CN108460875A - A kind of entrance guard authentication method and device based on dynamic two-dimension code - Google Patents
A kind of entrance guard authentication method and device based on dynamic two-dimension code Download PDFInfo
- Publication number
- CN108460875A CN108460875A CN201810229388.0A CN201810229388A CN108460875A CN 108460875 A CN108460875 A CN 108460875A CN 201810229388 A CN201810229388 A CN 201810229388A CN 108460875 A CN108460875 A CN 108460875A
- Authority
- CN
- China
- Prior art keywords
- code
- user
- effective
- image
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 230000004044 response Effects 0.000 claims abstract description 61
- 230000005764 inhibitory process Effects 0.000 claims abstract description 18
- 238000006243 chemical reaction Methods 0.000 claims description 22
- 230000006870 function Effects 0.000 claims description 17
- 238000004590 computer program Methods 0.000 claims description 16
- 238000012545 processing Methods 0.000 claims description 5
- 238000004364 calculation method Methods 0.000 claims description 3
- 238000004422 calculation algorithm Methods 0.000 description 12
- 238000010586 diagram Methods 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 9
- 230000008569 process Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 5
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 230000010485 coping Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention is suitable for gate inhibition's technical field, provides a kind of entrance guard authentication method based on dynamic two-dimension code, including:By scanning the two-dimensional code image and decrypting acquisition 2 D code information, current time is judged whether within the effective time, judges whether the number for scanning identical image in 2 D code is less than or equal to the effective degree;If current time is within the effective time, and the number for scanning identical image in 2 D code is less than or equal to the effective degree, then the User ID is sent to access controller.The embodiment of the present invention fails when not parsing Quick Response Code or ciphertext data by being parsed and being decrypted to Quick Response Code, illustrates that the Quick Response Code of scanning is not correct opening gate Quick Response Code, effectively prevent malice opening gate.And effective time and effective degree are judged after decryption, malice opening gate has been further prevented, has improved anti-theft capability so that safety higher.
Description
Technical field
The invention belongs to gate inhibition's technical field more particularly to a kind of entrance guard authentication methods based on dynamic two-dimension code.
Background technology
With the progress of science and technology, intelligent entrance guard technology has been commonly utilized in mansion office building, intellectual communityintellectualized village etc.
The room entry/exit management of public place controls.Currently, gate inhibition's card technique that existing access control system largely all uses, because of access card
It is inconvenient to carry, in this case, it is thus proposed that access card ID is converted to Quick Response Code and is stored in by Quick Response Code gate inhibition's technology
, only need to be by two-dimensional code scanning when use in mobile phone, although this technology uses more convenient, cost is also relatively low
It is honest and clean, but due to existing Quick Response Code gate inhibition all be fixed two-dimension code image, be easy by other people replicate or take pictures, safety
Property is poor.Also, makes the access control equipment of original recognition access control system card be converted to the access control equipment of identification Quick Response Code, need again
Access control equipment is installed or larger transformation is carried out to original access control equipment, not only trouble is also spent greatly in this way.
Invention content
In view of this, an embodiment of the present invention provides a kind of entrance guard authentication method based on dynamic two-dimension code, it is existing to solve
There is the Quick Response Code access control system safety difference in technology and the access control equipment of original recognition access control system card is converted into identification two dimension
The access control equipment of code is troublesome and spends high problem.
The first aspect of the embodiment of the present invention provides a kind of entrance guard authentication method based on dynamic two-dimension code, including:
By scanning the two-dimensional code image and decrypting acquisition 2 D code information, the 2 D code information includes image in 2 D code
Generated time, effective time, effective degree and User ID;
Judge that current time whether within the effective time, judges whether the number for scanning identical image in 2 D code is less than
Or it is equal to the effective degree;
If current time is within the effective time, and the number for scanning identical image in 2 D code has less than or equal to described
Number is imitated, then the User ID is sent to access controller.
The second aspect of the embodiment of the present invention provides a kind of method generating dynamic two-dimension code, is applied to mobile terminal,
This method includes:
Receive effective time input by user and effective degree;
Obtain current time and User ID;
The current time, User ID, effective time and effective degree are encrypted to form ciphertext, and by the ciphertext
It is converted into image in 2 D code.
Further, it is described receive effective time input by user and effective degree before, further include:It generates and shows use
Family ID, the User ID is for being written access controller;Or
The ID with the access card of access controller pairing is obtained as User ID.
Further, described to obtain the ID with the access card of access controller pairing as User ID, including:
By the NFC function of mobile terminal, the ID of access card corresponding with access controller is obtained as User ID;Or,
The ID of the corresponding access card of access controller is obtained by access card conversion equipment.
The third aspect of the embodiment of the present invention provides a kind of gate inhibition's authentication device based on dynamic two-dimension code, including:
Response Code scan module, for by scanning the two-dimensional code image and decrypting acquisition 2 D code information, the Quick Response Code
Information includes generated time, effective time, effective degree and the User ID of image in 2 D code;
Judgment module, for judging that current time whether within the effective time, judges to scan identical image in 2 D code
Number whether be less than or equal to the effective degree;
Sending module, for the User ID to be sent to access controller.
