CN111243138B - Real-time access control authentication method - Google Patents
Real-time access control authentication method Download PDFInfo
- Publication number
- CN111243138B CN111243138B CN202010033303.9A CN202010033303A CN111243138B CN 111243138 B CN111243138 B CN 111243138B CN 202010033303 A CN202010033303 A CN 202010033303A CN 111243138 B CN111243138 B CN 111243138B
- Authority
- CN
- China
- Prior art keywords
- time
- access control
- terminal
- real
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/08—Mechanical actuation by opening, e.g. of door, of window, of drawer, of shutter, of curtain, of blind
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a real-time access authentication method, which is applied to an access control system. Through this technical scheme, can realize the dual authentication of real-time entrance guard, increase substantially access control system's security and traceability, can guarantee the smooth promotion of dual authentication simultaneously under user authentication terminal networking and non-networking state simultaneously, have splendid special environmental suitability.
Description
Technical Field
The invention relates to the field of access control, in particular to a real-time access control authentication method.
Background
At present most access control system adopts modes such as lock, entrance guard's card, password to realize security protection encryption demand, and above three kinds of access control modes all take place following problem and hidden danger easily: 1) the safety coefficient is not high: if the key, the access card and the password are lost or stolen, the protection area corresponding to the access system is easy to be invaded by lawbreakers; 2) keys, access cards and passwords have no authority verification setting, and are easy to be copied by lawbreakers; 3) the entrance guard condition often does not have the record, if meet the problem in the later stage and be difficult to form effective retrospection.
Disclosure of Invention
Aiming at the problems in the prior art, a real-time access control authentication method is provided, and the specific technical scheme is as follows:
a real-time entrance guard authentication method is applied to an entrance guard system, and the entrance guard system comprises an entrance guard verification terminal, a user verification terminal, an entrance guard control terminal and a server side;
the access control verification terminal is connected with the access control terminal;
the server is remotely connected with the access control terminal and the user terminal;
the access control verification terminal is provided with an access control characteristic;
the user verifies that the terminal has a user characteristic;
each access control feature corresponds to a plurality of user features;
the real-time access control authentication method specifically comprises the following steps:
step S1, the entrance guard terminal continuously displays entrance guard verification information, the entrance guard verification information is refreshed every a preset time interval, and the entrance guard verification information comprises encrypted entrance guard characteristics and refreshing time;
step S2, determining whether the server maintains remote connection with the user terminal:
if not, go to step S3;
if yes, go to step S9;
step S3, the access control verification information is decrypted through the user verification terminal to obtain the refreshing time;
step S4, determining whether the refresh time belongs to a preset time interval:
if yes, go to step S5;
if not, displaying unlocking failure through the user verification terminal and quitting;
step S5, encrypting the user characteristics and the refreshing time to obtain a verification character string and outputting the verification character string to the access verification terminal;
step S6, the access control verification terminal decrypts the verification character string to obtain the user characteristics and the refreshing time;
step S7, determining whether the user characteristic corresponds to the access control characteristic, and determining whether a difference between the refresh time and the current time is less than a first preset threshold:
if the user characteristic corresponds to the entrance guard characteristic and the difference value is smaller than a first preset threshold value, turning to step S8;
if the user characteristic does not correspond to the access control characteristic or the difference value is larger than or equal to a first preset threshold value, displaying unlocking failure through the user verification terminal and quitting;
step S8, the entrance guard verification terminal sends an unlocking instruction to the entrance guard control terminal, and then the step S13 is turned to;
step S9, decrypting the access control verification information through the user verification terminal to obtain the refreshing time and the access control characteristics;
step S10, the entrance guard characteristics, the user characteristics and the refreshing time are sent to a server side;
step S11, the server determines whether the user characteristic corresponds to the access control characteristic, and determines whether the difference between the refresh time and the current time is smaller than a second preset threshold:
if the user characteristic corresponds to the entrance guard characteristic and the difference value is smaller than a second preset threshold value, turning to step S12;
if the user characteristic does not correspond to the access control characteristic or the difference value is larger than or equal to a second threshold value, displaying unlocking failure through the user verification terminal and quitting;
step S12, the server side sends an unlocking instruction to the access control terminal, and then the step S13 is turned to;
and step S13, unlocking the door control terminal according to the unlocking instruction.
Preferably, the access control feature includes a device number corresponding to the access control verification terminal.
Preferably, the user characteristics include a device number corresponding to the user authentication terminal and corresponding user identity information.
Preferably, the real-time access authentication method further includes the following steps:
step A1, the access control terminal continuously monitors the opening state of the corresponding door lock from the closing time and continuously outputs a real-time state;
step A2, judging whether the real-time state changes and whether the access control terminal receives an unlocking instruction:
if the real-time state changes and the entrance guard control terminal does not receive the unlocking instruction, turning to the step A3;
if the real-time state is not changed or the entrance guard control terminal receives an unlocking instruction, returning to the step A1;
and step A3, the access control terminal sends alarm information to the server.
Preferably, the real-time access authentication method further includes the following steps:
step B1, the access control terminal continuously monitors the opening state of the corresponding door lock from the closing time and continuously outputs a real-time state;
step B2, judging whether the real-time state changes:
if the real-time status changes, go to step B3;
if the real-time state is not changed, returning to the step B1;
and step B3, the access control terminal sends access history information to the server.
Preferably, the real-time access authentication method includes that the access history information includes a corresponding time when the real-time status changes and a corresponding user characteristic when the real-time status changes.
Preferably, in the real-time access authentication method, in steps S1 to S13, a dynamically updated key is introduced into each encryption process, and the key is stored in the server and updated periodically.
Preferably, the real-time access authentication method, wherein the periodic updating of the key includes the following steps:
step C1, every a preset time interval, the server updates the secret key;
step C2, the server updates the secret key in the user authentication terminal;
step C3, determining whether the key in the user authentication terminal is successfully updated:
if yes, go to step C4;
if not, the server side restores the secret key to the state of not updating, and then returns to the step C1;
and step C4, the server side updates the secret key in the access control verification terminal.
This technical scheme has following advantage or beneficial effect:
through this technical scheme, can realize the dual authentication of real-time entrance guard, increase substantially access control system's security and traceability, can guarantee the smooth promotion of dual authentication simultaneously under user authentication terminal networking and non-networking state simultaneously, have splendid special environmental suitability.
Drawings
Fig. 1 is a schematic flow chart of a real-time access authentication method according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the embodiments and features of the embodiments may be combined with each other without conflict.
The invention is further described with reference to the following drawings and specific examples, which are not intended to be limiting.
Aiming at the problems in the prior art, a real-time access control authentication method is provided, and the specific technical scheme is as follows:
a real-time entrance guard authentication method is applied to an entrance guard system, and the entrance guard system comprises an entrance guard verification terminal, a user verification terminal, an entrance guard control terminal and a server side;
the access control verification terminal is connected with the access control terminal;
the server is remotely connected with the access control terminal and the user terminal;
the access control verification terminal is provided with an access control characteristic;
the user verifies that the terminal has a user characteristic;
each access control feature corresponds to a plurality of user features;
as shown in fig. 1, the real-time access authentication method specifically includes:
step S1, the entrance guard terminal continuously displays entrance guard verification information, the entrance guard verification information is refreshed every a preset time interval, and the entrance guard verification information comprises encrypted entrance guard characteristics and refreshing time;
step S2, determining whether the server maintains remote connection with the user terminal:
if not, go to step S3;
if yes, go to step S9;
step S3, the access control verification information is decrypted through the user verification terminal to obtain the refreshing time;
step S4, determining whether the refresh time belongs to a preset time interval:
if yes, go to step S5;
if not, displaying unlocking failure through the user verification terminal and quitting;
step S5, encrypting the user characteristics and the refreshing time to obtain a verification character string and outputting the verification character string to the access verification terminal;
step S6, the access control verification terminal decrypts the verification character string to obtain the user characteristics and the refreshing time;
step S7, determining whether the user characteristic corresponds to the access control characteristic, and determining whether a difference between the refresh time and the current time is less than a first preset threshold:
if the user characteristic corresponds to the entrance guard characteristic and the difference value is smaller than a first preset threshold value, turning to step S8;
if the user characteristic does not correspond to the access control characteristic or the difference value is larger than or equal to a first preset threshold value, displaying unlocking failure through the user verification terminal and quitting;
step S8, the entrance guard verification terminal sends an unlocking instruction to the entrance guard control terminal, and then the step S13 is turned to;
step S9, decrypting the access control verification information through the user verification terminal to obtain the refreshing time and the access control characteristics;
step S10, the entrance guard characteristics, the user characteristics and the refreshing time are sent to a server side;
step S11, the server determines whether the user characteristic corresponds to the access control characteristic, and determines whether the difference between the refresh time and the current time is smaller than a second preset threshold:
if the user characteristic corresponds to the entrance guard characteristic and the difference value is smaller than a second preset threshold value, turning to step S12;
if the user characteristic does not correspond to the access control characteristic or the difference value is larger than or equal to a second threshold value, displaying unlocking failure through the user verification terminal and quitting;
step S12, the server side sends an unlocking instruction to the access control terminal, and then the step S13 is turned to;
and step S13, unlocking the door control terminal according to the unlocking instruction.
