CN117496622A - Entrance guard two-dimension code generation method and device, electronic equipment and storage medium - Google Patents

Entrance guard two-dimension code generation method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN117496622A
CN117496622A CN202311440086.5A CN202311440086A CN117496622A CN 117496622 A CN117496622 A CN 117496622A CN 202311440086 A CN202311440086 A CN 202311440086A CN 117496622 A CN117496622 A CN 117496622A
Authority
CN
China
Prior art keywords
door opening
target
dimensional code
certificate
drawing time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311440086.5A
Other languages
Chinese (zh)
Inventor
谭潇阳
许小阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Lingdong Shuzhi Technology Co ltd
Original Assignee
Nanjing Lingdong Shuzhi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Lingdong Shuzhi Technology Co ltd filed Critical Nanjing Lingdong Shuzhi Technology Co ltd
Priority to CN202311440086.5A priority Critical patent/CN117496622A/en
Publication of CN117496622A publication Critical patent/CN117496622A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/21Individual registration on entry or exit involving the use of a pass having a variable access code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/215Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a method, a device, electronic equipment and a storage medium for generating an access control two-dimensional code, which are used for solving the technical problem that the existing access control two-dimensional code is easy to crack by technology. The invention comprises the following steps: the method comprises the steps that a main control component receives a random graph drawn on a touch component by a user; extracting target coordinate points in the random graph and target drawing time points of the target coordinate points; generating a door opening certificate by adopting a target coordinate point and a target drawing time point; and generating an entrance guard two-dimensional code by adopting a door opening certificate. The repeatability of the door opening certificate is reduced through the random graph coordinates; then, the door opening certificate is generated by algorithm encryption by combining unique factors such as time, equipment ID and the like, so that the uniqueness of the door opening certificate is enhanced, and the safety of the door opening certificate is improved; even the same graph can be distinguished by different factors such as starting point coordinates, drawing sequences, coordinate deviations, time and the like, so that the generated door opening certificate is difficult to crack in terms of the generation mode.

Description

Entrance guard two-dimension code generation method and device, electronic equipment and storage medium
Technical Field
The invention relates to the technical field of access control, in particular to an access two-dimensional code generation method, an access two-dimensional code generation device, electronic equipment and a storage medium.
Background
At present, the identity recognition modes of the access control system mainly comprise passwords, IC cards, biological characteristic recognition and the like. Common to these identification technologies is that the identity credentials (such as static passwords, IC cards, fingerprints or faces) are fixed, so that there is a varying degree of risk of theft of these identity credentials.
With the rapid development of mobile payment in China, the use of two-dimensional codes is popularized; the two-dimensional code is a graph which is distributed on a plane (in a two-dimensional direction) according to a certain rule by using a specific geometric figure, is alternately black and white, and records data symbol information; the concept of 0 and 1 which form the logic foundation in the computer is skillfully utilized in code programming, a plurality of geometric shapes corresponding to binary are used for representing literal numerical information, and the literal numerical information is automatically read through an image input device or a photoelectric scanning device so as to realize automatic information processing; it has some commonalities in bar code technology, each code having its specific character set; each character occupies a certain width; has a certain checking function and the like. Meanwhile, the system also has the function of automatically identifying information of different rows and the function of processing the rotation change points of the graphics.
The two-dimensional code is used, so that the life of people is greatly facilitated. Besides participating in mobile payment, the two-dimensional code can also be used as an access certificate, is applied to intelligent equipment such as intelligent locks, intelligent doors and gate computers, supplements a door opening recognition mode, and improves safety and convenience.
At present, the two-dimensional code is generated mainly by algorithm encryption or is converted according to other keys, and the risk of cracking the password caused by key leakage exists.
Disclosure of Invention
The invention provides a method, a device, electronic equipment and a storage medium for generating an access two-dimensional code, which are used for solving the technical problem that the existing access two-dimensional code is easy to crack by technology.
The invention provides a method for generating an access control two-dimensional code, which is applied to an access control system, wherein the access control system comprises a main control component and a touch control component; the method comprises the following steps:
the main control component receives a random graph drawn on the touch control component by a user;
extracting target coordinate points in the random graph and target drawing time points of the target coordinate points;
generating a door opening certificate by adopting the target coordinate point and the target drawing time point;
and generating an entrance guard two-dimensional code by adopting the door opening certificate.
Optionally, the access control system further comprises an image acquisition component and a lock control component; the method further comprises the steps of:
when the two-dimensional code of the door access to be identified is acquired through the image acquisition component, the two-dimensional code of the door access to be identified is analyzed, and a certificate to be verified is obtained;
matching the credential to be verified with the door opening credential stored in the main control component;
when the matching is successful, judging that the two-dimensional code is effective, and sending an unlocking instruction to the lock control assembly; the unlocking instruction is used for triggering the unlocking operation of the lock control assembly.
Optionally, the step of extracting the target coordinate points in the random graph and the target drawing time points of each target coordinate point includes:
acquiring the total drawing time length of the random graph and drawing time points of all coordinate points in the random graph;
calculating an acquisition interval according to the total drawing duration and the preset acquisition quantity;
and determining a target coordinate point in the coordinate points according to the drawing time points of all the coordinate points in the random graph and the acquisition interval, and determining the target drawing time point of the target coordinate point.
Optionally, the step of generating the door opening credential by using the target coordinate point and the target drawing time point includes:
and combining the target coordinate point and the target drawing time point to generate a door opening certificate.
Optionally, the step of generating the two-dimension code of the entrance guard by adopting the door opening certificate includes:
acquiring the equipment ID of the main control component;
encrypting the door opening certificate by adopting the equipment ID as a security key to obtain encrypted data;
and converting the encrypted data into an access control two-dimensional code.
The invention also provides a device for generating the two-dimension code of the door control, which is applied to a door control system, wherein the door control system comprises a main control component and a touch control component; the device comprises:
the random pattern receiving module is used for receiving a random pattern drawn on the touch control assembly by a user through the main control assembly;
the coordinate and time extraction module is used for extracting target coordinate points in the random graph and target drawing time points of the target coordinate points;
the door opening credential generation module is used for generating a door opening credential by adopting the target coordinate point and the target drawing time point;
and the entrance guard two-dimension code generation module is used for generating an entrance guard two-dimension code by adopting the door opening certificate.
Optionally, the access control system further comprises an image acquisition component and a lock control component; the apparatus further comprises:
the to-be-verified certificate analyzing module is used for analyzing the to-be-identified entrance guard two-dimensional code to obtain a to-be-verified certificate when the to-be-identified entrance guard two-dimensional code is acquired through the image acquisition component;
the matching module is used for matching the to-be-verified certificate with the door opening certificate stored in the main control assembly;
the unlocking module is used for judging that the two-dimensional code is valid when the matching is successful and sending an unlocking instruction to the lock control assembly; the unlocking instruction is used for triggering the unlocking operation of the lock control assembly.
Optionally, the coordinate and time extraction module includes:
the drawing total duration and drawing time point obtaining sub-module is used for obtaining the drawing total duration of the random graph and the drawing time points of all coordinate points in the random graph;
the acquisition interval calculation sub-module is used for calculating an acquisition interval according to the total drawing time length and the preset acquisition quantity;
and the coordinate and time extraction sub-module is used for determining a target coordinate point in the coordinate points according to the drawing time points of all the coordinate points in the random graph and the acquisition interval, and determining the target drawing time point of the target coordinate point.
The invention also provides an electronic device comprising a processor and a memory:
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is used for executing the entrance guard two-dimensional code generation method according to any one of the instructions in the program codes.
The invention also provides a computer readable storage medium for storing program code for executing the entrance guard two-dimensional code generation method according to any one of the above.
From the above technical scheme, the invention has the following advantages: the invention discloses a method for generating an access control two-dimensional code, which comprises the following steps: the method comprises the steps that a main control component receives a random graph drawn on a touch component by a user; extracting target coordinate points in the random graph and target drawing time points of the target coordinate points; generating a door opening certificate by adopting a target coordinate point and a target drawing time point; and generating an entrance guard two-dimensional code by adopting a door opening certificate. According to the method and the system for generating the door opening certificate, the user draws the generated graph randomly, and selects a plurality of target coordinate points and drawing time points thereof from the graph which is generated randomly to generate the door opening certificate, so that the door opening certificate is generated more randomly, a server is not needed to participate, and the security of the door opening two-dimensional code generated based on the door opening certificate is improved.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the description below are only some embodiments of the invention, and that other drawings can be obtained from these drawings without inventive faculty for a person skilled in the art.
Fig. 1 is a step flowchart of an access control two-dimensional code generating method provided by an embodiment of the invention;
fig. 2 is a flowchart of steps of a method for generating an access control two-dimensional code according to another embodiment of the present invention;
FIG. 3 is a pictorial representation of a drawn reference provided by an embodiment of the present invention;
fig. 4 is a block diagram of a two-dimensional code generating device for entrance guard according to an embodiment of the present invention.
Detailed Description
The embodiment of the invention provides a method, a device, electronic equipment and a storage medium for generating an access two-dimensional code, which are used for solving the technical problem that the existing access two-dimensional code is easy to crack by technology.
In order to make the objects, features and advantages of the present invention more comprehensible, the technical solutions in the embodiments of the present invention are described in detail below with reference to the accompanying drawings, and it is apparent that the embodiments described below are only some embodiments of the present invention, but not all embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, fig. 1 is a flowchart illustrating steps of a method for generating an access control two-dimensional code according to an embodiment of the present invention.
The invention provides a method for generating an access control two-dimensional code, which is applied to an access control system, wherein the access control system comprises a main control component and a touch control component; the main control component can be central control equipment and is used for processing and forwarding received data; the touch control component can be a touch control screen and is used for receiving instructions input by a user and collecting drawing actions of the user.
The method specifically comprises the following steps:
step 101, a main control component receives a random graph drawn on a touch control component by a user;
in the embodiment of the invention, the touch control component can be arranged on or beside the door, connection (wired connection or wireless connection) is established with the main control component, when a user needs to generate an access control two-dimensional code belonging to the user, the user can randomly draw a graph on the touch control component, further, the touch control component can provide a drawing reference graph for the user, and the user can draw the random graph according to the reference graph.
In one example, the random pattern may not be limited to be composed of a curve or a straight line, and may not be limited to be drawn by several strokes, and may be drawn by one stroke or may be drawn by a plurality of strokes. When the random pattern is drawn by a plurality of strokes, a drawing time point threshold value can be preset, and the patterns drawn in a certain time length interval are combined into the random pattern for generating the door opening certificate.
102, extracting target coordinate points in a random graph and target drawing time points of the target coordinate points;
in the embodiment of the invention, after the main control component obtains the random graph drawn by the user, the coordinates of each point on the random graph can be determined according to the drawing trend of the random graph, then a plurality of coordinates are selected from the coordinates of the random graph as target coordinate points, and the target drawing time points of each target coordinate point are determined.
Step 103, generating a door opening certificate by adopting a target coordinate point and a target drawing time point;
after determining the target coordinate point in the random graph, the door opening credential may be generated using the target coordinate point and the target drawing time point.
In one example, the door opening certificate may be a character string formed by arranging each target coordinate point and corresponding target drawing time point according to a certain sequence.
And 104, generating an entrance guard two-dimensional code by adopting a door opening certificate.
After the door opening certificate is generated by adopting the target coordinate point and the corresponding target drawing time point, the door opening certificate can be converted into an entrance guard two-dimensional code.
In a specific implementation, any method known in the prior art can be used for generating the entrance guard two-dimensional code, for example, a Base64 encoding method is used for converting the door opening certificate into a character String X-String, and then an open source tool is used for converting the X-String into an entrance guard two-dimensional code X-qr code. The embodiment of the present invention is not particularly limited thereto.
According to the method and the system for generating the door opening certificate, the generated graph is randomly drawn by the user, a plurality of target coordinate points and drawing time points thereof are selected from the randomly generated graph to generate the door opening certificate, so that the door opening certificate is more random to generate, a server is not needed to participate, and the security of the door opening two-dimensional code generated based on the door opening certificate is improved.
Referring to fig. 2, fig. 2 is a flowchart illustrating steps of a method for generating an access control two-dimension code according to another embodiment of the present invention. The method specifically comprises the following steps:
step 201, a main control component receives a random graph drawn by a user on a touch control component;
in the embodiment of the invention, the touch control component can be arranged on or beside the door, and is connected with the main control component (can be in wired connection or wireless connection), when a user needs to generate the two-dimension code of the access control belonging to the user, the touch control component can provide a drawing reference diagram for the user, and the user can draw a random diagram according to the reference diagram.
In one example, the drawing reference diagram may be as shown in fig. 3. And are not limited to the use of pentagram, circle, and other complex patterns.
Step 202, extracting target coordinate points in a random graph and target drawing time points of the target coordinate points;
in the embodiment of the invention, after the main control component obtains the random graph drawn by the user, the coordinates of each point on the random graph can be determined according to the drawing trend of the random graph, then a plurality of coordinates are selected from the coordinates of the random graph as target coordinate points, and the target drawing time points of each target coordinate point are determined.
In one example, the step of extracting the target coordinate points in the random graph and the target drawing time points of each target coordinate point may specifically include the following sub-steps:
s21, acquiring the total drawing time length of the random graph and drawing time points of all coordinate points in the random graph;
s22, calculating an acquisition interval according to the total drawing duration and the preset acquisition quantity;
s23, determining a target coordinate point in the coordinate points according to the drawing time points and the acquisition intervals of all the coordinate points in the random graph, and determining the drawing time points of the target coordinate points.
In a specific implementation, the main control component may record first a start coordinate and an end coordinate of a drawing graph of a user, obtain a total drawing duration between the start coordinate and the end coordinate, and calculate an acquisition interval according to the total drawing duration and a preset acquisition number, so as to select a plurality of intermediate coordinates in the random graph.
Recording the starting time of drawing a random graph by a user as T0, the ending time as T1, presetting a plurality of coordinate acquisition numbers, wherein n is used for representing the acquisition interval of each point taking, and T/n is used for representing the acquisition interval of each point taking; the starting coordinates and the ending coordinates are marked as X1 and Xn, and according to the acquisition interval T/n of the drawing time points, T0, T0+t/n, T0+2t/n, … …, T0+ (n-1) T/n and T1 are sequentially taken as target coordinate points corresponding to coordinate values X1, X2, X3, … …, xn-1 and Xn.
The obtained target coordinate points and the corresponding target drawing time points form original legend data, the original legend data are stored in the main control component, and the formed original legend data are shown in the following table 1 (taking three coordinate points as an example):
TABLE 1
Step 203, generating a door opening certificate by adopting a target coordinate point and a target drawing time point;
after determining the target coordinate point in the random graph, the door opening credential may be generated using the target coordinate point and the target drawing time point.
In one example, the step of generating the door opening credential using the target coordinate point and the target drawing time point may specifically include: and combining the target coordinate point and the target drawing time point to generate the door opening certificate.
In a specific implementation, the target coordinate point can be expressed in hexadecimal system to obtain a coordinate character string; converting the target drawing time point into a time stamp and expressing the time stamp in hexadecimal system to obtain a time character string; the coordinate string and the time string are then combined as a door opening certificate Code. And storing the obtained door opening certificate in a local space for subsequent identification and comparison. Taking three coordinate points in table 1 as an example, the obtained door opening certificate Code is shown in the following table 2:
TABLE 2
Step 204, generating an entrance guard two-dimensional code by adopting a door opening certificate;
after the door opening certificate is generated, the door opening certificate can be adopted to generate the two-dimension code of the door.
In one example, the step of generating the two-dimensional code of the door access by using the door opening certificate may specifically include the following substeps:
s41, acquiring the equipment ID of the main control component;
s42, encrypting the door opening certificate by using the equipment ID as a security key to obtain encrypted data;
s43, converting the encrypted data into an access two-dimensional code.
In a specific implementation, before the door opening credential is converted into the two-dimension Code of the entrance guard, the door opening credential can be firstly encrypted, the equipment ID of the main control component is used as a security key, the door opening credential is encrypted into an X-Code through an open source algorithm such as AES, DES, RC and other algorithms, then the X-Code is converted into a character String X-String through an open source tool, and the character String is converted into the two-dimension Code X-qr Code through the open source tool and is sent to a user.
Optionally, when multiple devices need to use the same door-opening credential, the device ID of the master control component may be used to request the security factor K from the cloud, and the security factor K is used as a key for encryption.
Step 205, when the two-dimensional code of the door access to be identified is acquired through the image acquisition component, the two-dimensional code of the door access to be identified is analyzed, and a certificate to be verified is obtained;
step 206, matching the credentials to be verified with the door opening credentials stored in the main control component;
step 207, when the matching is successful, judging that the two-dimensional code is valid, and sending an unlocking instruction to the lock control assembly; the unlocking instruction is used for triggering the unlocking operation of the lock control assembly.
In the embodiment of the invention, the image acquisition component can be a camera or a two-dimensional code scanning gun, when a user arrives before entering a door, the camera or the two-dimensional code scanning gun is started to identify the two-dimensional code of the door access to be identified, which is presented by the user, is then sent to the main control component, the main control component identifies and analyzes the two-dimensional code of the door access to be identified to obtain a credential to be verified, the credential to be verified is then matched with a locally stored door opening credential, and when the matching is successful, the lock control component or the door control component is controlled to unlock. If the matching fails, the lock control component or the door control component is not awakened.
The embodiment of the invention reduces the repeatability of the door opening certificate through the random graph coordinates; then, the door opening certificate is generated by algorithm encryption by combining unique factors such as time, equipment ID and the like, so that the uniqueness of the door opening certificate is enhanced, and the safety of the door opening certificate is improved; even the same graph can be distinguished by different factors such as starting point coordinates, drawing sequences, coordinate deviations, time and the like, so that the generated door opening certificate is difficult to crack in terms of the generation mode.
Referring to fig. 4, fig. 4 is a block diagram of a two-dimensional code generating device for entrance guard according to an embodiment of the present invention.
The embodiment of the invention provides an access control two-dimensional code generating device which is applied to an access control system, wherein the access control system comprises a main control component and a touch control component; the device comprises:
the random pattern receiving module 401 is used for receiving a random pattern drawn on the touch control component by a user through the main control component;
the coordinate and time extraction module 402 is configured to extract target coordinate points in the random graph and target drawing time points of each target coordinate point;
a door opening credential generating module 403, configured to generate a door opening credential using the target coordinate point and the target drawing time point;
the door control two-dimensional code generating module 404 is configured to generate a door control two-dimensional code by using a door opening certificate.
In the embodiment of the invention, the access control system further comprises an image acquisition component and a lock control component; the apparatus further comprises:
the to-be-verified certificate analyzing module is used for analyzing the to-be-identified entrance guard two-dimensional code to obtain the to-be-verified certificate when the to-be-identified entrance guard two-dimensional code is acquired through the image acquisition component;
the matching module is used for matching the certificate to be verified with the door opening certificate stored in the main control assembly;
the unlocking module is used for judging that the two-dimensional code is valid when the matching is successful and sending an unlocking instruction to the lock control assembly; the unlocking instruction is used for triggering the unlocking operation of the lock control assembly.
In an embodiment of the present invention, the coordinate and time extraction module 402 includes:
the drawing total duration and drawing time point obtaining sub-module is used for obtaining the drawing total duration of the random graph and the drawing time points of all coordinate points in the random graph;
the acquisition interval calculation sub-module is used for calculating an acquisition interval according to the total drawing time length and the preset acquisition quantity;
and the coordinate and time extraction sub-module is used for determining a target coordinate point in the coordinate points according to the drawing time points and the acquisition intervals of all the coordinate points in the random graph and determining the target drawing time points of the target coordinate points.
In an embodiment of the present invention, the door opening credential generation module 403 includes:
and the door opening certificate generation sub-module is used for combining the target coordinate point and the target drawing time point to generate a door opening certificate.
In the embodiment of the present invention, the access control two-dimensional code generating module 404 includes:
the equipment ID acquisition sub-module is used for acquiring the equipment ID of the main control component;
the encryption sub-module is used for encrypting the door opening certificate by adopting the equipment ID as a security key to obtain encrypted data;
and the entrance guard two-dimension code conversion sub-module is used for converting the encrypted data into an entrance guard two-dimension code.
The embodiment of the invention also provides electronic equipment, which comprises a processor and a memory:
the memory is used for storing the program codes and transmitting the program codes to the processor;
the processor is used for executing the two-dimension code generation method of the entrance guard according to the instruction in the program code.
The embodiment of the invention also provides a computer readable storage medium, which is characterized in that the computer readable storage medium is used for storing program codes, and the program codes are used for executing the two-dimension code generation method of the entrance guard.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described by differences from other embodiments, and identical and similar parts between the embodiments are all enough to be referred to each other.
It will be apparent to those skilled in the art that embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the invention may take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal device to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal device, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiment and all such alterations and modifications as fall within the scope of the embodiments of the invention.
Finally, it is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or terminal device comprising the element.
The above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. The two-dimension code generation method for the door control is characterized by being applied to a door control system, wherein the door control system comprises a main control component and a touch control component; the method comprises the following steps:
the main control component receives a random graph drawn on the touch control component by a user;
extracting target coordinate points in the random graph and target drawing time points of the target coordinate points;
generating a door opening certificate by adopting the target coordinate point and the target drawing time point;
and generating an entrance guard two-dimensional code by adopting the door opening certificate.
2. The method of claim 1, wherein the access control system further comprises an image acquisition assembly and a lock control assembly; the method further comprises the steps of:
when the two-dimensional code of the door access to be identified is acquired through the image acquisition component, the two-dimensional code of the door access to be identified is analyzed, and a certificate to be verified is obtained;
matching the credential to be verified with the door opening credential stored in the main control component;
when the matching is successful, judging that the two-dimensional code is effective, and sending an unlocking instruction to the lock control assembly; the unlocking instruction is used for triggering the unlocking operation of the lock control assembly.
3. The method according to claim 1, wherein the step of extracting the target coordinate points in the random pattern and the target drawing time points of the respective target coordinate points includes:
acquiring the total drawing time length of the random graph and drawing time points of all coordinate points in the random graph;
calculating an acquisition interval according to the total drawing duration and the preset acquisition quantity;
and determining a target coordinate point in the coordinate points according to the drawing time points of all the coordinate points in the random graph and the acquisition interval, and determining the target drawing time point of the target coordinate point.
4. The method of claim 1, wherein the step of generating the door-open certificate using the target coordinate point and the target rendering time point comprises:
and combining the target coordinate point and the target drawing time point to generate a door opening certificate.
5. The method of claim 1, wherein the step of generating the two-dimensional code for the door using the door opening credential comprises:
acquiring the equipment ID of the main control component;
encrypting the door opening certificate by adopting the equipment ID as a security key to obtain encrypted data;
and converting the encrypted data into an access control two-dimensional code.
6. The entrance guard two-dimension code generating device is characterized by being applied to an entrance guard system, wherein the entrance guard system comprises a main control component and a touch control component; the device comprises:
the random pattern receiving module is used for receiving a random pattern drawn on the touch control assembly by a user through the main control assembly;
the coordinate and time extraction module is used for extracting target coordinate points in the random graph and target drawing time points of the target coordinate points;
the door opening credential generation module is used for generating a door opening credential by adopting the target coordinate point and the target drawing time point;
and the entrance guard two-dimension code generation module is used for generating an entrance guard two-dimension code by adopting the door opening certificate.
7. The apparatus of claim 6, wherein the access control system further comprises an image acquisition assembly and a lock control assembly; the apparatus further comprises:
the to-be-verified certificate analyzing module is used for analyzing the to-be-identified entrance guard two-dimensional code to obtain a to-be-verified certificate when the to-be-identified entrance guard two-dimensional code is acquired through the image acquisition component;
the matching module is used for matching the to-be-verified certificate with the door opening certificate stored in the main control assembly;
the unlocking module is used for judging that the two-dimensional code is valid when the matching is successful and sending an unlocking instruction to the lock control assembly; the unlocking instruction is used for triggering the unlocking operation of the lock control assembly.
8. The apparatus of claim 6, wherein the coordinate and time extraction module comprises:
the drawing total duration and drawing time point obtaining sub-module is used for obtaining the drawing total duration of the random graph and the drawing time points of all coordinate points in the random graph;
the acquisition interval calculation sub-module is used for calculating an acquisition interval according to the total drawing time length and the preset acquisition quantity;
and the coordinate and time extraction sub-module is used for determining a target coordinate point in the coordinate points according to the drawing time points of all the coordinate points in the random graph and the acquisition interval, and determining the target drawing time point of the target coordinate point.
9. An electronic device, the device comprising a processor and a memory:
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to execute the two-dimensional code generation method for entrance guard according to any one of claims 1 to 5 according to the instructions in the program code.
10. A computer-readable storage medium storing a program code for executing the entrance guard two-dimensional code generation method according to any one of claims 1 to 5.
CN202311440086.5A 2023-11-01 2023-11-01 Entrance guard two-dimension code generation method and device, electronic equipment and storage medium Pending CN117496622A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311440086.5A CN117496622A (en) 2023-11-01 2023-11-01 Entrance guard two-dimension code generation method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311440086.5A CN117496622A (en) 2023-11-01 2023-11-01 Entrance guard two-dimension code generation method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117496622A true CN117496622A (en) 2024-02-02

Family

ID=89682134

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311440086.5A Pending CN117496622A (en) 2023-11-01 2023-11-01 Entrance guard two-dimension code generation method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117496622A (en)

Similar Documents

Publication Publication Date Title
AU2016269267B2 (en) Encoding methods and systems
CN108171137B (en) Face recognition method and system
US20090293119A1 (en) User authentication method and system and password management system
Ratha et al. Biometrics break-ins and band-aids
JP2015506485A (en) Biometric authentication with secure multi-party computation using filters
CN102223233A (en) Biological code authentication system and biological code authentication method
JPWO2013088837A1 (en) INPUT INFORMATION AUTHENTICATION DEVICE, SERVER DEVICE, INPUT INFORMATION AUTHENTICATION SYSTEM, AND DEVICE PROGRAM
Sheng et al. Template-free biometric-key generation by means of fuzzy genetic clustering
WO2020136763A1 (en) Authentication system, authentication device, authentication method, and program
Gandhi et al. Study on security of online voting system using biometrics and steganography
Selvaraju et al. A method to improve the security level of ATM banking systems using AES algorithm
Aanjanadevi et al. Face Attribute Convolutional Neural Network System for Data Security with Improved Crypto Biometrics.
Machado et al. Securing ATM pins and passwords using Fingerprint based Fuzzy Vault System
CN117496622A (en) Entrance guard two-dimension code generation method and device, electronic equipment and storage medium
Nandini et al. Efficient cryptographic key generation from fingerprint using symmetric hash functions
Kolekar et al. Click and session based—Captcha as graphical password authentication schemes for smart phone and web
Han et al. A biometric encryption approach incorporating fingerprint indexing in key generation
JP5774461B2 (en) INPUT INFORMATION AUTHENTICATION DEVICE, SERVER DEVICE, INPUT INFORMATION AUTHENTICATION SYSTEM, AND DEVICE PROGRAM
Ganjewar et al. Privacy threat reduction using modified multi-line code generation algorithm (MMLCGA) for cancelable biometric technique (CBT)
Ninassi et al. Privacy Compliant Multi-biometric Authentication on Smartphones.
JP5713941B2 (en) INPUT INFORMATION AUTHENTICATION DEVICE, SERVER DEVICE, INPUT INFORMATION AUTHENTICATION SYSTEM, AND DEVICE PROGRAM
Pandiaraja et al. An Overview of Joint Biometric Identification for Secure Online Voting with Blockchain Technology
Kunnil et al. Biometrics assisted secure network transactions
Chuldun et al. Multilayers Physical Authentication and NoSQL PRESENT algorithm for Data Center
Alibraheemi Hiding Fingerprint Minutiae in Multiple Facial Images Using BPCS

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination