6, the access control verification terminal decrypts the verification character string to obtain the user characteristics and the refreshing time;
step S7, determining whether the user characteristic corresponds to the access control characteristic, and determining whether a difference between the refresh time and the current time is less than a first preset threshold:
if the user characteristic corresponds to the entrance guard characteristic and the difference value is smaller than the first preset threshold value, turning to step S8;
if the user characteristic does not correspond to the access control characteristic or the difference value is greater than or equal to the first preset threshold value, displaying unlocking failure through the user verification terminal and quitting;
step S8, the entrance guard verification terminal sends an unlocking instruction to the entrance guard control terminal, and then the step S13 is turned to;
step S9, decrypting the access control verification information through the user verification terminal to obtain the refreshing time and the access control characteristics;
step S10, the entrance guard characteristic, the user characteristic and the refreshing time are sent to the server side together;
step S11, the server side judges whether the user characteristic corresponds to the access control characteristic, and judges whether the difference between the refreshing time and the current time is less than a second preset threshold:
if the user characteristic corresponds to the entrance guard characteristic and the difference value is smaller than the second preset threshold value, turning to step S12;
if the user characteristic does not correspond to the access control characteristic or the difference value is greater than or equal to the second preset threshold value, displaying unlocking failure through the user verification terminal and quitting;
step S12, the server side sends the unlocking instruction to the access control terminal, and then the operation goes to step S13;
and step S13, unlocking the door access control terminal according to the unlocking instruction.
2. The real-time access authentication method of claim 1, wherein the access characteristic comprises a device number corresponding to the access authentication terminal.
3. The real-time access authentication method of claim 1, wherein the user characteristics include a device number corresponding to the user authentication terminal and corresponding user identity information.
4. The real-time access authentication method of claim 1, further comprising the steps of:
step A1, the access control terminal continuously monitors the opening state of the corresponding door lock from the closing time and continuously outputs a real-time state;
step A2, judging whether the real-time state changes and whether the access control terminal receives the unlocking instruction:
if the real-time state changes and the access control terminal does not receive the unlocking instruction, turning to step A3;
if the real-time state is not changed or the entrance guard control terminal has received the unlocking instruction, returning to the step A1;
and A3, the access control terminal sends alarm information to the server.
5. The real-time access authentication method of claim 1, further comprising the steps of:
step B1, the access control terminal continuously monitors the opening state of the corresponding door lock from the closing time and continuously outputs a real-time state;
step B2, determining whether the real-time status changes:
if the real-time status changes, go to step B3;
if the real-time status is not changed, returning to the step B1;
and step B3, the access control terminal sends access history information to the server.
6. The real-time access authentication method of claim 5, wherein the access history information includes a corresponding time when the real-time status changes and a corresponding user characteristic when the real-time status changes.
7. The real-time access authentication method according to claim 1, wherein in the steps S1 to S13, a dynamically updated key is introduced into each encryption process, and the key is stored in the server and updated periodically.
8. The real-time access authentication method according to claim 7, wherein the periodic updating of the key comprises the steps of:
step C1, every a preset time interval, the server updates the secret key;
step C2, the server side updates the secret key in the user authentication terminal;
step C3, determining whether the key in the user authentication terminal is successfully updated:
if yes, go to step C4;
if not, the server side restores the secret key to an un-updated state, and then returns to the step C1;
and step C4, the server updates the secret key in the access control verification terminal.
CN202010033303.9A 2020-01-13 2020-01-13 Real-time access control authentication method Active CN111243138B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010033303.9A CN111243138B (en) 2020-01-13 2020-01-13 Real-time access control authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010033303.9A CN111243138B (en) 2020-01-13 2020-01-13 Real-time access control authentication method

Publications (2)

Publication Number Publication Date
CN111243138A CN111243138A (en) 2020-06-05
CN111243138B true CN111243138B (en) 2022-04-19

Family

ID=70880829

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010033303.9A Active CN111243138B (en) 2020-01-13 2020-01-13 Real-time access control authentication method

Country Status (1)

Country Link
CN (1) CN111243138B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0843425A3 (en) * 1996-11-14 2000-12-13 International Business Machines Corporation Electronic communication apparatus using the human body as a transmission medium
WO2008127323A2 (en) * 2006-12-28 2008-10-23 Hewlett-Packard Development Company, L.P. Biometric security system and method
CN101826227A (en) * 2010-04-30 2010-09-08 广州合立正通信息网络集成有限公司 Triple-authentication gate control system and control method
CN104780043A (en) * 2014-01-14 2015-07-15 中国电信股份有限公司 Access control method and system based on two-dimension code
CN104851174A (en) * 2015-06-16 2015-08-19 赵旭东 High-reliability machine room intelligent entrance guard opening method and opening system
CN105095728A (en) * 2015-06-15 2015-11-25 南京市信息中心 Two-dimensional code identification method based on digital signatures and timestamps
CN107680207A (en) * 2017-08-18 2018-02-09 杭州比特信息技术有限公司 Several triggerings of networking smart lock wake up and the method for contactless enabling
CN108492433A (en) * 2018-06-08 2018-09-04 杭州滨拓通信技术有限公司 It is a kind of networking and suspension can intelligent control network access system
CN110110568A (en) * 2019-05-16 2019-08-09 深圳航天科技创新研究院 A kind of NFC electronic lock card reader and card reading method based on random key

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105025048B (en) * 2014-04-22 2018-12-18 东莞安尔发智能科技股份有限公司 Realize the method and system of smart lock permission control
CN106204843A (en) * 2016-07-13 2016-12-07 尹博实 A kind of door-control lock and gate control system
CN106447870A (en) * 2016-10-26 2017-02-22 江苏金米智能科技有限责任公司 Door control system based on two-dimensional code recognition
CN106384415A (en) * 2016-10-26 2017-02-08 江苏金米智能科技有限责任公司 Entrance guard automation control system based on synchronous transmission
CN108022333A (en) * 2016-11-04 2018-05-11 杭州海康威视数字技术股份有限公司 A kind of access control method, access controller and access control system
CN107733994A (en) * 2017-09-20 2018-02-23 美的智慧家居科技有限公司 Control method, intelligent door lock and the readable storage medium storing program for executing of intelligent door lock
CN108171849B (en) * 2018-01-11 2023-03-21 上海威惠智能科技有限公司 Password updating method, safe and safe control system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0843425A3 (en) * 1996-11-14 2000-12-13 International Business Machines Corporation Electronic communication apparatus using the human body as a transmission medium
WO2008127323A2 (en) * 2006-12-28 2008-10-23 Hewlett-Packard Development Company, L.P. Biometric security system and method
CN101826227A (en) * 2010-04-30 2010-09-08 广州合立正通信息网络集成有限公司 Triple-authentication gate control system and control method
CN104780043A (en) * 2014-01-14 2015-07-15 中国电信股份有限公司 Access control method and system based on two-dimension code
CN105095728A (en) * 2015-06-15 2015-11-25 南京市信息中心 Two-dimensional code identification method based on digital signatures and timestamps
CN104851174A (en) * 2015-06-16 2015-08-19 赵旭东 High-reliability machine room intelligent entrance guard opening method and opening system
CN107680207A (en) * 2017-08-18 2018-02-09 杭州比特信息技术有限公司 Several triggerings of networking smart lock wake up and the method for contactless enabling
CN108492433A (en) * 2018-06-08 2018-09-04 杭州滨拓通信技术有限公司 It is a kind of networking and suspension can intelligent control network access system
CN110110568A (en) * 2019-05-16 2019-08-09 深圳航天科技创新研究院 A kind of NFC electronic lock card reader and card reading method based on random key

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一种基于加密型二维码的手机门禁系统的设计与实现;孙永道;《科技通报》;20140731;全文 *

Also Published As

Publication number Publication date
CN111243138A (en) 2020-06-05

Similar Documents

Publication Publication Date Title
US11070364B2 (en) Secure communication method and smart lock system based thereof
US11947649B2 (en) Locking device biometric access
US7205883B2 (en) Tamper detection and secure power failure recovery circuit
US20040025039A1 (en) Lock box security system with improved communication
US9053313B2 (en) Method and system for providing continued access to authentication and encryption services
EP3362931B1 (en) Wireless firmware updates
JPH0652518B2 (en) Security system and its management method
CN103227776A (en) Configuration method, configuration device, computer program product and control system
CN108900296B (en) Secret key storage method based on biological feature identification
CN109003368B (en) Bluetooth access control system offline password updating method and Bluetooth access control system
KR20220072657A (en) SECURITY CONSTRUCTION METHOD FOR IoT DEVICES PLATFORM AND SECURITY CONSTRUCTION SYSTEM FOR IoT DEVICES PLATFORM BASED ON DUAL BLOCKCHAIN COUPLED WITH VIRTUAL BLOCKCHAIN
CN113965328A (en) Authority transfer method and system for digital key offline condition of trusted execution environment
CN111243138B (en) Real-time access control authentication method
CN112530053B (en) Control method and system of intelligent lock, lock equipment, server and storage medium
CN113556235A (en) Digital key authorization method
CN108055124A (en) Lock administration system and lock management method
EP3997674A1 (en) A structure accesses unlocking system and associated method
KR101996317B1 (en) Block chain based user authentication system using authentication variable and method thereof
CN112037383B (en) Intelligent door lock and authority judgment method and application system thereof
WO2003093997A1 (en) Lock box security system with improved communication
CN113593088A (en) Intelligent unlocking method, intelligent lock, mobile terminal and server
WO2021174264A1 (en) Method for remotely activating a remote lock system using cryptography and the remote lock system for implementing the method
CN117858079B (en) Safety control method of building intercom system
CN114783091B (en) Temporary password generation method, device, equipment and storage medium
US20030014672A1 (en) Authentication protocol with dynamic secret

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant