CN113392392A - CTID-based intelligent terminal verification method, intelligent door lock and access control system - Google Patents

CTID-based intelligent terminal verification method, intelligent door lock and access control system Download PDF

Info

Publication number
CN113392392A
CN113392392A CN202110349045.XA CN202110349045A CN113392392A CN 113392392 A CN113392392 A CN 113392392A CN 202110349045 A CN202110349045 A CN 202110349045A CN 113392392 A CN113392392 A CN 113392392A
Authority
CN
China
Prior art keywords
information
user
platform server
system platform
intelligent terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110349045.XA
Other languages
Chinese (zh)
Other versions
CN113392392B (en
Inventor
陈融洁
陈守用
陈先财
甘涛
谢辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongfutong Group Co ltd
Original Assignee
Zhongfutong Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongfutong Group Co ltd filed Critical Zhongfutong Group Co ltd
Priority to CN202110349045.XA priority Critical patent/CN113392392B/en
Publication of CN113392392A publication Critical patent/CN113392392A/en
Application granted granted Critical
Publication of CN113392392B publication Critical patent/CN113392392B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a CTID-based intelligent terminal verification method, an intelligent door lock and an access control system, which comprise the following steps: s01, the user initiates a CTID authentication request and finishes CTID authentication; s02, downloading the user certificate which completes CTID authentication to the user terminal through the user terminal; s03, the intelligent terminal responds to an access request initiated by a user through a user certificate, and then reads the user certificate to generate user identity information; s04, acquiring user identity information, and transmitting the user identity information to a system platform server according to preset conditions; s05, the system platform server receives the user identity information, then transmits the user identity information to the public security system database according to preset conditions, generates a verification result by the public security system database, and then feeds the verification result back to the system platform server; s06, the system platform server sends the received verification result back to the intelligent terminal, and the intelligent terminal executes corresponding operation according to preset conditions; the scheme has the advantages of reliable implementation, rapid response, convenient unified management and good safety and confidentiality.

Description

CTID-based intelligent terminal verification method, intelligent door lock and access control system
Technical Field
The invention relates to the technical field of information verification technology and access control systems, in particular to a CTID-based intelligent terminal verification method, an intelligent door lock and an access control system.
Background
CTID is abbreviated as follows: CTID (cyber Trusted identity) is an identity card online application certificate, called a network card for short. The CTID takes a citizen identity number as a basic trust root, performs irreversible desensitization treatment on identity card information by utilizing a domestic cryptographic algorithm to form authentication comparison basic data, establishes a nationwide unified internet trusted identity authentication basic platform, realizes multi-mode, large-scale and high-concurrency online security authentication of real names, real persons and real certificates, and solves the problems of online identity authentication privacy protection and data security from the source.
The existing real-name system application is inaccurate, the identity information is easy to copy and steal, meanwhile, on an application terminal, the problems that the identity authentication cannot be obtained in real time, the identity authentication is inconvenient and expensive exist, and the like, so that the original identity authentication system is difficult to implement practically, and the identity authentication has great risk hidden danger and uneconomic performance.
The authentication terminal in the current market mainly adopts modes of face, fingerprint identification, identity card and the like to carry out authentication processing, the processing part is carried out at the authentication terminal part, the requirements on the terminal performance are high, the development difficulty is high, meanwhile, most of terminals adopt wired networks to carry out transmission, and the outdoor requirements cannot be met.
Disclosure of Invention
In view of the above, the present invention provides a CTID-based intelligent terminal verification method, an intelligent door lock and an access control system, which are reliable in implementation, fast in response, convenient in unified management, and good in security and confidentiality.
In order to achieve the technical purpose, the technical scheme adopted by the invention is as follows:
a CTID-based intelligent terminal verification method comprises the following steps:
s01, the user initiates a CTID authentication request and finishes CTID authentication;
s02, downloading the user certificate which completes CTID authentication to the user terminal through the user terminal;
s03, the intelligent terminal responds to an access request initiated by a user through a user certificate, and then reads the user certificate to generate user identity information;
s04, acquiring user identity information, and transmitting the user identity information to a system platform server according to preset conditions;
s05, the system platform server receives the user identity information, then transmits the user identity information to the public security system database according to preset conditions, generates a verification result by the public security system database, and then feeds the verification result back to the system platform server;
and S06, the system platform server sends the received verification result back to the intelligent terminal, and the intelligent terminal executes corresponding operation according to preset conditions.
As a possible implementation manner, further, in step S04 of the present invention, the edge device control server obtains the user identity information, and then transmits the user identity information to the system platform server according to a preset condition;
in step S06, the system platform server sends the received verification result back to the edge device control server, and the edge device control server generates a control instruction and transmits the control instruction to the intelligent terminal, and the intelligent terminal executes a corresponding operation according to a preset condition.
As a possible implementation manner, further, the user credential is a two-dimensional code, a one-dimensional code, or a random character string with a preset number of digits.
As a preferred selection implementation, preferably, the user terminal communicates with the intelligent terminal through bluetooth network communication, NFC network communication, or internet network communication to initiate an access request;
the edge device control server is in communication connection with the system platform server through NB-IoT network communication.
Based on the verification method, the invention also provides a use method of the intelligent door lock, which comprises the intelligent terminal verification method based on the CTID;
the intelligent terminal comprises an electric control door lock.
As a possible implementation manner, further, in the scheme, when the intelligent terminal generates the user identity information, the intelligent terminal also generates data association information;
the edge device control server also acquires data association information when acquiring the user identity information, and transmits the data association information to the system platform server according to the preset conditions when transmitting the user identity information to the system platform server according to the preset conditions.
As a preferred selection embodiment, it is preferable that the data related information includes one or more of abnormal information, normal information, and key information:
the abnormal information comprises more than one of non-authentication user unlocking information, lock abnormal fault information, wireless connection abnormal information and heartbeat interruption abnormal information;
the normal information comprises more than one of unlocking times information, timing statistical information, user basic information and equipment energy consumption monitoring information;
the key information at least comprises an unlocking request and/or an identity verification request and/or a password revision request;
the key information is access request information initiated by the intelligent terminal response user through the user certificate.
As a preferred embodiment, preferably, the edge device server further stores the verification result issued by the system platform server,
when the edge device control server obtains the user identity information, judging whether the edge device server has a verification result for storing the user identity information,
when the data is stored and matched, executing a key information request in the data association information;
when the user identity information is not stored or matched, the user identity information is transmitted to a system platform server;
when the system platform server receives the user identity information, judging whether the system platform server has a verification result for storing the user identity information,
when the data is stored and matched, executing a key information request in the data association information;
when the user identity information is not stored or matched, the user identity information is transmitted to a public security system database;
the edge device control server judges the type of the data associated information when acquiring the data associated information,
when the data associated information comprises abnormal information and/or key information, transmitting the data associated information to a system platform server, and pushing the abnormal information and/or the key information in the data associated information to a user associated with the user credential stored in the system platform server by the system platform server;
and when the data associated information only comprises normal information, transmitting the data associated information to the system platform server according to a preset time period.
Based on the using method, the invention also provides the intelligent door lock which is controlled by applying the using method of the intelligent door lock.
Based on the intelligent door lock scheme, the invention also provides an access control system which comprises the intelligent door lock and is applied to industrial parks, business offices, residential communities or hotels.
According to the scheme, the identity real-time authentication can be completed by embedding a CTID technology on a mobile phone terminal WeChat applet or APP and using CTID remote authentication at a mobile phone terminal, so that an accurate and real-time authentication process is realized.
According to the scheme, the identity real-time authentication can be completed by embedding a CTID technology on a mobile phone terminal WeChat applet or APP and using CTID remote authentication at a mobile phone terminal, so that an accurate and real-time authentication process is realized.
As an example, the scheme can adopt the combination of the PC end and the WeChat end, data statistics, query, analysis and management are carried out on the PC end, code scanning verification is carried out through the WeChat end, information obtained by scanning codes and the Internet of things terminal equipment are in linkage communication, and reliable and accurate management and control of personnel are achieved. The PC terminal adopts java, html and other technologies, and the WeChat terminal adopts wxss, js and other technologies.
The system is divided into a soft part and a hard part, and the software is mainly used for identity information identification and verification, information inquiry and management; the hardware part is mainly used by accessing terminal equipment (namely an intelligent door lock) of the Internet of things in the later period, so that the mutual combination of the data of the Internet of things and the credible identity authentication is realized, and a safe, credible, controllable and accurate information management system is realized.
And addition is carried out based on basic technologies such as a Bluetooth module, an NB communication module and an intelligent door lock, so that the formed intelligent terminal Internet of things system can realize the following expected technical function support:
1. the method supports non-contact type identity credible identification and verification, and ensures identity authenticity and application;
2. supporting a PC end, and inquiring and analyzing a background system of a system platform server to form a credible management platform for identity recognition and authentication;
3. the WeChat end is supported, so that the scanning can be performed quickly, and the identity identification verification and the application cannot be installed;
4. the method supports access to third-party Internet of things terminal equipment, and effectively links and interworks the Internet of things equipment and the identity recognition system to form a characteristic product;
5. and the characteristics of quick access to a third-party module and strong performance compatibility are supported.
By adopting the technical scheme, compared with the prior art, the invention has the beneficial effects that: the scheme ingeniously utilizes the CTID authentication scheme, an access request is responded through an intelligent terminal, then the product certificate after CTID authentication is read and judged through a system platform server and an edge equipment control server to form corresponding data feedback, on one hand, the method does not need to directly acquire the entity identity card of a user, on the other hand, the verification is carried out through a public security system database (namely, an official authority database), the stealing, outflow, illegal storage and the like of data are avoided, the information data safety of the user is ensured, meanwhile, the verification scheme is loaded into an intelligent door lock and an access control system to be applied, the identity can be effectively identified, accurate management and control of personnel can be carried out, meanwhile, the Internet of things terminal equipment can be quickly accessed, new application is quickly integrated with the Internet of things terminal equipment to form a special credible intelligent terminal-intelligent door lock, the method provides a foundation for applications such as floating population, employee management, families, communities, parks, hotels, outdoor machine rooms and the like.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic flow chart of an embodiment of the verification scheme of the present invention;
FIG. 2 is a second schematic flow chart of the verification scheme of the present invention;
fig. 3 is a schematic diagram of the interaction trend of the hardware data of the internet of things corresponding to the implementation flow diagram shown in fig. 2;
fig. 4 is a schematic diagram of data trend for the edge device control server to determine data association information according to the present invention;
FIG. 5 is a schematic diagram of a brief data interaction of the access control system according to the present embodiment;
FIG. 6 is a second schematic diagram of a simplified data interaction of the door access system according to the present embodiment;
fig. 7 is one of schematic frame structures of an access control system of the access control system according to the present embodiment;
fig. 8 is a schematic diagram of the application of the access control system in the industrial park and the residential community.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be noted that the following examples are only illustrative of the present invention, and do not limit the scope of the present invention. Similarly, the following examples are only some but not all examples of the present invention, and all other examples obtained by those skilled in the art without any inventive work are within the scope of the present invention.
As shown in fig. 1, the present scheme is a CTID-based intelligent terminal verification method, which includes:
s01, the user initiates a CTID authentication request and finishes CTID authentication;
s02, downloading the user certificate which completes CTID authentication to the user terminal through the user terminal;
s03, the intelligent terminal responds to an access request initiated by a user through a user certificate, and then reads the user certificate to generate user identity information;
s04, acquiring user identity information, and transmitting the user identity information to a system platform server according to preset conditions;
s05, the system platform server receives the user identity information, then transmits the user identity information to the public security system database according to preset conditions, generates a verification result by the public security system database, and then feeds the verification result back to the system platform server;
and S06, the system platform server sends the received verification result back to the intelligent terminal, and the intelligent terminal executes corresponding operation according to preset conditions.
In order to overcome the problem that access request information initiated by a user may not be timely and effectively transmitted to a system platform server when a plurality of intelligent terminals or the intelligent terminals have a large processing capacity or the intelligent terminals have unstable network communication, as a possible implementation manner, further, on the basis of fig. 1 and with reference to fig. 2, step S04 of the scheme obtains user identity information through an edge device control server, and then transmits the user identity information to the system platform server according to preset conditions;
in step S06, the system platform server sends the received verification result back to the edge device control server, and the edge device control server generates a control instruction and transmits the control instruction to the intelligent terminal, and the intelligent terminal executes a corresponding operation according to a preset condition.
As a possible implementation manner, further, the user credential in this scheme is a two-dimensional code, but the user credential is not limited to a two-dimensional code, and may also be generated by a one-dimensional code or a random character string with a preset number of bits.
In the data communication transmission mode, in the scheme, as a preferred implementation mode, preferably, the user terminal communicates with the intelligent terminal through bluetooth network communication, NFC network communication or internet network communication to initiate an access request;
the edge device control server is in communication connection with the system platform server through NB-IoT network communication.
On the basis of fig. 1 or fig. 2, and with reference to fig. 3, based on the verification method described above, the present solution further provides a use method of the intelligent door lock, which includes the above-described CTID-based intelligent terminal verification method;
the intelligent terminal is an electric control door lock.
In order to facilitate information monitoring on the electric control door lock and the edge device control server, as a possible implementation manner, further, in the scheme, when the intelligent terminal generates the user identity information, the intelligent terminal also generates data association information;
the edge device control server also acquires data association information when acquiring the user identity information, and transmits the data association information to the system platform server according to the preset conditions when transmitting the user identity information to the system platform server according to the preset conditions.
As further shown in fig. 4, in order to facilitate the fine-sorting of the data related information, as a preferred embodiment, the data related information preferably includes one or more of abnormal information, normal information, or key information:
the abnormal information comprises more than one of non-authentication user unlocking information, lock abnormal fault information, wireless connection abnormal information and heartbeat interruption abnormal information;
the normal information comprises more than one of unlocking times information, timing statistical information, user basic information and equipment energy consumption monitoring information;
the key information at least comprises an unlocking request and/or an identity verification request and/or a password revision request;
the key information is access request information initiated by the intelligent terminal response user through the user certificate.
In order to improve the verification effect and avoid unnecessary multiple verification operations, as a preferred implementation, preferably, the edge device server further stores the verification result issued by the system platform server,
when the edge device control server obtains the user identity information, judging whether the edge device server has a verification result for storing the user identity information,
when the data is stored and matched, executing a key information request in the data association information;
when the user identity information is not stored or matched, the user identity information is transmitted to a system platform server;
when the system platform server receives the user identity information, judging whether the system platform server has a verification result for storing the user identity information,
when the data is stored and matched, executing a key information request in the data association information;
when the user identity information is not stored or matched, the user identity information is transmitted to a public security system database;
the edge device control server judges the type of the data associated information when acquiring the data associated information,
when the data associated information comprises abnormal information and/or key information, transmitting the data associated information to a system platform server, and pushing the abnormal information and/or the key information in the data associated information to a user associated with the user credential stored in the system platform server by the system platform server;
and when the data associated information only comprises normal information, transmitting the data associated information to the system platform server according to a preset time period.
Through the mechanism, the accelerated forwarding, control and storage of data can be realized by utilizing the edge device server, the response efficiency of the intelligent terminal is improved, and the user experience is improved.
Based on the use method, the intelligent door lock can be applied to an intelligent door lock for control, a plurality of formed door control systems can be arranged on the intelligent door lock, the door control systems are applied to industrial parks, business office areas, residential communities or hotels, and meanwhile, a door lock based on the use method of the intelligent door lock can be arranged, so that the intelligent door lock and the door lock form an Internet of things control system.
As shown in fig. 5 and 6, with the access control system, a user can initiate an access request only by scanning two-dimensional code information (i.e., a user certificate) which is authenticated and downloaded to a mobile phone terminal, then an internet of things terminal device (i.e., an intelligent terminal) performs corresponding operations according to matching of verification conditions, and the generated data association information passes through an edge device control server and a system platform server, and then can perform automatic data statistics and the like as required, and can be stored at the same time, so that the user can initiate a check request or actively push authenticity to the user, for example, the user can be checked by scanning the two-dimensional code information, and the user is ensured to enter legally; after the terminal equipment can be combined with a reserved terminal interface of the Internet of things, identity information and terminal equipment information of the Internet of things are combined with each other, uploaded data are updated to a WeChat terminal, and the terminal information of the Internet of things is automatically counted; historical information and the like are checked through a PC (personal computer) end or a WeChat end, so that personnel management and control are realized.
Fig. 7 shows one of schematic diagrams of a general frame structure of the access control system, through which a richer function can be further accessed and effective processing and utilization of data can be realized, and in addition, as shown in fig. 8, after a system platform server is established, the access control system can be associated to industrial parks, residential intake sites and other sites, so that convenience of data interaction is achieved by sharing the system platform server, and user experience and safety are improved. The personnel of cominging in and going out need get into through the scanning at entering family, community, garden, hotel etc. through checking to the identity, ensure that the personnel of entering are true and reliable, can combine thing networking device terminal simultaneously, carry out the application of data.
The above description is only a part of the embodiments of the present invention, and not intended to limit the scope of the present invention, and all equivalent devices or equivalent processes performed by the present invention through the contents of the specification and the drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A CTID-based intelligent terminal verification method is characterized by comprising the following steps:
a user initiates a CTID authentication request and finishes CTID authentication;
downloading a user certificate which completes CTID authentication to the user terminal through the user terminal;
the intelligent terminal responds to an access request initiated by a user through a user certificate, then reads the user certificate and generates user identity information;
acquiring user identity information, and transmitting the user identity information to a system platform server according to preset conditions;
the system platform server receives the user identity information, then transmits the user identity information to the public security system database according to preset conditions, generates a verification result by the public security system database, and then feeds the verification result back to the system platform server;
and the system platform server sends the received verification result back to the intelligent terminal, and the intelligent terminal executes corresponding operation according to preset conditions.
2. The CTID-based intelligent terminal verification method of claim 1, wherein,
the method comprises the steps that user identity information is obtained through an edge device control server and then is transmitted to a system platform server according to preset conditions;
and the system platform server sends the received verification result back to the edge equipment control server, the edge equipment control server generates a control instruction and transmits the control instruction to the intelligent terminal, and the intelligent terminal executes corresponding operation according to preset conditions.
3. The CTID-based intelligent terminal verification method as in claim 1 or 2, wherein the user credential is a two-dimensional code, a one-dimensional code or a random string with a preset number of bits.
4. The CTID-based intelligent terminal verification method of claim 2, wherein the user terminal communicates with the intelligent terminal through bluetooth network communication, NFC network communication or internet network communication to initiate an access request;
the edge device control server is in communication connection with the system platform server through NB-IoT network communication.
5. A use method of an intelligent door lock is characterized by comprising the CTID-based intelligent terminal verification method in claim 4;
the intelligent terminal comprises an electric control door lock.
6. The use method of the intelligent door lock as claimed in claim 5, wherein the intelligent terminal also generates data association information when generating the user identity information;
the edge device control server also acquires data association information when acquiring the user identity information, and transmits the data association information to the system platform server according to the preset conditions when transmitting the user identity information to the system platform server according to the preset conditions.
7. The method as claimed in claim 6, wherein the data-related information includes one or more of abnormal information, normal information or key information:
the abnormal information comprises more than one of non-authentication user unlocking information, lock abnormal fault information, wireless connection abnormal information and heartbeat interruption abnormal information;
the normal information comprises more than one of unlocking times information, timing statistical information, user basic information and equipment energy consumption monitoring information;
the key information at least comprises an unlocking request and/or an identity verification request and/or a password revision request;
the key information is access request information initiated by the intelligent terminal response user through the user certificate.
8. The method as claimed in claim 7, wherein the edge device server further stores the verification result issued by the system platform server,
when the edge device control server obtains the user identity information, judging whether the edge device server has a verification result for storing the user identity information,
when the data is stored and matched, executing a key information request in the data association information;
when the user identity information is not stored or matched, the user identity information is transmitted to a system platform server;
when the system platform server receives the user identity information, judging whether the system platform server has a verification result for storing the user identity information,
when the data is stored and matched, executing a key information request in the data association information;
when the user identity information is not stored or matched, the user identity information is transmitted to a public security system database;
the edge device control server judges the type of the data associated information when acquiring the data associated information,
when the data associated information comprises abnormal information and/or key information, transmitting the data associated information to a system platform server, and pushing the abnormal information and/or the key information in the data associated information to a user associated with the user credential stored in the system platform server by the system platform server;
and when the data associated information only comprises normal information, transmitting the data associated information to the system platform server according to a preset time period.
9. An intelligent door lock, characterized in that it is controlled by applying the method of using the intelligent door lock of any one of claims 5 to 8.
10. An access control system comprising the intelligent door lock of claim 9, wherein the access control system is applied to an industrial park, a business office, a residential community, or a hotel.
CN202110349045.XA 2021-03-31 2021-03-31 CTID-based intelligent terminal verification method, intelligent door lock and access control system Active CN113392392B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110349045.XA CN113392392B (en) 2021-03-31 2021-03-31 CTID-based intelligent terminal verification method, intelligent door lock and access control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110349045.XA CN113392392B (en) 2021-03-31 2021-03-31 CTID-based intelligent terminal verification method, intelligent door lock and access control system

Publications (2)

Publication Number Publication Date
CN113392392A true CN113392392A (en) 2021-09-14
CN113392392B CN113392392B (en) 2022-09-13

Family

ID=77617619

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110349045.XA Active CN113392392B (en) 2021-03-31 2021-03-31 CTID-based intelligent terminal verification method, intelligent door lock and access control system

Country Status (1)

Country Link
CN (1) CN113392392B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114066489A (en) * 2022-01-14 2022-02-18 深圳市明源云客电子商务有限公司 Channel fraud identification method, equipment and computer readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019057105A1 (en) * 2017-09-21 2019-03-28 云丁网络技术(北京)有限公司 Smart lock and method for automatically locking smart lock
CN109636955A (en) * 2018-10-26 2019-04-16 杭州云时智创科技有限公司 The intelligent lock system and method for unlocking unlocked using CTID electronic ID card
CN110211261A (en) * 2019-04-28 2019-09-06 新大陆(福建)公共服务有限公司 A kind of intelligent door lock method for unlocking and system based on two dimensional code
CN110473319A (en) * 2019-07-30 2019-11-19 武汉慧联无限科技有限公司 A kind of door opening method of access control system, device, equipment and readable medium
CN110533806A (en) * 2019-08-13 2019-12-03 中电智能技术南京有限公司 A kind of method and system based on NB-Iot and CTID technology setting intelligent door lock
CN111063073A (en) * 2019-12-04 2020-04-24 中国船舶重工集团公司第七一九研究所 Access control system, control method and device thereof

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019057105A1 (en) * 2017-09-21 2019-03-28 云丁网络技术(北京)有限公司 Smart lock and method for automatically locking smart lock
CN109636955A (en) * 2018-10-26 2019-04-16 杭州云时智创科技有限公司 The intelligent lock system and method for unlocking unlocked using CTID electronic ID card
CN110211261A (en) * 2019-04-28 2019-09-06 新大陆(福建)公共服务有限公司 A kind of intelligent door lock method for unlocking and system based on two dimensional code
CN110473319A (en) * 2019-07-30 2019-11-19 武汉慧联无限科技有限公司 A kind of door opening method of access control system, device, equipment and readable medium
CN110533806A (en) * 2019-08-13 2019-12-03 中电智能技术南京有限公司 A kind of method and system based on NB-Iot and CTID technology setting intelligent door lock
CN111063073A (en) * 2019-12-04 2020-04-24 中国船舶重工集团公司第七一九研究所 Access control system, control method and device thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114066489A (en) * 2022-01-14 2022-02-18 深圳市明源云客电子商务有限公司 Channel fraud identification method, equipment and computer readable storage medium

Also Published As

Publication number Publication date
CN113392392B (en) 2022-09-13

Similar Documents

Publication Publication Date Title
US8751794B2 (en) System and method for secure nework login
CN104065652B (en) A kind of auth method, device, system and relevant device
EP2166697B1 (en) Method and system for authenticating a user by means of a mobile device
US20080120698A1 (en) Systems and methods for authenticating a device
US6799272B1 (en) Remote device authentication system
CN100518411C (en) Dynamic cipher system and method based on mobile communication terminal
US20080120707A1 (en) Systems and methods for authenticating a device by a centralized data server
CN106330442B (en) Identity authentication method, device and system
CN106533861A (en) Security control system and authentication method of smart home Internet of Things
CN105069876A (en) Control method and system for intelligent access control
CN109618326A (en) User's dynamic identifier generation method and service registration method, login validation method
US7502931B2 (en) Method and device for authenticating a user on a remote server
WO2018231703A1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
CN111882704B (en) Control method of intelligent door lock system and intelligent door lock management system
CN104063650B (en) A kind of key storage device and using method thereof
CN105099690A (en) OTP and user behavior-based certification and authorization method in mobile cloud computing environment
CN109639419A (en) Cryptographic key protection method, cipher key storage device and terminal device
CN101944216A (en) Two-factor online transaction safety authentication method and system
CN110324820A (en) A kind of Internet of Things safety right appraisal method, system and readable medium
CN113392392B (en) CTID-based intelligent terminal verification method, intelligent door lock and access control system
CN113037736B (en) Authentication method, device, system and computer storage medium
CN1266910C (en) A method choosing 802.1X authentication mode
KR102017337B1 (en) Smart safe based on bluetooth processed with smartphone and method for providing lock or unlocking service of door of safe
CN1771753B (en) Method and apparatus for user authentication using infrared communication of a mobile terminal
KR101133167B1 (en) Method and apparatus for user verifing process with enhanced security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant