CN115758398B - Access control data processing method and device, access control system and storage medium - Google Patents

Access control data processing method and device, access control system and storage medium Download PDF

Info

Publication number
CN115758398B
CN115758398B CN202211347036.8A CN202211347036A CN115758398B CN 115758398 B CN115758398 B CN 115758398B CN 202211347036 A CN202211347036 A CN 202211347036A CN 115758398 B CN115758398 B CN 115758398B
Authority
CN
China
Prior art keywords
key
authentication
access control
card
parameter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211347036.8A
Other languages
Chinese (zh)
Other versions
CN115758398A (en
Inventor
连新蔚
凌杭
桑波
李露
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dinghyun Commercial Code Evaluation Technology Shenzhen Co ltd
Original Assignee
Dinghyun Commercial Code Evaluation Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dinghyun Commercial Code Evaluation Technology Shenzhen Co ltd filed Critical Dinghyun Commercial Code Evaluation Technology Shenzhen Co ltd
Priority to CN202211347036.8A priority Critical patent/CN115758398B/en
Publication of CN115758398A publication Critical patent/CN115758398A/en
Application granted granted Critical
Publication of CN115758398B publication Critical patent/CN115758398B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Abstract

The invention discloses an access control data processing method, an access control data processing device, an access control system and a storage medium, and belongs to the technical field of safety. The access control data processing method comprises the following steps: acquiring a first authentication parameter of an access card and a biological characteristic parameter of a user of the access card, wherein the first authentication parameter is a result of performing preset encryption operation on a random number by a first authentication key of the access card; performing the preset encryption operation on the hash value corresponding to the biological characteristic parameter according to the card reader key to obtain a second authentication key, and performing the preset encryption operation on the random number according to the second authentication key to obtain a second authentication parameter; and determining whether to execute a door opening operation according to the first authentication parameter and the second authentication parameter. The method and the device realize the reduction of the probability of the leakage of the biological characteristic information of the user.

Description

Access control data processing method and device, access control system and storage medium
Technical Field
The invention relates to the technical field of security, in particular to an access control data processing method, an access control data processing device, an access control system and a storage medium.
Background
With the development of technology, many access control systems using biometric parameters are presented. At present, the door control system often stores the face information of the user in the door control system, compares the face information acquired by the sensor with the data of the door control system to determine whether the door needs to be opened, but because the face information of the user is intensively stored in the door control system and the face information acquired by the sensor directly compares the face information of a plurality of users, the face information without encryption is used for a plurality of times in the process, so that the leakage probability of the biological characteristic information such as the face information of the user is increased.
The foregoing is provided merely for the purpose of facilitating understanding of the technical solutions of the present invention and is not intended to represent an admission that the foregoing is prior art.
Disclosure of Invention
The invention mainly aims to provide an access control data processing method, an access control data processing device, an access control system and a storage medium, and aims to solve the problem that the probability of leakage of biological characteristic information of a user in the access control system is reduced.
In order to achieve the above purpose, the invention provides an access control data processing method, which is applied to an access control system, and the access control data processing method comprises the following steps:
acquiring a first authentication parameter of an access card and a biological characteristic parameter of a user of the access card, wherein the first authentication parameter is a result of performing preset encryption operation on a random number by a first authentication key of the access card;
performing the preset encryption operation on the hash value corresponding to the biological characteristic parameter according to the card reader key to obtain a second authentication key, and performing the preset encryption operation on the random number according to the second authentication key to obtain a second authentication parameter;
and determining whether to execute a door opening operation according to the first authentication parameter and the second authentication parameter.
Optionally, before the obtaining the first authentication parameter of the access card and the biometric parameter of the user of the access card, the method further includes:
acquiring preset biological characteristic parameters of a user with the access card use permission;
performing the preset encryption operation on the hash value of the preset biological characteristic parameter according to the card reader key to obtain a first preset key;
and storing the first preset key into the access card to serve as the first authentication key.
Optionally, before the step of obtaining the first preset key, performing the preset encryption operation on the hash value of the preset biometric parameter according to the card reader key, the method further includes:
acquiring a root key and an enterprise identifier corresponding to the access control system;
and carrying out the preset encryption operation on the enterprise identifier according to the root key to obtain the card reader key.
Optionally, the step of performing the preset encryption operation on the hash value corresponding to the biometric parameter according to the card reader key to obtain a second authentication key, and performing the preset encryption operation on the random number according to the second authentication key to obtain a second authentication parameter further includes:
acquiring an identification number of the access control card, and determining whether the identification number belongs to a blacklist of the access control system;
stopping executing the door opening operation when the identification number belongs to the blacklist;
and when the identification number does not belong to the blacklist, executing the step of determining whether to execute a door opening operation according to the first authentication parameter and the second authentication parameter.
Optionally, before the step of performing the preset encryption operation on the hash value corresponding to the biometric parameter according to the card reader key, the method further includes:
and acquiring the corresponding card reader key according to the identification of the card reader.
Optionally, the step of obtaining the first authentication parameter of the access card includes:
generating the random number, and sending the random number to the access card so that the access card can perform the preset encryption operation on the random number according to the first authentication key to obtain the first authentication parameter;
the first authentication parameter is received.
Optionally, the operation algorithm of the preset encryption operation is a cryptographic algorithm.
In addition, in order to achieve the above object, the present invention also provides an access control data processing device, which includes:
the interaction module is used for acquiring a first authentication parameter of the access card and a biological characteristic parameter of a user of the access card, wherein the first authentication parameter is a result of performing preset encryption operation on a random number by a first authentication key of the access card;
the operation module is used for carrying out the preset encryption operation on the hash value corresponding to the biological characteristic parameter according to the card reader key to obtain a second authentication key, and carrying out the preset encryption operation on the random number according to the second authentication key to obtain a second authentication parameter;
and the authentication module is used for determining whether to execute the door opening operation according to the first authentication parameter and the second authentication parameter.
In addition, in order to achieve the above object, the present invention also provides an access control system, including: the system comprises a memory, a processor and an access control data processing program which is stored in the memory and can run on the processor, wherein the access control data processing program is configured to realize the steps of the access control data processing method.
In addition, in order to achieve the above object, the present invention further provides a storage medium, on which an access control data processing program is stored, the access control data processing program implementing the steps of the access control data processing method described in any one of the above when executed by a processor.
The invention provides an access control data processing method, which comprises the following steps: acquiring a first authentication parameter of an access card and a biological characteristic parameter of a user of the access card, wherein the first authentication parameter is a result of performing preset encryption operation on a random number by a first authentication key of the access card; performing the preset encryption operation on the hash value corresponding to the biological characteristic parameter according to the card reader key to obtain a second authentication key, and performing the preset encryption operation on the random number according to the second authentication key to obtain a second authentication parameter; and determining whether the identity of the user passes or not according to the first authentication parameter and the second authentication parameter. Compared with the prior access control system utilizing the biological characteristic parameters, the access control system compares the first authentication parameters of the access control card with the second authentication parameters corresponding to the access control card to perform identity recognition to determine whether to open the door, analysis and comparison of the biological characteristic data are not needed, and only the hash value of the biological characteristic parameters is needed to obtain the verification key in the verification process, so that other people can obtain the authentication parameters and cannot determine the biological characteristic parameters of the user, and the probability of leakage of the biological characteristic information of the user is reduced.
Drawings
FIG. 1 is a schematic diagram of a hardware operating environment involved in an access control system according to an embodiment of the present invention;
FIG. 2 is a flowchart of a first embodiment of an access control data processing method according to the present invention;
FIG. 3 is a flowchart of a second embodiment of the door control data processing method of the present invention;
FIG. 4 is a flowchart of a third embodiment of an access data processing method according to the present invention;
the achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Referring to fig. 1, fig. 1 is a schematic diagram of an access control system structure of a hardware running environment according to an embodiment of the present invention.
As shown in fig. 1, the access control system may include: a processor 1001, such as a central processing unit (Central Processing Unit, CPU), a communication bus 1002, an interaction device 1003, a network interface 1004, a memory 1005. Wherein the communication bus 1002 is used to enable connected communication between these components. The interactive apparatus 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional interactive apparatus 1003 may further include: the interactive device 1003 may also be coupled to the communications bus 1002 by a standard wired interface, wireless interface, card reader, card issuer, camera, etc. The network interface 1004 may optionally include a standard wired interface, a WIreless interface (e.g., a WIreless-FIdelity (WI-FI) interface). The Memory 1005 may be a high-speed random access Memory (Random Access Memory, RAM) Memory or a stable nonvolatile Memory (NVM), such as a disk Memory. The memory 1005 may also optionally be a storage device separate from the processor 1001 described above.
Those skilled in the art will appreciate that the configuration shown in fig. 1 is not limiting of the access control system and may include more or fewer components than shown, or may combine certain components, or may be arranged in different components.
As shown in fig. 1, an operating system, a data storage module, a network communication module, a hardware control module, and an entrance guard data processing program may be included in the memory 1005 as one type of storage medium.
In the access control system shown in fig. 1, the network interface 1004 is mainly used for data communication with other devices; the interaction device 1003 is mainly used for data interaction with a user; the processor 1001 and the memory 1005 in the access control system can be arranged in the access control system, and the access control system calls the access control data processing program stored in the memory 1005 through the processor 1001 and executes the access control data processing method provided by the embodiment of the invention.
The embodiment of the invention provides an access control data processing method, and referring to fig. 2, fig. 2 is a schematic flow chart of a first embodiment of the access control data processing method.
In this embodiment, the method for processing access control data includes:
step S10, a first authentication parameter of an access card and a biological characteristic parameter of a user of the access card are obtained, wherein the first authentication parameter is a result of performing preset encryption operation on a random number by a first authentication key of the access card;
the first authentication parameter is a result of the first authentication key performing the preset encryption operation on the random number, the access card sends the first authentication parameter to the card reader, and the access card does not store the first authentication parameter after sending the first authentication parameter. The random number is sent to the access card by the card reader when identity authentication is required, in this embodiment, one access card stores a first authentication key, and the process of encrypting the random number by the first authentication key to obtain the first authentication parameter is performed in the access card, that is, the first key is not sent to the card reader. The card reader receives a first authentication parameter sent by the access card.
The first authentication key here is stored in the access card. The biological characteristic information of the user of the access card can be face information, iris information or fingerprint information. Any one or more of the above face information, iris information, fingerprint information may be combined as the biometric information. The random number here is sent by the card reader to the access card. The preset encryption operation here is an operation of a distributed encryption algorithm.
Step S20, performing the preset encryption operation on the hash value corresponding to the biological characteristic parameter according to a card reader key to obtain a second authentication key, and performing the preset encryption operation on the random number according to the second authentication key to obtain a second authentication parameter;
the biometric parameters are mapped to hash values by a hash algorithm, which in this embodiment may be the national secret SM3 algorithm. After calculating the hash value corresponding to the biological characteristic parameter, deleting the biological characteristic parameter.
Step S30, determining whether to execute a door opening operation according to the first authentication parameter and the second authentication parameter.
In this embodiment, by comparing the value of the first authentication parameter with the value of the second authentication parameter, when the value of the first authentication parameter and the value of the second authentication parameter are the same, the door opening operation is performed. And stopping executing the door opening operation when the value of the first authentication parameter is different from the value of the second authentication parameter. Optionally, acquiring a plurality of original data acquired by a sensor, separating corresponding biometric parameters and error parameters according to each original data, obtaining a plurality of biometric parameters and a plurality of error parameters, wherein the biometric parameters and the error parameters are in one-to-one correspondence, and executing the preset encryption operation on hash values corresponding to the biometric parameters according to a card reader key when the biometric parameters are the same and the error parameters are different, so as to obtain a second authentication key. And determining to acquire the abnormality of the biological characteristic parameters when the biological characteristic parameters are different or when the error parameters are different. The sensors are set according to different biological characteristic parameters, and the original data can be images of faces, iris and fingerprint. When the biometric parameters are face information or iris information, the error parameters may be the maximum light intensity pixel coordinates or the maximum light intensity value of the image. When the biometric parameter is fingerprint information, the error parameter may be a position coordinate of a center of the fingerprint or a direction of the fingerprint.
In this embodiment, compared with the current access control system using the biometric parameters, the access control system compares the first authentication parameters of the access control card with the second authentication parameters corresponding to the access control card to perform identity recognition to determine whether to open the door, does not need to analyze and compare the biometric data, and only needs to use the hash value of the biometric parameters to obtain the verification key in the verification process, so that other people can not determine the biometric parameters of the user even if obtaining the authentication parameters, thereby reducing the probability of leakage of the biometric information of the user.
Further, based on the first embodiment, a second embodiment of the access control data processing method of the present invention is provided, in this embodiment, before the obtaining the first authentication parameter of the access control card and the biometric parameters of the user of the access control card, the method further includes:
step S01, acquiring preset biological characteristic parameters of a user with the access card use authority;
the type of the preset biometric parameters is the same as the biometric parameters. Specifically, the preset biometric parameters may be obtained by a sensor.
Step S02, performing preset encryption operation on the hash value of the preset biological characteristic parameter according to the card reader key to obtain a first preset key;
and after the card reader key performs the preset encryption operation on the preset biological characteristic parameters to obtain a first preset key, deleting the preset biological characteristic parameters.
And step S03, storing the first preset key into the access card as the first authentication key.
And storing the first preset key to an access card through a card sender, and taking the first preset key as the first authentication key.
In this embodiment, the card reader key performs a preset encryption operation on the preset biometric parameters, so that a user who can use the access card is determined, and the first preset key is stored as a first authentication key in the access card, so that the first authentication key is stored by the user of the access card, and the probability of leakage of the first authentication key is reduced.
Further, based on the second embodiment, a third embodiment of the access data processing method of the present invention is provided, in this embodiment, referring to fig. 4, before the step of obtaining the first preset key, the method further includes:
step S0201, obtaining a root key and an enterprise identifier corresponding to the access control system;
the root key is generated from a random number generator, and the enterprise identifier may be the name or ID of the enterprise.
Step S0202, carrying out the preset encryption operation on the enterprise identifier according to the root key to obtain the card reader key.
A card reader key may be determined from the root key and the enterprise identification. And installing the card reader key in the card reader.
In this embodiment, the preset encryption operation is identified for the enterprise through the root key, so that the card reader key can be prevented from being replaced, and the security of the access control system is improved.
Further, based on any one of the foregoing embodiments, a fourth embodiment of the access data processing method of the present invention is provided, in this embodiment, after the step of performing the preset encryption operation on the hash value corresponding to the biometric parameter according to the card reader key to obtain a second authentication key, and performing the preset encryption operation on the random number according to the second authentication key to obtain a second authentication parameter, the method further includes:
acquiring an identification number of the access control card, and determining whether the identification number belongs to a blacklist of the access control system;
stopping executing the door opening operation when the identification number belongs to the blacklist;
and when the identification number does not belong to the blacklist, executing the step of determining whether to execute a door opening operation according to the first authentication parameter and the second authentication parameter.
The access card identification number can be used for identifying the access card, the access system is provided with a blacklist of access cards, and specifically, when the access card is lost or staff leaves, the lost access card can be added to the blacklist. And stopping executing the door opening operation when the identification number is identified to belong to the blacklist. And when the identification number is identified not to belong to the blacklist, executing the step of determining whether to execute the door opening operation according to the first authentication parameter and the second authentication parameter. In other embodiments, the usage time of the access card is recorded, and when the difference between the recorded usage times of the access card is smaller than a preset time difference, the access card is determined to be abnormal.
In the embodiment, the blacklist is arranged to prevent the access control card from being used for door opening operation after being lost, so that the possibility that an access control system is entered by an illegal person is reduced.
Further, based on any one of the foregoing embodiments, a fifth embodiment of the access data processing method according to the present invention is provided, in this embodiment, before the step of performing the preset encryption operation on the hash value corresponding to the biometric parameter according to the card reader key, the method further includes:
and acquiring the corresponding card reader key according to the identification of the card reader.
In an access control system with multiple access control units, each access control unit is provided with a corresponding card reader, one card reader identifier corresponds to one card reader key uniquely, and one card reader key can correspond to multiple card reader identifiers, for example, two access ports are arranged in a meeting place, and different card readers are arranged at the two access ports, but the card reader keys of the two access port card readers are the same.
In the embodiment, the corresponding card reader key is obtained according to the identifications of the card readers, so that the identifications of the plurality of card readers correspond to one reader key, one access control card can enter from a plurality of access control positions, and the universality of an access control system is improved.
Further, the step of obtaining the first authentication parameter of the access card includes:
generating the random number, and sending the random number to the access card so that the access card can perform the preset encryption operation on the random number according to the first authentication key to obtain the first authentication parameter;
the first authentication parameter is received.
Optionally, the random number generator generates a random number, the random number is sent to the access control card through the card reader, the access control card generates a first authentication parameter, and the first authentication parameter is returned to the access control system. In other embodiments, the time stamp may be generated according to the current time, and then the time stamp is sent to the access card through the card reader, and the access card generates the first authentication parameter.
In this embodiment, the random number is generated and the preset encryption operation is performed on the random number according to the first authentication key to obtain the first authentication parameter, so that replay attack can be effectively avoided, and the probability of illegal opening of the access control is reduced.
Further, the operation algorithm of the preset encryption operation is a national encryption algorithm.
The national encryption algorithm is an encryption algorithm such as SM1, SM4 or SM7, the hash algorithm is a national encryption SM3 algorithm, and the principle is that a key distribution is carried out by adopting a packet encryption algorithm specified by the national password administration.
In addition, the embodiment of the invention also provides an access control data processing device, which comprises:
the interaction module is used for acquiring a first authentication parameter of the access card and a biological characteristic parameter of a user of the access card, wherein the first authentication parameter is a result of performing preset encryption operation on a random number by a first authentication key of the access card;
the operation module is used for carrying out the preset encryption operation on the hash value corresponding to the biological characteristic parameter according to the card reader key to obtain a second authentication key, and carrying out the preset encryption operation on the random number according to the second authentication key to obtain a second authentication parameter;
and the authentication module is used for determining whether to execute the door opening operation according to the first authentication parameter and the second authentication parameter.
In addition, the embodiment of the invention also provides a storage medium, wherein the storage medium is stored with an access control data processing program, and the access control data processing program realizes the steps of the access control data processing method according to any one of the embodiments when being executed by a processor.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of embodiments, it will be clear to a person skilled in the art that the above embodiment method may be implemented by means of software plus a necessary general hardware platform, but may of course also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on this understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as described above, comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (8)

1. The access control data processing method is characterized by being applied to an access control system, and comprises the following steps of:
acquiring a first authentication parameter of an access card and a biological characteristic parameter of a user of the access card, wherein the first authentication parameter is a result of performing preset encryption operation on a random number by a first authentication key of the access card;
performing the preset encryption operation on the hash value corresponding to the biological characteristic parameter according to the card reader key to obtain a second authentication key, and performing the preset encryption operation on the random number according to the second authentication key to obtain a second authentication parameter;
determining whether to execute a door opening operation according to the first authentication parameter and the second authentication parameter;
before the first authentication parameter of the access card and the biological characteristic parameter of the user of the access card are obtained, the method further comprises:
acquiring preset biological characteristic parameters of a user with the access card use permission;
performing the preset encryption operation on the hash value of the preset biological characteristic parameter according to the card reader key to obtain a first preset key;
storing the first preset key to the access card as the first authentication key;
the step of performing the preset encryption operation on the hash value of the preset biometric parameter according to the card reader key to obtain a first preset key further includes:
acquiring a root key and an enterprise identifier corresponding to the access control system;
and carrying out the preset encryption operation on the enterprise identifier according to the root key to obtain the card reader key.
2. The access control data processing method according to claim 1, wherein after the step of performing a preset encryption operation on the hash value corresponding to the biometric parameter according to the card reader key to obtain a second authentication key, and performing the preset encryption operation on the random number according to the second authentication key to obtain a second authentication parameter, the method further comprises:
acquiring an identification number of the access control card, and determining whether the identification number belongs to a blacklist of the access control system;
stopping executing the door opening operation when the identification number belongs to the blacklist;
and when the identification number does not belong to the blacklist, executing the step of determining whether to execute a door opening operation according to the first authentication parameter and the second authentication parameter.
3. The access control data processing method according to claim 1, wherein before the step of performing the preset encryption operation on the hash value corresponding to the biometric parameter according to the card reader key, the method further comprises:
and acquiring the corresponding card reader key according to the identification of the card reader.
4. The entrance guard data processing method as recited in claim 1, wherein the step of acquiring the first authentication parameter of the entrance guard card comprises:
generating the random number, and sending the random number to the access card so that the access card can perform the preset encryption operation on the random number according to the first authentication key to obtain the first authentication parameter;
the first authentication parameter is received.
5. The entrance guard data processing method according to any one of claims 1 to 4, wherein the operation algorithm of the preset encryption operation is a cryptographic algorithm.
6. An access control data processing device, characterized in that, access control data processing device includes:
the interaction module is used for acquiring a first authentication parameter of the access card and a biological characteristic parameter of a user of the access card, wherein the first authentication parameter is a result of performing preset encryption operation on a random number by a first authentication key of the access card;
the operation module is used for carrying out the preset encryption operation on the hash value corresponding to the biological characteristic parameter according to the card reader key to obtain a second authentication key, and carrying out the preset encryption operation on the random number according to the second authentication key to obtain a second authentication parameter;
the authentication module is used for determining whether to execute a door opening operation according to the first authentication parameter and the second authentication parameter;
before the first authentication parameter of the access card and the biological characteristic parameter of the user of the access card are obtained, the method further comprises:
acquiring preset biological characteristic parameters of a user with the access card use permission;
performing the preset encryption operation on the hash value of the preset biological characteristic parameter according to the card reader key to obtain a first preset key;
storing the first preset key to the access card as the first authentication key;
the step of performing the preset encryption operation on the hash value of the preset biometric parameter according to the card reader key to obtain a first preset key further includes:
acquiring a root key and an enterprise identifier corresponding to the access control system;
and carrying out the preset encryption operation on the enterprise identifier according to the root key to obtain the card reader key.
7. An access control system, characterized in that the access control system comprises: a memory, a processor and an access control data processing program stored on the memory and executable on the processor, the access control data processing program being configured to implement the steps of the access control data processing method of any one of claims 1 to 5.
8. A storage medium having stored thereon an access control data processing program which when executed by a processor implements the steps of the access control data processing method of any one of claims 1 to 5.
CN202211347036.8A 2022-10-31 2022-10-31 Access control data processing method and device, access control system and storage medium Active CN115758398B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211347036.8A CN115758398B (en) 2022-10-31 2022-10-31 Access control data processing method and device, access control system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211347036.8A CN115758398B (en) 2022-10-31 2022-10-31 Access control data processing method and device, access control system and storage medium

Publications (2)

Publication Number Publication Date
CN115758398A CN115758398A (en) 2023-03-07
CN115758398B true CN115758398B (en) 2023-07-21

Family

ID=85354516

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211347036.8A Active CN115758398B (en) 2022-10-31 2022-10-31 Access control data processing method and device, access control system and storage medium

Country Status (1)

Country Link
CN (1) CN115758398B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116580489B (en) * 2023-07-13 2023-09-29 鼎铉商用密码测评技术(深圳)有限公司 Access control equipment, access control card and card sender control method, equipment and medium
CN116844266B (en) * 2023-09-01 2023-11-24 鼎铉商用密码测评技术(深圳)有限公司 Access control method, access control system and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20180000849A (en) * 2016-06-24 2018-01-04 고성석 Biometric card for encrypting card information using biometric crptosystem and biometric data and user authentication method thereof
CN109272609A (en) * 2018-08-19 2019-01-25 天津新泰基业电子股份有限公司 A kind of CPU safety door inhibition control method and system
CN113436376A (en) * 2021-06-02 2021-09-24 杭州海康威视数字技术股份有限公司 Access control system, method and device and biological key card

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070168674A1 (en) * 2003-12-09 2007-07-19 Masao Nonaka Authentication system, authentication apparatus, and recording medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20180000849A (en) * 2016-06-24 2018-01-04 고성석 Biometric card for encrypting card information using biometric crptosystem and biometric data and user authentication method thereof
CN109272609A (en) * 2018-08-19 2019-01-25 天津新泰基业电子股份有限公司 A kind of CPU safety door inhibition control method and system
CN113436376A (en) * 2021-06-02 2021-09-24 杭州海康威视数字技术股份有限公司 Access control system, method and device and biological key card

Also Published As

Publication number Publication date
CN115758398A (en) 2023-03-07

Similar Documents

Publication Publication Date Title
CN115758398B (en) Access control data processing method and device, access control system and storage medium
EP3005202B1 (en) System and method for biometric authentication with device attestation
EP2624160B1 (en) Biometric authentication system, communication terminal device, biometric authentication device, and biometric authentication method
US20180082050A1 (en) Method and a system for secure login to a computer, computer network, and computer website using biometrics and a mobile computing wireless electronic communication device
US9384338B2 (en) Architectures for privacy protection of biometric templates
CN110149328B (en) Interface authentication method, device, equipment and computer readable storage medium
EP2037387A1 (en) Authentication server, client terminal for authentication, biometrics authentication system, biometrics authentication method, and program for biometrics authentication
US11496471B2 (en) Mobile enrollment using a known biometric
US11063936B2 (en) Encryption parameter selection
CN112559991A (en) System secure login method, device, equipment and storage medium
US9413533B1 (en) System and method for authorizing a new authenticator
EP3684004A1 (en) Offline interception-free interaction with a cryptocurrency network using a network-disabled device
Aramice et al. Secure Code Generation for Multi-Level Mutual Authentication
JP4134798B2 (en) Wireless communication system and program
Munir et al. Comparing user authentication techniques for fog computing
Chauhan et al. Survey Paper on a Novel Approach: Web Based Technique for Vote Casting
CN117320008B (en) 5G message tax system and processing method thereof
WO2022237550A1 (en) Access control authentication method, apparatus and system for preventing privacy leak
CN116052313B (en) Intelligent secret cabinet control method, device, equipment and storage medium
CN113554783B (en) Storage method and device of authentication data and computer readable storage medium
KR102161281B1 (en) Method for providing user device access control service using dual secure channel based pseudo-random number generator
KR20180060483A (en) Method and system for protecting personal information infingement using division of authentication process and biometrics authentication
Jaiswal et al. Biometric Authentication for the Cloud Computing
CN117792697A (en) Access authentication method and device
CN117119457A (en) Meta-space access method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant