CN116612572A - Building access control management system - Google Patents
Building access control management system Download PDFInfo
- Publication number
- CN116612572A CN116612572A CN202310703884.6A CN202310703884A CN116612572A CN 116612572 A CN116612572 A CN 116612572A CN 202310703884 A CN202310703884 A CN 202310703884A CN 116612572 A CN116612572 A CN 116612572A
- Authority
- CN
- China
- Prior art keywords
- access control
- encrypted data
- user terminal
- dynamic
- dimensional code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012795 verification Methods 0.000 claims abstract description 44
- 238000006243 chemical reaction Methods 0.000 claims description 5
- 238000004891 communication Methods 0.000 description 24
- 230000009467 reduction Effects 0.000 description 22
- 230000003044 adaptive effect Effects 0.000 description 18
- 238000000034 method Methods 0.000 description 14
- 238000012545 processing Methods 0.000 description 12
- 230000008569 process Effects 0.000 description 9
- 238000004364 calculation method Methods 0.000 description 6
- 238000009826 distribution Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 241000347389 Serranus cabrilla Species 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000004904 shortening Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/33—Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/21—Individual registration on entry or exit involving the use of a pass having a variable access code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
Abstract
The invention belongs to the field of access control and discloses a building access control system, which comprises a user terminal, a code scanning module, a verification server and a gate control device, wherein the user terminal is connected with the code scanning module; the user terminal is used for displaying the dynamic two-dimensional code generated according to the preset rule; the code scanning module is used for shooting a display interface of the user terminal, obtaining a scanning image containing the dynamic two-dimensional code, and sending the scanning image to the verification server; the verification server is used for judging whether the user has passing authority according to the scanned image, obtaining a first judgment result and sending the first judgment result to the gate control device; the gate control device is used for performing access control according to the first judgment result. The invention improves the convenience of access control when users enter and exit the building.
Description
Technical Field
The invention relates to the field of access control, in particular to a building access control system.
Background
The traditional building entrance guard management system adopts an entrance guard card to carry out entrance guard management, acquires character strings contained in the entrance guard card through a card reader, and then compares the acquired character strings with the pre-stored character strings with passing rights, thereby judging whether to open a gate. However, this approach makes it inconvenient for the user to carry the access card additionally.
Disclosure of Invention
The invention aims to disclose a building access control system for a building, which solves the problem of how to improve the convenience of access control when a user enters and exits the building.
In order to achieve the above purpose, the present invention provides the following technical solutions:
the invention provides a building access control system, which comprises a user terminal, a code scanning module, a verification server and a gate control device, wherein the user terminal is connected with the code scanning module;
the user terminal is used for displaying the dynamic two-dimensional code generated according to the preset rule;
the code scanning module is used for shooting a display interface of the user terminal, obtaining a scanning image containing the dynamic two-dimensional code, and sending the scanning image to the verification server;
the verification server is used for judging whether the user has passing authority according to the scanned image, obtaining a first judgment result and sending the first judgment result to the gate control device;
the gate control device is used for performing access control according to the first judgment result.
Preferably, the system further comprises a card reader, wherein the card reader is used for reading an access control card carried by a user, obtaining an access control card number and sending the access control card number to the verification server.
Preferably, the method for reading the access control card carried by the user to obtain the access control card number includes:
and obtaining the physical card number contained in the access card, and carrying out card number conversion on the physical card number according to a preset decoding rule to obtain the access card number.
Preferably, the verification server is further configured to determine whether the user has a passing authority according to the access card number, obtain a second determination result, and send the second determination result to the gate control device.
Preferably, the gate control device is further configured to perform gate control according to the second determination result.
Preferably, the dynamic two-dimensional code generated according to a preset rule includes:
s1, acquiring an update interval;
s2, counting down the update interval;
s3, judging whether the countdown of the update interval is finished, if so, entering S4;
s4, generating a dynamic two-dimensional code according to the physical information of the user terminal, and entering S1.
Preferably, generating the dynamic two-dimensional code according to a preset rule includes:
acquiring physical information of a user terminal;
encrypting the physical information to obtain first encrypted data;
acquiring encryption completion time of the first encrypted data;
encrypting the first encrypted data and the encryption completion time of the first encrypted data to obtain second encrypted data;
and generating a dynamic two-dimensional code according to the second encrypted data.
Preferably, the physical information of the user terminal includes any one of mac address, IMEI code, MEID code.
Preferably, the encrypting process is performed on the physical information to obtain first encrypted data, including:
and encrypting the physical information by using a preset symmetric encryption key to obtain first encrypted data.
Preferably, the encrypting process is performed on the first encrypted data and the encryption completion time of the first encrypted data to obtain second encrypted data, including:
and encrypting the first encrypted data and the encryption completion time of the first encrypted data by using the encryption public key sent by the verification server to obtain second encrypted data.
Compared with the prior art, the method and the system have the advantages that the dynamic two-dimensional code mode is adopted to carry out access control on the building, a user does not need to additionally carry an access card, only the dynamic two-dimensional code is generated on a user terminal such as a mobile phone, and access verification can be carried out by utilizing the dynamic two-dimensional code, so that convenience of access control is improved when the user enters and exits the building.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of a building access control system according to the present invention.
Fig. 2 is another schematic diagram of a building access control system according to the present invention.
Fig. 3 is a schematic diagram illustrating a process of generating a dynamic two-dimensional code according to a preset rule according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The invention provides a building access control system, as shown in an embodiment of fig. 1, which comprises a user terminal, a code scanning module, a verification server and a gate control device, wherein the user terminal is connected with the code scanning module;
the user terminal is used for displaying the dynamic two-dimensional code generated according to the preset rule;
the code scanning module is used for shooting a display interface of the user terminal, obtaining a scanning image containing the dynamic two-dimensional code, and sending the scanning image to the verification server;
the verification server is used for judging whether the user has passing authority according to the scanned image, obtaining a first judgment result and sending the first judgment result to the gate control device;
the gate control device is used for performing access control according to the first judgment result.
Compared with the prior art, the method and the system have the advantages that the dynamic two-dimensional code mode is adopted to carry out access control on the building, a user does not need to additionally carry an access card, only the dynamic two-dimensional code is generated on a user terminal such as a mobile phone, and access verification can be carried out by utilizing the dynamic two-dimensional code, so that convenience of access control is improved when the user enters and exits the building.
Specifically, the user terminal may be a device that is carried about by a user such as a smart phone, or may be a smart watch, a smart bracelet, or the like.
After the user installs the corresponding software in the user terminal, the installed software can generate the dynamic two-dimensional code according to the preset rule.
Preferably, as shown in fig. 2, the system further comprises a card reader, wherein the card reader is used for reading an access card carried by a user, obtaining an access card number and sending the access card number to the verification server.
Specifically, for some users without user terminals, the invention still provides the option of using the access card to perform access verification, so that the user can select a corresponding access verification mode according to the actual situation of the user.
Preferably, the method for reading the access control card carried by the user to obtain the access control card number includes:
and obtaining the physical card number contained in the access card, and carrying out card number conversion on the physical card number according to a preset decoding rule to obtain the access card number.
Specifically, the decoding rules of different card readers may be different, so after the physical card number is obtained, the card number conversion process needs to be performed according to the decoding rules, and the access control card number adapted to the decoding rules of the card readers is obtained. That is, for the access card with the same physical card number, when the access card is read by using the card readers with different decoding rules, the output access card numbers are not the same. And the access control card number stored in the verification server for judging the passing authority is also an access control card number adapted to the decoding rule of the card reader.
Specifically, the physical card number is the card number written into the memory chip of the access card.
Illustrating: for hexadecimal physical card number 01026f 6c 3a, if the decoding rule is: the last 8 bits are converted into 10-bit decimal card number, and then the obtained access card number is 010040856634.
Preferably, the verification server is further configured to determine whether the user has a passing authority according to the access card number, obtain a second determination result, and send the second determination result to the gate control device.
Specifically, before the access card is issued to a user, the physical card number in the access card needs to be subjected to card number conversion according to the decoding rule of the card reader, the access card number is obtained, and then the access card number is stored in the verification server.
After receiving the access control card number sent by the card reader, the verification server judges whether the access control card number which is stored by the verification server is the same as the access control card number sent by the card reader, if so, the judgment result is that the access control card number has the passing authority, and if not, the judgment result is that the access control card number does not have the passing authority.
Preferably, the gate control device is further configured to perform gate control according to the second determination result.
Specifically, when the second judgment result is that the pass right exists, the gate control device controls the gate to be opened.
Preferably, the user terminal is further configured to perform encrypted communication with the authentication server using an adaptive communication interval, and send an algorithm update request to the authentication server;
the verification server is further used for sending an encryption public key for asymmetric encryption and a symmetric encryption key generated in real time to the user terminal after receiving the algorithm updating request.
Preferably, the adaptive communication interval is calculated as:
comitr s+1 representing the s+1st adaptive communication interval wgt 1 、wgt 2 、wgt 3 Respectively representing the set first weight, second weight and third weight; the sum between the three weights is 1, numshw s Indicating that the user terminal scans codes in the s-th adaptive communication intervalShowing the number of dynamic two-dimensional codes, wherein stafreq represents preset standard number of times, comitr s Represents the s-th adaptive communication interval, stadura represents the preset standard communication interval, H (combtim) s+1 ) Time comptim indicating the start of calculation of the (s+1) -th adaptive communication interval s+1 The minimum value of the second difference from the elements in the set of verification peak times tptimset,comptim s+1 the value of (2) is in the range of 0.0 minutes 0 seconds to 23.59 minutes 59 seconds, tim= { 8.0 minutes 0 seconds, 8.30 minutes 0 seconds, 9.0 minutes 0 seconds, 17.0 minutes 0 seconds, 18.0 minutes 0 seconds }, statim represents a preset seconds difference, and min represents a minimum function.
In the invention, when the user terminal sends an algorithm updating request to the verification server, the same communication interval is adopted, but the communication interval is adaptive. Compared with the same communication interval, the invention can effectively reduce the number of algorithm update requests sent by the user terminals received by the verification server at the same moment, thereby effectively reducing the calculation pressure of the verification server, because the verification server needs to generate different symmetrical encryption keys for each user terminal respectively.
Self-adaptive number of times numshw for displaying dynamic two-dimensional code from user terminal to code scanning module at intervals s The s-th adaptive communication interval comitr s The minimum value H (compim) of the second difference between the time of calculating the (s+1) th adaptive communication interval and the element in the peak time set tptimset is calculated s+1 ) The three angles are obtained by comprehensive calculation, and the numshw is calculated s The greater the number of comber s The larger the value of H (comptim) s+1 ) The larger the value of s+1st adaptive communication interval is, the smaller the value of s+1st adaptive communication interval is. Therefore, when the dynamic two-dimension code is displayed more frequently, the numerical value of the previous self-adaptive communication interval is larger, and the time interval from the peak time is larger, the numerical value of the next self-adaptive communication interval is smaller, and therefore the safety of verification by using the dynamic two-dimension code is effectively improved.
The more frequently the dynamic two-dimensional code is used, the higher the probability of being illegally shot and acquired by other people is, at the moment, the invention improves the change probability of the dynamic two-dimensional code by shortening the next self-adaptive communication interval, thereby improving the safety of the invention. In addition, when the previous adaptive communication interval is larger, the next adaptive communication interval is smaller, and the second difference from the verification peak time is smaller, the next adaptive communication interval is larger, so that the calculation pressure of the verification server at the same time can be effectively reduced.
Specifically, the verification peak time is a rush hour and a rush hour, and at the verification peak time, the verification server processes the public key to be generated into symmetric encryption and also performs a large number of judgment of pass authority. Therefore, with the communication interval of the present invention, the number of public keys to be generated with symmetric encryption can be reduced during peak hours, thereby reducing the calculation pressure of the authentication server.
Preferably, as shown in fig. 3, the dynamic two-dimensional code generated according to a preset rule includes:
s1, acquiring an update interval;
s2, counting down the update interval;
s3, judging whether the countdown of the update interval is finished, if so, entering S4;
s4, generating a dynamic two-dimensional code according to the physical information of the user terminal, and entering S1.
The dynamic two-dimensional code is updated by adopting the updating interval, so that the safety of the invention can be improved. Because the static two-dimensional code is easy to be illegally acquired by other people, the entrance guard safety of the building is affected.
Specifically, after each adaptive communication interval is completed, the symmetric encryption key is changed.
Specifically, the update interval is stored in the user terminal in advance.
Preferably, generating the dynamic two-dimensional code according to a preset rule includes:
acquiring physical information of a user terminal;
encrypting the physical information to obtain first encrypted data;
acquiring encryption completion time of the first encrypted data;
encrypting the first encrypted data and the encryption completion time of the first encrypted data to obtain second encrypted data;
and generating a dynamic two-dimensional code according to the second encrypted data.
In the process of generating the dynamic two-dimensional code, the invention not only considers the physical information of the user terminal, but also adds the finishing moment of dynamic change, and the symmetric key updated irregularly, so that the dynamic two-dimensional code of the invention has more variation possibility, thereby improving the safety of the invention.
Preferably, the physical information of the user terminal includes any one of mac address, IMEI code, MEID code.
Specifically, when the user terminal obtains the passing right, the physical information of the user terminal can be sent to the verification server for storage in an encrypted communication mode, or can be directly added into the verification server by a person with the management right.
Preferably, the encrypting process is performed on the physical information to obtain first encrypted data, including:
and encrypting the physical information by using a preset symmetric encryption key to obtain first encrypted data.
Specifically, because the symmetric encryption key is changed irregularly, the obtained first encrypted data can be changed dynamically, and the security of the invention is improved.
Preferably, the encrypting process is performed on the first encrypted data and the encryption completion time of the first encrypted data to obtain second encrypted data, including:
and encrypting the first encrypted data and the encryption completion time of the first encrypted data by using the encryption public key sent by the verification server to obtain second encrypted data.
Specifically, because the first encrypted data can be dynamically changed, the dynamic two-dimensional code of the invention has more possibility of change by adding the dynamically changed encryption completion time.
Preferably, determining whether the user has a pass right according to the scanned image, to obtain a first determination result includes:
s10, performing image recognition on the scanned image to acquire second encrypted data contained in the scanned image;
s20, decrypting the second encrypted data by using an encryption private key for asymmetric encryption to obtain the first encrypted data and the encryption completion time of the first encrypted data;
s30, calculating the absolute value of the difference value between the encryption completion time of the first encrypted data and the current time of the verification server, if the absolute value of the difference value is smaller than or equal to a set absolute value threshold, entering S40, and if the absolute value of the difference value is larger than the set absolute value threshold, determining that the first judgment result is that the first judgment result does not have passing permission;
s40, decrypting the first encrypted data by using a symmetric encryption key corresponding to the user terminal to obtain physical information of the user terminal;
s50, judging whether the physical information obtained in S40 is contained in the self-stored physical information, if so, determining that the first judgment result is that the physical information has passing authority, and if not, determining that the first judgment result is that the physical information does not have passing authority.
Preferably, image recognition is performed on the scanned image to obtain second encrypted data contained in the scanned image, including:
s101, carrying out graying treatment on a scanned image to obtain a gray image;
s102, carrying out noise reduction processing on a gray image to obtain a noise reduction image;
s103, recognizing the noise reduction image to obtain a two-dimensional code area in the noise reduction image;
and S104, identifying the two-dimensional code area to obtain second encrypted data contained in the two-dimensional code area.
Specifically, the noise reduction treatment can improve the image quality, and is beneficial to obtaining a more accurate two-dimensional code recognition result.
Preferably, the noise reduction processing is performed on the gray image, and the obtained noise reduction image includes:
acquiring a connected domain formed by pixel points with the same gray value in a gray image;
storing the pixel points which do not belong to a connected domain formed by the pixel points with the same gray value in the gray image into a set Q;
and adopting a noise reduction algorithm to carry out noise reduction treatment on the pixel points in the set Q, and obtaining a noise reduction image.
The existing noise reduction processing algorithm generally directly carries out noise reduction processing on all pixel points, and obviously, a plurality of pixel points which do not need to carry out noise reduction processing are also subjected to noise reduction processing, so that the number of the pixel points subjected to noise reduction processing is excessive, the speed of verifying whether a user has passing permission is reduced, and the user experience is influenced.
Therefore, the invention can greatly reduce the number of pixels participating in the noise reduction processing and effectively improve the noise reduction processing efficiency by firstly acquiring the connected domains formed by the pixels with the same gray value and then carrying out the noise reduction processing on the pixels belonging to the connected domains in the subsequent noise reduction processing process.
Preferably, acquiring a connected domain composed of pixels with the same gray value in a gray image includes:
respectively obtaining the number of pixel points of each gray value in the gray image;
storing the pixel points corresponding to the gray values with the number of the pixel points being greater than or equal to the self-adaptive number threshold value into a set S;
for the pixel points pixk in the set S, a connected domain formed by the pixel points with the same gray value as the pixel points pixk is obtained by adopting the following method:
the first step, pixk is used as a calculation pixel point;
secondly, respectively storing the pixel points which belong to the set S and are adjacent to the calculated pixel points and have the same gray value as the calculated pixel points into an intermediate set and a connected domain set;
thirdly, if the number of elements in the intermediate set is 0, entering a fourth step, and if the number of elements in the intermediate set is not 0, entering a fifth step;
fourth, outputting a connected domain set;
fifthly, storing the calculated pixel points into a connected domain set, and deleting the calculated pixel points and the pixel points in the middle set from the set S;
and sixthly, if the number of the elements in the set S is not 0, randomly selecting a pixel point from the intermediate set as a new calculated pixel point, emptying the intermediate set, and entering the second step.
Specifically, for the gray value of only a small number of pixels, it is obvious that the probability that such pixels belong to noise pixels in the gray image is relatively large, so that the number of pixels participating in noise reduction processing is reduced by the self-adaptive number threshold value so that the pixels cannot form a connected domain. For the same gray value, there may be a plurality of corresponding connected domains due to different distribution positions of the pixels. And forming the connected domain by the pixel points in the connected domain set.
Preferably, the adaptive quantity threshold is obtained by:
acquiring the number numole of gray values with the number of pixel points of 1 in the gray image;
the adaptive quantity threshold is calculated using the following function:
wherein, amathre represents an adaptive quantity threshold, numtol represents the total number of pixel points in the gray image, eta represents a preset proportional parameter, eta epsilon (0, 1), and granlet represents a set of pixel points in the gray image j Representing the gradient value of pixel j, vrfgrad representing the preset gradient value variance, basthre representing the preset threshold reference value.
In the present invention, the number threshold is not a preset value because such a value cannot be adapted to gray-scale images at different noise distributions. The self-adaptive quantity threshold is adopted, and can be calculated according to the distribution of the gray values and the distribution of the gradient values in the gray images, so that the application range of the noise reduction mode is wider. The self-adaptive quantity threshold value is comprehensively calculated from the quantity of gray values with the quantity of 1 and the gradient value variance of the pixel points, and the larger the value of numone is, the larger the gradient value variance of the pixel points is, the larger the probability of the connected domain with the too small area is indicated, and the larger the value of the self-adaptive quantity threshold value is at the moment, so that the pixel points in the connected domain with the too small area are divided into a set Q for noise reduction treatment.
Preferably, the access control according to the first judgment result includes:
when the first judgment result is that the pass right exists, the gate control device controls the gate to be opened.
The preferred embodiments of the invention disclosed above are intended only to assist in the explanation of the invention. The preferred embodiments are not exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. The invention is limited only by the claims and the full scope and equivalents thereof.
Claims (10)
1. The building access control system is characterized by comprising a user terminal, a code scanning module, a verification server and a gate control device;
the user terminal is used for displaying the dynamic two-dimensional code generated according to the preset rule;
the code scanning module is used for shooting a display interface of the user terminal, obtaining a scanning image containing the dynamic two-dimensional code, and sending the scanning image to the verification server;
the verification server is used for judging whether the user has passing authority according to the scanned image, obtaining a first judgment result and sending the first judgment result to the gate control device;
the gate control device is used for performing access control according to the first judgment result.
2. The building access control system of claim 1, further comprising a card reader for reading an access control card carried by a user, obtaining an access control card number, and transmitting the access control card number to the verification server.
3. A building access control system according to claim 2, wherein reading access cards carried by users to obtain access card numbers comprises:
and obtaining the physical card number contained in the access card, and carrying out card number conversion on the physical card number according to a preset decoding rule to obtain the access card number.
4. The building access control system according to claim 2, wherein the verification server is further configured to determine whether the user has a pass right according to the access card number, obtain a second determination result, and send the second determination result to the gate control device.
5. The building access control system of claim 4, wherein the gate control device is further configured to perform access control according to the second determination result.
6. The building access control system according to claim 1, wherein the dynamic two-dimensional code generated according to a preset rule comprises:
s1, acquiring an update interval;
s2, counting down the update interval;
s3, judging whether the countdown of the update interval is finished, if so, entering S4;
s4, generating a dynamic two-dimensional code according to the physical information of the user terminal, and entering S1.
7. The building access control system of claim 6, wherein generating the dynamic two-dimensional code based on physical information of the user terminal comprises:
acquiring physical information of a user terminal;
encrypting the physical information to obtain first encrypted data;
acquiring encryption completion time of the first encrypted data;
encrypting the first encrypted data and the encryption completion time of the first encrypted data to obtain second encrypted data;
and generating a dynamic two-dimensional code according to the second encrypted data.
8. The building access control system of claim 7, wherein the physical information of the user terminal includes any one of mac address, IMEI code, MEID code.
9. The building access control system of claim 7, wherein the encrypting the physical information to obtain the first encrypted data comprises:
and encrypting the physical information by using a preset symmetric encryption key to obtain first encrypted data.
10. The building access control system according to claim 7, wherein the encrypting the first encrypted data and the encryption completion time of the first encrypted data to obtain the second encrypted data comprises:
and encrypting the first encrypted data and the encryption completion time of the first encrypted data by using the encryption public key sent by the verification server to obtain second encrypted data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310703884.6A CN116612572B (en) | 2023-06-14 | 2023-06-14 | Building access control management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310703884.6A CN116612572B (en) | 2023-06-14 | 2023-06-14 | Building access control management system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116612572A true CN116612572A (en) | 2023-08-18 |
CN116612572B CN116612572B (en) | 2024-03-19 |
Family
ID=87676510
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310703884.6A Active CN116612572B (en) | 2023-06-14 | 2023-06-14 | Building access control management system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116612572B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117495292A (en) * | 2023-11-10 | 2024-02-02 | 海南华筑国际工程设计咨询管理有限公司 | Building design progress supervisory systems based on big data calculation |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090010565A1 (en) * | 2007-07-06 | 2009-01-08 | Quanta Computer Inc. | Noise reduction device and method |
CN104881698A (en) * | 2015-05-28 | 2015-09-02 | 程序 | Two dimensional code generation and verification method |
CN105225314A (en) * | 2015-09-18 | 2016-01-06 | 张福伟 | A kind of dynamic two-dimension code door control system based on pseudo-random sequence |
CN105653911A (en) * | 2016-01-06 | 2016-06-08 | 上海斐讯数据通信技术有限公司 | Unlocking method and system based on two-dimension code |
CN106570984A (en) * | 2016-10-19 | 2017-04-19 | 厦门中控生物识别信息技术有限公司 | Card number verification method, device and system capable of supporting various wiegand formats |
US20170164420A1 (en) * | 2015-12-04 | 2017-06-08 | Xiaomi Inc. | Method, apparatus and computer-readable medium for updating connection parameter of low-power bluetooth device |
CN206975709U (en) * | 2017-06-14 | 2018-02-06 | 广州市奥康信息科技有限公司 | The system swiped the card is realized by barcode scanning |
CN111540093A (en) * | 2020-04-29 | 2020-08-14 | 三仟(杭州)数字科技有限公司 | Access control system and control method thereof |
CN111835511A (en) * | 2020-06-30 | 2020-10-27 | 平安国际智慧城市科技股份有限公司 | Data security transmission method and device, computer equipment and storage medium |
CN112188403A (en) * | 2020-09-24 | 2021-01-05 | 江苏恒宝智能系统技术有限公司 | Environment self-adaptive communication method and system |
CN112561003A (en) * | 2019-09-26 | 2021-03-26 | 上海际链网络科技有限公司 | Method and device for managing leaving of vehicle from park, storage medium and terminal |
CN114615048A (en) * | 2022-03-09 | 2022-06-10 | 中国农业银行股份有限公司 | Method and device for processing submission data |
CN115102768A (en) * | 2022-06-24 | 2022-09-23 | 平安银行股份有限公司 | Data processing method and device and computer equipment |
CN115307666A (en) * | 2022-08-09 | 2022-11-08 | 广西交通设计集团有限公司 | Variable frequency acquisition system and method of vibrating wire sensor |
-
2023
- 2023-06-14 CN CN202310703884.6A patent/CN116612572B/en active Active
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090010565A1 (en) * | 2007-07-06 | 2009-01-08 | Quanta Computer Inc. | Noise reduction device and method |
CN104881698A (en) * | 2015-05-28 | 2015-09-02 | 程序 | Two dimensional code generation and verification method |
CN105225314A (en) * | 2015-09-18 | 2016-01-06 | 张福伟 | A kind of dynamic two-dimension code door control system based on pseudo-random sequence |
US20170164420A1 (en) * | 2015-12-04 | 2017-06-08 | Xiaomi Inc. | Method, apparatus and computer-readable medium for updating connection parameter of low-power bluetooth device |
CN105653911A (en) * | 2016-01-06 | 2016-06-08 | 上海斐讯数据通信技术有限公司 | Unlocking method and system based on two-dimension code |
CN106570984A (en) * | 2016-10-19 | 2017-04-19 | 厦门中控生物识别信息技术有限公司 | Card number verification method, device and system capable of supporting various wiegand formats |
CN206975709U (en) * | 2017-06-14 | 2018-02-06 | 广州市奥康信息科技有限公司 | The system swiped the card is realized by barcode scanning |
CN112561003A (en) * | 2019-09-26 | 2021-03-26 | 上海际链网络科技有限公司 | Method and device for managing leaving of vehicle from park, storage medium and terminal |
CN111540093A (en) * | 2020-04-29 | 2020-08-14 | 三仟(杭州)数字科技有限公司 | Access control system and control method thereof |
CN111835511A (en) * | 2020-06-30 | 2020-10-27 | 平安国际智慧城市科技股份有限公司 | Data security transmission method and device, computer equipment and storage medium |
CN112188403A (en) * | 2020-09-24 | 2021-01-05 | 江苏恒宝智能系统技术有限公司 | Environment self-adaptive communication method and system |
CN114615048A (en) * | 2022-03-09 | 2022-06-10 | 中国农业银行股份有限公司 | Method and device for processing submission data |
CN115102768A (en) * | 2022-06-24 | 2022-09-23 | 平安银行股份有限公司 | Data processing method and device and computer equipment |
CN115307666A (en) * | 2022-08-09 | 2022-11-08 | 广西交通设计集团有限公司 | Variable frequency acquisition system and method of vibrating wire sensor |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117495292A (en) * | 2023-11-10 | 2024-02-02 | 海南华筑国际工程设计咨询管理有限公司 | Building design progress supervisory systems based on big data calculation |
CN117495292B (en) * | 2023-11-10 | 2024-05-28 | 海南华筑国际工程设计咨询管理有限公司 | Building design progress supervisory systems based on big data calculation |
Also Published As
Publication number | Publication date |
---|---|
CN116612572B (en) | 2024-03-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3905081A1 (en) | Method and device for authenticating identity information, and server | |
US8813248B2 (en) | System and method for authenticating a user | |
CN102638447B (en) | Method and device for system login based on autonomously generated password of user | |
EP2065798A1 (en) | Method for performing secure online transactions with a mobile station and a mobile station | |
EP1443382A2 (en) | User authentication method and apparatus | |
CN116612572B (en) | Building access control management system | |
US9213811B2 (en) | Methods and systems for improving the security of secret authentication data during authentication transactions | |
EP0864996A2 (en) | Portable electronic device and method for personal identification | |
US8959359B2 (en) | Methods and systems for improving the security of secret authentication data during authentication transactions | |
JPH0737098A (en) | Method and system for confirming identity of individual | |
JP2009543176A (en) | Traceless biometric identification system and method | |
AU2021351519A1 (en) | Biometric-based identity authentication | |
JP4299894B2 (en) | Portable electronic device and personal authentication method using biometric information | |
CN101807318B (en) | Mobile communication terminal, automatic transaction device, automatic transaction system and automatic transaction method | |
CN111079573A (en) | Anti-counterfeiting encryption method based on image random scrambling technology | |
US20220156873A1 (en) | Image synthesis device and method for embedding watermark | |
AU2023201979B2 (en) | Systems and methods for providing temporary access credentials to access physical locations | |
US20220284448A1 (en) | Anti-counterfeiting and encryption method based on local random image transformation technique | |
US20190362345A1 (en) | Transaction Processing Method and Apparatus | |
CN116055129B (en) | Internet of things equipment identity authentication method and system based on dynamic graphic password picture | |
KR20010098561A (en) | Credit card settlement system and method for use report human being | |
EP1116176B1 (en) | Information card | |
JP4623053B2 (en) | Portable electronic device and personal authentication method using biometric information | |
KR101906141B1 (en) | Apparatus and Method for Multi-level Iris Scan in Mobile Communication Terminal | |
CN114494474B (en) | Generation method, verification method and device of universal verification code of human and legal equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: A building access control management system for a building Granted publication date: 20240319 Pledgee: Bank of China Limited Xiamen hi tech Park sub branch Pledgor: Xiamen Wan an intelligent Co.,Ltd. Registration number: Y2024980034976 |