The fourth aspect of the embodiment of the present invention provides a kind of access control system, including:
Quick Response Code read head obtains 2 D code information for scanning the two-dimensional code image, and the 2 D code information includes Quick Response Code
Generated time, effective time, effective degree and the User ID of image;Judge that current time whether within the effective time, is sentenced
Whether the disconnected number for scanning identical image in 2 D code is less than or equal to the effective degree;If current time is in the effective time
It is interior, and the number for scanning identical image in 2 D code is less than or equal to the effective degree, then the User ID is sent to gate inhibition
Controller;
Access controller, for judging whether the User ID that the Quick Response Code read head is sent is correct, if correctly, controlling
Door-control lock is opened.
Further, the access control system further includes conversion equipment, and the conversion equipment includes keyboard, display, Card Reader
Device and conversion module;
The conversion module is used for:Obtain the mobile terminal identification code and read by card reader that user is inputted by keyboard
The ID of the access card arrived;It is encrypted the mobile terminal identification code and the ID to form ciphertext, and the ciphertext is converted
At being shown over the display after image in 2 D code.
5th aspect of the embodiment of the present invention provides a kind of device generating dynamic two-dimension code, including:
Receiving module receives effective time input by user and effective degree;
Acquisition module obtains current time and preset User ID;
Conversion module is encrypted the current time, User ID, effective time and effective degree to form ciphertext, and
The ciphertext is converted into image in 2 D code.
6th aspect of the embodiment of the present invention provides a kind of terminal device, including processor, input equipment, output equipment
And memory, the processor, input equipment, output equipment and memory are connected with each other, wherein the memory is for storing
Terminal is supported to execute the computer program of the above method, the computer program includes program instruction, and the processor is configured
For calling described program to instruct, the method for executing above-mentioned first aspect and second aspect.
7th aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage
It includes program instruction that media storage, which has computer program, the computer program, and described program instructs when being executed by a processor
The method for making the processor execute above-mentioned first aspect and second aspect.
Existing advantageous effect is the embodiment of the present invention compared with prior art:
The embodiment of the present invention obtains 2 D code information by scanning the two-dimensional code image, judges whether current time has described
In the effect time and judge whether the number for scanning identical image in 2 D code is less than or equal to the effective degree, only when current
Between within the effective time and scan identical image in 2 D code number be less than or equal to the effective degree when, will just use
Family ID is sent to access controller.The embodiment of the present invention by being parsed and decrypted to Quick Response Code, do not parse Quick Response Code or
Fail when ciphertext data, illustrate that the Quick Response Code of scanning is not correct opening gate Quick Response Code, effectively prevents malice and open
Gate inhibition.And effective time and effective degree are judged after decryption, malice opening gate has been further prevented, has improved
Anti-theft capability so that safety higher.
Description of the drawings
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art
Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description be only the present invention some
Embodiment for those of ordinary skill in the art without having to pay creative labor, can also be according to these
Attached drawing obtains other attached drawings.
Fig. 1 is a kind of flow diagram of entrance guard authentication method based on dynamic two-dimension code provided in an embodiment of the present invention;
Fig. 2 is a kind of flow diagram of method generating dynamic two-dimension code provided in an embodiment of the present invention;
Fig. 3 is the flow diagram of another method for generating dynamic two-dimension code provided in an embodiment of the present invention;
Fig. 4 is a kind of schematic block diagram of gate inhibition's authentication device based on dynamic two-dimension code provided in an embodiment of the present invention;
Fig. 5 is a kind of schematic block diagram of device generating dynamic two-dimension code provided in an embodiment of the present invention;
Fig. 6 is a kind of schematic block diagram of access control system provided in an embodiment of the present invention;
Fig. 7 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention.
Specific implementation mode
In being described below, for illustration and not for limitation, it is proposed that such as tool of particular system structure, technology etc
Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific
The present invention can also be realized in the other embodiments of details.In other situations, it omits to well-known system, device, electricity
The detailed description of road and method, in case unnecessary details interferes description of the invention.
It should be appreciated that ought use in this specification and in the appended claims, term " comprising " and "comprising" instruction
Described feature, entirety, step, operation, the presence of element and/or component, but one or more of the other feature, whole is not precluded
Body, step, operation, element, component and/or its presence or addition gathered.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment
And be not intended to limit the present invention.As description of the invention and it is used in the attached claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singulative, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and the appended claims is
Refer to any combinations and all possible combinations of one or more of associated item listed, and includes these combinations.
In order to illustrate technical solutions according to the invention, illustrated below by specific embodiment.
With reference to figure 1, Fig. 1 is a kind of entrance guard authentication method based on dynamic two-dimension code provided in an embodiment of the present invention, the party
Method executive agent is Quick Response Code read head, and the Quick Response Code read head executes the method as described in step S101 to S104, this method packet
Include step:S101 to S104.
S101, by scanning the two-dimensional code image and decrypting acquisition 2 D code information, the 2 D code information includes Quick Response Code
Generated time, effective time, effective degree and the User ID of image.
In embodiments of the present invention, the effective time is the time that user is arranged by application program for mobile terminal
Interval, if the time of clock module within effective time, calculates effective in Quick Response Code read head.For example, the effective time can be with
Be since the generated time of image in 2 D code after a period of time, after the effective time can also be that random time starts
For a period of time.For example, Quick Response Code generated time is 10 minutes 10 points of on March 8th, 2018, user setting effective time is 20 minutes,
Then the effective time is 30 minutes 10 points of March 8 of 10 minutes to 2018 10 points of on March 8th, 2018, alternatively, user setting is effective
Time is 35 minutes 10 points of March 8 of 15 minutes to 2018 10 points of on March 8th, 2018.It should be understood that it is merely illustrative statement herein, and
It should not be understood as the concrete restriction to the present invention.
Quick Response Code read head is scanned and is decoded to image in 2 D code, obtains encrypted ciphertext in image in 2 D code, is used
Ciphertext is decrypted in decipherment algorithm, obtains generated time, effective time, effective degree and the user of image in 2 D code therein
ID.If the data in image in 2 D code have used certain Encryption Algorithm to be encrypted, then Quick Response Code read head must use and add
The corresponding decipherment algorithm of close algorithm could successfully be decrypted the data in the Quick Response Code.Quick Response Code is mutually tied with encryption technology
The safety of information in image in 2 D code can be ensured by closing, and prevent information leakage.
Optionally, in an embodiment of the present invention, if decryption failure, signal an alert or error signal.Ying Li
Solution, is merely illustrative statement herein, can not be interpreted as the concrete restriction to the present invention.
S102 judges current time whether within the effective time, if current time is held within the effective time
Row step S103.
The current time be Quick Response Code read head in clock module time, if current time within the effective time,
Then judge whether the number for scanning identical image in 2 D code is less than or equal to the effective degree.
For example, the effective time is 30 minutes 10 points of March 8 of 10 minutes to 2018 10 points of on March 8th, 2018, if two-dimentional
The time of clock module is 20 minutes 10 points of on March 8th, 2018 in code read head, then in the Quick Response Code read head clock module time
Within the effective time;If the time of clock module is 40 minutes 10 points of on March 8th, 2018 in Quick Response Code read head, not in institute
It states in effective time.It should be understood that being merely illustrative statement herein, the concrete restriction to the present invention can not be interpreted as.
Step S103, judges whether the number for scanning identical image in 2 D code is less than or equal to the effective degree.
In embodiments of the present invention, every image in 2 D code is scanned primary, and Quick Response Code read head will be by this Quick Response Code
The generated time of image and scanned number are preserved.In order to save the memory space of Quick Response Code read head, when this Quick Response Code
After past effective time of image, Quick Response Code read head will be by the information deletion of this image in 2 D code of preservation.
Quick Response Code read head obtains the generated time of scanned image in 2 D code, is looked into from the image in 2 D code information of storage
Image in 2 D code information identical with the generated time of scanned image in 2 D code is looked for, optionally, in the another kind of the present invention
In embodiment, Quick Response Code read head can also preserve the scanned number and User ID of image in 2 D code, because at one
The same time can be only generated an image in 2 D code on mobile terminal, and be wrapped in the image in 2 D code generated on different mobile terminal
The User ID contained is different.If the generated time according to image in 2 D code is found that multiple image in 2 D code letters when being searched
Breath, then searched further according to User ID, can thus find unique image in 2 D code information.
If being scanned the scanned number of image in 2 D code in the image in 2 D code information found less than or equal to this
The User ID is then sent to access controller by the effective degree of image in 2 D code.
Further, if the scanned number for being scanned image in 2 D code in the image in 2 D code information found is more than this
The effective degree for opening image in 2 D code, then illustrate that the effective degree of this image in 2 D code has run out.Optionally, in the present invention
A kind of embodiment in, if in the image in 2 D code information found be scanned image in 2 D code scanned number more than this
The effective degree of image in 2 D code, then scanning means signal an alert or error signal.It should be understood that being merely illustrative table herein
It states, the concrete restriction to the present invention can not be interpreted as.
The User ID is sent to access controller by step S104.
If current time is within the effective time and scans the number of identical image in 2 D code less than or equal to described
The User ID is then sent to access controller by effective degree.
The embodiment of the present invention obtains 2 D code information by scanning the two-dimensional code image, judges whether current time has described
In the effect time and judge whether the number for scanning identical image in 2 D code is less than or equal to the effective degree, only when current
Between within the effective time and scan identical image in 2 D code number be less than or equal to the effective degree when, will just use
Family ID is sent to access controller.The embodiment of the present invention does not parse two dimension by being parsed and being decrypted to image in 2 D code
Fail when code image or ciphertext data, illustrates that the image in 2 D code of scanning is not correct opening gate Quick Response Code, it is effective anti-
Malice opening gate is stopped.And effective time and effective degree are judged after decryption, malice has been further prevented to open
Gate inhibition is opened, anti-theft capability is improved so that safety higher.
With reference to figure 2, Fig. 2 is a kind of method generating dynamic two-dimension code provided in an embodiment of the present invention, and this method is applied to
Mobile terminal, including step S201-S203.
Step S201 receives effective time input by user and effective degree.
In embodiments of the present invention, user can be inputted by voice, or by the keyboard of mobile terminal, or pass through movement
The touch screen displays input effective time of terminal and effective degree.It should be understood that being merely illustrative statement herein, can not be interpreted as
To the concrete restriction of the present invention.
Step S202 obtains current time and User ID.
The current time is the time of the clock module of mobile terminal, is stored in the User ID and access controller
ID is identical.
Step S203 is encrypted the current time, User ID, effective time and effective degree to form ciphertext, and
The ciphertext is converted into image in 2 D code.
The current time and User ID of effective time input by user and effective degree and acquisition are used into Encryption Algorithm
It is encrypted to form ciphertext, then ciphertext is subjected to coding and forms image in 2 D code.In embodiments of the present invention, the coding of Quick Response Code
Mode and data encryption algorithm can be selected according to actual conditions.If the data in image in 2 D code have used certain to encrypt
Algorithm is encrypted, then Quick Response Code read head must use decipherment algorithm corresponding with Encryption Algorithm could be successfully to the Quick Response Code
In data be decrypted.It ensure that the safety of data by the way that data are encrypted, it is therefore prevented that maliciously crack Quick Response Code.
With reference to figure 3, in above-described embodiment step S201:Before receiving effective time input by user and effective degree, also
Including step S200.
Step S200:It generates and shows User ID.
If the mobile terminal runs the embodiment for the first time, need to generate a User ID, the User ID is used for
Access controller is written.
In an embodiment of the present invention, mobile terminal can generate a User ID at random according to algorithm, and user obtains
Give this ID to property management staff after this ID, this ID is write by access controller by gate inhibition's daemon software by property management staff
In.
Further, in another embodiment of the invention, the mobile terminal can also obtain and match with access controller
To access card ID as User ID.
Nowadays popularizing with mobile payment, most of mobile phone vendor commercial city starts that wireless near field communication is added in mobile phone
Technology (Near Field Communication, NFC).NFC payment is exactly by the equipment simulating with NFC function in simple terms
At a non-contact card, such as access card, bank card.If mobile terminal possesses NFC function, by access card close to mobile terminal
NFC chip read range, mobile terminal can obtain the ID of access card, movement is eventually by running application call NFC chip
End is again using the ID of the access card read as User ID.
If the mobile terminal does not support NFC function, need to obtain the corresponding door of access controller by conversion equipment
Prohibit the ID of card.Such case will be described in the embodiment of conversion equipment described below, and the embodiment of the present invention was not done
It repeats more.
It should be understood that in embodiments of the present invention, the access card is divided into ID cards and IC card, ID card full name identification cards,
It is a kind of non-writable contactless card, contains fixed number.IC card full name integrated circuit card, read-write, capacity is big.Wherein, one
Part gate inhibition's IC card is to go to carry out opening gate by the way that fixed sequence number is written, and another part is the permissions data of write-in, this
The number of 2 systems is all converted to when a little permissions data write-in IC card.So when access card is that the IC card of permissions data is written,
The ID of acquisition for mobile terminal is actually these binary numbers.
With reference to figure 4, Fig. 4 is a kind of showing for gate inhibition's authentication device 40 based on dynamic two-dimension code provided in an embodiment of the present invention
It is intended to, as shown in figure 4, the device includes:Response Code scan module 41, judgment module 42, sending module 43.
Response Code scan module 41, for obtaining 2 D code information, the 2 D code information by scanning the two-dimensional code image
Generated time, effective time, effective degree including image in 2 D code and User ID.
Judgment module 42 judges to scan identical Quick Response Code figure for judging current time whether within the effective time
Whether the number of picture is less than or equal to the effective degree.
Sending module 43, for the User ID to be sent to access controller.
The embodiment of the present invention is lost by being decoded and decrypting to Quick Response Code when not parsing Quick Response Code or ciphertext data
It loses, then illustrates that the Quick Response Code of scanning is not correct enabling Quick Response Code, effectively prevent malice opening gate.And it is decrypting
Effective time and effective degree are judged afterwards, malice opening gate has been further prevented, has improved anti-theft capability so that peace
Full property higher.
With reference to figure 5, Fig. 5 is a kind of schematic diagram of device 50 generating dynamic two-dimension code provided in an embodiment of the present invention, such as
Shown in Fig. 5, which includes:Receiving module 51, acquisition module 52, conversion module 53.
Receiving module 51 receives effective time input by user and effective degree.
Acquisition module 52 obtains current time and User ID.
Conversion module 53 is encrypted to form ciphertext to the current time, User ID, effective time and effective degree,
And the ciphertext is converted into image in 2 D code.
Data are encrypted the embodiment of the present invention to effectively prevent ID to leak, and compare traditional fixed Quick Response Code figure
Piece is safer.
With reference to figure 6, Fig. 6 is a kind of schematic diagram of access control system 60 provided in an embodiment of the present invention, as shown in fig. 6, this is
System includes:Quick Response Code read head 61, access controller 62.
Quick Response Code read head 61 obtains 2 D code information for scanning the two-dimensional code image, and the 2 D code information includes two dimension
Generated time, effective time, effective degree and the User ID of code image;Current time is judged whether within the effective time,
Judge whether the number for scanning identical image in 2 D code is less than or equal to the effective degree;If current time is when described effective
In, and the number for scanning identical image in 2 D code is less than or equal to the effective degree, then the User ID is sent to door
Prohibit controller.
Access controller 62, for judging whether the User ID that the Quick Response Code read head is sent is correct, if correctly, controlling
Door-control lock processed is opened.
Further, the access control system further includes conversion equipment 63, the conversion equipment 63 include keyboard, display,
Card reader and conversion module;
The conversion module is used for:Obtain the mobile terminal identification code and read by card reader that user is inputted by keyboard
The ID of the access card arrived is encrypted the mobile terminal identification code and the ID to form ciphertext, and the ciphertext is converted
At being shown over the display after image in 2 D code.The mobile terminal identification code will by application program (Application, APP)
The International Mobile Station Equipment Identification (International Mobile Equipment Identity, IMEI) of mobile terminal, movement
EIC equipment identification code (Mobile Equipment IDentifier, MEID), media access control (Media Access
Control, MAC) address and the self-contained unique codes of APP generated by algorithm.
Further, the access control system further includes mobile terminal, and the mobile terminal is stored with ciphering two-dimension code data
Key.The mobile terminal is used to generate image in 2 D code according to current time, User ID, effective time and effective degree;
The mobile terminal is additionally operable to obtain the ID with the access card of access controller pairing as User ID;The mobile terminal is also used
In the two-dimension code image of generation is sent to default contact person, for example, when having guest to come to visit, user can be given birth to by mobile terminal
At one 10 minutes in limited time, the two-dimension code image of limit time 1 time be sent to guest, efficiently solve visiting guest and pass in and out gate inhibition's
Problem, it is ensured that the safety of system.It should be understood that being merely illustrative statement herein, can not be interpreted as to the specific of the present invention
Limitation.
Further, the Quick Response Code read head 61 includes memory, and the memory is used to store the life of image in 2 D code
It is scanned number and User ID at the time, the memory is also stored with the key of decryption two-dimensional code data.
Further, the access controller 62 includes memory, and the memory is for storing User ID.
The ID of access card matched with access controller that obtains includes as User ID:Pass through the NFC of mobile terminal
Function obtains the ID of access card corresponding with access controller as User ID;Or, obtaining access controller by conversion equipment
The ID of corresponding access card.The specific work process of module in above system can refer to the correspondence in preceding method embodiment
Process, details are not described herein.
Mobile terminal by the image in 2 D code on 63 display of scan transformation equipment, to image in 2 D code carry out parsing and
Decryption, obtains the ID of mobile terminal identification code and access card therein, judges whether mobile terminal identification code is the machine, if so,
Then the ID for the access card for including in image in 2 D code is set as the User ID of mobile terminal by mobile terminal.By using conversion equipment
Mobile terminal is written into access card ID, overcomes the defect that mobile terminal does not support NFC function, and by inputting mobile terminal
Identification code, it is ensured that the mobile terminal of user could obtain access card ID, ensure that access card ID will not leak, more pacify
All risk insurance is close.
Further, in the embodiment of the present invention, shown Quick Response Code read head 61 is connected to access controller by Wiegand interface
On 62, the access controller 62 can be the access controller of any brand.
Quick Response Code read head can connect the access controller of any brand in the embodiment of the present invention, be compared to traditional gate inhibition
System, the embodiment of the present invention need not replace access controller and need not be also transformed to the communication interface of access controller, only
As soon as it needs to connect a Quick Response Code read head on the basis of original access controller, it can be so that access control system increase has Quick Response Code
Imitate the judgement of time and effective degree so that the security performance of original gate inhibition gets a promotion, and the embodiment of the present invention can prop up
Holding ID toll bars taboo can also support IC card entrance guard, use scope more wide.It is also not required in addition, mobile terminal need not connect network
It wirelessly or non-wirelessly to be connect with access control system, gate inhibition's unlock can be carried out, door can not be opened when avoiding no network signal
The embarrassment of taboo.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process
Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit
It is fixed.
Fig. 7 is the schematic diagram for the terminal device that one embodiment of the invention provides.As shown in fig. 7, the terminal of the embodiment is set
Standby 7 include:Processor 70, memory 71 and it is stored in the meter that can be run in the memory 71 and on the processor 70
Calculation machine program 72.The processor 70 realizes the step in above-mentioned each embodiment of the method when executing the computer program 72,
Such as step 101 shown in FIG. 1 is to 104.Alternatively, the processor 70 realizes above-mentioned each dress when executing the computer program 72
Set the function of each module in embodiment, such as the function of module 41 to 44 shown in Fig. 4.
Illustratively, the computer program 72 can be divided into one or more modules, one or more of
Module is stored in the memory 71, and is executed by the processor 70, to complete the present invention.One or more of moulds
Block can be the series of computation machine program instruction section that can complete specific function, and the instruction segment is for describing the computer journey
Implementation procedure of the sequence 72 in the terminal device 7.
The terminal device 7 can be that the calculating such as desktop PC, notebook, palm PC and cloud server are set
It is standby.The terminal device may include, but be not limited only to, processor 70, memory 71.It will be understood by those skilled in the art that Fig. 7
The only example of terminal device 7 does not constitute the restriction to terminal device 7, may include than illustrating more or fewer portions
Part either combines certain components or different components, such as the terminal device can also include input-output equipment, net
Network access device, bus etc..
Alleged processor 70 can be central processing unit (Central Processing Unit, CPU), can also be
Other general processors, digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor
Deng.
The memory 71 can be the internal storage unit of the terminal device 7, such as the hard disk of terminal device 7 or interior
It deposits.The memory 71 can also be to be equipped on the External memory equipment of the terminal device 7, such as the terminal device 7
Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodge
Deposit card (Flash Card) etc..Further, the memory 71 can also both include the storage inside list of the terminal device 7
Member also includes External memory equipment.The memory 71 is for storing needed for the computer program and the terminal device
Other programs and data.The memory 71 can be also used for temporarily storing the data that has exported or will export.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each work(
Can unit, module division progress for example, in practical application, can be as needed and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of described device are divided into different functional units or module, more than completion
The all or part of function of description.Each functional unit, module in embodiment can be integrated in a processing unit, also may be used
It, can also be above-mentioned integrated during two or more units are integrated in one unit to be that each unit physically exists alone
The form that hardware had both may be used in unit is realized, can also be realized in the form of SFU software functional unit.In addition, each function list
Member, the specific name of module are also only to facilitate mutually distinguish, the protection domain being not intended to limit this application.Above system
The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment
The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may realize that lists described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, depends on the specific application and design constraint of technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed device/terminal device and method, it can be with
It realizes by another way.For example, device described above/terminal device embodiment is only schematical, for example, institute
The division of module or unit is stated, only a kind of division of logic function, formula that in actual implementation, there may be another division manner, such as
Multiple units or component can be combined or can be integrated into another system, or some features can be ignored or not executed.Separately
A bit, shown or discussed mutual coupling or direct-coupling or communication connection can be by some interfaces, device
Or INDIRECT COUPLING or the communication connection of unit, can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple
In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also
It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.Above-mentioned integrated list
The form that hardware had both may be used in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or
In use, can be stored in a computer read/write memory medium.Based on this understanding, the present invention realizes above-mentioned implementation
All or part of flow in example method, can also instruct relevant hardware to complete, the meter by computer program
Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on
The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation
Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium
May include:Any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic of the computer program code can be carried
Dish, CD, computer storage, read-only memory (Read-Only Memory, ROM), random access memory (Random
Access Memory, RAM), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that the meter
The content that calculation machine readable medium includes can carry out increase and decrease appropriate according to legislation in jurisdiction and the requirement of patent practice,
Such as in certain jurisdictions, according to legislation and patent practice, computer-readable medium does not include electric carrier signal and telecommunications
Signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although with reference to aforementioned reality
Applying example, invention is explained in detail, it will be understood by those of ordinary skill in the art that:It still can be to aforementioned each
Technical solution recorded in embodiment is modified or equivalent replacement of some of the technical features;And these are changed
Or replace, the spirit and scope for various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution should all
It is included within protection scope of the present invention.
Claims (10)
1. a kind of entrance guard authentication method based on dynamic two-dimension code, which is characterized in that including:
By scanning the two-dimensional code image and decrypting acquisition 2 D code information, the 2 D code information includes the generation of image in 2 D code
Time, effective time, effective degree and User ID;
Judge that current time whether within the effective time, judges whether the number for scanning identical image in 2 D code is less than or waits
In the effective degree;
If current time is within the effective time, and the number for scanning identical image in 2 D code is less than or equal to described effective time
Number, then be sent to access controller by the User ID.
2. a kind of method generating dynamic two-dimension code, which is characterized in that be applied to mobile terminal, this method includes:
Receive effective time input by user and effective degree;
Obtain current time and User ID;
The current time, User ID, effective time and effective degree are encrypted to form ciphertext, and the ciphertext is converted
At image in 2 D code.
3. method as claimed in claim 2, which is characterized in that it is described receive effective time input by user and effective degree it
Before, further include:Generate and show User ID, the User ID is for being written access controller;Or
The ID with the access card of access controller pairing is obtained as User ID.
4. method as claimed in claim 3, which is characterized in that the acquisition and the ID of the access card of access controller pairing make
For User ID, including:
By the NFC function of mobile terminal, the ID of access card corresponding with access controller is obtained as User ID;Or, passing through
Conversion equipment obtains the ID of the corresponding access card of access controller.
5. a kind of gate inhibition's authentication device based on dynamic two-dimension code, which is characterized in that including:
Response Code scan module, for by scanning the two-dimensional code image and decrypting acquisition 2 D code information, the 2 D code information
Generated time, effective time, effective degree including image in 2 D code and User ID;
Judgment module judges time for scanning identical image in 2 D code for judging current time whether within the effective time
Whether number is less than or equal to the effective degree;
Sending module, for the User ID to be sent to access controller.
6. a kind of access control system, which is characterized in that including:
Quick Response Code read head obtains 2 D code information for scanning the two-dimensional code image, and the 2 D code information includes image in 2 D code
Generated time, effective time, effective degree and User ID;Judge that current time whether within the effective time, judges to sweep
Whether the number for retouching identical image in 2 D code is less than or equal to the effective degree;If current time within the effective time,
And the number of the identical image in 2 D code of scanning is less than or equal to the effective degree, then the User ID is sent to access control
Device;
Access controller, for judging whether the User ID that the Quick Response Code read head is sent is correct, if correctly, access control
Lock is opened.
7. access control system as claimed in claim 6, which is characterized in that
Further include conversion equipment, the conversion equipment includes keyboard, display, card reader and conversion module;
The conversion module is used for:It obtains the user mobile terminal identification code inputted by keyboard and is read by card reader
The ID of access card;It is encrypted the mobile terminal identification code and the ID to form ciphertext, and the ciphertext is converted into two
It is shown over the display after dimension code image.
8. a kind of device generating dynamic two-dimension code, which is characterized in that including:
Receiving module receives effective time input by user and effective degree;
Acquisition module obtains current time and User ID;
Conversion module is encrypted the current time, User ID, effective time and effective degree to form ciphertext, and by institute
It states ciphertext and is converted into image in 2 D code.
9. a kind of terminal device, which is characterized in that including processor, input equipment, output equipment and memory, the processing
Device, input equipment, output equipment and memory are connected with each other, wherein the memory is for storing computer program, the meter
Calculation machine program includes program instruction, and the processor is configured for calling described program instruction, executes such as Claims 1-4
Any one of them method.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey
Sequence, the computer program include program instruction, and described program instruction makes the processor execute such as when being executed by a processor
Claims 1-4 any one of them method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810229388.0A CN108460875A (en) | 2018-03-20 | 2018-03-20 | A kind of entrance guard authentication method and device based on dynamic two-dimension code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810229388.0A CN108460875A (en) | 2018-03-20 | 2018-03-20 | A kind of entrance guard authentication method and device based on dynamic two-dimension code |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108460875A true CN108460875A (en) | 2018-08-28 |
Family
ID=63237495
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810229388.0A Pending CN108460875A (en) | 2018-03-20 | 2018-03-20 | A kind of entrance guard authentication method and device based on dynamic two-dimension code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108460875A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109377618A (en) * | 2018-11-08 | 2019-02-22 | 深圳市亲邻科技有限公司 | Guard method and device |
CN109871923A (en) * | 2019-02-19 | 2019-06-11 | 深圳市西克智能技术有限公司 | Time-correcting method, terminal device and storage medium based on two dimensional code |
CN109948748A (en) * | 2019-02-02 | 2019-06-28 | 郑州匠芯电子科技有限公司 | A kind of encryption method and system of two dimensional code anti-copying |
CN111523626A (en) * | 2019-02-02 | 2020-08-11 | 腾讯科技(深圳)有限公司 | Electronic code display method and related device |
CN111968278A (en) * | 2020-08-21 | 2020-11-20 | 广州挺称心电子科技有限公司 | Offline intelligent access control system and device thereof |
CN112349007A (en) * | 2020-09-28 | 2021-02-09 | 湖北民族大学 | Offline gate authentication device and time synchronization method |
CN112580762A (en) * | 2019-09-29 | 2021-03-30 | 北京沃东天骏信息技术有限公司 | Dynamic two-dimensional code and identification method and identification device thereof |
TWI761843B (en) * | 2019-06-26 | 2022-04-21 | 中國商深圳市商湯科技有限公司 | Access control method and device, electronic device and storage medium |
CN115394001A (en) * | 2022-07-29 | 2022-11-25 | 北京旷视科技有限公司 | Identity authentication system, method, electronic device, and computer-readable medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103606211A (en) * | 2013-10-30 | 2014-02-26 | 小米科技有限责任公司 | Method, equipment and system used for realization of intelligent entrance guard |
CN103903316A (en) * | 2012-12-28 | 2014-07-02 | 中国电信股份有限公司 | Intelligent access control system and access control method thereof |
CN104464045A (en) * | 2014-11-11 | 2015-03-25 | 曾桓涛 | Two-dimension code-based access control method and two-dimension code-based access control system |
CN104851171A (en) * | 2015-06-05 | 2015-08-19 | 成都生长线科技有限公司 | Intelligent access control method, device and system |
CN105046775A (en) * | 2015-07-14 | 2015-11-11 | 黄育斌 | Device for unlocking time domain two-dimension code |
CN105069876A (en) * | 2015-08-04 | 2015-11-18 | 珠海格力电器股份有限公司 | Intelligent access control method and system |
CN105741395A (en) * | 2016-02-03 | 2016-07-06 | 慧锐通智能科技股份有限公司 | Entrance guard access method and system based on two-dimension code and face identification |
CN106250959A (en) * | 2016-08-01 | 2016-12-21 | 吴龙 | Produce the method for dynamic two-dimension code, entrance guard authentication method and related system |
US20170163621A1 (en) * | 2012-09-04 | 2017-06-08 | Kabushiki Kaisha Toshiba | Wireless communication apparatus, authentication apparatus, wireless communication method and authentication method |
-
2018
- 2018-03-20 CN CN201810229388.0A patent/CN108460875A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170163621A1 (en) * | 2012-09-04 | 2017-06-08 | Kabushiki Kaisha Toshiba | Wireless communication apparatus, authentication apparatus, wireless communication method and authentication method |
CN103903316A (en) * | 2012-12-28 | 2014-07-02 | 中国电信股份有限公司 | Intelligent access control system and access control method thereof |
CN103606211A (en) * | 2013-10-30 | 2014-02-26 | 小米科技有限责任公司 | Method, equipment and system used for realization of intelligent entrance guard |
CN104464045A (en) * | 2014-11-11 | 2015-03-25 | 曾桓涛 | Two-dimension code-based access control method and two-dimension code-based access control system |
CN104851171A (en) * | 2015-06-05 | 2015-08-19 | 成都生长线科技有限公司 | Intelligent access control method, device and system |
CN105046775A (en) * | 2015-07-14 | 2015-11-11 | 黄育斌 | Device for unlocking time domain two-dimension code |
CN105069876A (en) * | 2015-08-04 | 2015-11-18 | 珠海格力电器股份有限公司 | Intelligent access control method and system |
CN105741395A (en) * | 2016-02-03 | 2016-07-06 | 慧锐通智能科技股份有限公司 | Entrance guard access method and system based on two-dimension code and face identification |
CN106250959A (en) * | 2016-08-01 | 2016-12-21 | 吴龙 | Produce the method for dynamic two-dimension code, entrance guard authentication method and related system |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109377618A (en) * | 2018-11-08 | 2019-02-22 | 深圳市亲邻科技有限公司 | Guard method and device |
CN109948748A (en) * | 2019-02-02 | 2019-06-28 | 郑州匠芯电子科技有限公司 | A kind of encryption method and system of two dimensional code anti-copying |
CN111523626A (en) * | 2019-02-02 | 2020-08-11 | 腾讯科技(深圳)有限公司 | Electronic code display method and related device |
CN109871923A (en) * | 2019-02-19 | 2019-06-11 | 深圳市西克智能技术有限公司 | Time-correcting method, terminal device and storage medium based on two dimensional code |
TWI761843B (en) * | 2019-06-26 | 2022-04-21 | 中國商深圳市商湯科技有限公司 | Access control method and device, electronic device and storage medium |
CN112580762A (en) * | 2019-09-29 | 2021-03-30 | 北京沃东天骏信息技术有限公司 | Dynamic two-dimensional code and identification method and identification device thereof |
CN111968278A (en) * | 2020-08-21 | 2020-11-20 | 广州挺称心电子科技有限公司 | Offline intelligent access control system and device thereof |
CN112349007A (en) * | 2020-09-28 | 2021-02-09 | 湖北民族大学 | Offline gate authentication device and time synchronization method |
CN115394001A (en) * | 2022-07-29 | 2022-11-25 | 北京旷视科技有限公司 | Identity authentication system, method, electronic device, and computer-readable medium |
CN115394001B (en) * | 2022-07-29 | 2024-04-26 | 北京旷视科技有限公司 | Identity authentication system, method, electronic device, and computer-readable medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108460875A (en) | A kind of entrance guard authentication method and device based on dynamic two-dimension code | |
CN105915502B (en) | The method and system being added conducive to network | |
CN106161359B (en) | It authenticates the method and device of user, register the method and device of wearable device | |
CN105391840B (en) | Automatically create destination application | |
CN106850209A (en) | A kind of identity identifying method and device | |
CN108012268A (en) | A kind of mobile phone terminal SIM card and the method for safe handling App, medium | |
CN106503492A (en) | A kind of authorization management method, server, customer equipment and system | |
RU2573211C2 (en) | Execution method and universal electronic card and smart card system | |
CN102568061B (en) | Method, system and device for achieving entrance guard control | |
CN103609136A (en) | Method for in-situ upgrading RFID readers | |
US20150248668A1 (en) | Secure mobile device transactions | |
CN103502994A (en) | Method for handling privacy data | |
CN107004077A (en) | Method and system for providing safe and independently operable biological characteristic authentication | |
CN104281272B (en) | Password Input processing method and processing device | |
CN104424676A (en) | Identity information sending method, identity information sending device, access control card reader and access control system | |
CN106060073B (en) | Channel key machinery of consultation | |
CN102867157A (en) | Mobile terminal and data protecting method | |
WO2014180345A1 (en) | User identity verification and authorization system | |
CN105139201A (en) | Method for facilitating transactions, computer program product and mobile device | |
CN109302442A (en) | A kind of data storage method of proof and relevant device | |
CN102480724A (en) | Software authentication data card, software authentication system and software authentication method | |
CN102983969A (en) | Security login system and security login method for operating system | |
CN110349316A (en) | A kind of visitor's access control system and control method | |
CN106295267B (en) | It is a kind of access electronic equipment physical memory in private data method and apparatus | |
US20160381495A1 (en) | Application management system with contactless wrist |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180828 |
|
RJ01 | Rejection of invention patent application after publication |