In a preferred embodiment of the present invention, the real-time access authentication method is applied to an access control system, the access control system includes an access verification terminal, a user verification terminal, an access control terminal and a server, the server is respectively connected to the access control terminal and the user terminal in a remote manner, and the real-time access authentication system adopts a secondary authentication mode: when the user terminal can be networked and is kept connected with the server side, the server side is adopted for secondary authentication, so that the safety of the access control system is improved; when the user terminal is in the non-networking state and can not be connected with the server side, the access control verification terminal performs secondary authentication instead, so that the requirement of performing real-time authentication in both the networking state and the non-networking state is met.
Particularly, in the above preferred embodiment, when the access control terminal is used for performing the secondary authentication instead, the risk is higher than that of performing the secondary authentication through the remote server, so that the user terminal is used to authenticate the information at the refresh time first, thereby ensuring the security of the real-time authentication method.
As a preferred implementation manner, the real-time access authentication method includes that the access characteristic includes a device number corresponding to the access authentication terminal.
As a preferred implementation manner, the real-time access authentication method includes that the user characteristics include a device number corresponding to the user authentication terminal and corresponding user identity information.
As a preferred embodiment, the real-time access authentication method further includes the following steps:
step A1, the access control terminal continuously monitors the opening state of the corresponding door lock from the closing time and continuously outputs a real-time state;
step A2, judging whether the real-time state changes and whether the access control terminal receives an unlocking instruction:
if the real-time state changes and the entrance guard control terminal does not receive the unlocking instruction, turning to the step A3;
if the real-time state is not changed or the entrance guard control terminal receives an unlocking instruction, returning to the step A1;
and step A3, the access control terminal sends alarm information to the server.
In another preferred embodiment of the present invention, the real-time access authentication method further comprises an alarm mechanism, which can issue an alarm in an abnormal state in which the state of the access control terminal changes but the unlocking instruction is not received, so as to warn about possible illegal intrusion.
As a preferred embodiment, the real-time access authentication method further includes the following steps:
step B1, the access control terminal continuously monitors the opening state of the corresponding door lock from the closing time and continuously outputs a real-time state;
step B2, judging whether the real-time state changes:
if the real-time status changes, go to step B3;
if the real-time state is not changed, returning to the step B1;
and step B3, the access control terminal sends access history information to the server.
As a preferred embodiment, the real-time access authentication method includes that the access history information includes a corresponding time when the real-time status changes and a corresponding user characteristic when the real-time status changes.
In another preferred embodiment of the present invention, the real-time access authentication method further includes an access history information uploading mechanism, so as to realize the later traceability of the access opening/closing amount.
In a preferred embodiment, in steps S1 to S13, a dynamically updated key is introduced into each encryption process, and the key is stored in the server and updated periodically.
Preferably, the real-time access authentication method, wherein the periodic updating of the key includes the following steps:
step C1, every a preset time interval, the server updates the secret key;
step C2, the server updates the secret key in the user authentication terminal;
step C3, determining whether the key in the user authentication terminal is successfully updated:
if yes, go to step C4;
if not, the server side restores the secret key to the state of not updating, and then returns to the step C1;
and step C4, the server side updates the secret key in the access control verification terminal.
In another preferred embodiment of the present invention, for each step from step S1 to step S13 that requires encryption, an encryption factor that is updated regularly is introduced in addition to the conventionally set encryption algorithm, so as to further improve the difficulty of cracking and the overall security of the access control system. The secret key is safely stored in the server and is periodically updated by the server, and the updating period can be one day or one week, which depends on the opening frequency of the access control system applying the real-time authentication method.
In the above preferred embodiment, the server is configured to update the secret key periodically, and in order to ensure that the encryption secret keys in the user authentication terminal and the access control authentication terminal are always consistent, the server first updates the user authentication terminal, and if the user authentication terminal fails to be updated because the user authentication terminal is not networked, the server gives up updating, restores the secret key to an un-updated state, and waits for a next update period to continue to perform an update attempt, so as to ensure that the secret keys of the user authentication terminal and the access control authentication terminal are consistent.
In conclusion, by the technical scheme, the real-time dual authentication of the access control can be realized, the safety and traceability of the access control system are greatly improved, meanwhile, the smooth promotion of the dual authentication can be simultaneously ensured under the networking and non-networking states of the user verification terminal, and the method has excellent special environment adaptability.
While the invention has been described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention.
Claims (8)
1. A real-time access authentication method is characterized in that the real-time access authentication method is applied to an access control system, and the access control system comprises an access control verification terminal, a user verification terminal, an access control terminal and a server side;
the access control verification terminal is connected with the access control terminal;
the server is respectively and remotely connected with the access control terminal and the user verification terminal;
the access control verification terminal is provided with an access control feature;
the user verification terminal is due to a user characteristic;
each access control feature corresponds to a plurality of user features;
the real-time access control authentication method specifically comprises the following steps:
step S1, the entrance guard verification terminal continuously displays entrance guard verification information, the entrance guard verification information is refreshed every a preset time interval, and the entrance guard verification information comprises encrypted entrance guard characteristics and refreshing time;
step S2, determining whether the server maintains a remote connection with the user authentication terminal:
if not, go to step S3;
if yes, go to step S9;
step S3, decrypting the access control verification information through the user verification terminal to obtain the refreshing time;
step S4, determining whether the refresh time belongs to a preset time interval:
if yes, go to step S5;
if not, displaying unlocking failure through the user verification terminal and quitting;
step S5, encrypting the user characteristics and the refreshing time to obtain a verification character string and outputting the verification character string to the access control verification terminal;
step S6, the access control verification terminal decrypts the verification character string to obtain the user characteristics and the refreshing time;
step S7, determining whether the user characteristic corresponds to the access control characteristic, and determining whether a difference between the refresh time and the current time is less than a first preset threshold:
if the user characteristic corresponds to the entrance guard characteristic and the difference value is smaller than the first preset threshold value, turning to step S8;
if the user characteristic does not correspond to the access control characteristic or the difference value is greater than or equal to the first preset threshold value, displaying unlocking failure through the user verification terminal and quitting;
step S8, the entrance guard verification terminal sends an unlocking instruction to the entrance guard control terminal, and then the step S13 is turned to;
step S9, decrypting the access control verification information through the user verification terminal to obtain the refreshing time and the access control characteristics;
step S10, the entrance guard characteristic, the user characteristic and the refreshing time are sent to the server side together;
step S11, the server side judges whether the user characteristic corresponds to the access control characteristic, and judges whether the difference between the refreshing time and the current time is less than a second preset threshold:
if the user characteristic corresponds to the entrance guard characteristic and the difference value is smaller than the second preset threshold value, turning to step S12;
if the user characteristic does not correspond to the access control characteristic or the difference value is greater than or equal to the second preset threshold value, displaying unlocking failure through the user verification terminal and quitting;
step S12, the server side sends the unlocking instruction to the access control terminal, and then the operation goes to step S13;
and step S13, unlocking the door access control terminal according to the unlocking instruction.
2. The real-time access authentication method of claim 1, wherein the access characteristic comprises a device number corresponding to the access authentication terminal.
3. The real-time access authentication method of claim 1, wherein the user characteristics include a device number corresponding to the user authentication terminal and corresponding user identity information.
4. The real-time access authentication method of claim 1, further comprising the steps of:
step A1, the access control terminal continuously monitors the opening state of the corresponding door lock from the closing time and continuously outputs a real-time state;
step A2, judging whether the real-time state changes and whether the access control terminal receives the unlocking instruction:
if the real-time state changes and the access control terminal does not receive the unlocking instruction, turning to step A3;
if the real-time state is not changed or the entrance guard control terminal has received the unlocking instruction, returning to the step A1;
and A3, the access control terminal sends alarm information to the server.
5. The real-time access authentication method of claim 1, further comprising the steps of:
step B1, the access control terminal continuously monitors the opening state of the corresponding door lock from the closing time and continuously outputs a real-time state;
step B2, determining whether the real-time status changes:
if the real-time status changes, go to step B3;
if the real-time status is not changed, returning to the step B1;
and step B3, the access control terminal sends access history information to the server.
6. The real-time access authentication method of claim 5, wherein the access history information includes a corresponding time when the real-time status changes and a corresponding user characteristic when the real-time status changes.
7. The real-time access authentication method according to claim 1, wherein in the steps S1 to S13, a dynamically updated key is introduced into each encryption process, and the key is stored in the server and updated periodically.
8. The real-time access authentication method according to claim 7, wherein the periodic updating of the key comprises the steps of:
step C1, every a preset time interval, the server updates the secret key;
step C2, the server side updates the secret key in the user authentication terminal;
step C3, determining whether the key in the user authentication terminal is successfully updated:
if yes, go to step C4;
if not, the server side restores the secret key to an un-updated state, and then returns to the step C1;
and step C4, the server updates the secret key in the access control verification terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010033303.9A CN111243138B (en) | 2020-01-13 | 2020-01-13 | Real-time access control authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010033303.9A CN111243138B (en) | 2020-01-13 | 2020-01-13 | Real-time access control authentication method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111243138A CN111243138A (en) | 2020-06-05 |
CN111243138B true CN111243138B (en) | 2022-04-19 |
Family
ID=70880829
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010033303.9A Active CN111243138B (en) | 2020-01-13 | 2020-01-13 | Real-time access control authentication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111243138B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0843425A3 (en) * | 1996-11-14 | 2000-12-13 | International Business Machines Corporation | Electronic communication apparatus using the human body as a transmission medium |
WO2008127323A2 (en) * | 2006-12-28 | 2008-10-23 | Hewlett-Packard Development Company, L.P. | Biometric security system and method |
CN101826227A (en) * | 2010-04-30 | 2010-09-08 | 广州合立正通信息网络集成有限公司 | Triple-authentication gate control system and control method |
CN104780043A (en) * | 2014-01-14 | 2015-07-15 | 中国电信股份有限公司 | Access control method and system based on two-dimension code |
CN104851174A (en) * | 2015-06-16 | 2015-08-19 | 赵旭东 | High-reliability machine room intelligent entrance guard opening method and opening system |
CN105095728A (en) * | 2015-06-15 | 2015-11-25 | 南京市信息中心 | Two-dimensional code identification method based on digital signatures and timestamps |
CN107680207A (en) * | 2017-08-18 | 2018-02-09 | 杭州比特信息技术有限公司 | Several triggerings of networking smart lock wake up and the method for contactless enabling |
CN108492433A (en) * | 2018-06-08 | 2018-09-04 | 杭州滨拓通信技术有限公司 | It is a kind of networking and suspension can intelligent control network access system |
CN110110568A (en) * | 2019-05-16 | 2019-08-09 | 深圳航天科技创新研究院 | A kind of NFC electronic lock card reader and card reading method based on random key |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105025048B (en) * | 2014-04-22 | 2018-12-18 | 东莞安尔发智能科技股份有限公司 | Realize the method and system of smart lock permission control |
CN106204843A (en) * | 2016-07-13 | 2016-12-07 | 尹博实 | A kind of door-control lock and gate control system |
CN106447870A (en) * | 2016-10-26 | 2017-02-22 | 江苏金米智能科技有限责任公司 | Door control system based on two-dimensional code recognition |
CN106384415A (en) * | 2016-10-26 | 2017-02-08 | 江苏金米智能科技有限责任公司 | Entrance guard automation control system based on synchronous transmission |
CN108022333A (en) * | 2016-11-04 | 2018-05-11 | 杭州海康威视数字技术股份有限公司 | A kind of access control method, access controller and access control system |
CN107733994A (en) * | 2017-09-20 | 2018-02-23 | 美的智慧家居科技有限公司 | Control method, intelligent door lock and the readable storage medium storing program for executing of intelligent door lock |
CN108171849B (en) * | 2018-01-11 | 2023-03-21 | 上海威惠智能科技有限公司 | Password updating method, safe and safe control system |
-
2020
- 2020-01-13 CN CN202010033303.9A patent/CN111243138B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0843425A3 (en) * | 1996-11-14 | 2000-12-13 | International Business Machines Corporation | Electronic communication apparatus using the human body as a transmission medium |
WO2008127323A2 (en) * | 2006-12-28 | 2008-10-23 | Hewlett-Packard Development Company, L.P. | Biometric security system and method |
CN101826227A (en) * | 2010-04-30 | 2010-09-08 | 广州合立正通信息网络集成有限公司 | Triple-authentication gate control system and control method |
CN104780043A (en) * | 2014-01-14 | 2015-07-15 | 中国电信股份有限公司 | Access control method and system based on two-dimension code |
CN105095728A (en) * | 2015-06-15 | 2015-11-25 | 南京市信息中心 | Two-dimensional code identification method based on digital signatures and timestamps |
CN104851174A (en) * | 2015-06-16 | 2015-08-19 | 赵旭东 | High-reliability machine room intelligent entrance guard opening method and opening system |
CN107680207A (en) * | 2017-08-18 | 2018-02-09 | 杭州比特信息技术有限公司 | Several triggerings of networking smart lock wake up and the method for contactless enabling |
CN108492433A (en) * | 2018-06-08 | 2018-09-04 | 杭州滨拓通信技术有限公司 | It is a kind of networking and suspension can intelligent control network access system |
CN110110568A (en) * | 2019-05-16 | 2019-08-09 | 深圳航天科技创新研究院 | A kind of NFC electronic lock card reader and card reading method based on random key |
Non-Patent Citations (1)
Title |
---|
一种基于加密型二维码的手机门禁系统的设计与实现;孙永道;《科技通报》;20140731;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN111243138A (en) | 2020-06-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11070364B2 (en) | Secure communication method and smart lock system based thereof | |
US11947649B2 (en) | Locking device biometric access | |
US7205883B2 (en) | Tamper detection and secure power failure recovery circuit | |
US20040025039A1 (en) | Lock box security system with improved communication | |
US9053313B2 (en) | Method and system for providing continued access to authentication and encryption services | |
EP3362931B1 (en) | Wireless firmware updates | |
JPH0652518B2 (en) | Security system and its management method | |
CN103227776A (en) | Configuration method, configuration device, computer program product and control system | |
CN108900296B (en) | Secret key storage method based on biological feature identification | |
CN109003368B (en) | Bluetooth access control system offline password updating method and Bluetooth access control system | |
KR20220072657A (en) | SECURITY CONSTRUCTION METHOD FOR IoT DEVICES PLATFORM AND SECURITY CONSTRUCTION SYSTEM FOR IoT DEVICES PLATFORM BASED ON DUAL BLOCKCHAIN COUPLED WITH VIRTUAL BLOCKCHAIN | |
CN113965328A (en) | Authority transfer method and system for digital key offline condition of trusted execution environment | |
CN111243138B (en) | Real-time access control authentication method | |
CN112530053B (en) | Control method and system of intelligent lock, lock equipment, server and storage medium | |
CN113556235A (en) | Digital key authorization method | |
CN108055124A (en) | Lock administration system and lock management method | |
EP3997674A1 (en) | A structure accesses unlocking system and associated method | |
KR101996317B1 (en) | Block chain based user authentication system using authentication variable and method thereof | |
CN112037383B (en) | Intelligent door lock and authority judgment method and application system thereof | |
WO2003093997A1 (en) | Lock box security system with improved communication | |
CN113593088A (en) | Intelligent unlocking method, intelligent lock, mobile terminal and server | |
WO2021174264A1 (en) | Method for remotely activating a remote lock system using cryptography and the remote lock system for implementing the method | |
CN117858079B (en) | Safety control method of building intercom system | |
CN114783091B (en) | Temporary password generation method, device, equipment and storage medium | |
US20030014672A1 (en) | Authentication protocol with dynamic secret |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |