WO2015014232A1 - 一种鉴权系统及其发射终端、接收终端和权限认证方法 - Google Patents

一种鉴权系统及其发射终端、接收终端和权限认证方法 Download PDF

Info

Publication number
WO2015014232A1
WO2015014232A1 PCT/CN2014/082850 CN2014082850W WO2015014232A1 WO 2015014232 A1 WO2015014232 A1 WO 2015014232A1 CN 2014082850 W CN2014082850 W CN 2014082850W WO 2015014232 A1 WO2015014232 A1 WO 2015014232A1
Authority
WO
WIPO (PCT)
Prior art keywords
identification code
information
module
transmitter
transmitting
Prior art date
Application number
PCT/CN2014/082850
Other languages
English (en)
French (fr)
Inventor
刘若鹏
徐思路
Original Assignee
深圳光启创新技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳光启创新技术有限公司 filed Critical 深圳光启创新技术有限公司
Priority to EP14832231.6A priority Critical patent/EP3029906B1/en
Priority to KR1020167004699A priority patent/KR102056722B1/ko
Priority to JP2016530332A priority patent/JP2016536889A/ja
Publication of WO2015014232A1 publication Critical patent/WO2015014232A1/zh
Priority to US15/011,548 priority patent/US10771968B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • G07C2009/00785Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by light
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity

Definitions

  • the present application relates to an authentication system, and more particularly to a photonic authentication system that modulates an identification code into an optical signal and authenticates the optical signal.
  • a common authentication system generally includes a receiving terminal and a transmitting terminal, and the transmitting terminal has a set authority, and the receiving terminal receives the authentication information sent by the transmitting terminal, and authenticates the transmitting terminal, and the transmitting terminal can allow the transmitting terminal to receive the authentication.
  • the terminal performs some kind of operation.
  • related technical solutions are based on non-contact proximity cards such as RFID (radio frequency) cards or IC cards for security authentication.
  • the access control system using the proximity card is the induction card access control system.
  • the proximity card access control system transmits information to the card reader through the proximity card, and the card reader transmits the sensor card information to the access controller.
  • the access controller determines whether the card is After the valid card, the judgment result is transmitted back to the card reader. If the card is a valid card, the card reader will beep once, indicating that it is a valid card, and the access controller controls to open the electric lock to open the door; When it is an invalid card, the card reader will not do anything, nor will it have any sound, and the electric lock will not react.
  • RFID cards can be easily cracked and the card information is copied, which has great security problems. The cracking of IC cards is difficult, but there are also methods that can be cracked. Security issues still exist.
  • the access control system mainly transmits wireless information by means of visible light, and communicates by high-frequency flickering of the LED light source, which generally includes a transmitting end and a receiving end, wherein the LED in the transmitting end is frequency-frequency at a frequency that is invisible to the human eye.
  • Flashing in a specific time period, light indicates binary signal "1", no light indicates binary signal "0"; and receiving end (equivalent to card reader) converts optical signal into photoelectric signal through photoelectric conversion element such as photoresistor
  • photoelectric conversion element such as photoresistor
  • the electrical signal is decoded and the corresponding card signal is obtained, and then transmitted to the access controller, and the access controller determines whether the transmitting end has the right to open the door, thereby whether to open the door lock or the like.
  • the visible light can be emitted only by triggering the transmitting end, and the fast blinking is used to transmit the optical signal, it may be captured by the high speed camera to obtain the visible light strobe information, and then the transmitted information content is analyzed by the flicker change. Even if it encrypts the content of the information at the transmitter, the captured content may be illegally copied and made into the same transmitting device to emit the copied optical signal, so that the door lock of the photon access control system can be opened as well. There are also certain security risks. Summary of the invention
  • the application provides an authentication system, a transmitting terminal, a receiving terminal and a right authentication method, which prevent an illegally copied transmitting device and improve the security of the authentication system.
  • the application provides an authentication system, including a transmitting terminal, a receiving terminal, and a management server, where the transmitting terminal includes a transmitter, the receiving terminal includes a receiver and a controller, and the controller separately receives And the management server is in communication connection, wherein the management server stores an identifier information set corresponding to each receiver; the receiver includes an information transmitting module and an optical receiving module, wherein the information transmitting module and the optical receiving module are respectively connected to the controller, The information transmitting module transmits the acquired identification code information set to the controller, and the optical receiving module performs at least photoelectric conversion after receiving the optical signal of the transmitter, and outputs the transmission source information to the controller; the controller receives the transmission source.
  • the transmitting terminal includes a transmitter
  • the receiving terminal includes a receiver and a controller
  • the controller separately receives
  • the management server is in communication connection
  • the management server stores an identifier information set corresponding to each receiver
  • the receiver includes an information transmitting module and an optical receiving module, wherein the information transmitting module and the optical receiving module
  • the transmitter After the information, performing the second authority authentication according to the source information; the transmitter includes a processor, an information receiving module, and an optical transmitting module, wherein the processor is respectively connected to the information receiving module and the light emitting module; and the information receiving module receives the above information. And transmitting, by the transmitting module, the identifier information set is transmitted to the processor, and the processor performs the first authority authentication on whether the transmitter has the operation authority according to the received identifier information set, and controls the light emitting module to emit light according to the authentication result. The enable state of the signal.
  • the identification code information set includes unique identification code information of all transmitters corresponding to the receiver, and the processor compares the unique identification code of the transmitter itself with the received identification code information set. If the received identification information set includes the same identification code as its own unique identification code, the control light emitting module is switched to an operating state that allows the transmission of its own transmission source information into an optical signal, otherwise the control light is controlled. The transmitting module is in an operating state that prohibits converting its own transmitting source information into an optical signal, and the transmitting source information includes at least a unique identification code of the transmitter. After receiving the transmission source information, the controller compares the unique identification code in the transmission source information with the identification code information set, and passes the first authority authentication when determining that the identification code information set includes the unique identification code.
  • the present application provides a receiving terminal, where the receiving terminal includes a receiver and a controller, the receiver includes an information transmitting module and a light receiving module, and the information transmitting module and the light receiving module are respectively connected to the controller.
  • the information transmitting module transmits the identifier information set to the outside; the optical receiving module performs at least photoelectric conversion after receiving the transmitting source optical signal, and outputs the transmitting source information to the controller, after the controller receives the transmitting source information,
  • the second authority authentication is performed according to the source information.
  • the application provides an authentication system authority authentication method, where the authentication system includes a transmitting terminal and a receiving terminal, the transmitting terminal includes a transmitter, and the receiving terminal includes a connected receiving And the controller, the method includes: the receiver propagates the acquired identifier code information set corresponding thereto; and after receiving the identifier information set transmitted by the receiver, the transmitter receives the identifier information set according to the received identifier Whether the user has the operation authority to perform the first authority authentication, and determines whether to allow the transmission of the source information to be transmitted into the optical signal according to the authentication result, where the source information includes at least the unique identification code of the transmitter; After the optical receiving module receives the transmitting source information sent by the transmitter in the form of an optical signal, the controller performs the second authority authentication on the transmitting source information.
  • the authentication system is an access control system
  • the controller determines whether to output the unlocked control signal according to the authentication result after performing the second authority authentication on the source information.
  • the present application provides a method for authenticating a rights of a transmitting terminal, including: receiving a set of identification code information transmitted by a receiver; and performing first permission on whether or not there is an operation right according to the received identification information set.
  • Authentication determining whether to allow the transmission of the own source information into an optical signal according to the authentication result, where the source information includes at least a unique identification code corresponding to the transmitting terminal.
  • the present application provides a method for authenticating a right of a receiving terminal, comprising: a receiver transmitting the identification code information set outward; and receiving, by the receiving terminal, a transmitting source that is sent by the transmitter as an optical signal through the optical receiving module. After the information, the controller performs the second authority authentication on the source information.
  • the application has an information transmitting module and a light receiving module in the receiver of the authentication system, and the transmitter is provided with an information receiving module and a light emitting module.
  • the receiver transmits the corresponding identification code information set through the information transmitting module, and the transmitter can receive the identification code information sent by the receiver when entering the propagation range of the receiver, firstly by the transmitter itself.
  • the transmitter allows itself to transmit the optical signal of its own unique identification code, reducing The security risk of the transmitter due to uncontrolled transmission of its own identification code.
  • the receiver After the transmitter transmits the optical signal of its own identification code, the receiver performs the second permission authentication according to the received optical signal, thereby further improving the security of the authentication system.
  • FIG. 1 is a schematic structural view of an embodiment of the present application.
  • FIG. 2a is a schematic structural diagram of an access control system according to an embodiment of the present application.
  • FIG. 2b is a schematic structural diagram of an access control system according to another embodiment of the present application.
  • FIG. 3 is a schematic structural diagram of a transmitter in still another embodiment of the present application.
  • FIG. 4 is a flowchart of a first authority authentication in an access control system according to an embodiment of the present application
  • FIG. 5 is a flowchart of a second authority authentication in an access control system according to an embodiment of the present application. detailed description
  • the authentication system of the present application can be applied to an access control system, and can also be applied to systems requiring authorization such as various consumption management systems, transaction systems, and subway systems.
  • the consumption management system can be related to shopping volumes, ticket management, discounted volumes, or members. Cards and other systems that require authorization.
  • the authentication system includes a transmitting terminal, a receiving terminal, and a management server 50.
  • the transmitting terminal includes a transmitter 10.
  • the receiving terminal includes a receiver 20 and a controller 30, and the controller 30 and the receiver 20 and the management server 50, respectively.
  • the management server 50 stores an identification code information set corresponding to each receiver.
  • the receiver 20 includes an information transmitting module 21 and a light receiving module 22, and the information transmitting module 21 and the light receiving module 22 are communicatively coupled to the controller 30, respectively.
  • the transmitter 10 includes a processor 11, an information receiving module 12, and a light emitting module 13, and the processor 11 is connected to the information receiving module 12 and the light emitting module 13, respectively.
  • the working process is: the receiver 20 transmits the acquired identification code information corresponding thereto through the information transmitting module 21; after receiving the identification code information set transmitted by the receiver, the transmitter 10 receives the identification code through the information receiving module 12
  • the information set is transmitted to the processor 11, and the processor 11 performs the first authority authentication according to the received identifier information set to determine whether it has the operation authority, and determines whether to allow its own source information to pass through the light emitting module 13 according to the authentication result.
  • the transmission source information includes at least a unique identification code of the transmitter; when the receiving terminal receives the transmission source information sent by the transmitter in the form of an optical signal through the optical receiving module 22, and transmits the information to the controller 30, the controller 30 performs a second authority authentication on the source information, and performs some action according to the authentication result. For example, the controller determines whether to output a corresponding control signal according to the authentication result.
  • the control signals output by the controller also have different functions. For example, when the authentication system is an access control system, a consumption management system, or a subway system, the authentication system further includes being set to be in an open state and a closed state.
  • the switch is connected to the access control switch device, and the controller is communicably connected with the access control switch device. After the controller performs the second authority authentication according to the source information, the controller determines whether to output the control signal to the access control switch device according to the authentication result, and the function of the control signal can be It is the access control switch of the control authentication system that is turned on (for example, controlling the controllable lock to unlock, or controlling the gate to open).
  • the authentication system is a transaction system
  • the transaction system further includes a cash register, a P0S machine or a computer, and the controller is also in communication connection with the cash register or the POS machine, and the controller performs the second authority authentication according to the source information, according to the certification. As a result, it is determined whether to output the control signal of the cash register to the cash register, the POS machine or the computer, and the control signal is used to control the cash register, the POS machine or the computer to collect the money according to a predetermined manner.
  • Embodiment 1 is a diagrammatic representation of Embodiment 1:
  • the authentication system is taken as an example of the access control system.
  • the management server is an access control management server
  • the controller is an access control controller.
  • the access control system 100 includes a transmitting terminal and a receiving terminal.
  • the transmitting terminal is a transmitter 110
  • the receiving terminal includes a receiver 120 and an access controller 130.
  • the access control system 100 further includes an access control switch device that is configured to switch between an open and a closed state.
  • the access control switch device is a controllable lock 140.
  • the access control switch device further Can be a gate.
  • the access control system 100 also includes an access control management server 150 that stores unique identification code information for all of the transmitters corresponding to the respective receivers.
  • the unique identification code information of all the transmitters corresponding to each receiver may be the same or different.
  • the access controller 130 is communicably connected to the receiver 120, the access control management server 150 and the controllable lock 140, respectively, and the communication connection manner may be a wired connection or a wireless communication connection.
  • the access control system 100 also includes a display 160 that is coupled to the access controller 130 to display information output by the access controller 130.
  • the access controller 130 can obtain information from the access control management server 150.
  • the access controller 130 can also transmit data to the receiver 120 or control the receiver 120 to execute an instruction.
  • the access controller 130 can also control the controllable.
  • the state in which the lock 140 is changed controls the controllable lock 140 to change to an unlocked state or a locked state.
  • the controllable lock 140 can be an electric lock that is unlocked or locked by an electrical signal, or can be a lock that is otherwise controlled.
  • the transmitter 110 can convert its own unique identification code into an optical signal for transmission.
  • the receiver 120 converts the received optical signal into an electrical signal.
  • the access controller 130 performs authentication based on the electrical signal containing the transmitter 110 identification code, determines whether the transmitter 110 has the authority to open the controlled gate controlled by the receiver 120, and if so, outputs the control signal control The controllable lock is open.
  • the receiver 120 includes a first radio frequency module 121 and a light receiving module 122 as information transmitting modules, and the first radio frequency module 121 and the optical receiving module 122 are respectively communicably connected to the access controller 130.
  • the first radio frequency module 121 can convert the information transmitted by the access controller 130 into a radio frequency signal and transmit it.
  • the first radio frequency module 121 can also receive the radio frequency signal, and perform corresponding processing and transmit to the access control. 130.
  • the light receiving module 122 can receive the optical signal and convert the optical signal into an electrical signal for output to the access controller 130.
  • the transmitter 110 includes a processor 111, a second radio frequency module 112 as an information receiving module, and a light emitting module 113.
  • the processor 111 is connected to the second radio frequency module 112 and the optical transmitting module 113, respectively.
  • the second radio frequency module 112 can receive the radio frequency signal and transmit the corresponding radio frequency signal to the processor 111.
  • the second radio frequency module 112 can also transmit the radio frequency signal.
  • the light emitting module 113 can convert the electrical signal output by the processor 111 to the optical signal and transmit it.
  • the access controller 130 obtains the identification code information set corresponding to the receiver 120 from the access control management server 150 periodically or randomly, and the identification code information set includes the corresponding receiver (ie, has the authority to open the receiver control).
  • the first radio frequency module 121 of the receiver 120 receives the identification code information set from the access controller 130, and processes it as needed
  • the identification code information set is encrypted, and after processing, the identification code information set is continuously or intermittently propagated in a certain range (for example, a range of several meters) by radio frequency.
  • the second radio frequency module 112 can receive the radio frequency signal transmitted by the first radio frequency module 121, and the second radio frequency module 112 processes the identification code information information sent by the first radio frequency module 121 as needed, for example, After decryption, the second radio frequency module 112 sends the identification code information set to the processor 111, and the processor 111 firstly has the right to operate the controllable lock controlled by the receiver according to the received identifier information set.
  • the secondary authority is authenticated, and the enabled state of the optical signal emitted by the light emitting module 113 is controlled according to the authentication result.
  • the control light emitting module 113 When the authentication is passed, the control light emitting module 113 is in a state capable of emitting an optical signal, and when the authentication fails, the light emitting module 113 is controlled. It is in a state where it cannot emit an optical signal.
  • a specific authentication scheme is: the processor 111 compares the unique identification code of the transmitter 110 itself with the received identification code information set, and determines whether to allow the transmission source information of the transmitter according to the comparison result. Converting into an optical signal, the transmission source information includes at least a unique identification code corresponding to the transmitting terminal, and if the received identification code information set includes the same identification code as its own unique identification code, the transmitter is considered to be open.
  • the authority of the controlled gate controls the light emitting module 113 to change to an operating state that allows the transmission of its own source information into an optical signal, and the light emitting module 113 can transmit its own source information after changing to the allowable working state.
  • the signal is converted into an optical signal, and the control light emitting module 113 is in an operating state that prohibits the conversion of its own source information into an optical signal, or can maintain the original state.
  • the identification code information set may also be other information, and the first authorization authentication may also adopt different authentication methods according to different identification code information sets.
  • the identifier information set includes the identity information of the receiving terminal, and the transmitter no stores the identity information of all the receiving terminals that have the rights to operate.
  • the first method of the rights authentication may also be: the identifier that the processor 111 will receive.
  • the information set is compared with the identity information of all the receiving terminals that the transmitter 110 stores with authority to operate. If the identity information of all the receiving terminals whose transmitters 110 are authorized to operate includes the identification code information set, the information is considered to be
  • the transmitter has the authority to open the controlled gate, and then controls the light emitting module 113 to change to an operating state that allows the transmission of its own source information into an optical signal, otherwise the control light emitting module 113 is prohibited from transmitting its own source information. Converting into an operating state in which the optical signal is transmitted, or maintaining the original state, the transmitting source information includes at least a unique identification code corresponding to the transmitting terminal.
  • the light receiving module 122 of the receiver 120 performs photoelectric conversion after receiving the optical signal emitted by the light emitting module 113, and outputs an electrical signal transmitting the source information to the access controller 130.
  • the access controller 130 After receiving the transmission source information, the access controller 130 performs the second authority authentication according to the transmission source information, and determines whether to output a control signal for controlling the controllable lock unlocking according to the authentication result.
  • the method for authenticating may be, for example, comparing the source information and the identifier information set. If the identifier information includes the source information, the first control signal is output to the controllable lock, and the controllable lock is controlled. unlock.
  • the method for authenticating may further include: the source information further includes the authority information of the transmitter for each controlled gate, and the access controller 130 determines the source information according to the authority information. Whether the transmitter has the authority to open the controlled gate controlled by the receiver, and if so, outputs a control signal that controls the unlocking of the controllable lock.
  • the first decryption module 115 and the first encryption module 114 can be added to the transmitter 110.
  • the first decryption module 115 is connected to the processing. Between the device 111 and the second RF module 112, the second RF module 115 receives the identification code information set and decrypts it, and outputs it to the processor 111.
  • the first encryption module 114 is configured to encrypt its own transmission source information, first.
  • the encryption module 114 is coupled between the processor and the light emitting module.
  • a second encryption module 123 and a second decryption module 124 may be added to the receiver 120.
  • the second encryption module 123 is connected between the access controller 130 and the first radio frequency module 121, and the identifier information received from the access controller 130 is received.
  • the set is encrypted and output to the first RF module 121.
  • the second decryption module 123 is connected between the light receiving module 122 and the access controller 130, and performs signal conversion after the photoelectrically converted signal output by the received light receiving module 122. The decryption is then output to the access controller 130.
  • the transmitting end is usually carried by the user, the receiving end is usually installed beside the controlled door, and the controllable lock is installed on the controlled door to control the controlled door to open or prohibit opening by changing the state in which it is located.
  • the access management server can be set in a safe place, such as an administrator or a computer room.
  • the access controller communicates with the access control server via a wired communication network or a wireless communication network.
  • the receiver periodically obtains the unique identification code of all transmitters currently having permission to open the gate corresponding to the receiver from the database in the access control server through the access controller. All of these identification codes are then encrypted and propagated through the radio frequency transmitting module of the receiver to a small range within a few meters by radio frequency.
  • the transmitter decrypts the received RF propagation signal and checks whether the decrypted signal has the same code as its own unique identification code. If there is a unique identification code identical to the transmitter, then the transmitter has The permission opens the door corresponding to this receiver.
  • the transmitter activates the visible light transmitting module, and dynamically encrypts the information of the transmitter, and transmits it in the form of visible light through the visible light emitting module.
  • the receiver After receiving the visible light information, the receiver performs photoelectric conversion through the visible light receiving module to obtain the information of the transmitter encrypted by the dynamic key, and then decrypts the signal content by using the dynamic key generated by the same algorithm before, and obtains Original transmitter information. After obtaining the information of the transmitter, the receiver sends it to the access controller, and the access controller performs the second judgment on the legality authority of the transmitter. If it is legal, the controllable lock is opened; if it is not legal, it is not. Open the controllable lock and give an illegal prompt.
  • the transmitter decrypts the RF propagation signal and does not find a code that matches the unique code of its own device, then the transmitter does not have permission to open the door lock of the current corresponding receiver, even if the user is transmitting at the receiver.
  • the enable button is pressed within the range, the transmitter will not activate the visible light transmitting module, so no visible light signal will be emitted, and the access controller will not have any action.
  • the transmitter determines that the received identification code information set includes the same identification code as its own unique identification code, that is, only the transmitter is close to the controlled door and has the right to open the controlled door.
  • the user can operate the transmitter to send the optical sequence signal after the identification code is converted. If the two conditions are not met, the transmitter will not emit the optical signal after the identification code is converted, which reduces the adoption by others. The security risks caused by high-speed camera shooting and copying.
  • the receiving terminal performs another authority authentication on the transmitter (ie, the transmitting source) that emits the optical signal, and allows the transmitter to open the controlled door when both authentications are passed. Therefore, in this embodiment, the transmitter is authorized to open the controlled door twice, which further improves the security of the access control system.
  • the information transmitting module obtains the identification code information set from the access control management server through the access control controller. In another specific embodiment, the information transmitting module may further obtain the identification code information set directly from the access control management server.
  • the information transmitting module of the receiver may also transmit information by using other wireless methods.
  • the information transmitting module may be a Wifi transmitting module, an infrared transmitting module, a Bluetooth transmitting module, or a low frequency electromagnetic wave transmitting module.
  • the information receiving module of the transmitter may also be a Wifi receiving module, an infrared receiving module, a Bluetooth receiving module or a low frequency electromagnetic wave receiving module.
  • Embodiment 2 is a diagrammatic representation of Embodiment 1:
  • the transmitter 110 further includes a power source 115, a trigger switch 116 and a control switch 117.
  • the trigger switch 116 and the control switch 117 are connected in series with the power source 115 and the light emitting module 113.
  • the control terminal of the control switch 1 ⁇ is coupled to the processor 111, and switches between the closed and open states according to the control signal output by the processor 111.
  • the processor 111 determines that the received identification code information set includes its own unique
  • the control switch 117 is closed when the identification code is the same, otherwise the control switch 117 is turned off, and the trigger switch 116 is set to switch between the closed and open states in response to the user's operation. Therefore, only when the trigger switch 116 and the control switch 117 are both closed, the light emitting module 113 can be powered on and operated.
  • the timer may be started when the processor 111 determines that the received identification code information set includes the same identification code as its own unique identification code. The control switch 117 is turned off afterwards.
  • those skilled in the art may also control the light-emitting module 113 to change between a state of allowing operation and a state of prohibiting operation based on the content disclosed in the present application, for example, in the processor 111.
  • a switch is provided on the transmission path for transmitting the transmitter's own identification code to the light emitting module 113. The state of the switch is controlled by the processor 111, and the transmission of the identification code by the light emitting module 113 can also be controlled.
  • the transmitter 110 can convert its own unique identification code into an optical signal in a controllable state.
  • the access control system is based on the secondary authentication when performing the authority authentication.
  • the steps of transmitting the optical signal and timing control based on the user trigger are also added.
  • the transmitter first performs the first authentication by opening the controlled door to itself. The process is as shown in FIG. 4, and includes the following steps:
  • Step 401 The receiver acquires the corresponding identifier information set corresponding thereto in a radio frequency manner continuously or intermittently, and the identifier information set includes unique identifier information of all the transmitters corresponding to the receiver.
  • Step 402 The transmitter authenticates its own authority. After receiving the identifier information set transmitted by the receiver, the transmitter compares the unique identification code of the transmitting terminal itself with the received identifier information set, if the received identification code information set includes the transmitting terminal If the identification code with the same identification code is the same, the authorization is performed, and step 403 is performed. Otherwise, step 404 is executed to prohibit the transmission of the source information of the transmission source into the optical signal by the optical transmission module, or the original state may be maintained.
  • Step 403 the transmitter allows the transmission of its own source information to be transmitted by the light emitting module into an optical signal, and simultaneously starts the timer.
  • Step 405 The transmitter detects whether the user has an input light emission trigger signal. If it is detected, step 406 is performed, otherwise step 407 is performed. Step 406: Control the optical transmitting module to convert the transmitting source information of the transmitting terminal into an optical signal and transmit it according to the optical transmitting trigger signal.
  • step 407 it is determined whether the timing time is up. If the timing time is up, step 404 is performed. Otherwise, proceed to step 405.
  • the transmitter exceeds the set time after the self-certification is passed, that is, the optical signal is prohibited from being re-transmitted, and the optical signal is allowed to be transmitted again after the next self-authentication, which is a self-authentication.
  • An expiration date is specified to further improve the safety of optical signal transmission.
  • the second authentication is performed on whether the transmitter has the right to open the controlled gate.
  • the execution process is as shown in FIG. 5, and includes the following steps:
  • Step 501 The receiver detects the optical signal through the optical receiving module.
  • the transmitting source information is photoelectrically converted and then sent to the access controller.
  • Step 502 The access controller performs rights authentication on the source information, and if the authentication passes, step 503 is performed, otherwise step 504 is performed.
  • the receiving terminal performs the right authentication on the source information, including: comparing the source information with the identifier information set saved by the access controller, and outputting a control signal for controlling the unlock of the controllable lock when determining that the identifier information includes the source information Or the receiving terminal checks whether the source information includes the opening authority of the controlled door controlled by the receiving terminal, and if so, outputs a control signal for controlling the unlocking of the controllable lock.
  • Step 503 Output a control signal for controlling the unlocking of the controllable lock to control the controllable lock to open.
  • Step 504 the control signal for controlling the unlocking of the controllable lock is not output, and the controllable lock remains in the locked state.
  • Embodiment 3 is a diagrammatic representation of Embodiment 3
  • the password as the door opening identification code is used when the mobile phone software is installed in the form of text in the mobile phone SD card at the same time.
  • To change the password just generate a new password on the computer and put it in the text and replace the mobile phone SD card. Old text information.
  • With the increase of users of photon access control systems, such a method can no longer meet the market demand, and the password stored in the mobile phone SD card has a certain risk of leakage.
  • the access control system further includes an identifier distribution server.
  • the mobile terminal When the transmitter is a mobile terminal, the mobile terminal performs data communication through one or more information networks and an identifier distribution server, and the network may be an Internet, a local area network, a WiFi network, or a mobile network. At least one of a communication network (GSM, CDMA, WCDMA, TD-LTE, LTE, etc.).
  • the method for obtaining the identification code by the mobile terminal is: sending a request for acquiring an identification code to the identifier distribution server via the Internet or a local area network, where the request for acquiring the identification code includes information associated with the mobile terminal; and the identifier distribution server is based on the request for acquiring the identification code A unique identification code is sent to the mobile terminal associated with the request. Obtained
  • the request for the identification code may be sent by the applicant through the mobile terminal, or may be issued by the administrator through the platform of the access control management system.
  • the mobile terminal when the mobile terminal installs the software, it may bring an invalid password or a blank password.
  • the mobile terminal After the mobile terminal installs the software, it sends a request for acquiring the identification code to the identification code distribution server, and the identifier is assigned.
  • the server sends the unique identification code corresponding to the mobile terminal to the mobile terminal according to the request, and the mobile terminal manually receives the permission information, and the user sets the unlocking authority ID on the mobile terminal according to the received identification code (encrypted ), and written on the mobile terminal. This allows the user to set the correct password.
  • the identification code assigning server assigns only one identification code for each request to acquire the identification code.
  • the following takes a mobile terminal as a mobile phone as an example to illustrate a process in which a mobile terminal obtains an identification code from an identification code distribution server through a local area network or the Internet.
  • S101 Configure the database, establish a database instance, and create a database table that stores an identifier (hereinafter referred to as an ID number).
  • the ID issuance function uses the three-tier architecture S t rut s+Spr ing+H iberna te to implement the ID management function of the website, and encrypts the communication data with the source and channel, the source encryption uses the AES encryption algorithm, and the channel encryption uses the SSL. encryption.
  • S104 In order to ensure the security of the administrator, the administrator must assign the server's website address by using the password login ID, and the password can be modified.
  • This password is static, that is, the password for each login is the same.
  • S105 Determine whether the passwords are consistent. If they are consistent, they are administrators. If they are inconsistent, they may be incorrectly entered or not an administrator. To avoid third-party attacks, the password is locked after more than 5 failed attempts. Because each administrator maintains the password for logging in to himself, this password can be set to its length, complexity, and periodicity, such as setting the password length to 10 digits, including numbers, letters, special symbols, and changing once in a month. Forgot your password to tell the cloud administrator to reset it.
  • S106 Click the "ID Get” button of the mobile photonic client, and then the administrator will be prompted on the server's website that a mobile phone is getting the ID.
  • S107 In order to get only one mobile terminal to obtain the ID at a time, the number of issuing IDs is set to 1.
  • the mobile terminal obtains the ID, it is possible that other illegal users who downloaded the mobile terminal software also obtain the ID, for example.
  • a user is the resident of the cell
  • B user is not the resident of the cell
  • the B user's mobile phone prompts "Getting ID”, A user mobile phone Prompt "Get ID failed", then the administrator operation interface shows that a user is getting the ID, A user tells the administrator to say “Get ID failed", obviously the ID number being obtained is not A user, but illegal user B user's, this time the administrator decisively cuts off the ID, clicks to refuse to get the ID, B user's mobile phone will prompt "reject to get ID”, then the B user's mobile phone needs to wait for a time to retry, and A user can immediately Try and retry the process as described above. If the authorization issuance ID is successful, the process proceeds to S108, and if the authorization issuance ID fails, the process proceeds to S109.
  • S108 The mobile phone photonic client software performs channel and source decryption on the acquired data, and the decryption method and the above encryption method are symmetric, and the prompt “acquisition ID is successful” after clearing the plaintext.
  • Si l l Save the ID number generated by the decryption.
  • AES is encrypted when it is saved, and the key is used by the unique identifier of the mobile phone.
  • the password of the administrator login identifier distribution server may also be dynamically generated, and is completed by the administrator inputting the password and the verification code, that is, the password is unchanged, and the verification code is changed every time.
  • the high security is an encryption and decryption algorithm: AES, in order to prevent information spoofing, the unique identifier of the mobile phone is used as a key for encryption.
  • AES encryption and decryption algorithm
  • the SSH three-layer framework model of java is used to support the application platform of the website, which guarantees the quality and reuse of the program.
  • the interaction process of assigning IDs guarantees the uniqueness of ID assignment.
  • the identifier distribution server includes a two-dimensional code generation module, and the identifier distribution server generates a bound verification code and an identification code based on the request for acquiring the identification code input by the user, and generates the verification code by using the two-dimensional code.
  • the module generates a two-dimensional code of the verification code and displays the same;
  • the mobile terminal includes a two-dimensional code scanning module, and the mobile terminal scans the two-dimensional code of the verification code by using the two-dimensional code scanning module, extracts the verification code, and sends and acquires the verification code corresponding to the verification code.
  • the request for the identification code is sent to the identification code distribution server, and the request for obtaining the identification code sent by the mobile terminal includes the verification code extracted by the mobile terminal from the two-dimensional code and the identity information of the mobile terminal.
  • the identifier distribution server After receiving the request for acquiring the identification code sent by the mobile terminal, the identifier distribution server transmits an identification code corresponding to the verification code to the mobile terminal.
  • a specific process of this embodiment is as follows: S201: After uploading the mobile photonic client software to the software market, the QR code generation tool is used to generate the QR code of the download URL, and the mobile phone scans the generated QR code by the QR code scanning tool to obtain the download URL, and clicks the download to download the mobile photon.
  • the client software, and then install the software, the first installation is no ID information, so it will prompt "Get ID by setting".
  • S202 Configure the database, establish a database instance, and create a database table that holds the ID number.
  • S203 Implementing the ID issuing function by using the popular three-layer architecture webservice+Spr ing+Hibernate of the java platform website, using the three-layer architecture Strut s+Spr ing+Hibernate to implement the ID management function of the website, and performing source and channel on the communication data.
  • Encryption source encryption uses AES encryption algorithm
  • channel encryption uses SSL encryption.
  • S205 Determine whether the passwords are consistent. If they are consistent, they are administrators. If they are inconsistent, they may be incorrect or not administrators. In order to avoid third-party attacks, the password is locked after more than 5 failed attempts. Because each administrator maintains the password for logging in to himself, this password can be set to its length, complexity, and periodicity, such as setting the password length to 10 digits, including numbers, letters, special symbols, and changing once in a month. Forgot your password to tell the cloud administrator to reset it.
  • S206 The administrator sends a request to the website server through a web browser or other client, and the website server randomly generates one or more verification codes from the background and randomly generates one or more ID numbers, and performs the generated verification code and ID number. Bind, and then generate the QR code of the verification code through the QR code generation tool.
  • the mobile photonic client scans the two-dimensional code of the verification code through the two-dimensional code decoding tool, extracts the verification code, and clicks the "ID acquisition" button of the mobile photonic client, and then the administrator can prompt a certain on the server website.
  • the phone is getting an ID.
  • the number of issuing IDs is set to 1.
  • the mobile terminal obtains the ID, it is possible that other illegal users who downloaded the mobile terminal software also obtain the ID, for example.
  • a user is the resident of the cell
  • B user is not the resident of the cell
  • the B user's mobile phone prompts "Getting ID”, A user mobile phone Prompt "Get ID failed", then the administrator operation interface shows that a user is getting the ID, A user tells the administrator to say “Get ID failed", obviously the ID number being obtained is not A user's, but an illegal user B user, this time the administrator decisively cuts off the ID, clicks to refuse to get the ID, B user's mobile phone will prompt "reject to get ID”, then the B user's mobile phone needs to wait for a time to re Try, and the A user can try again immediately, and the retry process is the same as described above. If the authorization issuance ID is successful, the process proceeds to S209, and if the authorization issuance ID fails, the process proceeds to S210.
  • the mobile photonic client software performs channel and source decryption on the acquired data, and the decryption method and the above encryption method are symmetric, and the prompt “acquisition ID is successful” after clearing the plaintext.
  • S212 The ID number generated by the decryption is saved, and AES is encrypted when it is saved, and the key is performed using the unique identifier of the mobile phone.
  • the downloading of the mobile photonic client requires the use of a two-dimensional code generation and decoding tool
  • the use of the verification code to communicate with the website also requires the use of a two-dimensional code generation and decoding tool
  • the administrator password is dynamically generated, the largest
  • AES encryption and decryption algorithm
  • the unique identifier of the mobile phone is used as the key for encryption.
  • the SSH three-layer framework model of java is used to support the application platform of the website, which guarantees the quality and reuse of the program.
  • the interaction process of assigning IDs guarantees the uniqueness of ID assignment.
  • the identification code distribution server generates a unique identification code corresponding to the mobile terminal number according to the mobile terminal number (for example, the mobile phone number) input by the user, and the mobile terminal requests the identification by sending the acquisition identification code carrying its own number.
  • the code distribution server obtains the identification code.
  • a specific process of this embodiment is as follows: S 301: Configure the database, establish a database instance, and create a database table that holds the ID number.
  • S 302 The three-layer model popular with the .net platform website: 1. View layer: Implemented using configuration files, 2. Model layer: Write all entity classes and business logic, 3. Control layer: According to the model layer according to the model layer business Logic to achieve the turn of different results.
  • Implement the ID issuing function use the above model to implement the ID management function of the website, and encrypt the communication data with the source and channel, the source encryption using AES encryption algorithm, and the channel encryption using SSL encryption.
  • the mobile phone must be set up with a login port before communicating with the network server.
  • the Internet router is used to connect to the network, and then the mobile phone is connected to the Internet router.
  • S 305 Determine whether the passwords are consistent. If they are consistent, it means that they are administrators. If they are inconsistent, they may be incorrectly entered or not administrators. In order to avoid third-party attacks, the password is retried more than 5 times and the account is locked. number. Because each administrator maintains the password for logging in to himself, this password can be set to its length, complexity, and periodicity, such as setting the password length to 10 digits, including numbers, letters, special symbols, and changing once in a month. Forgot your password to tell the cloud administrator to reset it.
  • S306 The administrator inputs the unique identifier of the mobile phone through the ID issuing software: ims i , and then clicks Generate to generate a random unused ID number and bind the mobile phone number.
  • the mobile photonic client obtains the unique identifier of the mobile phone through the program: ims i , and clicks the "ID acquisition" button of the mobile photonic client, and the mobile photonic client carries the mobile phone number to send an ht tp request to the web server.
  • the web server After receiving the ht tp request, the web server turns to the processing program: first determines whether the received ims i has a record in the binding list generated by S106, and if so, extracts the ID number corresponding to ims i and returns the light key to the mobile phone.
  • S310 The mobile photonic client software obtains data through the network, prompting “Get ID failed”.
  • S311 You can retry the ID by setting the mobile photonic client over a period of time.
  • S312 The ID number generated by the decryption is saved, and AES is encrypted when it is saved, and the key is performed using the unique identifier of the mobile phone.
  • the administrator password is dynamically generated to maximize the security of the administrator's assigned ID.
  • the high security is the encryption and decryption algorithm: AES, in order to prevent information spoofing, the unique identifier of the mobile phone is used as the key for encryption.
  • AES encryption and decryption algorithm
  • the administrator pre-registers the user's ims i and binds it with the ID number.
  • an im ID is assigned to each ims i.
  • the web server uses the three-layer framework of the .net platform to support the application platform of the website, ensuring the quality and reuse of the program.
  • the interaction process of assigning IDs guarantees the uniqueness of ID assignments.
  • Embodiment 4 is a diagrammatic representation of Embodiment 4:
  • the device for assigning the identification code is the upper computer, and the upper computer generates and deletes the identification code through software.
  • the transmitter may be a mobile phone photonic client, a light pen photonic client, etc., the transmitter passes The data line is connected with the host computer to obtain an identification code.
  • the mobile phone photonic client is taken as an example.
  • the specific process of the embodiment is as follows: S101: Configure the database, establish a database instance, and create a database table that holds the ID number.
  • S102 Using Vistual C# 2008 to write the host computer ID issuing software, randomly select a unique ID number and an administrator password from the mysql database, and perform AES encryption on it, and store it in a file of the memory card of the mobile phone.
  • S103 The mobile phone installs the mobile phone photonic client software from the market or on the optical disc, and then the administrator inputs the administrator password generated by the pre-host computer ID issuing software.
  • S104 The mobile photonic client just generates the decryption of the encrypted file in the memory card, and compares the input administrator password with the decrypted administrator password. If it is correct, turn to S105. If it is not correct, turn to S106.
  • S105 Click the "Get ID” button of the mobile photonic client to perform AES decryption on the encrypted file that was generated on the memory card.
  • S106 Select whether to retry the input of the administrator password, if yes, go to S103, and if not, end.
  • S107 The ID number generated by the decryption is saved, and AES is encrypted when it is saved, and the key is performed by using the unique identifier of the mobile phone.
  • the high security is an encryption and decryption algorithm: AES, in order to prevent information spoofing, the unique identifier of the mobile phone is used as a key for encryption.
  • AES encryption and decryption algorithm
  • the device for assigning the identification code and the access control management server may be two independent devices that can perform data communication with each other, or may be combined into one device.
  • the authentication system is a ticketing system or a subway system, and the ticketing system or the subway system further includes a gate.
  • the controller is also communicably connected with the gate. After the controller performs the second authority authentication according to the source information, the controller determines whether to output according to the authentication result.
  • the control signal of the gate is connected to the gate to control the gate opening; or the authentication system is a trading system, the trading system further comprises a cash register or a POS machine, and the controller is also connected with the cash register or the POS machine, and the controller is based on the source information.
  • the second authorization according to the authentication result, it is determined whether to output the control signal of the cash register to the cash register or the POS machine to control the cash register of the cash register or the POS machine.
  • the specific process will not be described here.
  • Embodiments of the present invention reduce the security risks associated with transmitters that are uncontrolled to transmit optical signals of their own identification codes. After the transmitter transmits the optical signal of its own identification code, the receiver performs the second authority authentication according to the received optical signal, thereby further improving the security of the authentication system.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Lock And Its Accessories (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Electromagnetism (AREA)
  • Cash Registers Or Receiving Machines (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

本申请公开了一种鉴权系统及其发射终端、接收终端和权限认证方法,鉴权系统包括发射终端、接收终端和管理服务器,发射终端包括发射机,接收终端包括接收机和控制器。接收机设有信息发射模块和光接收模块,发射机设有信息接收模块和光发射模块。接收机将其所对应的识别码信息集通过信息发射模块传播出去,发射机接收到识别码信息集后,首先由发射机对其自身的权限进行第一次权限认证,认证通过后,发射机才允许自身发射其自身识别码的光信号,减少了发射机因不受控发射其自身识别码的光信号而带来的安全风险。在发射机发射其自身识别码的光信号后,接收机根据接收到的光信号进行第二次权限认证,进一步提供了鉴权系统的安全性。

Description

一种鉴权系统及其发射终端、 接收终端和权限认证方法 技术领域
本申请涉及一种鉴权系统, 尤其涉及一种将身份识别码调制为光信号、 并对光信 号进行认证的光子鉴权系统。
背景技术
目前常见的鉴权系统中, 通常包括接收终端和发射终端, 发射终端具有设定的权 限, 接收终端接收发射终端发出的鉴权信息, 对发射终端进行认证, 认证通过后可允 许发射终端对接收终端进行某种操作。 例如门禁系统中, 相关的技术解决方案都是采 用 RFID (射频) 卡或 IC卡等非接触感应卡进行安全认证。 利用感应卡进行工作的门 禁系统就是感应卡门禁系统, 感应卡门禁系统通过感应卡传递信息到读卡机, 读卡机 再传送感应卡信息到门禁控制器, 门禁控制器在判断该卡片是否为有效的卡片后将判 断结果再传输回读卡机, 如果该卡片是有效卡片, 读卡机就会"哔"一声, 代表是有效 卡片, 同时门禁控制器控制打开电锁, 进行开门; 当卡片是无效卡时, 读卡机会不做 任何动作, 也无任何声音, 而电锁也不会有任何反应。然而随着破解技术的不断发展, 目前 RFID卡都能轻易地遭到破解并将卡信息进行复制, 存在很大的安全问题。 IC卡 的破解难度较高, 但目前也出现了可进行破解的方法, 安全性问题依然存在。
除了上述的感应卡门禁系统外, 也有一些通过可见光传输信号的门禁系统开始了 应用。这种门禁系统主要通过可见光的方式进行无线信息传输, 其通过 LED光源的高 频率闪烁来进行通信, 通常包括发射端和接收端, 其中发射端中的 LED以人眼觉察不 到的频率进行频闪发光, 在特定时间周期内, 有光表示二进制信号 "1", 无光表示二进 制信号 "0"; 而接收端(相当于读卡器)则通过光敏电阻等光电转换元件将光信号转换 为电信号, 并进行解码, 得到相应的卡信号, 再传给门禁控制器, 由门禁控制器判断 该发射端是否具有开门权限, 从而是否打开门锁等。 以上利用可见光进行近距离通信 来传输发射端信息的解决方案也是可行的。但由于可见光可只通过触发发射端而发出, 并且是采用快速闪烁来传输光信号的, 所以其可能会被高速摄像机进行拍摄而获得可 见光频闪信息, 再通过闪烁变化而分析出所传输的信息内容, 即使其在发射机对信息 的内容进行了加密, 但被拍摄的内容也有可能被非法复制而制作成相同的发射装置而 发射复制的光信号, 从而一样可以打开光子门禁系统的门锁, 因此也存在一定的安全 隐患。 发明内容
本申请提供一种鉴权系统及其发射终端、 接收终端和权限认证方法, 防止非法复 制的发射装置, 提高鉴权系统的安全性。
根据本申请的第一方面, 本申请提供一种鉴权系统, 包括发射终端、 接收终端和 管理服务器, 上述发射终端包括发射机, 上述接收终端包括接收机和控制器, 上述控 制器分别与接收机和管理服务器通信连接, 其中, 上述管理服务器存储有与各接收机 对应的识别码信息集; 上述接收机包括信息发射模块和光接收模块, 上述信息发射模 块和光接收模块分别与控制器通信连接, 上述信息发射模块将获取的上述识别码信息 集向外传播, 上述光接收模块在接收到发射机的光信号后至少进行光电转换, 输出发 射源信息至控制器; 上述控制器在接收到发射源信息后, 根据发射源信息进行第二次 权限认证; 上述发射机包括处理器、 信息接收模块和光发射模块, 上述处理器分别与 信息接收模块和光发射模块相连; 上述信息接收模块接收到上述信息发射模块发射的 上述识别码信息集后传输给处理器, 上述处理器根据接收到的上述识别码信息集对发 射机是否有操作权限进行第一次权限认证, 根据认证结果控制光发射模块发射光信号 的使能状态。
在一种实施例中, 上述识别码信息集包括与该接收机对应的所有发射机的唯一识 别码信息, 上述处理器将发射机自身的唯一识别码与接收到的上述识别码信息集进行 比对, 如果接收到的上述识别码信息集中包括与其自身的唯一识别码相同的识别码, 则控制光发射模块变换到允许将自身的发射源信息转换成光信号发射出去的工作状 态, 否则控制光发射模块处于禁止将自身的发射源信息转换成光信号发射出去的工作 状态, 上述发射源信息中至少包括发射机的唯一识别码。 上述控制器在接收到发射源 信息后, 将发射源信息中的唯一识别码和上述识别码信息集进行比对, 在判断上述识 别码信息集中包括唯一识别码时通过第一次权限认证。
根据本申请的第三方面, 本申请提供一种接收终端, 上述接收终端包括接收机和 控制器, 上述接收机包括信息发射模块和光接收模块, 上述信息发射模块和光接收模 块分别与控制器通信连接, 上述信息发射模块将识别码信息集向外传播; 上述光接收 模块在接收到发射源光信号后至少进行光电转换, 输出发射源信息至控制器, 上述控 制器在接收到发射源信息后, 根据发射源信息进行第二次权限认证。
根据本申请的第四方面, 本申请提供一种鉴权系统权限认证方法, 上述鉴权系统 包括发射终端和接收终端, 上述发射终端包括发射机, 上述接收终端包括相连的接收 机和控制器, 上述方法包括: 接收机将获取到的与其对应的识别码信息集向外传播; 发射机接收到接收机发射的上述识别码信息集后, 根据接收到的上述识别码信息集对 自身是否有操作权限进行第一次权限认证, 根据认证结果确定是否允许将自身的发射 源信息转换成光信号发射出去, 上述发射源信息中至少包括发射机的唯一识别码; 当 接收终端通过光接收模块接收到发射机以光信号形式发出的发射源信息后, 控制器对 发射源信息进行第二次权限认证。
在一种实施例中, 上述鉴权系统为门禁系统, 控制器在对发射源信息进行第二次 权限认证后根据认证结果确定是否输出开锁的控制信号。
根据本申请的第五方面, 本申请提供发射终端的权限认证方法, 包括: 接收接收 机发射的识别码信息集; 根据接收到的上述识别码信息集对自身是否有操作权限进行 第一次权限认证; 根据认证结果确定是否允许将自身的发射源信息转换成光信号发射 出去, 发射源信息中至少包括与该发射终端对应的唯一识别码。
根据本申请的第六方面, 本申请提供接收终端的权限认证方法, 包括: 接收机将 识别码信息集向外传播; 当接收终端通过光接收模块接收到发射机以光信号形式发出 的发射源信息后, 控制器对发射源信息进行第二次权限认证。
本申请在鉴权系统的接收机设有信息发射模块和光接收模块, 发射机设有信息接 收模块和光发射模块。接收机将其所对应的识别码信息集通过信息发射模块传播出去, 发射机在进入到接收机的传播范围内时, 才可接收到接收机发出的识别码信息, 首先 由发射机对其自身是否有操作权限进行第一次权限认证,只有在其自身有权限操作时, 即只有在该发射机有权限操作该接收机时, 发射机才允许自身发射其自身唯一识别码 的光信号, 减少了发射机因不受控发射其自身识别码的光信号而带来的安全风险。 在 发射机发射其自身识别码的光信号后, 接收机根据接收到的光信号进行第二次权限认 证, 进一步提高了鉴权系统的安全性。
附图说明
图 1为本申请一种实施例的结构示意图;
图 2a为本申请一种实施例的门禁系统的结构示意图;
图 2b为本申请另一种实施例的门禁系统的结构示意图;
图 3为本申请又一种实施例中发射机的结构示意图;
图 4为本申请一种实施例中门禁系统中第一次权限认证的流程图;
图 5为本申请一种实施例中门禁系统中第二次权限认证的流程图。 具体实施方式
下面通过具体实施方式结合附图对本发明作进一步详细说明。
本申请的鉴权系统可应用于门禁系统, 也可以应用于如各种消费管理系统、 交易 系统、 地铁系统等需要授权的系统, 消费管理系统可以是涉及购物卷、 票务管理、 打 折卷或会员卡等需要授权的系统。 如图 1所示, 鉴权系统包括发射终端、 接收终端和 管理服务器 50, 发射终端包括发射机 10, 接收终端包括接收机 20和控制器 30, 控制 器 30分别与接收机 20和管理服务器 50通信连接, 管理服务器 50存储有与各接收机 对应的识别码信息集。 接收机 20包括信息发射模块 21和光接收模块 22, 信息发射模 块 21和光接收模块 22分别与控制器 30通信连接。 发射机 10包括处理器 11、 信息接 收模块 12和光发射模块 13,处理器 11分别与信息接收模块 12和光发射模块 13相连。 其工作流程为: 接收机 20将获取到的与其对应的识别码信息通过信息发射模块 21向 外传播; 发射机 10通过信息接收模块 12接收到接收机发射的识别码信息集后, 将识 别码信息集传送给处理器 11, 处理器 11根据接收到的上述识别码信息集对自身是否 有操作权限进行第一次权限认证, 根据认证结果确定是否允许将自身的发射源信息通 过光发射模块 13 转换成光信号发射出去, 发射源信息中至少包括发射机的唯一识别 码;当接收终端通过光接收模块 22接收到发射机以光信号形式发出的发射源信息后传 送给控制器 30, 控制器 30对发射源信息进行第二次权限认证, 根据认证结果进行某 种动作, 例如控制器根据认证结果确定是否输出相应的控制信号。 根据鉴权系统的不 同应用, 控制器输出的控制信号的作用也不同, 例如, 当鉴权系统为门禁系统、 消费 管理系统或地铁系统时, 鉴权系统还包括设置为在打开和关闭状态之间切换的门禁开 关装置, 控制器还与门禁开关装置通信连接, 控制器在根据发射源信息进行第二次权 限认证后, 根据认证结果确定是否输出控制信号至门禁开关装置, 控制信号的作用可 以是控制鉴权系统的门禁开关装置打开, (例如控制可控锁开锁, 或控制闸口打开)。 当鉴权系统为交易系统时, 交易系统还包括收银机、 P0S 机或电脑, 控制器还与收银 机或 P0S机通信连接, 控制器在根据发射源信息进行第二次权限认证后, 根据认证结 果确定是否输出收银的控制信号至收银机、 P0S 机或电脑, 控制信号的作用是控制收 银机、 P0S机或电脑按照预定的方式收款等。
实施例一:
本实施例中, 以鉴权系统为门禁系统为例进行说明, 管理服务器为门禁管理服务 器, 控制器为门禁控制器。 请参考图 2a, 门禁系统 100包括发射终端和接收终端, 本实施例中, 发射终端为 发射机 110, 接收终端包括接收机 120和门禁控制器 130。 为达到对门的控制, 门禁系 统 100还包括设置为在打开和关闭状态之间切换的门禁开关装置, 本实施例中, 门禁 开关装置为可控锁 140, 在其他实施例中, 门禁开关装置还可以为闸口。 为方便门禁 系统的管理, 门禁系统 100还包括门禁管理服务器 150, 门禁管理服务器 150存储有 与各接收机对应的所有发射机的唯一识别码信息。 其中各接收机对应的所有发射机的 唯一识别码信息可以是相同的或不同的。 门禁控制器 130分别与接收机 120、 门禁管 理服务器 150和可控锁 140通信连接, 通信连接方式可以是有线连接或无线通信方式 连接。 为方便显示信息, 门禁系统 100还包括显示器 160, 显示器 160与门禁控制器 130连接, 显示门禁控制器 130输出的信息。 本实施例中, 门禁控制器 130可从门禁 管理服务器 150中获取信息, 门禁控制器 130也可向接收机 120传输数据或控制接收 机 120执行某个指令, 门禁控制器 130还可控制可控锁 140变换所处的状态, 例如控 制可控锁 140变换到开锁状态或锁紧状态。 可控锁 140可以是由电信号控制开锁或锁 紧的电锁, 也可以是由其他方式控制的锁。
本实施例中, 发射机 110可将其自身唯一的识别码转换为光信号发送出去, 当发 射机 110对向接收机 120发射光信号时, 接收机 120将接收到的光信号转换为电信号 输出给门禁控制器 130, 门禁控制器 130根据含有发射机 110识别码的电信号进行认 证, 判断发射机 110是否有打开接收机 120所控制的受控门的权限, 如果有则输出控 制信号控制可控锁打开。
本实施例中, 接收机 120包括作为信息发射模块的第一射频模块 121和光接收模 块 122, 第一射频模块 121和光接收模块 122分别与门禁控制器 130通信连接。 第一 射频模块 121可将门禁控制器 130传输的信息转换为射频信号并发射出去, 当然, 在 其它实施例中, 第一射频模块 121还可以接收射频信号, 并进行相应处理后传输给门 禁控制器 130。 光接收模块 122可接收光信号, 并将光信号转换为电信号输出至门禁 控制器 130。发射机 110包括处理器 111、作为信息接收模块的第二射频模块 112和光 发射模块 113, 处理器 111分别与第二射频模块 112和光发射模块 113相连。 第二射 频模块 112可接收射频信号, 并进行相应处理后传输给处理器 111, 当然, 在其它实 施例中,第二射频模块 112还可以向外发射射频信号。光发射模块 113可将处理器 111 输出的电信号转换给光信号并发射出去。 本实施例中, 门禁控制器 130定时或随机地从门禁管理服务器 150获得与接收机 120 对应的识别码信息集, 识别码信息集中包括该接收机对应的 (即有权限打开该接 收机控制的门)所有发射机 110的唯一识别码,并将识别码信息集传输给该接收机 120; 接收机 120的第一射频模块 121从门禁控制器 130接收到识别码信息集后, 根据需要 进行处理, 例如对识别码信息集进行加密, 处理后将识别码信息集以无线射频方式在 一定范围 (例如数米的范围) 内向外连续或间歇性传播。
发射机 110进入该范围时, 第二射频模块 112可接收到第一射频模块 121发射的 射频信号, 第二射频模块 112将第一射频模块 121发射的识别码信息集根据需要进行 处理, 例如进行解密, 处理后第二射频模块 112将识别码信息集发送给处理器 111, 处理器 111根据接收到的上述识别码信息集对自身是否有操作该接收机控制的可控锁 的权限进行第一次权限认证, 并根据认证结果控制光发射模块 113发射光信号的使能 状态, 当认证通过时, 控制光发射模块 113处于能够发射光信号的状态, 当认证不通 过时, 控制光发射模块 113处于不能发射光信号的状态。 本实施例中, 一种具体的认 证方案为: 处理器 111将发射机 110自身的唯一识别码与接收到的识别码信息集进行 比对, 根据比对结果确定是否允许将自身的发射源信息转换成光信号发射出去, 发射 源信息中至少包括与该发射终端对应的唯一识别码, 如果接收到的识别码信息集中包 括与其自身的唯一识别码相同的识别码, 则认为该发射机有打开该受控门的权限, 则 控制光发射模块 113变换到允许将自身的发射源信息转换成光信号发射出去的工作状 态, 光发射模块 113在变换到允许工作状态后可将自身的发射源信息转换成光信号发 射出去, 否则控制光发射模块 113处于禁止将自身的发射源信息转换成光信号发射出 去的工作状态, 或者可以维持原状态。 在另外的具体实例中, 识别码信息集还可以是 其它信息, 第一次权限认证也可以根据识别码信息集的不同采用不同的认证方法。 例 如识别码信息集包括接收终端的身份信息, 而发射机 n o存储有其有权限操作的所有 接收终端的身份信息, 第一次权限认证的方法还可以是: 处理器 111将接收到的识别 码信息集和发射机 110存储的其有权限操作的所有接收终端的身份信息进行比对, 如 果发射机 110存储的其有权限操作的所有接收终端的身份信息中包含识别码信息集, 则认为该发射机有打开该受控门的权限, 则控制光发射模块 113变换到允许将自身的 发射源信息转换成光信号发射出去的工作状态, 否则控制光发射模块 113处于禁止将 自身的发射源信息转换成光信号发射出去的工作状态, 或者可以维持原状态, 发射源 信息中至少包括与该发射终端对应的唯一识别码。 接收机 120的光接收模块 122在接收到光发射模块 113发射的光信号后进行光电 转换, 输出发射源信息的电信号至门禁控制器 130。 门禁控制器 130在接收到发射源 信息后, 根据发射源信息进行第二次权限认证, 根据认证结果确定是否输出控制可控 锁开锁的控制信号。 本实施例中, 认证的方法例如可以是将发射源信息和识别码信息 集进行比对, 如果识别码信息集中包括该发射源信息,则输出第一控制信号至可控锁, 控制可控锁开锁。 在另一种具体实例中, 认证的方法还可以是在发射源信息中还包含 有该发射机对各受控门的权限信息, 门禁控制器 130在接收到发射源信息后, 根据权 限信息判断该发射机是否有权限打开该接收机控制的受控门, 如果有则输出控制可控 锁开锁的控制信号。
如图 2b所示的门禁系统 200的结构示意图,当需要对识别码进行加密解密处理时, 发射机 110中可以增加第一解密模块 115和第一加密模块 114, 第一解密模块 115连 接在处理器 111和第二射频模块 112之间, 将第二射频模块 115接收到识别码信息集 进行解密后输出至处理器 111 ; 第一加密模块 114设置为对自身的发射源信息进行加 密, 第一加密模块 114连接在处理器和光发射模块之间。 接收机 120中可以增加第二 加密模块 123和第二解密模块 124, 第二加密模块 123连接在门禁控制器 130和第一 射频模块 121之间, 将从门禁控制器 130接收到的识别码信息集进行加密后输出至第 一射频模块 121 ; 第二解密模块 123连接在光接收模块 122和门禁控制器 130之间, 在接收到的光接收模块 122输出的光电转换后的信号后对信号进行解密, 然后输出给 门禁控制器 130。
实际使用过程中, 发射端通常由用户携带, 接收端通常安装在受控门的旁边, 可 控锁安装在受控门上, 以通过变换其所处的状态控制受控门允许打开或禁止打开, 门 禁管理服务器可设置在安全的地方, 例如管理员处或机房。 门禁控制器通过有线通信 网络或无线通信网络与门禁管理服务器进行数据通信。 本实施例的工作过程如下:
1. 接收机定时通过门禁控制器从门禁管理服务器中的数据库获得当前有权限打 开本接收机对应的门的所有发射机的唯一识别码。然后对所有的这些识别码进行加密, 并通过接收机的射频发射模块以无线射频的方式向数米以内的小范围进行传播。
2. 当有发射机接近门附近的接收机时, 就会进入到无线射频传播的范围, 并开始 接收无线射频传播信号。
3. 发射机对接收到的射频传播信号进行解密, 并检查解密后的信号中有无与自身 的唯一识别码相同的码。 如果存在与发射机相同的唯一识别码, 则说明本发射机是有 权限打开这个接收机对应的门的。 发射机在使用者按下按钮的时候, 就会启动可见光 发射模块, 并将发射机的信息进行动态加密, 通过可见光发射模块以可见光的形式发 射出去。
4. 当接收机收到可见光信息后, 通过可见光接收模块进行光电转换, 得到利用动 态密钥加密过的发射机的信息, 然后利用之前相同算法生成的动态密钥对信号内容进 行解密, 并得到原始的发射机的信息。 得到发射机的信息后, 接收器会将其发送给门 禁控制器, 由门禁控制器对发射机的合法性权限进行第二次的判断, 如果合法, 则打 开可控锁; 不合法, 则不打开可控锁, 并给出非法提示。
5. 如果发射机解密射频传播信号后, 没有发现存在与自身设备唯一码相符合的 码, 则说明本发射机没有权限打开当前对应的接收机的门锁, 那即使使用者在接收机 的传播范围内按下启用按钮, 发射机也不会启动可见光发射模块, 因此不会有可见光 信号发射出去, 从而门禁控制器不会有任何动作。
可见, 本实施例的技术方案中, 只有当发射机判断接收到的识别码信息集中包括 与其自身的唯一识别码相同的识别码时, 即只有发射机靠近受控门并有权限打开受控 门时, 用户才可操作发射机, 使其发出将识别码转换后的光序列信号, 不满足这两个 条件的情况下发射机便不会发出将识别码转换后的光信号, 减少了他人采用高速摄像 机拍摄而进行复制所带来的安全隐患。 当发射机可发出光信号后, 接收终端接收到光 信号后, 对发出光信号的发射机 (即发射源) 再进行一次权限认证, 两次认证都通过 时才允许发射机打开受控门, 因此本实施例中对发射机是否有权限打开受控门进行了 两次认证, 进一步提高了门禁系统的安全性。
本实施例中,信息发射模块通过门禁控制器从门禁管理服务器获得识别码信息集, 在另外的具体实施例中, 信息发射模块还可以直接从门禁管理服务器获得识别码信息 集。
在另外的具体实施例中, 接收机的信息发射模块还可以采用其他无线方式发射信 息, 例如信息发射模块可以是 Wif i发射模块、红外发射模块、蓝牙发射模块或低频电 磁波发射模块, 相应的, 发射机的信息接收模块也可以是 Wif i接收模块、红外接收模 块、 蓝牙接收模块或低频电磁波接收模块。
实施例二:
请参考图 3, 与上述实施例不同的是, 发射机 110还包括电源 115、 触发开关 116 和控制开关 117, 触发开关 116与控制开关 117串联在电源 115和光发射模块 113之 间, 控制开关 1 Π的控制端耦合到处理器 111, 根据处理器 111输出的控制信号在闭 合和断开状态之间切换, 当处理器 111判断接收到的识别码信息集中包括与其自身的 唯一识别码相同的识别码时控制控制开关 117闭合, 否则控制控制开关 117断开, 触 发开关 116设置为响应于用户的操作在闭合和断开状态之间进行切换。 因此只有当触 发开关 116与控制开关 117都闭合的状态下, 光发射模块 113才能接通电源, 进行工 作。
有些情况下, 用户进入接收机的传播范围只是经过, 并不需要打开受控门, 因此, 用户不需要触发发射机发射光信号。 为避免这种情况下控制开关 1 Π—直处于闭合状 态, 可在处理器 111判断接收到的识别码信息集中包括与其自身的唯一识别码相同的 识别码后即启动计时器, 当计时器时间到后控制控制开关 117断开。
当然, 在其他的具体实施例中, 本领域技术人员基于本申请公开的内容, 也可以 采用其他方式控制光发射模块 113在允许工作的状态和禁止工作的状态之间变换, 例 如在处理器 111向光发射模块 113传输发射机自身识别码的传输通路上设置开关, 该 开关的状态由处理器 111控制, 同样可控制光发射模块 113对识别码的发射。
为增强门禁系统的安全性, 使发射机 110在可控的状态下才能将其自身唯一的识 别码转换为光信号发送出去, 本实施例中门禁系统在进行权限认证时在二次认证的基 础上还增加了基于用户触发来发射光信号和计时控制的步骤。 在发射终端, 先由发射 机对其自身是否有权限打开受控门进行第一次认证, 其流程如图 4所示, 包括以下步 骤:
步骤 401, 接收机将获取到的与其对应的识别码信息集以无线射频方式向外连续 或间歇性传播, 识别码信息集包括与该接收机对应的所有发射机的唯一识别码信息。
步骤 402, 发射机对自身的权限进行认证。 发射机接收到接收机发射的上述识别 码信息集后, 将发射终端自身的唯一识别码与接收到的上述识别码信息集进行比对, 如果接收到的识别码信息集中包括与该发射终端的唯一识别码相同的识别码, 则通过 权限认证, 执行步骤 403, 否则执行步骤 404, 禁止将自身的发射源信息通过光发射模 块转换成光信号发射出去, 或者可以维持原状态。
步骤 403, 发射机允许将自身的发射源信息通过光发射模块转换成光信号发射出 去, 并同时启动计时器。
步骤 405, 发射机检测用户是否有输入的光发射触发信号, 如果检测到, 则执行 步骤 406, 否则执行步骤 407。 步骤 406, 基于光发射触发信号控制光发射模块将发射终端的发射源信息转换成 光信号发射出去。
步骤 407, 判断计时时间是否到, 如果计时时间到, 则执行步骤 404。 否则继续执 行步骤 405。
本实施例通过计时时间的控制, 使发射机在对自身认证通过后超过设定时间, 即 禁止再发射光信号, 直到下一次再通过自身认证后才又允许发射光信号, 为一次的自 身认证规定了一个有效期, 进一步提高了光信号发射的安全性。
在接收终端, 对发射机是否有权限打开受控门进行第二次认证, 其执行的流程如 图 5所示, 包括以下步骤:
步骤 501, 接收机通过光接收模块检测光信号, 当接收到发射机以光信号形式发 出的发射源信息时, 将发射源信息进行光电转换, 然后发送给门禁控制器。
步骤 502, 门禁控制器对发射源信息进行权限认证, 如果认证通过, 则执行步骤 503 , 否则执行步骤 504。 接收终端对发射源信息进行权限认证包括: 将发射源信息和 门禁控制器保存的识别码信息集进行比对, 在判断上述识别码信息中包括发射源信息 时输出控制可控锁开锁的控制信号; 或者接收终端检查发射源信息中是否包含对该接 收终端所控制的受控门的打开权限, 如果有则输出控制可控锁开锁的控制信号。
步骤 503, 输出控制可控锁开锁的控制信号, 以控制可控锁打开。
步骤 504, 不输出控制可控锁开锁的控制信号, 可控锁保持锁上状态。
实施例三:
通常, 作为开门识别码的密码是在安装手机软件时以文本形式同时装进手机 SD 卡而使用的, 要修改密码时只需在电脑上生成新密码置于文本中再替换手机 SD卡中 的旧文本信息。 随着光子门禁系统用户的增加, 这样的方式已不能满足市场需求, 而 且密码存放于手机 SD卡中有一定的泄密风险。
本实施例中门禁系统还包括识别码分配服务器, 当发射机为移动终端, 移动终端 通过一种或多种信息网络和识别码分配服务器进行数据通信, 网络可以是互联网、 局 域网、 WiFi网络或移动通信网络 (GSM、 CDMA、 WCDMA、 TD-LTE、 LTE等)中的至 少一种。 移动终端获取识别码的方法为: 通过互联网或局域网向识别码分配服务器发 送获取识别码的请求, 上述获取识别码的请求中包含与移动终端关联的信息; 识别码 分配服务器基于获取识别码的请求向与该请求关联的移动终端发送唯一的识别码。 获 取识别码的请求可以由申请者通过移动终端发出, 也可以由管理员通过门禁管理系统 的平台发出。
在一种具体实例中, 在移动终端安装软件时可以给其自带一个无效密码, 或者是 空密码, 在移动终端安装完软件后, 向识别码分配服务器发射获取识别码的请求, 识 别码分配服务器根据该请求再通过手机短信方式将与移动终端对应的唯一识别码发送 给移动终端, 移动终端通过手动接收上述权限信息, 用户根据接收到识别码设置移动 终端上的开锁权限 ID (加密后的), 并写入在移动终端上。 从而实现由用户自己去设 置正确的密码。
考虑到识别码唯一性、 机密性和可控性特性, 识别码分配服务器针对每个获取识 别码的请求只分配一个识别码。
下面以移动终端为手机为例, 说明移动终端通过局域网或互联网从识别码分配服 务器获取识别码的一种过程。
S101 : 配置数据库, 建立数据库实例并且创建保存识别码(以下简称 ID号) 的数 据库表。
S102 : 使用 java平台网站流行的三层架构 webserv ice+Spr ing+H iberna te实现
ID发放功能, 使用三层架构 S t rut s+Spr ing+H iberna te实现网站的 ID管理功能, 并 对通信的数据进行信源和信道加密, 信源加密选用 AES加密算法, 信道加密选用 SSL 加密。
S103 : 手机和局域网或互联网服务器通信之前必须设置登入入口, 比如用 wif i 路由器连接局域网, 然后手机和 wif i路由器连接。或用互联网路由器连接网络, 然后 手机和互联网路由器连接。
S104 : 为了保障管理员的安全, 管理员必须通过密码登陆识别码分配服务器的网 址, 并且可以修改密码。 这个密码是静态的, 也就是每次登陆的密码的是一致的。
S105 : 判断密码是否一致, 如果一致就说明是管理员, 如果不一致则可能是输入 错误或者不是管理员, 为了避免第三方攻击, 设置密码的重试超过 5次失败就锁定账 号。 因为每个管理员都维护着自己登陆管理的密码, 这个密码可以设置其长度、 复杂 性和周期性, 比如设置密码长度 10位, 包含数字、 字母、 特殊符号, 过 1个月更改一 次, 如果忘记密码可以告诉云管理员对其重置。
S106 : 点击手机光子客户端的 " ID获取"按钮, 然后管理员就能在服务器的网站 上会提示某个手机正在获取 ID。 S107 : 为了每次只让一个手机端获取 ID, 这时就设置发放 ID的数量为 1, 在手机 端获取 ID的时候, 有可能其他的下载了手机端软件的非法用户也在获取 ID, 比如 A 用户是小区的住户, B用户不是小区的住户, B 用户比 A用户早点击获取 ID, 那么怎 么来区分是 A还是 B 用户呢?可以用管理员和用户间的互动来区分, 比如管理员设置 发放 ID的数量为 1, B用户比 A用户早点击获取 ID, 这时 B用户手机端提示 "正在获 取 ID" , A用户手机端提示 "获取 ID失败" ,这时管理员操作界面里显示有一个用户 正在获取 ID, A用户告诉管理员说 "获取 ID失败" , 显然这个正在获取的 ID号不是 A用户的, 而是非法用户 B用户的, 这个时候管理员果断切断获取 ID, 点击拒绝获取 ID, B用户手机端就会提示 "拒绝获取 ID" , 然后 B用户手机端需要等待一个时间才 能重试,而 A用户可以立刻重试,重试过程和上面描述的一样。如果授权发放 ID成功, 则转向 S108 , 如果授权发放 ID失败, 则转向 S109。
S108 : 手机光子客户端软件对获取的数据进行信道和信源解密, 解密方法和上述 的加密方法是对称的, 解出明文以后提示 "获取 ID成功" 。
S109 : 手机光子客户端软件提示 "获取 ID失败" 。
S110: 可以通过设置手机光子客户端经过一段时间可以重试获取 ID。
Si l l : 对解密生成的 ID号进行保存, 保存的时候要对其进行 AES加密, 并且密钥 使用手机的唯一标识进行。
在其它的具体实例中,管理员登陆识别码分配服务器的密码还可以是动态生成的, 通过管理员输入密码和验证码来完成, 即密码不变, 验证码每次都在变化。
本实施例中, 采用高安全性是加解密算法: AES, 为防止信息欺骗使用了手机唯一 标识作为密钥进行加密。采用 java的 SSH三层框架模型来支撑网站的应用平台,保障 了程序的质量和复用。 分配 ID的交互过程保障了 ID分配的唯一性。
在一种具体实例中, 识别码分配服务器包括二维码生成模块, 识别码分配服务器 基于用户输入的获取识别码的请求产生绑定的验证码和识别码, 并将验证码通过二维 码生成模块生成验证码的二维码并显示; 上述移动终端包括二维码扫描模块, 上述移 动终端通过二维码扫描模块扫描验证码的二维码, 提取验证码, 并发送获取与该验证 码对应的识别码的请求至识别码分配服务器, 移动终端发送的获取识别码的请求中包 含有移动终端从二维码提取出的验证码和该移动终端的身份信息。 识别码分配服务器 接收到移动终端发送的获取识别码的请求后, 将与该验证码对应的识别码发送给该移 动终端。 本实施例的一种具体流程如下: S201 : 上传手机光子客户端软件到软件市场以后, 用二维码生成工具生成下载网 址的二维码, 手机通过二维码扫描工具扫描生成的二维码得到下载网址, 点击下载可 以下载手机光子客户端软件, 然后安装软件, 第一次安装是没有 ID信息的, 所以会提 示 "通过设置获取 ID" 。
S202 : 配置数据库, 建立数据库实例并且创建保存 ID号的数据库表。
S203: 使用 java平台网站流行的三层架构 webservice+Spr ing+Hibernate实现 ID发放功能, 使用三层架构 Strut s+Spr ing+Hibernate实现网站的 ID管理功能, 并 对通信的数据进行信源和信道加密, 信源加密选用 AES加密算法, 信道加密选用 SSL 加密。
S204: 为了保障管理员的安全, 管理员必须通过密码登陆, 并且可以修改密码, 这个密码是动态生成的, 通过管理员输入密码和验证码来完成, 即密码不变, 验证码 每次都在变化。
S205 : 判断密码是否一致, 如果一致就说明是管理员, 如果不一致则可能是输入 错误或者不是管理员, 为了避免第三方攻击, 设置密码的重试超过 5次失败就锁定账 号。 因为每个管理员都维护着自己登陆管理的密码, 这个密码可以设置其长度、 复杂 性和周期性, 比如设置密码长度 10位, 包含数字、 字母、 特殊符号, 过 1个月更改一 次, 如果忘记密码可以告诉云管理员对其重置。
S206: 管理员通过 web浏览器或者其他客户端发送请求给网站服务器, 网站服务 器从后台随机生成一个或者多个验证码和随机生成一个或者多个 ID号,并对生成的验 证码和 ID号进行绑定, 然后通过二维码生成工具生成验证码的二维码。
S207 : 手机光子客户端通过二维码解码工具扫描验证码的二维码,提取出验证码, 并点击手机光子客户端的 " ID获取"按钮, 然后管理员就能在服务器的网站上会提示 某个手机正在获取 ID。
S208 : 为了每次只让一个手机端获取 ID, 这时就设置发放 ID的数量为 1, 在手机 端获取 ID的时候, 有可能其他的下载了手机端软件的非法用户也在获取 ID, 比如 A 用户是小区的住户, B用户不是小区的住户, B 用户比 A用户早点击获取 ID, 那么怎 么来区分是 A还是 B 用户呢?可以用管理员和用户间的互动来区分, 比如管理员设置 发放 ID的数量为 1, B用户比 A用户早点击获取 ID, 这时 B用户手机端提示 "正在获 取 ID" , A用户手机端提示 "获取 ID失败" ,这时管理员操作界面里显示有一个用户 正在获取 ID, A用户告诉管理员说 "获取 ID失败" , 显然这个正在获取的 ID号不是 A用户的, 而是非法用户 B用户的, 这个时候管理员果断切断获取 ID, 点击拒绝获取 ID, B用户手机端就会提示 "拒绝获取 ID" , 然后 B用户手机端需要等待一个时间才 能重试,而 A用户可以立刻重试,重试过程和上面描述的一样。如果授权发放 ID成功, 则转向 S209 , 如果授权发放 ID失败, 则转向 S210。
S209 : 手机光子客户端软件对获取的数据进行信道和信源解密, 解密方法和上述 的加密方法是对称的, 解出明文以后提示 "获取 ID成功" 。
S210: 手机光子客户端软件提示 "获取 ID失败" 。
S211 : 可以通过设置手机光子客户端经过一段时间可以重试获取 ID。
S212 : 对解密生成的 ID号进行保存, 保存的时候要对其进行 AES加密, 并且密钥 使用手机的唯一标识进行。
本实施例中, 下载手机光子客户端需要用到二维码生成和解码工具, 使用验证码 与网站进行通信时也需要用到二维码生成和解码工具, 管理员密码是动态生成的, 最 大化保障管理员分配 ID的安全, 采用高安全性是加解密算法: AES, 为防止信息欺骗 使用了手机唯一标识作为密钥进行加密。采用 java的 SSH三层框架模型来支撑网站的 应用平台, 保障了程序的质量和复用。 分配 ID的交互过程保障了 ID分配的唯一性。
在另一具体实例中, 识别码分配服务器根据用户输入的移动终端号码 (例如手机 号码) 生成与移动终端号码对应的唯一识别码, 移动终端通过发送携带有其自身号码 的获取识别码请求从识别码分配服务器获得识别码。 本实施例的一种具体流程如下: S 301 : 配置数据库, 建立数据库实例并且创建保存 ID号的数据库表。
S 302 : 使用 . net平台网站流行的三层模型: 1、 视图层: 使用配置文件实现, 2、 模型层: 编写所有实体类和业务逻辑, 3、 控制层: 根据模型层根据模型层的业务逻辑 来实现不同结果的转向。 实现 ID发放功能, 使用以上模型实现网站的 ID管理功能, 并对通信的数据进行信源和信道加密,信源加密选用 AES加密算法,信道加密选用 SSL 加密。
S 303 : 手机和网络网服务器通信之前必须设置登入入口, 比如用互联网路由器连 接网络, 然后手机和互联网路由器连接。
S 304 :为了保障管理员的安全,在对 ID发放软件操作之前必须通过输入密码登陆, 并且可以修改密码。 这个密码是静态的, 也就是每次登陆的密码的是一致的。
S 305 : 判断密码是否一致, 如果一致就说明是管理员, 如果不一致则可能是输入 错误或者不是管理员, 为了避免第三方攻击, 设置密码的重试超过 5次失败就锁定账 号。 因为每个管理员都维护着自己登陆管理的密码, 这个密码可以设置其长度、 复杂 性和周期性, 比如设置密码长度 10位, 包含数字、 字母、 特殊符号, 过 1个月更改一 次, 如果忘记密码可以告诉云管理员对其重置。
S306: 管理员通过 ID发放软件输入手机的唯一标识: ims i , 然后点击生成即可以 生成一个随机的没有使用过的 ID号和此手机号码绑定。
S307 : 手机光子客户端通过程序获取此手机的唯一标识: ims i , 并点击手机光子 客户端的 " ID获取"按钮,这个时候手机光子客户端就携带此手机号码发送一个 ht tp 请求给 web服务器。
S308 : web服务器收到 ht tp请求后, 转向处理程序: 先判断收到到的 ims i是否 在 S106生成的绑定列表有记录,如果有则提取 ims i对应的 ID号并返回给手机光钥匙
ID号, 并转向 S309; 如果没有则返回授权失败信息, 并转向 S310。
S309: 手机光子客户端软件通过网络获取数据, 提示 "获取 ID成功" 。
S310: 手机光子客户端软件通过网络获取数据, 提示 "获取 ID失败" 。
S311 : 可以通过设置手机光子客户端经过一段时间可以重试获取 ID。
S312 : 对解密生成的 ID号进行保存, 保存的时候要对其进行 AES加密, 并且密钥 使用手机的唯一标识进行。
本实施例中, 管理员密码是动态生成的, 最大化保障管理员分配 ID的安全, 采用 高安全性是加解密算法: AES,为防止信息欺骗使用了手机唯一标识作为密钥进行加密。 为了控制发放过程, 管理员预先登记用户的 ims i , 并和 ID号进行绑定, 后期用户使 用手机光钥匙申请 ID的时候就会为每个 ims i分配一个 ID。 web服务器采用. net平台 的三层框架来支撑网站的应用平台,保障了程序的质量和复用。分配 ID的交互过程保 障了 ID分配的唯一性。
实施例四:
与实施例三不同的是, 分配识别码的设备为上位机, 上位机通过软件生成和删除 识别码, 本实施例中, 发射机可以是手机光子客户端、 光笔光子客户端等, 发射机通 过数据线与上位机连接获取识别码。 手机光子客户端为例, 实施例的具体流程如下: S101 : 配置数据库, 建立数据库实例并且创建保存 ID号的数据库表。
S102:使用 Vistual C# 2008编写上位机 ID发放软件,从 mysql数据库中随机选取 一个唯一的 ID号和管理员密码, 并对其进行 AES加密, 存放到手机的存储卡的一个 文件里。 S103 : 手机从市场上或者光盘上安装手机光子客户端软件, 然后管理员输入预先 上位机 ID发放软件生成的管理员密码。
S104: 手机光子客户端刚才生成对存储卡里的那个加密文件进行解密, 比对输入 的管理员密码和解密的管理员密码。 如果正确则转向 S105, 如果不正确则转向 S106。
S105: 点击手机光子客户端的"获取 ID"按钮, 对刚才生成对存储卡里的那个加密 文件进行 AES解密。
S106: 选择是否重试输入管理员密码, 如果是则转向 S103 , 如果否则结束。
S107: 对解密生成的 ID号进行保存, 保存的时候要对其进行 AES加密, 并且密 钥使用手机的唯一标识进行。
本实施例中, 采用高安全性是加解密算法: AES, 为防止信息欺骗使用了手机唯 一标识作为密钥进行加密。
上述实施例中, 分配识别码的设备与门禁管理服务器可以是独立的可相互进行数 据通信的两个设备, 也可以合成为一个设备。
当鉴权系统应用于其他的需要授权的系统时, 其原理和工作过程相似。 例如鉴权 系统为票务系统或地铁系统, 票务系统或地铁系统还包括闸口, 控制器还与闸口通信 连接, 控制器在根据发射源信息进行第二次权限认证后, 根据认证结果确定是否输出 开闸的控制信号至闸口, 以控制闸口打开; 或者鉴权系统为交易系统, 交易系统还包 括收银机或 P0S机, 控制器还与收银机或 P0S机通信连接, 控制器在根据发射源信息 进行第二次权限认证后, 根据认证结果确定是否输出收银的控制信号至收银机或 P0S 机, 以控制收银机或 P0S机收银。 具体过程在此不再赘述。
以上内容是结合具体的实施方式对本发明所作的进一步详细说明, 不能认定本发 明的具体实施只局限于这些说明。 对于本发明所属技术领域的普通技术人员来说, 在 不脱离本发明构思的前提下, 还可以做出若干简单推演或替换。
工业实用性
本发明实施例减少了发射机因不受控发射其自身识别码的光信号而带来的安全风 险。 在发射机发射其自身识别码的光信号后, 接收机根据接收到的光信号进行第二次 权限认证, 进一步提高了鉴权系统的安全性。

Claims

权 利 要 求 书
1. 一种鉴权系统, 包括发射终端、 接收终端和管理服务器, 所述发射终端包括发 射机, 所述接收终端包括接收机和控制器, 所述控制器分别与接收机和管理服 务器通信连接:
所述管理服务器存储有与各接收机对应的识别码信息集;
所述接收机包括信息发射模块和光接收模块, 所述信息发射模块和光接收 模块分别与控制器通信连接, 所述信息发射模块将获取的所述识别码信息集向 外传播, 所述光接收模块在接收到发射机的光信号后至少进行光电转换, 输出 发射源信息至控制器;
所述控制器在接收到发射源信息后,根据发射源信息进行第二次权限认证; 所述发射机包括处理器、 信息接收模块和光发射模块, 所述处理器分别与 信息接收模块和光发射模块相连; 所述信息接收模块接收到所述信息发射模块 发射的所述识别码信息集后传输给处理器, 所述处理器根据接收到的所述识别 码信息集对发射机是否有操作权限进行第一次权限认证, 根据认证结果控制光 发射模块发射光信号的使能状态。
2. 如权利要求 1所述的鉴权系统, 其中, 所述识别码信息集包括与该接收机对应 的所有发射机的唯一识别码信息, 所述处理器将发射机自身的唯一识别码与接 收到的所述识别码信息集进行比对, 如果接收到的所述识别码信息集中包括与 其自身的唯一识别码相同的识别码, 则控制光发射模块变换到允许将自身的发 射源信息转换成光信号发射出去的工作状态; 所述发射源信息中至少包括发射 机的唯一识别码。
3. 如权利要求 1所述的鉴权系统, 其中, 所述识别码信息集包括接收终端的身份 信息, 发射机存储有其有权限操作的所有接收终端的身份信息, 处理器将接收 到的识别码信息集和发射机存储的其有权限操作的所有接收终端的身份信息进 行比对, 如果发射机存储的其有权限操作的所有接收终端的身份信息中包含识 别码信息集, 则控制光发射模块变换到允许将自身的发射源信息转换成光信号 发射出去的工作状态; 所述发射源信息中至少包括发射机的唯一识别码。
4. 如权利要求 2所述的鉴权系统, 其中, 所述发射机还包括电源和控制开关, 所 述控制开关连接在电源和光发射模块之间, 所述控制开关的控制端耦合到处理 器, 根据处理器输出的控制信号在闭合和断开状态之间切换。
5. 如权利要求 4所述的鉴权系统, 其中, 所述发射机还包括设置为响应于用户的 操作在闭合和断开状态之间切换的触发开关, 所述触发开关与控制开关串联在 电源和光发射模块之间。
6. 如权利要求 3所述的鉴权系统, 其中, 所述发射机还包括电源和控制开关, 所 述控制开关连接在电源和光发射模块之间, 所述控制开关的控制端耦合到处理 器, 根据处理器输出的控制信号在闭合和断开状态之间切换。
7. 如权利要求 6所述的鉴权系统, 其中, 所述发射机还包括设置为响应于用户的 操作在闭合和断开状态之间切换的触发开关, 所述触发开关与控制开关串联在 电源和光发射模块之间。
8. 如权利要求 1所述的鉴权系统, 其中, 所述信息发射模块直接从管理服务器获 得识别码信息集,和 /或所述控制器从管理服务器获得与该接收机对应的识别码 信息集, 并将所述识别码信息集传输给该接收机的信息发射模块。
9. 如权利要求 1所述的鉴权系统, 其中, 所述发射机还包括设置为对自身的发射 源信息进行加密的第一加密模块, 所述第一加密模块连接在处理器和光发射模 块之间; 所述接收机还包括第二解密模块, 所述第二解密模块连接在光接收模 块和控制器之间, 在接收到的光接收模块输出的光电转换后的信号后对信号进 行解密。
10. 如权利要求 1所述的鉴权系统, 其中, 所述接收机还包括第二加密模块, 所述 第二加密模块连接在控制器和信息发射模块之间, 将从控制器接收到的所述识 别码信息集进行加密后输出至信息发射模块;所述发射机还包括第一解密模块, 所述第一解密模块连接在处理器和信息接收模块之间, 将信息接收模块接收到 所述识别码信息集进行解密后输出至处理器。
11. 如权利要求 1所述的鉴权系统,其中,所述信息发射模块为第一射频模块、 Wifi 发射模块、 红外发射模块、 蓝牙发射模块或低频电磁波发射模块, 所述第一射 频模块将识别码信息集以无线方式向外传播, 所述信息接收模块对应地为第二 射频模块、 Wifi接收模块、 红外接收模块、 蓝牙接收模块或低频电磁波接收模 块。
12. 如权利要求 1至 11中任一项所述的鉴权系统,其中,所述鉴权系统为门禁系统、 消费管理系统或地铁系统。
13. 如权利要求 12所述的鉴权系统,其中,所述鉴权系统还包括设置为在打开和关 闭状态之间切换的门禁开关装置, 控制器还与门禁开关装置通信连接, 控制器 在根据发射源信息进行第二次权限认证后, 根据认证结果确定是否输出控制信 号至门禁开关装置, 以控制门禁开关装置打开。
14. 如权利要求 13所述的鉴权系统, 其中, 门禁开关装置为可控锁或闸口。
15. 如权利要求 1至 11中任一项所述的鉴权系统,其中,所述鉴权系统为交易系统, 所述交易系统还包括收银机、 POS机或电脑, 控制器还与收银机、 POS机或电 脑通信连接, 控制器在根据发射源信息进行第二次权限认证后, 根据认证结果 确定是否输出收银的控制信号至收银机、 POS机或电脑, 以控制收银机、 POS 机或电脑收银。
16. 如权利要求 1至 11中任一项所述的鉴权系统, 其中, 所述发射机为移动终端, 所述门禁系统还包括识别码分配服务器, 所述移动终端通过一种或多种信息网 络和识别码分配服务器进行数据通信, 识别码分配服务器基于获取识别码的请 求向与该请求关联的移动终端发送唯一的识别码, 所述获取识别码的请求中包 含与移动终端关联的信息。
17. 如权利要求 16所述的鉴权系统,其中,所述识别码分配服务器包括二维码生成 模块, 所述识别码分配服务器基于用户输入的获取识别码的请求产生绑定的验 证码和识别码, 并将验证码通过二维码生成模块生成验证码的二维码; 所述移 动终端包括二维码扫描模块, 所述移动终端通过二维码扫描模块扫描验证码的 二维码, 提取验证码, 并发送获取与该验证码对应的识别码的请求至识别码分 配服务器, 移动终端发送的获取识别码的请求中包含有移动终端从二维码提取 出的验证码和该移动终端的身份信息, 识别码分配服务器将与该验证码对应的 识别码发送给该移动终端。
18. 如权利要求 16所述的鉴权系统,其中,识别码分配服务器根据用户输入的移动 终端号码生成与移动终端号码对应的唯一识别码, 移动终端通过发送携带有其 自身号码的获取识别码请求从识别码分配服务器获得识别码。
19. 如权利要求 16所述的鉴权系统,其中,所述识别码分配服务器针对每个获取识 别码的请求分配一个识别码。
20. 如权利要求 16所述的鉴权系统,其中,所述鉴权系统还包括设置为生成和删除 识别码的上位机, 所述发射机通过数据线与上位机连接获取识别码。
21. 一种发射终端, 所述发射终端包括发射机, 所述发射机包括处理器、 信息接收 模块和光发射模块, 所述处理器分别与信息接收模块和光发射模块相连; 所述 信息接收模块接收到识别码信息集后传输给处理器, 所述处理器根据接收到的 所述识别码信息集对发射机是否有操作权限进行第一次权限认证, 根据认证结 果控制光发射模块发射光信号的使能状态。
22. 如权利要求 21所述的发射终端,其中,所述识别码信息集包括与接收机对应的 所有发射机的唯一识别码信息, 所述处理器将发射机自身的唯一识别码与接收 到的所述识别码信息集进行比对, 如果接收到的所述识别码信息集中包括与其 自身的唯一识别码相同的识别码, 则控制光发射模块变换到允许将自身的发射 源信息转换成光信号发射出去的工作状态, 所述光发射模块在变换到允许将自 身的发射源信息转换成光信号发射出去的工作状态后将自身的发射源信息转换 成光信号发射出去; 或者识别码信息集包括接收终端的身份信息, 发射机存储 有其有权限操作的所有接收终端的身份信息, 处理器将接收到的识别码信息集 和发射机存储的其有权限操作的所有接收终端的身份信息进行比对, 如果发射 机存储的其有权限操作的所有接收终端的身份信息中包含识别码信息集, 则控 制光发射模块变换到允许将自身的发射源信息转换成光信号发射出去的工作状 态; 所述发射源信息中至少包括发射机的唯一识别码。
23. 如权利要求 22所述的发射终端, 其中, 所述发射机还包括电源和控制开关, 所 述控制开关连接在电源和光发射模块之间, 所述控制开关的控制端耦合到处理 器, 根据处理器输出的控制信号在闭合和断开状态之间切换。
24. 如权利要求 23所述的发射终端,其中,所述发射机还包括设置为响应于用户的 操作在闭合和断开状态之间切换的触发开关, 所述触发开关与控制开关串联在 电源和光发射模块之间。
25. 一种接收终端, 所述接收终端包括接收机和控制器, 所述接收机包括信息发射 模块和光接收模块, 所述信息发射模块和光接收模块分别与控制器通信连接, 所述信息发射模块将识别码信息集向外传播; 所述光接收模块在接收到发射源 光信号后至少进行光电转换, 输出发射源信息至控制器, 所述控制器在接收到 发射源信息后, 根据发射源信息进行第二次权限认证。
26. 如权利要求 25所述的接收终端,其中,所述信息发射模块从控制器获得识别码 信息集。
27. 一种鉴权系统权限认证方法, 所述鉴权系统包括发射终端和接收终端, 所述发 射终端包括发射机,所述接收终端包括相连的接收机和控制器,所述方法包括: 接收机将获取到的与其对应的识别码信息集向外传播;
发射机接收到接收机发射的所述识别码信息集后, 根据接收到的所述识别 码信息集对自身是否有操作权限进行第一次权限认证, 根据认证结果确定是否 允许将自身的发射源信息转换成光信号发射出去, 所述发射源信息中至少包括 发射机的唯一识别码;
当接收终端通过光接收模块接收到发射机以光信号形式发出的发射源信息 后, 控制器对发射源信息进行第二次权限认证。
28. 如权利要求 27所述的方法, 其中, 所述鉴权系统为门禁系统、消费管理系统或 地铁系统, 所述鉴权系统还包括设置为在打开和关闭状态之间切换的门禁开关 装置, 控制器在对发射源信息进行第二次权限认证后根据认证结果确定是否输 出控制门禁开关装置打开的控制信号。
29. 如权利要求 27所述的方法, 其中, 所述鉴权系统为交易系统, 所述交易系统还 包括收银机或 POS机, 控制器在根据发射源信息进行第二次权限认证后, 根据 认证结果确定是否输出收银的控制信号至收银机或 POS 机, 以控制收银机或 POS机收银。
30. 如权利要求 27-29中任一项所述的方法, 其中, 所述发射终端为移动终端, 发 射终端的唯一识别码通过以下步骤进行分配:
通过互联网或局域网向识别码分配服务器发送获取识别码的请求, 所述获 取识别码的请求中包含与移动终端关联的信息;
识别码分配服务器基于获取识别码的请求向与该请求关联的移动终端发送 唯一的识别码。
31. 如权利要求 30所述的方法,其中,所述识别码分配服务器基于获取识别码的请 求向移动终端发送唯一的识别码包括:
所述识别码分配服务器基于用户输入的获取识别码的请求产生绑定的验证 码和识别码;
将验证码通过二维码生成模块生成验证码的二维码并显示; 接收移动终端发送的获取识别码的请求, 移动终端发送的获取识别码的请 求中包含有移动终端从二维码提取出的验证码和该移动终端的身份信息;
识别码分配服务器将与该验证码对应的识别码发送给该移动终端。
32. 一种发射终端的权限认证方法, 包括,
接收接收机发射的识别码信息集;
根据接收到的所述识别码信息集对自身是否有操作权限进行第一次权限认 证;
根据认证结果确定是否允许将自身的发射源信息转换成光信号发射出去, 发射源信息中至少包括与该发射终端对应的唯一识别码。
33. 如权利要求 32所述的方法,其中,所述识别码信息集包括与该接收机对应的所 有发射机的唯一识别码信息, 第一次权限认证包括:
发射机将自身的唯一识别码与接收到的所述识别码信息集进行比对; 如果接收到的识别码信息集中包括与该发射机的唯一识别码相同的识别 码, 则允许将自身的发射源信息通过光发射模块转换成光信号发射出去;
或者, 识别码信息集包括接收终端的身份信息, 发射终端存储有其有权限 操作的所有接收终端的身份信息, 第一次权限认证包括:
将接收到的识别码信息集和发射终端存储的其有权限操作的所有接收终端 的身份信息进行比对, 如果发射终端存储的其有权限操作的所有接收终端的身 份信息中包含识别码信息集, 则允许将自身的发射源信息通过光发射模块转换 成光信号发射出去。
34. 如权利要求 32或 33所述的方法, 其中, 发射终端在通过第一次权限认证后包 括:
检测用户输入的光发射触发信号;
基于光发射触发信号控制光发射模块将发射终端的发射源信息转换成光信 号发射出去。
35. 如权利要求 34所述的方法, 其中, 发射终端在通过第一次权限认证后还包括: 启动计时器, 当计时时间到后禁止将自身的发射源信息通过光发射模块转 换成光信号发射出去。
36. 一种接收终端的权限认证方法, 包括,
接收机将识别码信息集向外传播; 当接收终端通过光接收模块接收到发射机以光信号形式发出的发射源信息 控制器对发射源信息进行第二次权限认证。
PCT/CN2014/082850 2013-07-31 2014-07-23 一种鉴权系统及其发射终端、接收终端和权限认证方法 WO2015014232A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP14832231.6A EP3029906B1 (en) 2013-07-31 2014-07-23 Authentication system and transmit terminal for authenticating the light signal
KR1020167004699A KR102056722B1 (ko) 2013-07-31 2014-07-23 인증 시스템 및 그에 따르는 송신 단말과 수신 단말 및 권한 인증 방법
JP2016530332A JP2016536889A (ja) 2013-07-31 2014-07-23 認証システム及びその送信端末、受信端末ならびに権限認証方法
US15/011,548 US10771968B2 (en) 2013-07-31 2016-01-30 Photonic authentication system for a receiver terminal and transmitter terminal

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310330112.9 2013-07-31
CN201310330112.9A CN103825871B (zh) 2013-07-31 2013-07-31 一种鉴权系统及其发射终端、接收终端和权限认证方法

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/011,548 Continuation US10771968B2 (en) 2013-07-31 2016-01-30 Photonic authentication system for a receiver terminal and transmitter terminal

Publications (1)

Publication Number Publication Date
WO2015014232A1 true WO2015014232A1 (zh) 2015-02-05

Family

ID=50760701

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/082850 WO2015014232A1 (zh) 2013-07-31 2014-07-23 一种鉴权系统及其发射终端、接收终端和权限认证方法

Country Status (6)

Country Link
US (1) US10771968B2 (zh)
EP (1) EP3029906B1 (zh)
JP (1) JP2016536889A (zh)
KR (1) KR102056722B1 (zh)
CN (1) CN103825871B (zh)
WO (1) WO2015014232A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110191134A (zh) * 2019-06-06 2019-08-30 南方电网科学研究院有限责任公司 智能电表认证方法、认证服务器、终端、系统及智能电表
CN114338108A (zh) * 2021-12-17 2022-04-12 江苏银承网络科技股份有限公司 用于自动化测试的外接验证码获取系统、方法及存储介质

Families Citing this family (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10515363B2 (en) 2012-06-12 2019-12-24 Square, Inc. Software PIN entry
CN103825871B (zh) 2013-07-31 2015-05-27 深圳光启创新技术有限公司 一种鉴权系统及其发射终端、接收终端和权限认证方法
CN103812854B (zh) * 2013-08-19 2015-03-18 深圳光启创新技术有限公司 身份认证系统、装置、方法以及身份认证请求装置
US9773240B1 (en) 2013-09-13 2017-09-26 Square, Inc. Fake sensor input for passcode entry security
US9613356B2 (en) 2013-09-30 2017-04-04 Square, Inc. Secure passcode entry user interface
US9928501B1 (en) 2013-10-09 2018-03-27 Square, Inc. Secure passcode entry docking station
TW201604706A (zh) * 2014-07-29 2016-02-01 王王道 光電轉換認證系統
TWI556666B (zh) * 2014-09-03 2016-11-01 台灣新光保全股份有限公司 無線感測裝置登錄服務網路的方法
CN105160735A (zh) * 2015-08-27 2015-12-16 桂林理工大学 带隐藏信道的可见光控门禁方法
US9847020B2 (en) 2015-10-10 2017-12-19 Videx, Inc. Visible light communication of an access credential in an access control system
CN105656573A (zh) * 2015-12-24 2016-06-08 三维通信股份有限公司 一种天馈线检测系统及方法
CN105574519B (zh) * 2016-02-02 2018-12-11 深圳市指点信息科技有限公司 一种识别动态人物特征进行智能门开启的方法及系统
CN105897716B (zh) * 2016-04-12 2018-10-19 广东公诚设备资产服务有限公司 一种网站登录验证码的生成方法
CN106097492B (zh) * 2016-06-03 2018-09-07 深圳大学 一种门禁访问控制方法以及门禁系统
CN107592627A (zh) * 2016-07-06 2018-01-16 深圳联友科技有限公司 一种基于4g网络鉴权的安全蓝牙连接方法
US20180013561A1 (en) * 2016-07-06 2018-01-11 Shimon Gersten System and method for data protection using dynamic tokens
CN106412882B (zh) * 2016-10-19 2020-01-24 深圳市晟碟半导体有限公司 一种智能设备接入无线网络的方法和系统
CN107255576A (zh) * 2017-04-20 2017-10-17 广州博联塑料有限公司 一种集装箱液袋远程遥控取样阀门
CN108986353A (zh) * 2017-05-31 2018-12-11 广州云移信息科技有限公司 一种pos终端解锁方法及系统
CN107507303A (zh) * 2017-07-07 2017-12-22 安徽德诺科技股份公司 智能锁系统及智能锁的开锁方法
CN109427121A (zh) * 2017-08-31 2019-03-05 阿里巴巴集团控股有限公司 解锁方法、装置及系统
CN107386827B (zh) * 2017-09-22 2023-06-09 贵州维讯光电科技有限公司 一种门锁用虹膜摄像头智能识别系统
CN108154590A (zh) * 2018-01-18 2018-06-12 南京熊猫电子股份有限公司 基于手机imsi号的道闸控制系统及方法
CN108734822A (zh) * 2018-03-29 2018-11-02 深圳市海司恩科技有限公司 基于紫外光通信的门禁认证方法、系统及存储介质
CN108734821A (zh) * 2018-03-29 2018-11-02 深圳市海司恩科技有限公司 基于紫外光通信的门禁认证方法、装置及存储介质
US11438767B2 (en) 2018-06-15 2022-09-06 Proxy, Inc. Methods and apparatus for preauthorizing reader devices
US11109234B2 (en) 2018-06-15 2021-08-31 Proxy, Inc. Reader device with sensor streaming data and methods
US11462095B2 (en) 2018-06-15 2022-10-04 Proxy, Inc. Facility control methods and apparatus
US11546728B2 (en) 2018-06-15 2023-01-03 Proxy, Inc. Methods and apparatus for presence sensing reporting
US11509475B2 (en) 2018-06-15 2022-11-22 Proxy, Inc. Method and apparatus for obtaining multiple user credentials
US11411735B2 (en) 2018-06-15 2022-08-09 Proxy, Inc. Methods and apparatus for authorizing and providing of distributed goods or services
CN109040056B (zh) * 2018-07-31 2022-03-18 每日互动股份有限公司 一种基于服务器的用户验证方法
CN111200725B (zh) * 2018-11-19 2023-09-26 中强光电股份有限公司 投影机及投影机开机方法
CN109615753A (zh) * 2019-01-16 2019-04-12 深圳壹账通智能科技有限公司 智能门锁的开锁方法和装置
CN110381064B (zh) * 2019-07-19 2021-05-14 吉林大学 一种验证方法、装置和计算机可读存储介质
CN110427119A (zh) * 2019-08-02 2019-11-08 上海诺为科技有限公司 一种翻页笔的多对一控制方法
EP3929728A1 (en) * 2020-06-26 2021-12-29 Atos IT Services UK Limited System and method for the automatic deployment of a cloud environment
CN112002041A (zh) * 2020-09-02 2020-11-27 赵辛 一种智能会议门禁系统
US20220131848A1 (en) * 2020-10-26 2022-04-28 Micron Technology, Inc. Management of Identifications of an Endpoint having a Memory Device Secured for Reliable Identity Validation
EP4092637A1 (en) * 2021-05-19 2022-11-23 Lina SAS Access control management system and method of access controller use
US11769359B2 (en) * 2021-07-22 2023-09-26 Rivian Ip Holdings, Llc Systems, structures, and methods for accessing power locked panels

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1755074A1 (en) * 2005-08-15 2007-02-21 Assa Abloy Identification Technology Group AB Light authenticated RFID transponder
CN102750762A (zh) * 2012-06-20 2012-10-24 深圳光启创新技术有限公司 基于wap的光子钥匙权限获取方法
CN103198550A (zh) * 2013-04-10 2013-07-10 浙江省邮电工程建设有限公司 一种采用智能手机的智能门禁系统和门禁控制方法
CN103825871A (zh) * 2013-07-31 2014-05-28 深圳光启创新技术有限公司 一种鉴权系统及其发射终端、接收终端和权限认证方法

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5144667A (en) * 1990-12-20 1992-09-01 Delco Electronics Corporation Method of secure remote access
JPH0865776A (ja) * 1994-06-16 1996-03-08 Alpha Corp 遠隔操作装置
JP2000152352A (ja) * 1998-11-18 2000-05-30 Sharp Corp 無線遠隔制御システム
AU2003221069A1 (en) * 2003-03-25 2004-10-18 Kenichi Miyamoto Authentication card and wireless authentication system for mutual authentication using the authentication card
JP2006092327A (ja) * 2004-09-24 2006-04-06 Seiko Epson Corp 予約管理サーバ、電子機器予約システム、電子機器予約方法、プログラムおよび記録媒体
US7492258B1 (en) * 2006-03-21 2009-02-17 Radiofy Llc Systems and methods for RFID security
FR2906096B1 (fr) * 2006-09-19 2008-10-24 Radiotelephone Sfr Procede de securisation de sessions entre un terminal radio et un equipement dans un reseau
US8744081B2 (en) * 2007-03-22 2014-06-03 Qualcomm Incorporated System and method for implementing content protection in a wireless digital system
JP2009141432A (ja) * 2007-12-03 2009-06-25 Fujitsu Ten Ltd データ処理装置及びデータ処理方法
EP2258148A1 (en) * 2008-02-22 2010-12-08 Tri-concept Technology Limited Apparatus and system for led street lamp monitoring and control
DE102008050988A1 (de) * 2008-09-01 2010-03-04 Gerd Reime Identifikationselement mit einem optischen Transponder
ATE524897T1 (de) * 2008-09-17 2011-09-15 Gmv Soluciones Globales Internet S A Verfahren und system zur authentifizierung eines benutzers mit hilfe eines mobilfunkgeräts
EP2227047A1 (en) * 2009-03-05 2010-09-08 BRITISH TELECOMMUNICATIONS public limited company Device determination
SE535009C2 (sv) * 2010-07-09 2012-03-13 Nordic Wallet Ab Säker användaridentifiering
WO2012067337A1 (ko) * 2010-11-18 2012-05-24 주식회사 차후 정보 인식 수단을 이용한 관거 종합 관리 시스템 및 방법
JP2012123690A (ja) * 2010-12-09 2012-06-28 Mitsubishi Electric Engineering Co Ltd ネットワーク用モニタシステム
WO2012096749A2 (en) * 2011-01-14 2012-07-19 Flash Seats, Llc Mobile application bar code identification method and system
US9444547B2 (en) * 2011-07-26 2016-09-13 Abl Ip Holding Llc Self-identifying one-way authentication method using optical signals
US9544075B2 (en) * 2012-02-22 2017-01-10 Qualcomm Incorporated Platform for wireless identity transmitter and system using short range wireless broadcast
WO2014032618A1 (zh) * 2012-08-31 2014-03-06 深圳光启创新技术有限公司 基于光信号的信息处理方法和装置
US9130929B2 (en) * 2013-03-15 2015-09-08 Aol Inc. Systems and methods for using imaging to authenticate online users
CN104301857A (zh) * 2014-09-24 2015-01-21 广州三星通信技术研究有限公司 用于通信终端之间的无线通信的方法和设备
US9887995B2 (en) * 2015-03-20 2018-02-06 Cyberdeadbolt Inc. Locking applications and devices using secure out-of-band channels

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1755074A1 (en) * 2005-08-15 2007-02-21 Assa Abloy Identification Technology Group AB Light authenticated RFID transponder
CN102750762A (zh) * 2012-06-20 2012-10-24 深圳光启创新技术有限公司 基于wap的光子钥匙权限获取方法
CN103198550A (zh) * 2013-04-10 2013-07-10 浙江省邮电工程建设有限公司 一种采用智能手机的智能门禁系统和门禁控制方法
CN103825871A (zh) * 2013-07-31 2014-05-28 深圳光启创新技术有限公司 一种鉴权系统及其发射终端、接收终端和权限认证方法

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110191134A (zh) * 2019-06-06 2019-08-30 南方电网科学研究院有限责任公司 智能电表认证方法、认证服务器、终端、系统及智能电表
CN110191134B (zh) * 2019-06-06 2021-09-10 南方电网科学研究院有限责任公司 智能电表认证方法、认证服务器、终端、系统及智能电表
CN114338108A (zh) * 2021-12-17 2022-04-12 江苏银承网络科技股份有限公司 用于自动化测试的外接验证码获取系统、方法及存储介质

Also Published As

Publication number Publication date
EP3029906A1 (en) 2016-06-08
US20160150411A1 (en) 2016-05-26
CN103825871A (zh) 2014-05-28
EP3029906A4 (en) 2017-03-08
JP2016536889A (ja) 2016-11-24
CN103825871B (zh) 2015-05-27
EP3029906B1 (en) 2019-10-16
US10771968B2 (en) 2020-09-08
KR20160039227A (ko) 2016-04-08
KR102056722B1 (ko) 2020-01-22

Similar Documents

Publication Publication Date Title
WO2015014232A1 (zh) 一种鉴权系统及其发射终端、接收终端和权限认证方法
JP6703151B2 (ja) ブルートゥースインタフェースを備える認証装置
US9032498B1 (en) Method for changing authentication for a legacy access interface
US9185096B2 (en) Identity verification
US20170195322A1 (en) Entry and exit control method and apparatus, and user terminal and server for the same
US20140380445A1 (en) Universal Authentication and Data Exchange Method, System and Service
US20190174304A1 (en) Universal Authentication and Data Exchange Method, System and Service
CN105408910A (zh) 用于利用无线通信令牌在操作系统被引导之前对由用户对操作系统的访问进行验证的系统和方法
US20140329497A1 (en) Smartdevices Enabled Secure Access to Multiple Entities (SESAME)
CN102663280B (zh) 一种身份认证装置及系统
KR101028882B1 (ko) 휴대단말기를 이용한 otp 방식의 사용자인증 시스템 및 방법
TW202020706A (zh) 多功能認證裝置與運作方法
WO2013152136A1 (en) Authentication token
CN101123509B (zh) 信息交互系统和方法
CN113924751A (zh) 用于提供安全数据访问的系统和方法
CN101873316B (zh) 身份验证方法、系统及身份验证器
Dhondge et al. Optical wireless authentication for smart devices using an onboard ambient light sensor
WO2023224749A1 (en) Touchless identity card emulator systems and methods
KR101378810B1 (ko) 엔에프씨칩과 통신이 가능한 아이씨칩으로의 공인인증서 저장시스템과 저장방법
KR101540301B1 (ko) Nfc 보안 디지털 시스템, 상기 보안 디지털 시스템과 페어를 이루는 페어 시스템, 및 그 제공방법
KR101592897B1 (ko) Nfc 보안 디지털 시스템, 상기 보안 디지털 시스템과 페어를 이루는 페어 시스템, 및 그 제공방법
US12001910B1 (en) Initialization of touchless identity card emulator
US12001911B1 (en) Status monitoring systems and methods for touchless identity card emulators
JP2006184973A (ja) 電子機器、及び電子機器を用いた読み取り方法。
JP5650252B2 (ja) 権限発行システム、権限発行サーバ、及び権限発行方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14832231

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2014832231

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2016530332

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20167004699

Country of ref document: KR

Kind code of ref document: A