[go: up one dir, main page]

CN108460875A - A kind of entrance guard authentication method and device based on dynamic two-dimension code - Google Patents

A kind of entrance guard authentication method and device based on dynamic two-dimension code Download PDF

Info

Publication number
CN108460875A
CN108460875A CN201810229388.0A CN201810229388A CN108460875A CN 108460875 A CN108460875 A CN 108460875A CN 201810229388 A CN201810229388 A CN 201810229388A CN 108460875 A CN108460875 A CN 108460875A
Authority
CN
China
Prior art keywords
code
user
effective
image
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810229388.0A
Other languages
Chinese (zh)
Inventor
唐勇
刘小林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen City Sicle Intelligent Technology Co Ltd
Original Assignee
Shenzhen City Sicle Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen City Sicle Intelligent Technology Co Ltd filed Critical Shenzhen City Sicle Intelligent Technology Co Ltd
Priority to CN201810229388.0A priority Critical patent/CN108460875A/en
Publication of CN108460875A publication Critical patent/CN108460875A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention is suitable for gate inhibition's technical field, provides a kind of entrance guard authentication method based on dynamic two-dimension code, including:By scanning the two-dimensional code image and decrypting acquisition 2 D code information, current time is judged whether within the effective time, judges whether the number for scanning identical image in 2 D code is less than or equal to the effective degree;If current time is within the effective time, and the number for scanning identical image in 2 D code is less than or equal to the effective degree, then the User ID is sent to access controller.The embodiment of the present invention fails when not parsing Quick Response Code or ciphertext data by being parsed and being decrypted to Quick Response Code, illustrates that the Quick Response Code of scanning is not correct opening gate Quick Response Code, effectively prevent malice opening gate.And effective time and effective degree are judged after decryption, malice opening gate has been further prevented, has improved anti-theft capability so that safety higher.

Description

A kind of entrance guard authentication method and device based on dynamic two-dimension code
Technical field
The invention belongs to gate inhibition's technical field more particularly to a kind of entrance guard authentication methods based on dynamic two-dimension code.
Background technology
With the progress of science and technology, intelligent entrance guard technology has been commonly utilized in mansion office building, intellectual communityintellectualized village etc. The room entry/exit management of public place controls.Currently, gate inhibition's card technique that existing access control system largely all uses, because of access card It is inconvenient to carry, in this case, it is thus proposed that access card ID is converted to Quick Response Code and is stored in by Quick Response Code gate inhibition's technology , only need to be by two-dimensional code scanning when use in mobile phone, although this technology uses more convenient, cost is also relatively low It is honest and clean, but due to existing Quick Response Code gate inhibition all be fixed two-dimension code image, be easy by other people replicate or take pictures, safety Property is poor.Also, makes the access control equipment of original recognition access control system card be converted to the access control equipment of identification Quick Response Code, need again Access control equipment is installed or larger transformation is carried out to original access control equipment, not only trouble is also spent greatly in this way.
Invention content
In view of this, an embodiment of the present invention provides a kind of entrance guard authentication method based on dynamic two-dimension code, it is existing to solve There is the Quick Response Code access control system safety difference in technology and the access control equipment of original recognition access control system card is converted into identification two dimension The access control equipment of code is troublesome and spends high problem.
The first aspect of the embodiment of the present invention provides a kind of entrance guard authentication method based on dynamic two-dimension code, including:
By scanning the two-dimensional code image and decrypting acquisition 2 D code information, the 2 D code information includes image in 2 D code Generated time, effective time, effective degree and User ID;
Judge that current time whether within the effective time, judges whether the number for scanning identical image in 2 D code is less than Or it is equal to the effective degree;
If current time is within the effective time, and the number for scanning identical image in 2 D code has less than or equal to described Number is imitated, then the User ID is sent to access controller.
The second aspect of the embodiment of the present invention provides a kind of method generating dynamic two-dimension code, is applied to mobile terminal, This method includes:
Receive effective time input by user and effective degree;
Obtain current time and User ID;
The current time, User ID, effective time and effective degree are encrypted to form ciphertext, and by the ciphertext It is converted into image in 2 D code.
Further, it is described receive effective time input by user and effective degree before, further include:It generates and shows use Family ID, the User ID is for being written access controller;Or
The ID with the access card of access controller pairing is obtained as User ID.
Further, described to obtain the ID with the access card of access controller pairing as User ID, including:
By the NFC function of mobile terminal, the ID of access card corresponding with access controller is obtained as User ID;Or, The ID of the corresponding access card of access controller is obtained by access card conversion equipment.
The third aspect of the embodiment of the present invention provides a kind of gate inhibition's authentication device based on dynamic two-dimension code, including:
Response Code scan module, for by scanning the two-dimensional code image and decrypting acquisition 2 D code information, the Quick Response Code Information includes generated time, effective time, effective degree and the User ID of image in 2 D code;
Judgment module, for judging that current time whether within the effective time, judges to scan identical image in 2 D code Number whether be less than or equal to the effective degree;
Sending module, for the User ID to be sent to access controller.
The fourth aspect of the embodiment of the present invention provides a kind of access control system, including:
Quick Response Code read head obtains 2 D code information for scanning the two-dimensional code image, and the 2 D code information includes Quick Response Code Generated time, effective time, effective degree and the User ID of image;Judge that current time whether within the effective time, is sentenced Whether the disconnected number for scanning identical image in 2 D code is less than or equal to the effective degree;If current time is in the effective time It is interior, and the number for scanning identical image in 2 D code is less than or equal to the effective degree, then the User ID is sent to gate inhibition Controller;
Access controller, for judging whether the User ID that the Quick Response Code read head is sent is correct, if correctly, controlling Door-control lock is opened.
Further, the access control system further includes conversion equipment, and the conversion equipment includes keyboard, display, Card Reader Device and conversion module;
The conversion module is used for:Obtain the mobile terminal identification code and read by card reader that user is inputted by keyboard The ID of the access card arrived;It is encrypted the mobile terminal identification code and the ID to form ciphertext, and the ciphertext is converted At being shown over the display after image in 2 D code.
5th aspect of the embodiment of the present invention provides a kind of device generating dynamic two-dimension code, including:
Receiving module receives effective time input by user and effective degree;
Acquisition module obtains current time and preset User ID;
Conversion module is encrypted the current time, User ID, effective time and effective degree to form ciphertext, and The ciphertext is converted into image in 2 D code.
6th aspect of the embodiment of the present invention provides a kind of terminal device, including processor, input equipment, output equipment And memory, the processor, input equipment, output equipment and memory are connected with each other, wherein the memory is for storing Terminal is supported to execute the computer program of the above method, the computer program includes program instruction, and the processor is configured For calling described program to instruct, the method for executing above-mentioned first aspect and second aspect.
7th aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage It includes program instruction that media storage, which has computer program, the computer program, and described program instructs when being executed by a processor The method for making the processor execute above-mentioned first aspect and second aspect.
Existing advantageous effect is the embodiment of the present invention compared with prior art:
The embodiment of the present invention obtains 2 D code information by scanning the two-dimensional code image, judges whether current time has described In the effect time and judge whether the number for scanning identical image in 2 D code is less than or equal to the effective degree, only when current Between within the effective time and scan identical image in 2 D code number be less than or equal to the effective degree when, will just use Family ID is sent to access controller.The embodiment of the present invention by being parsed and decrypted to Quick Response Code, do not parse Quick Response Code or Fail when ciphertext data, illustrate that the Quick Response Code of scanning is not correct opening gate Quick Response Code, effectively prevents malice and open Gate inhibition.And effective time and effective degree are judged after decryption, malice opening gate has been further prevented, has improved Anti-theft capability so that safety higher.
Description of the drawings
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description be only the present invention some Embodiment for those of ordinary skill in the art without having to pay creative labor, can also be according to these Attached drawing obtains other attached drawings.
Fig. 1 is a kind of flow diagram of entrance guard authentication method based on dynamic two-dimension code provided in an embodiment of the present invention;
Fig. 2 is a kind of flow diagram of method generating dynamic two-dimension code provided in an embodiment of the present invention;
Fig. 3 is the flow diagram of another method for generating dynamic two-dimension code provided in an embodiment of the present invention;
Fig. 4 is a kind of schematic block diagram of gate inhibition's authentication device based on dynamic two-dimension code provided in an embodiment of the present invention;
Fig. 5 is a kind of schematic block diagram of device generating dynamic two-dimension code provided in an embodiment of the present invention;
Fig. 6 is a kind of schematic block diagram of access control system provided in an embodiment of the present invention;
Fig. 7 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention.
Specific implementation mode
In being described below, for illustration and not for limitation, it is proposed that such as tool of particular system structure, technology etc Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific The present invention can also be realized in the other embodiments of details.In other situations, it omits to well-known system, device, electricity The detailed description of road and method, in case unnecessary details interferes description of the invention.
It should be appreciated that ought use in this specification and in the appended claims, term " comprising " and "comprising" instruction Described feature, entirety, step, operation, the presence of element and/or component, but one or more of the other feature, whole is not precluded Body, step, operation, element, component and/or its presence or addition gathered.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment And be not intended to limit the present invention.As description of the invention and it is used in the attached claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singulative, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and the appended claims is Refer to any combinations and all possible combinations of one or more of associated item listed, and includes these combinations.
In order to illustrate technical solutions according to the invention, illustrated below by specific embodiment.
With reference to figure 1, Fig. 1 is a kind of entrance guard authentication method based on dynamic two-dimension code provided in an embodiment of the present invention, the party Method executive agent is Quick Response Code read head, and the Quick Response Code read head executes the method as described in step S101 to S104, this method packet Include step:S101 to S104.
S101, by scanning the two-dimensional code image and decrypting acquisition 2 D code information, the 2 D code information includes Quick Response Code Generated time, effective time, effective degree and the User ID of image.
In embodiments of the present invention, the effective time is the time that user is arranged by application program for mobile terminal Interval, if the time of clock module within effective time, calculates effective in Quick Response Code read head.For example, the effective time can be with Be since the generated time of image in 2 D code after a period of time, after the effective time can also be that random time starts For a period of time.For example, Quick Response Code generated time is 10 minutes 10 points of on March 8th, 2018, user setting effective time is 20 minutes, Then the effective time is 30 minutes 10 points of March 8 of 10 minutes to 2018 10 points of on March 8th, 2018, alternatively, user setting is effective Time is 35 minutes 10 points of March 8 of 15 minutes to 2018 10 points of on March 8th, 2018.It should be understood that it is merely illustrative statement herein, and It should not be understood as the concrete restriction to the present invention.
Quick Response Code read head is scanned and is decoded to image in 2 D code, obtains encrypted ciphertext in image in 2 D code, is used Ciphertext is decrypted in decipherment algorithm, obtains generated time, effective time, effective degree and the user of image in 2 D code therein ID.If the data in image in 2 D code have used certain Encryption Algorithm to be encrypted, then Quick Response Code read head must use and add The corresponding decipherment algorithm of close algorithm could successfully be decrypted the data in the Quick Response Code.Quick Response Code is mutually tied with encryption technology The safety of information in image in 2 D code can be ensured by closing, and prevent information leakage.
Optionally, in an embodiment of the present invention, if decryption failure, signal an alert or error signal.Ying Li Solution, is merely illustrative statement herein, can not be interpreted as the concrete restriction to the present invention.
S102 judges current time whether within the effective time, if current time is held within the effective time Row step S103.
The current time be Quick Response Code read head in clock module time, if current time within the effective time, Then judge whether the number for scanning identical image in 2 D code is less than or equal to the effective degree.
For example, the effective time is 30 minutes 10 points of March 8 of 10 minutes to 2018 10 points of on March 8th, 2018, if two-dimentional The time of clock module is 20 minutes 10 points of on March 8th, 2018 in code read head, then in the Quick Response Code read head clock module time Within the effective time;If the time of clock module is 40 minutes 10 points of on March 8th, 2018 in Quick Response Code read head, not in institute It states in effective time.It should be understood that being merely illustrative statement herein, the concrete restriction to the present invention can not be interpreted as.
Step S103, judges whether the number for scanning identical image in 2 D code is less than or equal to the effective degree.
In embodiments of the present invention, every image in 2 D code is scanned primary, and Quick Response Code read head will be by this Quick Response Code The generated time of image and scanned number are preserved.In order to save the memory space of Quick Response Code read head, when this Quick Response Code After past effective time of image, Quick Response Code read head will be by the information deletion of this image in 2 D code of preservation.
Quick Response Code read head obtains the generated time of scanned image in 2 D code, is looked into from the image in 2 D code information of storage Image in 2 D code information identical with the generated time of scanned image in 2 D code is looked for, optionally, in the another kind of the present invention In embodiment, Quick Response Code read head can also preserve the scanned number and User ID of image in 2 D code, because at one The same time can be only generated an image in 2 D code on mobile terminal, and be wrapped in the image in 2 D code generated on different mobile terminal The User ID contained is different.If the generated time according to image in 2 D code is found that multiple image in 2 D code letters when being searched Breath, then searched further according to User ID, can thus find unique image in 2 D code information.
If being scanned the scanned number of image in 2 D code in the image in 2 D code information found less than or equal to this The User ID is then sent to access controller by the effective degree of image in 2 D code.
Further, if the scanned number for being scanned image in 2 D code in the image in 2 D code information found is more than this The effective degree for opening image in 2 D code, then illustrate that the effective degree of this image in 2 D code has run out.Optionally, in the present invention A kind of embodiment in, if in the image in 2 D code information found be scanned image in 2 D code scanned number more than this The effective degree of image in 2 D code, then scanning means signal an alert or error signal.It should be understood that being merely illustrative table herein It states, the concrete restriction to the present invention can not be interpreted as.
The User ID is sent to access controller by step S104.
If current time is within the effective time and scans the number of identical image in 2 D code less than or equal to described The User ID is then sent to access controller by effective degree.
The embodiment of the present invention obtains 2 D code information by scanning the two-dimensional code image, judges whether current time has described In the effect time and judge whether the number for scanning identical image in 2 D code is less than or equal to the effective degree, only when current Between within the effective time and scan identical image in 2 D code number be less than or equal to the effective degree when, will just use Family ID is sent to access controller.The embodiment of the present invention does not parse two dimension by being parsed and being decrypted to image in 2 D code Fail when code image or ciphertext data, illustrates that the image in 2 D code of scanning is not correct opening gate Quick Response Code, it is effective anti- Malice opening gate is stopped.And effective time and effective degree are judged after decryption, malice has been further prevented to open Gate inhibition is opened, anti-theft capability is improved so that safety higher.
With reference to figure 2, Fig. 2 is a kind of method generating dynamic two-dimension code provided in an embodiment of the present invention, and this method is applied to Mobile terminal, including step S201-S203.
Step S201 receives effective time input by user and effective degree.
In embodiments of the present invention, user can be inputted by voice, or by the keyboard of mobile terminal, or pass through movement The touch screen displays input effective time of terminal and effective degree.It should be understood that being merely illustrative statement herein, can not be interpreted as To the concrete restriction of the present invention.
Step S202 obtains current time and User ID.
The current time is the time of the clock module of mobile terminal, is stored in the User ID and access controller ID is identical.
Step S203 is encrypted the current time, User ID, effective time and effective degree to form ciphertext, and The ciphertext is converted into image in 2 D code.
The current time and User ID of effective time input by user and effective degree and acquisition are used into Encryption Algorithm It is encrypted to form ciphertext, then ciphertext is subjected to coding and forms image in 2 D code.In embodiments of the present invention, the coding of Quick Response Code Mode and data encryption algorithm can be selected according to actual conditions.If the data in image in 2 D code have used certain to encrypt Algorithm is encrypted, then Quick Response Code read head must use decipherment algorithm corresponding with Encryption Algorithm could be successfully to the Quick Response Code In data be decrypted.It ensure that the safety of data by the way that data are encrypted, it is therefore prevented that maliciously crack Quick Response Code.
With reference to figure 3, in above-described embodiment step S201:Before receiving effective time input by user and effective degree, also Including step S200.
Step S200:It generates and shows User ID.
If the mobile terminal runs the embodiment for the first time, need to generate a User ID, the User ID is used for Access controller is written.
In an embodiment of the present invention, mobile terminal can generate a User ID at random according to algorithm, and user obtains Give this ID to property management staff after this ID, this ID is write by access controller by gate inhibition's daemon software by property management staff In.
Further, in another embodiment of the invention, the mobile terminal can also obtain and match with access controller To access card ID as User ID.
Nowadays popularizing with mobile payment, most of mobile phone vendor commercial city starts that wireless near field communication is added in mobile phone Technology (Near Field Communication, NFC).NFC payment is exactly by the equipment simulating with NFC function in simple terms At a non-contact card, such as access card, bank card.If mobile terminal possesses NFC function, by access card close to mobile terminal NFC chip read range, mobile terminal can obtain the ID of access card, movement is eventually by running application call NFC chip End is again using the ID of the access card read as User ID.
If the mobile terminal does not support NFC function, need to obtain the corresponding door of access controller by conversion equipment Prohibit the ID of card.Such case will be described in the embodiment of conversion equipment described below, and the embodiment of the present invention was not done It repeats more.
It should be understood that in embodiments of the present invention, the access card is divided into ID cards and IC card, ID card full name identification cards, It is a kind of non-writable contactless card, contains fixed number.IC card full name integrated circuit card, read-write, capacity is big.Wherein, one Part gate inhibition's IC card is to go to carry out opening gate by the way that fixed sequence number is written, and another part is the permissions data of write-in, this The number of 2 systems is all converted to when a little permissions data write-in IC card.So when access card is that the IC card of permissions data is written, The ID of acquisition for mobile terminal is actually these binary numbers.
With reference to figure 4, Fig. 4 is a kind of showing for gate inhibition's authentication device 40 based on dynamic two-dimension code provided in an embodiment of the present invention It is intended to, as shown in figure 4, the device includes:Response Code scan module 41, judgment module 42, sending module 43.
Response Code scan module 41, for obtaining 2 D code information, the 2 D code information by scanning the two-dimensional code image Generated time, effective time, effective degree including image in 2 D code and User ID.
Judgment module 42 judges to scan identical Quick Response Code figure for judging current time whether within the effective time Whether the number of picture is less than or equal to the effective degree.
Sending module 43, for the User ID to be sent to access controller.
The embodiment of the present invention is lost by being decoded and decrypting to Quick Response Code when not parsing Quick Response Code or ciphertext data It loses, then illustrates that the Quick Response Code of scanning is not correct enabling Quick Response Code, effectively prevent malice opening gate.And it is decrypting Effective time and effective degree are judged afterwards, malice opening gate has been further prevented, has improved anti-theft capability so that peace Full property higher.
With reference to figure 5, Fig. 5 is a kind of schematic diagram of device 50 generating dynamic two-dimension code provided in an embodiment of the present invention, such as Shown in Fig. 5, which includes:Receiving module 51, acquisition module 52, conversion module 53.
Receiving module 51 receives effective time input by user and effective degree.
Acquisition module 52 obtains current time and User ID.
Conversion module 53 is encrypted to form ciphertext to the current time, User ID, effective time and effective degree, And the ciphertext is converted into image in 2 D code.
Data are encrypted the embodiment of the present invention to effectively prevent ID to leak, and compare traditional fixed Quick Response Code figure Piece is safer.
With reference to figure 6, Fig. 6 is a kind of schematic diagram of access control system 60 provided in an embodiment of the present invention, as shown in fig. 6, this is System includes:Quick Response Code read head 61, access controller 62.
Quick Response Code read head 61 obtains 2 D code information for scanning the two-dimensional code image, and the 2 D code information includes two dimension Generated time, effective time, effective degree and the User ID of code image;Current time is judged whether within the effective time, Judge whether the number for scanning identical image in 2 D code is less than or equal to the effective degree;If current time is when described effective In, and the number for scanning identical image in 2 D code is less than or equal to the effective degree, then the User ID is sent to door Prohibit controller.
Access controller 62, for judging whether the User ID that the Quick Response Code read head is sent is correct, if correctly, controlling Door-control lock processed is opened.
Further, the access control system further includes conversion equipment 63, the conversion equipment 63 include keyboard, display, Card reader and conversion module;
The conversion module is used for:Obtain the mobile terminal identification code and read by card reader that user is inputted by keyboard The ID of the access card arrived is encrypted the mobile terminal identification code and the ID to form ciphertext, and the ciphertext is converted At being shown over the display after image in 2 D code.The mobile terminal identification code will by application program (Application, APP) The International Mobile Station Equipment Identification (International Mobile Equipment Identity, IMEI) of mobile terminal, movement EIC equipment identification code (Mobile Equipment IDentifier, MEID), media access control (Media Access Control, MAC) address and the self-contained unique codes of APP generated by algorithm.
Further, the access control system further includes mobile terminal, and the mobile terminal is stored with ciphering two-dimension code data Key.The mobile terminal is used to generate image in 2 D code according to current time, User ID, effective time and effective degree; The mobile terminal is additionally operable to obtain the ID with the access card of access controller pairing as User ID;The mobile terminal is also used In the two-dimension code image of generation is sent to default contact person, for example, when having guest to come to visit, user can be given birth to by mobile terminal At one 10 minutes in limited time, the two-dimension code image of limit time 1 time be sent to guest, efficiently solve visiting guest and pass in and out gate inhibition's Problem, it is ensured that the safety of system.It should be understood that being merely illustrative statement herein, can not be interpreted as to the specific of the present invention Limitation.
Further, the Quick Response Code read head 61 includes memory, and the memory is used to store the life of image in 2 D code It is scanned number and User ID at the time, the memory is also stored with the key of decryption two-dimensional code data.
Further, the access controller 62 includes memory, and the memory is for storing User ID.
The ID of access card matched with access controller that obtains includes as User ID:Pass through the NFC of mobile terminal Function obtains the ID of access card corresponding with access controller as User ID;Or, obtaining access controller by conversion equipment The ID of corresponding access card.The specific work process of module in above system can refer to the correspondence in preceding method embodiment Process, details are not described herein.
Mobile terminal by the image in 2 D code on 63 display of scan transformation equipment, to image in 2 D code carry out parsing and Decryption, obtains the ID of mobile terminal identification code and access card therein, judges whether mobile terminal identification code is the machine, if so, Then the ID for the access card for including in image in 2 D code is set as the User ID of mobile terminal by mobile terminal.By using conversion equipment Mobile terminal is written into access card ID, overcomes the defect that mobile terminal does not support NFC function, and by inputting mobile terminal Identification code, it is ensured that the mobile terminal of user could obtain access card ID, ensure that access card ID will not leak, more pacify All risk insurance is close.
Further, in the embodiment of the present invention, shown Quick Response Code read head 61 is connected to access controller by Wiegand interface On 62, the access controller 62 can be the access controller of any brand.
Quick Response Code read head can connect the access controller of any brand in the embodiment of the present invention, be compared to traditional gate inhibition System, the embodiment of the present invention need not replace access controller and need not be also transformed to the communication interface of access controller, only As soon as it needs to connect a Quick Response Code read head on the basis of original access controller, it can be so that access control system increase has Quick Response Code Imitate the judgement of time and effective degree so that the security performance of original gate inhibition gets a promotion, and the embodiment of the present invention can prop up Holding ID toll bars taboo can also support IC card entrance guard, use scope more wide.It is also not required in addition, mobile terminal need not connect network It wirelessly or non-wirelessly to be connect with access control system, gate inhibition's unlock can be carried out, door can not be opened when avoiding no network signal The embarrassment of taboo.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
Fig. 7 is the schematic diagram for the terminal device that one embodiment of the invention provides.As shown in fig. 7, the terminal of the embodiment is set Standby 7 include:Processor 70, memory 71 and it is stored in the meter that can be run in the memory 71 and on the processor 70 Calculation machine program 72.The processor 70 realizes the step in above-mentioned each embodiment of the method when executing the computer program 72, Such as step 101 shown in FIG. 1 is to 104.Alternatively, the processor 70 realizes above-mentioned each dress when executing the computer program 72 Set the function of each module in embodiment, such as the function of module 41 to 44 shown in Fig. 4.
Illustratively, the computer program 72 can be divided into one or more modules, one or more of Module is stored in the memory 71, and is executed by the processor 70, to complete the present invention.One or more of moulds Block can be the series of computation machine program instruction section that can complete specific function, and the instruction segment is for describing the computer journey Implementation procedure of the sequence 72 in the terminal device 7.
The terminal device 7 can be that the calculating such as desktop PC, notebook, palm PC and cloud server are set It is standby.The terminal device may include, but be not limited only to, processor 70, memory 71.It will be understood by those skilled in the art that Fig. 7 The only example of terminal device 7 does not constitute the restriction to terminal device 7, may include than illustrating more or fewer portions Part either combines certain components or different components, such as the terminal device can also include input-output equipment, net Network access device, bus etc..
Alleged processor 70 can be central processing unit (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor Deng.
The memory 71 can be the internal storage unit of the terminal device 7, such as the hard disk of terminal device 7 or interior It deposits.The memory 71 can also be to be equipped on the External memory equipment of the terminal device 7, such as the terminal device 7 Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodge Deposit card (Flash Card) etc..Further, the memory 71 can also both include the storage inside list of the terminal device 7 Member also includes External memory equipment.The memory 71 is for storing needed for the computer program and the terminal device Other programs and data.The memory 71 can be also used for temporarily storing the data that has exported or will export.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each work( Can unit, module division progress for example, in practical application, can be as needed and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device are divided into different functional units or module, more than completion The all or part of function of description.Each functional unit, module in embodiment can be integrated in a processing unit, also may be used It, can also be above-mentioned integrated during two or more units are integrated in one unit to be that each unit physically exists alone The form that hardware had both may be used in unit is realized, can also be realized in the form of SFU software functional unit.In addition, each function list Member, the specific name of module are also only to facilitate mutually distinguish, the protection domain being not intended to limit this application.Above system The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may realize that lists described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, depends on the specific application and design constraint of technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed device/terminal device and method, it can be with It realizes by another way.For example, device described above/terminal device embodiment is only schematical, for example, institute The division of module or unit is stated, only a kind of division of logic function, formula that in actual implementation, there may be another division manner, such as Multiple units or component can be combined or can be integrated into another system, or some features can be ignored or not executed.Separately A bit, shown or discussed mutual coupling or direct-coupling or communication connection can be by some interfaces, device Or INDIRECT COUPLING or the communication connection of unit, can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.Above-mentioned integrated list The form that hardware had both may be used in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or In use, can be stored in a computer read/write memory medium.Based on this understanding, the present invention realizes above-mentioned implementation All or part of flow in example method, can also instruct relevant hardware to complete, the meter by computer program Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium May include:Any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic of the computer program code can be carried Dish, CD, computer storage, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that the meter The content that calculation machine readable medium includes can carry out increase and decrease appropriate according to legislation in jurisdiction and the requirement of patent practice, Such as in certain jurisdictions, according to legislation and patent practice, computer-readable medium does not include electric carrier signal and telecommunications Signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although with reference to aforementioned reality Applying example, invention is explained in detail, it will be understood by those of ordinary skill in the art that:It still can be to aforementioned each Technical solution recorded in embodiment is modified or equivalent replacement of some of the technical features;And these are changed Or replace, the spirit and scope for various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of entrance guard authentication method based on dynamic two-dimension code, which is characterized in that including:
By scanning the two-dimensional code image and decrypting acquisition 2 D code information, the 2 D code information includes the generation of image in 2 D code Time, effective time, effective degree and User ID;
Judge that current time whether within the effective time, judges whether the number for scanning identical image in 2 D code is less than or waits In the effective degree;
If current time is within the effective time, and the number for scanning identical image in 2 D code is less than or equal to described effective time Number, then be sent to access controller by the User ID.
2. a kind of method generating dynamic two-dimension code, which is characterized in that be applied to mobile terminal, this method includes:
Receive effective time input by user and effective degree;
Obtain current time and User ID;
The current time, User ID, effective time and effective degree are encrypted to form ciphertext, and the ciphertext is converted At image in 2 D code.
3. method as claimed in claim 2, which is characterized in that it is described receive effective time input by user and effective degree it Before, further include:Generate and show User ID, the User ID is for being written access controller;Or
The ID with the access card of access controller pairing is obtained as User ID.
4. method as claimed in claim 3, which is characterized in that the acquisition and the ID of the access card of access controller pairing make For User ID, including:
By the NFC function of mobile terminal, the ID of access card corresponding with access controller is obtained as User ID;Or, passing through Conversion equipment obtains the ID of the corresponding access card of access controller.
5. a kind of gate inhibition's authentication device based on dynamic two-dimension code, which is characterized in that including:
Response Code scan module, for by scanning the two-dimensional code image and decrypting acquisition 2 D code information, the 2 D code information Generated time, effective time, effective degree including image in 2 D code and User ID;
Judgment module judges time for scanning identical image in 2 D code for judging current time whether within the effective time Whether number is less than or equal to the effective degree;
Sending module, for the User ID to be sent to access controller.
6. a kind of access control system, which is characterized in that including:
Quick Response Code read head obtains 2 D code information for scanning the two-dimensional code image, and the 2 D code information includes image in 2 D code Generated time, effective time, effective degree and User ID;Judge that current time whether within the effective time, judges to sweep Whether the number for retouching identical image in 2 D code is less than or equal to the effective degree;If current time within the effective time, And the number of the identical image in 2 D code of scanning is less than or equal to the effective degree, then the User ID is sent to access control Device;
Access controller, for judging whether the User ID that the Quick Response Code read head is sent is correct, if correctly, access control Lock is opened.
7. access control system as claimed in claim 6, which is characterized in that
Further include conversion equipment, the conversion equipment includes keyboard, display, card reader and conversion module;
The conversion module is used for:It obtains the user mobile terminal identification code inputted by keyboard and is read by card reader The ID of access card;It is encrypted the mobile terminal identification code and the ID to form ciphertext, and the ciphertext is converted into two It is shown over the display after dimension code image.
8. a kind of device generating dynamic two-dimension code, which is characterized in that including:
Receiving module receives effective time input by user and effective degree;
Acquisition module obtains current time and User ID;
Conversion module is encrypted the current time, User ID, effective time and effective degree to form ciphertext, and by institute It states ciphertext and is converted into image in 2 D code.
9. a kind of terminal device, which is characterized in that including processor, input equipment, output equipment and memory, the processing Device, input equipment, output equipment and memory are connected with each other, wherein the memory is for storing computer program, the meter Calculation machine program includes program instruction, and the processor is configured for calling described program instruction, executes such as Claims 1-4 Any one of them method.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey Sequence, the computer program include program instruction, and described program instruction makes the processor execute such as when being executed by a processor Claims 1-4 any one of them method.
CN201810229388.0A 2018-03-20 2018-03-20 A kind of entrance guard authentication method and device based on dynamic two-dimension code Pending CN108460875A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810229388.0A CN108460875A (en) 2018-03-20 2018-03-20 A kind of entrance guard authentication method and device based on dynamic two-dimension code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810229388.0A CN108460875A (en) 2018-03-20 2018-03-20 A kind of entrance guard authentication method and device based on dynamic two-dimension code

Publications (1)

Publication Number Publication Date
CN108460875A true CN108460875A (en) 2018-08-28

Family

ID=63237495

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810229388.0A Pending CN108460875A (en) 2018-03-20 2018-03-20 A kind of entrance guard authentication method and device based on dynamic two-dimension code

Country Status (1)

Country Link
CN (1) CN108460875A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109377618A (en) * 2018-11-08 2019-02-22 深圳市亲邻科技有限公司 Guard method and device
CN109871923A (en) * 2019-02-19 2019-06-11 深圳市西克智能技术有限公司 Time-correcting method, terminal device and storage medium based on two dimensional code
CN109948748A (en) * 2019-02-02 2019-06-28 郑州匠芯电子科技有限公司 A kind of encryption method and system of two dimensional code anti-copying
CN111523626A (en) * 2019-02-02 2020-08-11 腾讯科技(深圳)有限公司 Electronic code display method and related device
CN111968278A (en) * 2020-08-21 2020-11-20 广州挺称心电子科技有限公司 Offline intelligent access control system and device thereof
CN112349007A (en) * 2020-09-28 2021-02-09 湖北民族大学 Offline gate authentication device and time synchronization method
CN112580762A (en) * 2019-09-29 2021-03-30 北京沃东天骏信息技术有限公司 Dynamic two-dimensional code and identification method and identification device thereof
TWI761843B (en) * 2019-06-26 2022-04-21 中國商深圳市商湯科技有限公司 Access control method and device, electronic device and storage medium
CN115394001A (en) * 2022-07-29 2022-11-25 北京旷视科技有限公司 Identity authentication system, method, electronic device, and computer-readable medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103606211A (en) * 2013-10-30 2014-02-26 小米科技有限责任公司 Method, equipment and system used for realization of intelligent entrance guard
CN103903316A (en) * 2012-12-28 2014-07-02 中国电信股份有限公司 Intelligent access control system and access control method thereof
CN104464045A (en) * 2014-11-11 2015-03-25 曾桓涛 Two-dimension code-based access control method and two-dimension code-based access control system
CN104851171A (en) * 2015-06-05 2015-08-19 成都生长线科技有限公司 Intelligent access control method, device and system
CN105046775A (en) * 2015-07-14 2015-11-11 黄育斌 Device for unlocking time domain two-dimension code
CN105069876A (en) * 2015-08-04 2015-11-18 珠海格力电器股份有限公司 Intelligent access control method and system
CN105741395A (en) * 2016-02-03 2016-07-06 慧锐通智能科技股份有限公司 Entrance guard access method and system based on two-dimension code and face identification
CN106250959A (en) * 2016-08-01 2016-12-21 吴龙 Produce the method for dynamic two-dimension code, entrance guard authentication method and related system
US20170163621A1 (en) * 2012-09-04 2017-06-08 Kabushiki Kaisha Toshiba Wireless communication apparatus, authentication apparatus, wireless communication method and authentication method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170163621A1 (en) * 2012-09-04 2017-06-08 Kabushiki Kaisha Toshiba Wireless communication apparatus, authentication apparatus, wireless communication method and authentication method
CN103903316A (en) * 2012-12-28 2014-07-02 中国电信股份有限公司 Intelligent access control system and access control method thereof
CN103606211A (en) * 2013-10-30 2014-02-26 小米科技有限责任公司 Method, equipment and system used for realization of intelligent entrance guard
CN104464045A (en) * 2014-11-11 2015-03-25 曾桓涛 Two-dimension code-based access control method and two-dimension code-based access control system
CN104851171A (en) * 2015-06-05 2015-08-19 成都生长线科技有限公司 Intelligent access control method, device and system
CN105046775A (en) * 2015-07-14 2015-11-11 黄育斌 Device for unlocking time domain two-dimension code
CN105069876A (en) * 2015-08-04 2015-11-18 珠海格力电器股份有限公司 Intelligent access control method and system
CN105741395A (en) * 2016-02-03 2016-07-06 慧锐通智能科技股份有限公司 Entrance guard access method and system based on two-dimension code and face identification
CN106250959A (en) * 2016-08-01 2016-12-21 吴龙 Produce the method for dynamic two-dimension code, entrance guard authentication method and related system

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109377618A (en) * 2018-11-08 2019-02-22 深圳市亲邻科技有限公司 Guard method and device
CN109948748A (en) * 2019-02-02 2019-06-28 郑州匠芯电子科技有限公司 A kind of encryption method and system of two dimensional code anti-copying
CN111523626A (en) * 2019-02-02 2020-08-11 腾讯科技(深圳)有限公司 Electronic code display method and related device
CN109871923A (en) * 2019-02-19 2019-06-11 深圳市西克智能技术有限公司 Time-correcting method, terminal device and storage medium based on two dimensional code
TWI761843B (en) * 2019-06-26 2022-04-21 中國商深圳市商湯科技有限公司 Access control method and device, electronic device and storage medium
CN112580762A (en) * 2019-09-29 2021-03-30 北京沃东天骏信息技术有限公司 Dynamic two-dimensional code and identification method and identification device thereof
CN111968278A (en) * 2020-08-21 2020-11-20 广州挺称心电子科技有限公司 Offline intelligent access control system and device thereof
CN112349007A (en) * 2020-09-28 2021-02-09 湖北民族大学 Offline gate authentication device and time synchronization method
CN115394001A (en) * 2022-07-29 2022-11-25 北京旷视科技有限公司 Identity authentication system, method, electronic device, and computer-readable medium
CN115394001B (en) * 2022-07-29 2024-04-26 北京旷视科技有限公司 Identity authentication system, method, electronic device, and computer-readable medium

Similar Documents

Publication Publication Date Title
CN108460875A (en) A kind of entrance guard authentication method and device based on dynamic two-dimension code
CN105915502B (en) The method and system being added conducive to network
CN106161359B (en) It authenticates the method and device of user, register the method and device of wearable device
CN105391840B (en) Automatically create destination application
CN106850209A (en) A kind of identity identifying method and device
CN108012268A (en) A kind of mobile phone terminal SIM card and the method for safe handling App, medium
CN106503492A (en) A kind of authorization management method, server, customer equipment and system
RU2573211C2 (en) Execution method and universal electronic card and smart card system
CN102568061B (en) Method, system and device for achieving entrance guard control
CN103609136A (en) Method for in-situ upgrading RFID readers
US20150248668A1 (en) Secure mobile device transactions
CN103502994A (en) Method for handling privacy data
CN107004077A (en) Method and system for providing safe and independently operable biological characteristic authentication
CN104281272B (en) Password Input processing method and processing device
CN104424676A (en) Identity information sending method, identity information sending device, access control card reader and access control system
CN106060073B (en) Channel key machinery of consultation
CN102867157A (en) Mobile terminal and data protecting method
WO2014180345A1 (en) User identity verification and authorization system
CN105139201A (en) Method for facilitating transactions, computer program product and mobile device
CN109302442A (en) A kind of data storage method of proof and relevant device
CN102480724A (en) Software authentication data card, software authentication system and software authentication method
CN102983969A (en) Security login system and security login method for operating system
CN110349316A (en) A kind of visitor's access control system and control method
CN106295267B (en) It is a kind of access electronic equipment physical memory in private data method and apparatus
US20160381495A1 (en) Application management system with contactless wrist

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180828

RJ01 Rejection of invention patent application after publication