CN113538752A - Offline dynamic two-dimensional code verification method for access control terminal equipment - Google Patents
Offline dynamic two-dimensional code verification method for access control terminal equipment Download PDFInfo
- Publication number
- CN113538752A CN113538752A CN202110816856.6A CN202110816856A CN113538752A CN 113538752 A CN113538752 A CN 113538752A CN 202110816856 A CN202110816856 A CN 202110816856A CN 113538752 A CN113538752 A CN 113538752A
- Authority
- CN
- China
- Prior art keywords
- terminal equipment
- cloud
- access control
- code
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 74
- 238000000034 method Methods 0.000 title claims abstract description 29
- 230000007246 mechanism Effects 0.000 claims description 22
- 230000001360 synchronised effect Effects 0.000 claims description 5
- 230000004044 response Effects 0.000 claims description 4
- 238000004806 packaging method and process Methods 0.000 claims description 2
- 230000006855 networking Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 2
- 101100217298 Mus musculus Aspm gene Proteins 0.000 description 1
- 238000005422 blasting Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 238000003973 irrigation Methods 0.000 description 1
- 230000002262 irrigation Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
Abstract
The invention provides an off-line dynamic two-dimensional code verification method for access control terminal equipment, which comprises the steps of obtaining verification information; generating a cloud security pass code SecCode according to the verification information; the entrance guard terminal equipment reads the information in the dynamic two-dimensional code, and generates a local safe pass code according to the abstract algorithm of the cloud system by combining the enterprise entrance guard secret key as an AcKey; the cloud system compares the local security pass code with the cloud security pass code, if the local security pass code is consistent with the cloud security pass code, the verification is passed, otherwise, the verification is not passed, the dependence of the access control terminal device on the connection with the internet is reduced, the validity of the dynamic two-dimensional code source can be verified in an off-line mode according to the verification method of the invention under the condition that the access control terminal device cannot access the internet, and the safe and quick door opening can be realized on the non-networked access control terminal device through a mobile phone or a PAD.
Description
Technical Field
The invention relates to the field of access control systems, in particular to an offline dynamic two-dimensional code verification method for access control terminal equipment.
Background
The verification of the two-dimensional code by the existing entrance guard terminal equipment needs networking verification, the entrance guard terminal equipment reads the dynamic two-dimensional code generated by the mobile phone terminal, and in order to verify the validity, the validity of the two-dimensional code needs to be verified to the cloud networking. On one hand, the access control terminal equipment has networking requirements, the network operation cost of the access control terminal equipment is increased, on the other hand, the concurrent pressure of the cloud verification server is higher, meanwhile, the verification efficiency of the access control terminal equipment is also reduced, and finally, the speed of pedestrian passing is reduced.
Disclosure of Invention
In view of the above, the present invention is proposed to provide an offline dynamic two-dimensional code verification method for an access terminal device that overcomes or at least partially solves the above-mentioned problems.
According to one aspect of the invention, an offline dynamic two-dimensional code verification method for an access control terminal device is provided, and the verification method comprises the following steps:
the identity authenticator logs in a cloud system, and after the identity of the cloud system authenticates the person, the identity authenticator initiates a request for generating a passing two-dimensional code;
acquiring verification information, wherein the verification information comprises that an enterprise ID to which access control terminal equipment belongs is CustId, the ID of an identity authenticator is HuId, the building number of a residence of the identity authenticator is BuildId, the effective time of a passing two-dimensional code is ExpTime, an access control key of an enterprise is AcKey, and the access control key of the enterprise is simultaneously stored in the cloud system and the access control terminal equipment;
generating a cloud security pass code SecCode according to the verification information;
the cloud system generates a dynamic two-dimensional code by packaging and combining an enterprise ID (identity) to which the access control terminal equipment belongs, an ID of an identity authenticator, a building number of a residence of the identity authenticator, and a valid time of the passing two-dimensional code, namely ExpTime and the cloud security pass code, and sends the dynamic two-dimensional code to a mobile terminal;
the entrance guard terminal equipment reads the information in the dynamic two-dimensional code, and generates a local safe pass code according to the abstract algorithm of the cloud system by combining the enterprise entrance guard secret key as an AcKey;
and the cloud system compares the local safe pass code with the cloud safe pass code, if the local safe pass code is consistent with the cloud safe pass code, the verification is passed, otherwise, the verification is not passed.
Optionally, the generating the cloud security pass code SecCode according to the verification information specifically includes: splicing CustId + HuId + BuildId + ExpTime according to the sequence to obtain a long character string LongStr; using a data summarization algorithm for the long character string LongStr to obtain a summarized value HashStr; splicing the HashStr + AcKey again, and obtaining the secure passcode SecCode by using the data summarization algorithm for the second time.
Optionally, the verification method further includes:
the mechanism for filling and updating the secret key of the access control terminal equipment comprises the following steps:
the length of the secret key is 32 bits long, the front 16 bits and the rear 16 bits are generated by different people and are simultaneously input into a cloud end and the access control terminal equipment, and after the input of 2 people is finished, the manual filling of the secret key is finished;
placing the access control terminal equipment in a network environment, and starting a secret key updating mechanism;
the access control terminal equipment randomly generates a 32-bit-length temporary secret key, 3DES encryption is carried out on the temporary secret key by using a local secret key to generate a ciphertext and a check code, the ciphertext and the check code are sent to the cloud, the cloud firstly uses the cloud secret key to check the check code, and after the check is successful, the secret key ciphertext is decrypted and then the cloud secret key is replaced;
and after receiving the response of the synchronous updating of the cloud secret key, the access control terminal equipment immediately starts the temporary secret key to finish the updating of the secret key.
Optionally, the verification method further includes:
the identity card person white list mechanism comprises the following steps:
if the access control terminal equipment only needs to release the passage for partial personnel, a white list mechanism is set;
and (3) identifying the white list of the people: and if the entrance guard terminal equipment is only partially opened, putting the HuId of the person who is opened and passed into a white list of the entrance guard terminal equipment.
Optionally, the verification method further includes:
the clock synchronization mechanism of the access control terminal equipment comprises the following steps:
the access control terminal equipment needs to verify the validity period of the two-dimensional code, so that the synchronization of a clock and a cloud of the terminal needs to be ensured, and the time error cannot exceed a certain time;
the clock synchronization request is initiated by the entrance guard terminal equipment, signature verification is carried out by using a local secret key of the entrance guard terminal equipment, cloud time is issued after cloud verification is passed, and the local clock is synchronously updated after the terminal receives the cloud time.
Optionally, the verification method further includes:
mechanism to prevent one code from multiple use:
the entrance guard terminal equipment establishes a safe pass code queue locally;
the length of the safe pass code queue is determined according to the storage performance of the access control terminal equipment and the building requirement;
after passing verification is successful, inserting a secure pass code SecCode into the head of the local queue; before passing verification, a safe pass code queue is searched, if the same codes exist, the fact that one code is multi-purpose is determined, and verification fails.
The offline dynamic two-dimension code verification method for the access control terminal equipment reduces the dependence of the access control terminal equipment on the connection with the Internet, so that the validity of the source of the dynamic two-dimension code can be verified offline according to the verification method of the invention under the condition that the access control terminal equipment cannot access the Internet, and the safe and quick door opening can be realized on the non-networked access control terminal equipment through a mobile phone or a PAD.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of an offline dynamic two-dimensional code verification method for an access control terminal device according to an embodiment of the present invention;
FIG. 2 is a block diagram of an algorithm for generating a cloud security passcode according to the present invention;
fig. 3 is a block diagram of the flow of the manual irrigation and subsequent system update mechanism of the key of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The terms "comprises" and "comprising," and any variations thereof, in the present description and claims and drawings are intended to cover a non-exclusive inclusion, such as a list of steps or elements.
The technical solution of the present invention is further described in detail with reference to the accompanying drawings and embodiments.
As shown in fig. 1, an offline dynamic two-dimensional code verification method for access control terminal equipment includes:
the identity authenticator logs in the cloud system, and after the cloud system verifies the identity of the person, the identity authenticator initiates a request for generating a passing two-dimensional code;
acquiring verification information, wherein the verification information comprises that the ID of an enterprise to which the access control terminal equipment belongs is CustId, the ID of an identity authenticator is HuId, the building number of a residence of the identity authenticator is BuildId, the effective time of a passing two-dimensional code is ExpTime, the access control key of the enterprise is AcKey, and the access control key of the enterprise is stored in a cloud system and the access control terminal equipment at the same time;
generating a cloud security pass code SecCode according to the verification information;
the ID of an enterprise to which the access terminal equipment belongs is CustId, the ID of an identity authenticator is HuId, the building number of a residence of the identity authenticator is BuildId, the effective time of the passing two-dimensional code is ExpTime and the cloud security passing code SecCode are packaged and combined to generate a dynamic two-dimensional code, and the dynamic two-dimensional code is sent to the mobile terminal;
the entrance guard terminal equipment reads the information in the dynamic two-dimensional code, and generates a local safe pass code according to an abstract algorithm of a cloud system by combining an enterprise entrance guard secret key as an AcKey;
and the cloud system compares the local security pass code with the cloud security pass code, if the local security pass code is consistent with the cloud security pass code, the verification is passed, otherwise, the verification is not passed.
As shown in fig. 2, the generating of the cloud security pass code SecCode according to the verification information specifically includes: splicing CustId + HuId + BuildId + ExpTime according to the sequence to obtain a long character string LongStr; using a data summarization algorithm for the long character string LongStr to obtain a summarized value HashStr; splicing the HashStr + AcKey again, and obtaining the secure passcode SecCode by using the data summarization algorithm for the second time. A data summarization algorithm is selected, so that fingerprint information is extracted from all data to realize functions of data signature, data integrity check and the like, and irreversibility is required.
After more than 10000 times of blasting tests are carried out on the access control site traffic data, the best two data summarization algorithms, Md5 and SHA1, are selected.
The digest value HashStr is obtained by using a data digest algorithm on LongStr.
Splicing the HashStr + AcKey again, and obtaining the abstract value by using the data abstract algorithm for the second time, wherein the abstract value is the secure passcode SecCode.
Since the algorithm for generating the abstract consumes cpu, one-time data abstract can be selected according to the actual performance of the terminal device, namely, CustId + HuId + BuildId + ExpTime + AcKey are spliced, and the overall data is subjected to one-time abstract, but the safety of the one-point algorithm is slightly reduced.
In practical application, primary or secondary data summarization is selected according to the condition of a building and the performance of equipment.
As shown in fig. 3, the mechanism for filling and updating the key of the access control terminal device:
the length of the secret key is 32 bits long, the front 16 bits and the rear 16 bits are generated by different people and are simultaneously input into the cloud terminal and the entrance guard terminal equipment, and after the input of 2 people is finished, the manual filling of the secret key is finished;
placing the access control terminal equipment in a network environment, and starting a secret key updating mechanism;
the access control terminal equipment randomly generates a 32-bit-length temporary secret key, 3DES encryption is carried out on the temporary secret key by using a local secret key to generate a ciphertext and a check code, the ciphertext and the check code are sent to the cloud, the cloud firstly uses the cloud secret key to check the check code, and after the check is successful, the secret key ciphertext is decrypted and then the cloud secret key is replaced;
and after receiving the response of the synchronous updating of the cloud secret key, the access control terminal equipment immediately starts the temporary secret key to finish the updating of the secret key.
The length of the secret key is 32 bits long, the first 16 bits and the second 16 bits are generated by different people, the secret key is simultaneously input into the cloud terminal and the entrance guard terminal equipment, and after the input of 2 people is completed, the manual filling of the secret key is completed.
And placing the access control terminal equipment in a network environment, and starting a secret key updating mechanism.
The access control terminal equipment randomly generates a 32-bit-length temporary secret key, 3DES encryption is carried out on the temporary secret key by using a local secret key to generate a ciphertext and a check code, the ciphertext and the check code are sent to the cloud, the cloud firstly uses the cloud secret key to check the check code, and after the check is successful, the secret key ciphertext is decrypted and then the cloud secret key is replaced;
and after receiving the response of the synchronous updating of the cloud secret key, the equipment immediately starts the temporary secret key, and the secret key updating is completed.
Since the updating process is not manually involved, the risk of the key being leaked is extremely low.
To further increase security, it may be institutionally specified that the key must be backed up for updating.
The identity card person white list mechanism comprises the following steps:
if the access control terminal equipment only needs to release the passage for partial personnel, a white list mechanism is set;
and (3) identifying the white list of the people: and if the entrance guard terminal equipment is only partially opened, putting the HuId of the person who is opened and passed into a white list of the entrance guard terminal equipment.
The authentication method further comprises:
the clock synchronization mechanism of the access control terminal equipment comprises the following steps:
the access control terminal equipment needs to verify the validity period of the two-dimensional code, so that the clock and the cloud of the terminal need to be kept synchronous, and the time error cannot exceed a certain time, such as 30 seconds;
the clock synchronization request is initiated by the entrance guard terminal equipment, signature verification is carried out by using a local secret key of the entrance guard terminal equipment, cloud time is issued after cloud verification is passed, and the local clock is synchronously updated after the terminal receives the cloud time. The entrance guard terminal can be set to request clock synchronization from the server periodically every month (or every week or every day).
The clock synchronization request is initiated by the terminal, signature verification is carried out by using a local terminal secret key (a signature algorithm can adopt Md5), the cloud terminal time is issued after the cloud terminal verification is passed, and the local clock is synchronously updated after the terminal receives the cloud terminal time.
The authentication method further comprises:
mechanism to prevent one code from multiple use:
the entrance guard terminal equipment establishes a safe pass code queue locally;
the length of the safe pass code queue is determined according to the storage performance of the access control terminal equipment and building requirements, and is recommended to be 1000;
after passing verification is successful, inserting a secure pass code SecCode into the head of the local queue; before passing verification, a safe pass code queue is searched, if the same codes exist, the fact that one code is multi-purpose is determined, and verification fails.
The core point of the invention lies in an off-line verification mechanism of the two-dimension code, namely, the cloud generates a data summary by using an irreversible data summary algorithm to the business plaintext data and the secret key data, and the access control terminal also generates a data summary by using the same algorithm and then compares the cloud summary with the terminal summary to realize the off-line verification mechanism.
Has the advantages that:
1. the dependence on the network environment is reduced, so that the access control terminal equipment can also verify the identity in the network-free environment.
2. The passing efficiency is improved, and compared with the off-line verification and the networking verification, the verification speed is greatly reduced, and the passing efficiency is improved.
3. The equipment cost is reduced, and the entrance guard terminal equipment can be configured without a network module, so that the hardware cost is reduced.
4. The network operation cost is reduced, and the network operation expense is not required to be considered for an operator.
5. When the personnel pass the peak, the server and the network pressure of the cloud system are greatly reduced, so that the operation and maintenance cost of the whole system is reduced.
The above embodiments are provided to further explain the objects, technical solutions and advantages of the present invention in detail, it should be understood that the above embodiments are merely exemplary embodiments of the present invention and are not intended to limit the scope of the present invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (6)
1. An offline dynamic two-dimension code verification method for access control terminal equipment is characterized by comprising the following steps:
the identity authenticator logs in a cloud system, and after the identity of the cloud system authenticates the person, the identity authenticator initiates a request for generating a passing two-dimensional code;
acquiring verification information, wherein the verification information comprises that an enterprise ID to which access control terminal equipment belongs is CustId, the ID of an identity authenticator is HuId, the building number of a residence of the identity authenticator is BuildId, the effective time of a passing two-dimensional code is ExpTime, an access control key of an enterprise is AcKey, and the access control key of the enterprise is simultaneously stored in the cloud system and the access control terminal equipment;
generating a cloud security pass code SecCode according to the verification information;
the cloud system generates a dynamic two-dimensional code by packaging and combining an enterprise ID (identity) to which the access control terminal equipment belongs, an ID of an identity authenticator, a building number of a residence of the identity authenticator, and a valid time of the passing two-dimensional code, namely ExpTime and the cloud security pass code, and sends the dynamic two-dimensional code to a mobile terminal;
the entrance guard terminal equipment reads the information in the dynamic two-dimensional code, and generates a local safe pass code according to the abstract algorithm of the cloud system by combining the enterprise entrance guard secret key as an AcKey;
and the cloud system compares the local safe pass code with the cloud safe pass code, if the local safe pass code is consistent with the cloud safe pass code, the verification is passed, otherwise, the verification is not passed.
2. The offline dynamic two-dimensional code verification method for the access terminal device according to claim 1, wherein the generating of the cloud security pass code SecCode according to the verification information specifically includes: splicing CustId + HuId + BuildId + ExpTime according to the sequence to obtain a long character string LongStr; using a data summarization algorithm for the long character string LongStr to obtain a summarized value HashStr; splicing the HashStr + AcKey again, and obtaining the secure passcode SecCode by using the data summarization algorithm for the second time.
3. The offline dynamic two-dimensional code verification method for the access terminal device as claimed in claim 1, wherein the verification method further comprises:
the mechanism for filling and updating the secret key of the access control terminal equipment comprises the following steps:
the length of the secret key is 32 bits long, the front 16 bits and the rear 16 bits are generated by different people and are simultaneously input into a cloud end and the access control terminal equipment, and after the input of 2 people is finished, the manual filling of the secret key is finished;
placing the access control terminal equipment in a network environment, and starting a secret key updating mechanism;
the access control terminal equipment randomly generates a 32-bit-length temporary secret key, 3DES encryption is carried out on the temporary secret key by using a local secret key to generate a ciphertext and a check code, the ciphertext and the check code are sent to the cloud, the cloud firstly uses the cloud secret key to check the check code, and after the check is successful, the secret key ciphertext is decrypted and then the cloud secret key is replaced;
and after receiving the response of the synchronous updating of the cloud secret key, the access control terminal equipment immediately starts the temporary secret key to finish the updating of the secret key.
4. The offline dynamic two-dimensional code verification method for the access terminal device as claimed in claim 1, wherein the verification method further comprises:
the identity card person white list mechanism comprises the following steps:
if the access control terminal equipment only needs to release the passage for partial personnel, a white list mechanism is set;
and (3) identifying the white list of the people: and if the entrance guard terminal equipment is only partially opened, putting the HuId of the person who is opened and passed into a white list of the entrance guard terminal equipment.
5. The offline dynamic two-dimensional code verification method for the access terminal device as claimed in claim 1, wherein the verification method further comprises:
the clock synchronization mechanism of the access control terminal equipment comprises the following steps:
the access control terminal equipment needs to verify the validity period of the two-dimensional code, so that the synchronization of a clock and a cloud of the terminal needs to be ensured, and the time error cannot exceed a certain time;
the clock synchronization request is initiated by the entrance guard terminal equipment, signature verification is carried out by using a local secret key of the entrance guard terminal equipment, cloud time is issued after cloud verification is passed, and the local clock is synchronously updated after the terminal receives the cloud time.
6. The offline dynamic two-dimensional code verification method for the access terminal device as claimed in claim 1, wherein the verification method further comprises:
mechanism to prevent one code from multiple use:
the entrance guard terminal equipment establishes a safe pass code queue locally;
the length of the safe pass code queue is determined according to the storage performance of the access control terminal equipment and the building requirement;
after passing verification is successful, inserting a secure pass code SecCode into the head of the local queue; before passing verification, a safe pass code queue is searched, if the same codes exist, the fact that one code is multi-purpose is determined, and verification fails.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110816856.6A CN113538752A (en) | 2021-07-20 | 2021-07-20 | Offline dynamic two-dimensional code verification method for access control terminal equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110816856.6A CN113538752A (en) | 2021-07-20 | 2021-07-20 | Offline dynamic two-dimensional code verification method for access control terminal equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113538752A true CN113538752A (en) | 2021-10-22 |
Family
ID=78128836
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110816856.6A Pending CN113538752A (en) | 2021-07-20 | 2021-07-20 | Offline dynamic two-dimensional code verification method for access control terminal equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113538752A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2073433A1 (en) * | 2007-12-18 | 2009-06-24 | Systemes Et Technologies Identification | Remote securing of control and identification UHF radio transactions |
CN104639561A (en) * | 2015-02-27 | 2015-05-20 | 飞天诚信科技股份有限公司 | Method for safely obtaining secret key |
CN105551117A (en) * | 2014-11-04 | 2016-05-04 | 广东中星电子有限公司 | Two-dimension code generation/verification method used in access control environment, and apparatus thereof |
CN105989643A (en) * | 2015-02-03 | 2016-10-05 | 吉林省施泰信息技术股份有限公司 | Communication encryption method used for electronic lock, electronic lock apparatus and system thereof |
CN106952378A (en) * | 2017-04-11 | 2017-07-14 | 徐士兰 | Method for unlocking and device, electronic lock |
CN106992850A (en) * | 2017-03-16 | 2017-07-28 | 武汉世纪金桥安全技术有限公司 | A kind of secret key verification method of blue-tooth intelligence lock controller |
CN108234458A (en) * | 2017-12-21 | 2018-06-29 | 广东汇泰龙科技有限公司 | Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher |
CN108683706A (en) * | 2018-04-12 | 2018-10-19 | 广东汇泰龙科技有限公司 | A kind of Encryption Algorithm and its verification method based on the lock communication of NB-IOT clouds |
-
2021
- 2021-07-20 CN CN202110816856.6A patent/CN113538752A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2073433A1 (en) * | 2007-12-18 | 2009-06-24 | Systemes Et Technologies Identification | Remote securing of control and identification UHF radio transactions |
CN105551117A (en) * | 2014-11-04 | 2016-05-04 | 广东中星电子有限公司 | Two-dimension code generation/verification method used in access control environment, and apparatus thereof |
CN105989643A (en) * | 2015-02-03 | 2016-10-05 | 吉林省施泰信息技术股份有限公司 | Communication encryption method used for electronic lock, electronic lock apparatus and system thereof |
CN104639561A (en) * | 2015-02-27 | 2015-05-20 | 飞天诚信科技股份有限公司 | Method for safely obtaining secret key |
CN106992850A (en) * | 2017-03-16 | 2017-07-28 | 武汉世纪金桥安全技术有限公司 | A kind of secret key verification method of blue-tooth intelligence lock controller |
CN106952378A (en) * | 2017-04-11 | 2017-07-14 | 徐士兰 | Method for unlocking and device, electronic lock |
CN108234458A (en) * | 2017-12-21 | 2018-06-29 | 广东汇泰龙科技有限公司 | Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher |
CN108683706A (en) * | 2018-04-12 | 2018-10-19 | 广东汇泰龙科技有限公司 | A kind of Encryption Algorithm and its verification method based on the lock communication of NB-IOT clouds |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110493202B (en) | Login token generation and verification method and device and server | |
EP3557831B1 (en) | System for processing two-dimensional barcodes in connection with mobile payment transactions | |
EP3435591B1 (en) | 1:n biometric authentication, encryption, signature system | |
US6748530B1 (en) | Certification apparatus and method | |
CN108833114A (en) | A kind of decentralization identity authorization system and method based on block chain | |
AU2019204723C1 (en) | Cryptographic key management based on identity information | |
CN108734018B (en) | Authentication method, device, system and computer readable storage medium | |
US20110113241A1 (en) | Ic card, ic card system, and method thereof | |
EP3206329B1 (en) | Security check method, device, terminal and server | |
CN106779705B (en) | Dynamic payment method and system | |
AU2019204711B2 (en) | Securely performing cryptographic operations | |
CN109905384B (en) | Data migration method and system | |
CN111884811A (en) | Block chain-based data evidence storing method and data evidence storing platform | |
CN106961329A (en) | A kind of solution for being directed to ADS B agreements confidentiality and integrality | |
US20200372507A1 (en) | Identification code pulling method, storage medium, terminal device, and server | |
CN113872932A (en) | Method, system, terminal and storage medium for authenticating interface between micro services | |
US11251941B2 (en) | Managing cryptographic keys based on identity information | |
CN109726578A (en) | A kind of anti-fake solution of novel dynamic two-dimension code | |
CN113538752A (en) | Offline dynamic two-dimensional code verification method for access control terminal equipment | |
Campbell | Supporting digital signatures in mobile environments | |
CN112580109B (en) | Software business process legality design method by using block chain signature technology | |
CN115633362B (en) | NFC function control method based on security element and mobile terminal equipment | |
CN114615075B (en) | Software tamper-proof system and method of controller and storage medium | |
JP2002006739A (en) | Authentication information generating device and data verifying device | |
CN113715670A (en) | Charging method of storage battery car charging pile equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20211022 |
|
RJ01 | Rejection of invention patent application after publication |