CN114360118A - Access control system based on block chain and processing method - Google Patents
Access control system based on block chain and processing method Download PDFInfo
- Publication number
- CN114360118A CN114360118A CN202210138650.7A CN202210138650A CN114360118A CN 114360118 A CN114360118 A CN 114360118A CN 202210138650 A CN202210138650 A CN 202210138650A CN 114360118 A CN114360118 A CN 114360118A
- Authority
- CN
- China
- Prior art keywords
- visitor
- access control
- access
- digital identity
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 11
- 238000012795 verification Methods 0.000 claims description 11
- 238000000034 method Methods 0.000 description 4
- 206010033799 Paralysis Diseases 0.000 description 3
- 230000006870 function Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
Images
Landscapes
- Time Recorders, Dirve Recorders, Access Control (AREA)
Abstract
The invention provides an access control system based on a block chain and a processing method, comprising the following steps: an appointment application module: the system is used for self-service reservation application of a visitor, the visitor authorizes the digital identity to log in and submits building unit access information to generate a digital identity access control two-dimensional code; an approval module: the system comprises an access unit, a visitor management unit and a data processing unit, wherein the access unit is used for verifying the digital identity of the visitor and verifying and approving the application information; block chain database: storing access application information and access log information of the entrance guard; the information acquisition module: the system comprises a two-dimensional code acquisition module, a two-dimensional code acquisition module and a two-dimensional code acquisition module, wherein the two-dimensional code acquisition module is used for acquiring a digital identity access control access two-dimensional code of a user; a comparison processing module: the system is used for analyzing the access two-dimensional code, checking the validity of a user and sending a result to the access gate; entrance guard's floodgate machine: and acquiring a verified result and performing the opening and closing operation of the entrance guard gate. According to the invention, the block chain technology is adopted to carry out multi-terminal calling on the two-dimensional code information for the access of the user digital identity access control, the chain deposit certificate of the access control access information can not be tampered, and the safety performance of the access control system is improved.
Description
Technical Field
The invention relates to the technical field of block chains, in particular to an access control system based on a block chain and a processing method.
Background
Along with the improvement of people's safety consciousness, people attach more and more importance to access control system's security performance, and access control system is also more and more advanced, not only have digital password type access control system, fingerprint identification type access control system also has the higher face identification type access control system of factor of safety, even so, after the memory of entrance guard is destroyed, the information of storage often faces the result that can't recover, lead to access control system's paralysis even, can't provide effectual information, and carry out the storage backup will greatly increased access control system's memory cost.
In chinese patent publication No. CN108806035A, a block chain-based access control system is disclosed, in which a block chain technology is used to perform multi-port storage and call on user information, so as to avoid the security problem of data loss of a single-storage access control system after a memory is damaged, and although the data storage capability of the access control system is improved, the problem that the existing access control system is likely to cause user information leakage due to paralysis when a server is attacked cannot be guaranteed.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide an access control system based on a block chain and a processing method.
The invention provides an access control system based on a block chain, which comprises: the system comprises an appointment application module, an approval module, a block chain database, an information acquisition module, a comparison processing module and an access gate;
an appointment application module: the system is used for self-service reservation application of a visitor, the visitor authorizes the digital identity to log in and submits building unit access information to generate a digital identity access control two-dimensional code;
an approval module: the system comprises a visitor and an access unit, wherein the visitor is used for verifying the digital identity of the visitor and verifying and approving the access control reservation application information of the visitor;
block chain database: the system is used for storing the access application information and the access log information of the reserved visitor;
the information acquisition module: the system comprises a digital identity access control two-dimensional code acquisition module, a storage module and a display module, wherein the digital identity access control two-dimensional code acquisition module is used for acquiring a digital identity access control two-dimensional code of a user in real time;
a comparison processing module: the system comprises an access control gate machine, a visitor user digital identity access control two-dimensional code, a user validity checking module and a visitor user digital identity access control two-dimensional code checking module, wherein the access control gate machine is used for analyzing the visitor user digital identity access control two-dimensional code, checking the validity of a user and sending a checking result instruction to the access control gate machine;
entrance guard's floodgate machine: and obtaining the verified result and carrying out corresponding opening and closing operations of the entrance guard gate.
Preferably, the digital identity is signed by a private key of the visitor and a public key of the digital identity is called by the approval module for verification.
Preferably, in the comparison processing module, the system analyzes the two-dimensional code of the visitor into a digital identity and access application information, verifies the digital identity by calling a public key, and compares the specific application information of the visitor.
Preferably, in the comparison processing module, after the verification of the digital identity public key is passed and the visitor applies for the accurate access information, the system determines that the visitor information is valid.
The invention provides a block chain-based access control system processing method, which comprises the following steps of;
a step of reservation application: the visitor makes a self-service reservation application, authorizes the digital identity to log in and submits building unit access information to generate a digital identity access control two-dimensional code;
and (3) approval step: the access unit verifies the digital identity of the visitor and verifies and approves the access control reservation application information of the visitor;
data uplink step: storing the access application information and the access log information of the reserved visitor;
an information acquisition step: acquiring a digital identity access control access two-dimensional code of a user in real time;
a comparison treatment step: analyzing the digital identity access control two-dimensional code of the visitor user, checking the validity of the user, and sending a checking result instruction to an access control gate;
controlling an access gate: and obtaining the verified result and carrying out corresponding opening and closing operations of the entrance guard gate.
Preferably, the digital identity is signed by a private key of the visitor and a public key of the digital identity is called by the approval module for verification.
Preferably, in the step of comparing, the system resolves the two-dimensional code of the visitor into a digital identity and access application information, verifies the digital identity by calling a public key, and compares the specific application information of the visitor.
Preferably, in the step of comparing, when the verification of the digital identity public key is passed and the visitor applies for the accurate access information, the system determines that the visitor information is valid.
Compared with the prior art, the invention has the following beneficial effects:
1. the invention realizes that the user has the control right to the self identity data and has the characteristic of accessing the local storage of the identity without chaining by adopting a distributed Digital Identity (DID) technology, and solves the problem that the prior access control system is paralyzed when a server is attacked, so that the user information is easy to leak.
2. According to the invention, the block chain technology is adopted to carry out multi-terminal calling on the two-dimensional code information for the access of the user digital identity access control, the chain deposit certificate of the access control access information can not be tampered, and the safety performance of the access control system is improved.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments with reference to the following drawings:
fig. 1 is a block chain-based access control system according to the present invention.
Detailed Description
The present invention will be described in detail with reference to specific examples. The following examples will assist those skilled in the art in further understanding the invention, but are not intended to limit the invention in any way. It should be noted that it would be obvious to those skilled in the art that various changes and modifications can be made without departing from the spirit of the invention. All falling within the scope of the present invention.
The invention discloses an access control system based on a block chain, which comprises the following components in part by weight with reference to fig. 1: the system comprises an appointment application module, an approval module, a block chain database, an information acquisition module, a comparison processing module and an access gate;
an appointment application module: the system is used for self-service reservation application of a visitor, the visitor authorizes the digital identity to log in and submits building unit access information to generate a digital identity access control two-dimensional code;
an approval module: the system comprises a visitor and an access unit, wherein the visitor is used for verifying the digital identity of the visitor and verifying and approving the access control reservation application information of the visitor;
the digital identity is signed by a private key of the visitor, and a public key of the digital identity is called by the approval module to be verified. And the visitor generates a digital identity access two-dimensional code after the appointment application module logs in the submitted information through the digital identity signed by the private key. In the background approval process, as the public key of the digital identity of the visitor is public and the public key of one digital identity corresponds to the private key, when the system calls the public key of the digital identity for verification, if the public key of the digital identity is displayed as the relevant information of the visitor, the system automatically approves.
Block chain database: the system is used for storing the access application information and the access log information of the reserved visitor;
the information acquisition module: the system comprises a digital identity access control two-dimensional code acquisition module, a storage module and a display module, wherein the digital identity access control two-dimensional code acquisition module is used for acquiring a digital identity access control two-dimensional code of a user in real time;
a comparison processing module: the system comprises an access control gate machine, a visitor user digital identity access control two-dimensional code, a user validity checking module and a visitor user digital identity access control two-dimensional code checking module, wherein the access control gate machine is used for analyzing the visitor user digital identity access control two-dimensional code, checking the validity of a user and sending a checking result instruction to the access control gate machine;
in the process of the approval module, after the system approves the information of the visitor applying for the appointment, the information is automatically stored in the block chain database. When the access control gate machine collects the digital identity two-dimensional code of the visitor, the system analyzes the two-dimensional code of the visitor into a digital identity part and an access application information part, and then verifies the digital identity by calling the public key and compares the specific application information of the visitor. The validity is mainly divided into two parts, namely, the digital identity public key passes verification, and the visitor applies for accurate access information. The digital identity public key authentication and access information is valid only if it is consistent with the information in the blockchain database.
Entrance guard's floodgate machine: and obtaining the verified result and carrying out corresponding opening and closing operations of the entrance guard gate.
The invention also discloses a block chain-based access control system processing method, which comprises the following steps;
a step of reservation application: the system is used for self-service reservation application of a visitor, the visitor authorizes the digital identity to log in and submits building unit access information to generate a digital identity access control two-dimensional code;
and (3) approval step: the access unit verifies the digital identity of the visitor and verifies and approves the access control reservation application information of the visitor; the digital identity is signed by the private key of the visitor and the public key of the digital identity is called for verification in the approval step.
Data uplink step: storing the access application information and the access log information of the reserved visitor;
an information acquisition step: acquiring a digital identity access control access two-dimensional code of a user in real time;
a comparison treatment step: analyzing the digital identity access control two-dimensional code of the visitor user, checking the validity of the user, and sending a checking result instruction to an access control gate; the system analyzes the visitor two-dimensional code into a digital identity and access application information, verifies the digital identity by calling a public key, and compares the specific application information of the visitor. And when the digital identity public key passes the verification and the visitor applies for accurate access information, the system determines that the visitor information is valid.
Controlling an access gate: and obtaining the verified result and carrying out corresponding opening and closing operations of the entrance guard gate.
Those skilled in the art will appreciate that, in addition to implementing the system and its various devices, modules, units provided by the present invention as pure computer readable program code, the system and its various devices, modules, units provided by the present invention can be fully implemented by logically programming method steps in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Therefore, the system and various devices, modules and units thereof provided by the invention can be regarded as a hardware component, and the devices, modules and units included in the system for realizing various functions can also be regarded as structures in the hardware component; means, modules, units for performing the various functions may also be regarded as structures within both software modules and hardware components for performing the method.
In the description of the present application, it is to be understood that the terms "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", and the like indicate orientations or positional relationships based on those shown in the drawings, and are only for convenience in describing the present application and simplifying the description, but do not indicate or imply that the referred device or element must have a specific orientation, be constructed in a specific orientation, and be operated, and thus, should not be construed as limiting the present application.
The foregoing description of specific embodiments of the present invention has been presented. It is to be understood that the present invention is not limited to the specific embodiments described above, and that various changes or modifications may be made by one skilled in the art within the scope of the appended claims without departing from the spirit of the invention. The embodiments and features of the embodiments of the present application may be combined with each other arbitrarily without conflict.
Claims (8)
1. The utility model provides an access control system based on block chain which characterized in that includes: the system comprises an appointment application module, an approval module, a block chain database, an information acquisition module, a comparison processing module and an access gate;
an appointment application module: the system is used for self-service reservation application of a visitor, the visitor authorizes the digital identity to log in and submits building unit access information to generate a digital identity access control two-dimensional code;
an approval module: the system comprises a visitor and an access unit, wherein the visitor is used for verifying the digital identity of the visitor and verifying and approving the access control reservation application information of the visitor;
block chain database: the system is used for storing the access application information and the access log information of the reserved visitor;
the information acquisition module: the system comprises a digital identity access control two-dimensional code acquisition module, a storage module and a display module, wherein the digital identity access control two-dimensional code acquisition module is used for acquiring a digital identity access control two-dimensional code of a user in real time;
a comparison processing module: the system comprises an access control gate machine, a visitor user digital identity access control two-dimensional code, a user validity checking module and a visitor user digital identity access control two-dimensional code checking module, wherein the access control gate machine is used for analyzing the visitor user digital identity access control two-dimensional code, checking the validity of a user and sending a checking result instruction to the access control gate machine;
entrance guard's floodgate machine: and obtaining the verified result and carrying out corresponding opening and closing operations of the entrance guard gate.
2. The block chain based access control system of claim 1, wherein: the digital identity is signed by a private key of the visitor, and a public key of the digital identity is called by the approval module to be verified.
3. The block chain based access control system of claim 1, wherein: in the comparison processing module, the system analyzes the two-dimensional code of the visitor into a digital identity and access application information, verifies the digital identity by calling a public key, and compares the specific application information of the visitor.
4. The block chain based access control system of claim 1, wherein: in the comparison processing module, when the verification of the digital identity public key is passed and the visitor applies for accurate access information, the system determines that the visitor information is valid.
5. A block chain-based access control system processing method is characterized by comprising the following steps;
a step of reservation application: the visitor makes a self-service reservation application, authorizes the digital identity to log in and submits building unit access information to generate a digital identity access control two-dimensional code;
and (3) approval step: the access unit verifies the digital identity of the visitor and verifies and approves the access control reservation application information of the visitor;
data uplink step: storing the access application information and the access log information of the reserved visitor;
an information acquisition step: acquiring a digital identity access control access two-dimensional code of a user in real time;
a comparison treatment step: analyzing the digital identity access control two-dimensional code of the visitor user, checking the validity of the user, and sending a checking result instruction to an access control gate;
controlling an access gate: and obtaining the verified result and carrying out corresponding opening and closing operations of the entrance guard gate.
6. The block chain-based access control system processing method according to claim 5, characterized in that: the digital identity is signed by a private key of the visitor, and a public key of the digital identity is called for verification in the approval step.
7. The block chain-based access control system processing method according to claim 5, characterized in that: in the step of comparison processing, the system analyzes the two-dimensional code of the visitor into a digital identity and access application information, verifies the digital identity by calling a public key, and compares the specific application information of the visitor.
8. The block chain-based access control system processing method according to claim 5, characterized in that: in the step of comparison processing, when the verification of the digital identity public key is passed and the visitor applies for accurate access information, the system determines that the visitor information is valid.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210138650.7A CN114360118A (en) | 2022-02-15 | 2022-02-15 | Access control system based on block chain and processing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210138650.7A CN114360118A (en) | 2022-02-15 | 2022-02-15 | Access control system based on block chain and processing method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114360118A true CN114360118A (en) | 2022-04-15 |
Family
ID=81093593
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210138650.7A Pending CN114360118A (en) | 2022-02-15 | 2022-02-15 | Access control system based on block chain and processing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114360118A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108806035A (en) * | 2018-05-08 | 2018-11-13 | 深圳市益鑫智能科技有限公司 | A kind of access control system based on block chain |
CN109584411A (en) * | 2018-10-18 | 2019-04-05 | 南京中诚区块链研究院有限公司 | Intelligent entrance guard management method based on block chain technology |
CN111986367A (en) * | 2020-08-27 | 2020-11-24 | 刘启强 | Block chain security entrance guard or lock system and business model |
-
2022
- 2022-02-15 CN CN202210138650.7A patent/CN114360118A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108806035A (en) * | 2018-05-08 | 2018-11-13 | 深圳市益鑫智能科技有限公司 | A kind of access control system based on block chain |
CN109584411A (en) * | 2018-10-18 | 2019-04-05 | 南京中诚区块链研究院有限公司 | Intelligent entrance guard management method based on block chain technology |
CN111986367A (en) * | 2020-08-27 | 2020-11-24 | 刘启强 | Block chain security entrance guard or lock system and business model |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11276131B2 (en) | Property management system utilizing a blockchain network | |
CN109118616A (en) | access control method and access control device | |
CN105741395A (en) | Entrance guard access method and system based on two-dimension code and face identification | |
CN105118125B (en) | A kind of intelligent unlocking method and system of electronic lock | |
CN105261105A (en) | Safety access control method | |
CN105574967A (en) | Intelligent access control system and operation method thereof | |
CN110211271A (en) | Net about room management method, management platform and system | |
CN110288783A (en) | A kind of bank tail-box library automatic access recognition methods, device, computer equipment and storage medium | |
CN110491007A (en) | A kind of community-based caller management method, community server and storage medium | |
CN113838228A (en) | Command issuing method and device applied to access control management system and storage medium | |
CN111260833A (en) | Binding and management method and device for access control card | |
CN109461241A (en) | A kind of face and fingerprint identification entrance guard system control method | |
CN111653018A (en) | Personnel passing management platform based on face recognition | |
Oktaviandri et al. | Design and development of visitor management system | |
CN112785766B (en) | Access control permission distribution authorization method based on block chain | |
CN111047750A (en) | Method, device and system for controlling offline access control device | |
CN109243014A (en) | Access control system and the double mirror unlocking methods of gate inhibition | |
CN114360118A (en) | Access control system based on block chain and processing method | |
CN110349301A (en) | Gate inhibition's open method and device | |
CN114613044A (en) | Pedestrian passageway passing method and device, electronic equipment and storage medium | |
CN105897708A (en) | Information protection method and mobile terminal | |
CN111770100B (en) | Method and system for verifying safe access of external equipment to Internet of things terminal | |
CN113570763A (en) | Passage control method and device, machine readable medium and equipment | |
CN114387715A (en) | Face recognition gate, gate control method, terminal device and storage medium | |
CN114360129A (en) | Access control management method, system and equipment, and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |