[go: up one dir, main page]

CN115439966A - Community one-code access control and elevator control method and system based on two-dimensional code - Google Patents

Community one-code access control and elevator control method and system based on two-dimensional code Download PDF

Info

Publication number
CN115439966A
CN115439966A CN202211086386.3A CN202211086386A CN115439966A CN 115439966 A CN115439966 A CN 115439966A CN 202211086386 A CN202211086386 A CN 202211086386A CN 115439966 A CN115439966 A CN 115439966A
Authority
CN
China
Prior art keywords
equipment
community
authorized
user
unique
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211086386.3A
Other languages
Chinese (zh)
Inventor
郭强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dalian Aijiajia Smart Technology Co ltd
Original Assignee
Dalian Aijiajia Smart Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian Aijiajia Smart Technology Co ltd filed Critical Dalian Aijiajia Smart Technology Co ltd
Priority to CN202211086386.3A priority Critical patent/CN115439966A/en
Publication of CN115439966A publication Critical patent/CN115439966A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B66HOISTING; LIFTING; HAULING
    • B66BELEVATORS; ESCALATORS OR MOVING WALKWAYS
    • B66B1/00Control systems of elevators in general
    • B66B1/34Details, e.g. call counting devices, data transmission from car to control system, devices giving information to the control system
    • B66B1/3415Control system configuration and the data transmission or communication within the control system
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B66HOISTING; LIFTING; HAULING
    • B66BELEVATORS; ESCALATORS OR MOVING WALKWAYS
    • B66B1/00Control systems of elevators in general
    • B66B1/34Details, e.g. call counting devices, data transmission from car to control system, devices giving information to the control system
    • B66B1/46Adaptations of switches or switchgear
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B66HOISTING; LIFTING; HAULING
    • B66BELEVATORS; ESCALATORS OR MOVING WALKWAYS
    • B66B2201/00Aspects of control systems of elevators
    • B66B2201/40Details of the change of control mode
    • B66B2201/46Switches or switchgear
    • B66B2201/4607Call registering systems
    • B66B2201/4615Wherein the destination is registered before boarding
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B66HOISTING; LIFTING; HAULING
    • B66BELEVATORS; ESCALATORS OR MOVING WALKWAYS
    • B66B2201/00Aspects of control systems of elevators
    • B66B2201/40Details of the change of control mode
    • B66B2201/46Switches or switchgear
    • B66B2201/4607Call registering systems
    • B66B2201/4653Call registering systems wherein the call is registered using portable devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Power Engineering (AREA)
  • Elevator Control (AREA)

Abstract

The invention discloses a community one-code access control and elevator control method and system based on two-dimensional codes, wherein a user mobile terminal only needs to send an authorized user identifier and possible geographical position information to a management background, the management background can predict a community to be accessed, extract an equipment identifier list corresponding to all equipment to be authorized by an authorized address of a user in the access community and a corresponding elevator authorization layer number to encode and encrypt, generate the two-dimensional codes and feed the two-dimensional codes back to the user mobile terminal, an identification terminal scans the two-dimensional codes to obtain encrypted data, then, an allocated secret key is used for decryption to obtain an authorization equipment identifier list and an elevator authorization layer number, pre-stored equipment identifiers are searched in the list, equipment authority self-checking is carried out, and if the equipment identifiers are found successfully, an associated access controller or elevator controller is controlled to open a door. According to the invention, the control two-dimensional code can be generated without appointed equipment, the problem of complex operation of the two-dimensional code access control is solved, and the possibility of replacing the contactable electronic card by the two-dimensional code access control is realized.

Description

Community one-code access control and elevator control method and system based on two-dimensional code
Technical Field
The invention belongs to the technical field of access control management, and particularly relates to a community one-code access control and elevator control method and system based on two-dimensional codes.
Background
The existing entrance guard elevator control system mainly adopts a non-contact electronic card entrance guard technology as a main part, and although the non-contact electronic card entrance guard elevator control has the advantages of low cost, convenience and the like, the problems of easy duplication, low safety and the like exist.
The existing two-dimensional code entrance guard elevator control technology can improve safety, solves the problem of easy duplication, and needs to select once when meeting a door or an elevator in a community, and then generates a two-dimensional code for the door or the elevator to control the door or the elevator. When the community has a plurality of doors or elevators, the operation is complicated, and the possibility of selection errors also exists. Compared with the operation of opening the non-contact electronic card access control ladder once, the interaction simplicity has the major disadvantage, so that the door lock can only be used as a supplement of the non-contact electronic card access control technology, can not replace non-contact electronic card equipment, and can not fundamentally solve the problem of non-contact electronic card items.
Disclosure of Invention
The invention aims to provide a community one-code-pass access control and ladder control method and system based on two-dimensional codes, which are used for solving the problems in the prior art.
In order to achieve the purpose, the invention adopts the following technical scheme:
in a first aspect, a community one-code access control and elevator control method based on two-dimensional codes is provided, and comprises the following steps:
the user mobile terminal sends the authorized user unique identification and the geographic position information of the user to the management background according to the operation instruction of the user, and the geographic position information can be sent only when the mobile terminal is authorized to obtain the geographic position;
the management background predicts communities/office buildings and the like to be visited according to the user identification and the geographical position information to obtain community identifications to be visited;
the management background acquires all the community addresses of the user authorized to access in the community corresponding to the community identification according to the authorized user identification and the community identification to be accessed; aiming at each community address, acquiring unique equipment identifiers corresponding to all access control equipment and elevator control equipment on an address path from outside the community to inside the community; taking a union set of all the unique equipment identifiers to obtain a unique identifier list of all authorized equipment of the corresponding user in the corresponding community; for the elevator control equipment, acquiring floor information corresponding to an address in a community corresponding to the elevator control equipment; generating a device control instruction according to the unique identification list of all authorized devices and the corresponding floor information;
the management background adopts a secret key which is distributed and set corresponding to the community to encode and encrypt the equipment control instruction to obtain encrypted data, generates a two-dimensional code according to the encrypted data and feeds the two-dimensional code back to the user mobile terminal;
displaying the two-dimension code to an identification terminal of a corresponding community through a user mobile terminal, and scanning the two-dimension code by the identification terminal to obtain encrypted data;
the identification terminal decrypts the encrypted data according to a pre-stored key distributed by a corresponding community to obtain an equipment control instruction, and analyzes the equipment control instruction to obtain an equipment unique identifier list of the two-dimensional code controllable equipment;
the identification terminal searches the unique identifier of the equipment prestored in the local in the analyzed unique identifier list of the equipment; if the search is successful, acquiring a device type identifier according to the pre-stored local device unique identifier, and judging; if the equipment is the access control equipment, generating an access control instruction and transmitting the access control instruction to the associated access controller; if the elevator controller is the elevator controller, the authorized floor information of the elevator is read, and an elevator control command is generated and transmitted to the associated elevator control controller.
Based on the technical content, when a user needs to access in a corresponding community, the user can only need to send an authorized user identifier and possible geographical location information to a management background through a user mobile terminal, so that the management background can predict the community to be accessed according to the authorized user identifier, acquire all authorized intra-community address lists in the corresponding community, and acquire unique identifiers of all access control equipment and elevator control equipment on an address path from the outside of the community to the inside of the community for each intra-community address; taking a union set of all the unique equipment identifiers, and acquiring an equipment unique identifier list of all authorized equipment in the community; and for the elevator controller, reading floor information corresponding to an address in the community, generating a device control command for the list and the floor codes, encrypting the device control command, generating a two-dimensional code, feeding the two-dimensional code back to the user mobile terminal, holding the user mobile terminal, and displaying the two-dimensional code to the identification terminal. The identification terminal scans the two-dimension code to obtain encrypted data, then decrypts the encrypted data by using a secret key distributed by the community to obtain a two-dimension code control instruction, decodes the two-dimension code control instruction to obtain a controllable equipment unique identification list, searches a pre-stored equipment unique identification in the list, reads equipment type information of the pre-stored equipment unique identification if the searching is successful, and sends the instruction to an associated access controller if the searching is the access equipment type; if the type of the elevator control equipment is the type of the elevator control equipment, the floor number information corresponding to the elevator equipment is read, and an instruction is sent to an elevator floor controller.
The two-dimensional code containing the device unique identifier list of all authorized devices of the user in the community is generated in the management background, and the identification terminal performs authorization verification by self-identifying the pre-stored device unique identifiers in the device unique list, so that one code in the community can control all the authorized devices. Thereby when using in the community, need not to appoint specific entrance guard's equipment or terraced accuse equipment, need not to switch the request two-dimensional code between the equipment of difference, only need send the two-dimensional code request at every turn, this two-dimensional code request need not contain the only sign of equipment that the equipment that will control corresponds, will obtain a community two-dimensional code, arbitrary user is authorized entrance guard or terraced accuse equipment of using in this two-dimensional code can control the community, the complexity that the two-dimensional code used has been reduced, make the mode that replaces non-contact electronic card become possible.
In a possible design, before the user mobile terminal sends the authorized user identifier to the management background, the method further includes:
the management background allocates equipment identifiers to access control equipment and elevator equipment in the community, binds the equipment identifiers with actual community addresses, and maintains a corresponding relation table of the community addresses and the unique equipment identifiers;
sending registration information to a management background through a user mobile terminal, and finishing user registration by the management background according to the registration information;
sending an authorization application to a management background through a user mobile terminal, wherein the authorization application comprises a user identifier and a community address applying for authorization;
the manager decides whether to authorize the user according to the actual situation of the user and the address in the community, if the user is authorized, the manager manages the background, and associates, binds and stores the user identifier and the address in the community to complete the authorization of the user. The manager can add, modify and delete the intra-community address authorized by the user in the background, namely the user can be authorized to a plurality of intra-community addresses;
in one possible design, the method further includes: and the management background gives the user identification and the authorization time limit of the address in the associated community.
In a possible design, the user mobile terminal sends the authorized user identifier and possible geographical location information to the management background according to the operation instruction of the user.
In one possible design, the method further includes:
and the user mobile terminal receives and displays the two-dimension code fed back by the management background.
In one possible design, before the identification terminal scans the two-dimensional code to obtain the encrypted data, the method further includes:
and writing the key of the corresponding community and the unique equipment identifier corresponding to the address of the equipment into the identification terminal.
The second aspect provides entrance guard and ladder accuse control system based on two-dimensional code, removes end, recognition terminal and management backstage including the user, wherein:
the user mobile terminal is used for sending a user identifier to the management background according to an operation instruction of a user, and when the user mobile terminal is authorized to acquire geographical position information, the user mobile terminal can also send the geographical position information of the location of the user, obtain a two-dimensional code which is returned by the background and contains an encrypted equipment control instruction, and display the two-dimensional code to the identification terminal;
the management background is used for predicting communities to be accessed according to the authorized user identification and possible geographical position information, matching all accessible intra-community address lists authorized by the user in the communities according to the user identification and the corresponding community identification, acquiring the unique equipment identification of the entrance guard or elevator control equipment on an address path from the outside of the community to the inside of the community for each intra-community address, and merging all the unique equipment identifications to obtain all the unique identification lists of the authorized equipment of the corresponding user in the communities; for the elevator control equipment, the elevator floor number of the community address corresponding to the unique equipment identifier is taken; generating a device control command according to the unique identification list of the full authorization device and the elevator floor number, coding and encrypting the control command by adopting a key which is allocated and set by a corresponding community to obtain encrypted data, generating a two-dimensional code according to the encrypted data, and feeding the two-dimensional code back to a user mobile terminal;
the identification terminal is used for scanning the two-dimensional code to obtain encrypted data, decrypting the encrypted data according to a pre-stored secret key distributed by a corresponding community to obtain an equipment control instruction, decoding a unique identification list of authorized equipment from the control instruction, inquiring the unique equipment identification pre-stored in the equipment in the list, if the searching is successful, reading the equipment type according to the unique pre-stored equipment identification, judging, if the equipment is access control equipment, generating an access control instruction and transmitting the access control instruction to an associated access controller, and if the equipment is elevator control equipment, reading the floor number information of a corresponding elevator, generating an elevator control instruction and transmitting the elevator control instruction to the associated elevator control controller.
Has the beneficial effects that: the invention designs a community one-code two-dimensional code access control and elevator control method, when a user enters a community, the user can directly send out a two-dimensional code request with a user identifier without specifying specific equipment every time the user requests the two-dimensional code, the obtained two-dimensional code can also control authorized access control and elevators, and the interaction complexity is greatly reduced. And after the equipment scans the two-dimensional code, the authority self-checking is carried out by utilizing the unique equipment identification bound in advance, so that the entrance guard ladder control equipment is controlled, and networking is not needed. The two-dimensional code access control elevator system is easier to install and more convenient to use, a non-contact electronic card is replaced to be possible, and the safety and the convenience of community access control management are improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic flow chart of the method of the present invention.
Detailed Description
It should be noted that the description of the embodiments is provided to help understanding of the present invention, but the present invention is not limited thereto. Specific structural and functional details disclosed herein are merely representative for purposes of describing example embodiments of the present invention. This invention may, however, be embodied in many alternate forms and should not be construed as limited to the embodiments set forth herein.
It should be understood that the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes," and/or "including," when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, numbers, steps, operations, elements, components, and/or groups thereof.
In the following description, specific details are provided to facilitate a thorough understanding of example embodiments. However, it will be understood by those of ordinary skill in the art that the example embodiments may be practiced without these specific details. For example, systems may be shown in block diagrams in order not to obscure the examples in unnecessary detail. In other instances, well-known processes, structures and techniques may be shown without unnecessary detail in order to avoid obscuring the embodiments.
Example 1:
the embodiment provides a community-based full-authority authorized entrance guard and elevator control method based on a two-dimensional code, which can be applied to complex interaction of two-dimensional code entrance guard optimization, so that the operability and simplicity of the two-dimensional code entrance guard can reach the traditional non-contact electronic card, such as an IC (integrated circuit)/ID (identity) card/NFC (near field communication) card, and the popularization of the two-dimensional code entrance guard is promoted. The system comprises a user mobile terminal, an identification terminal and a management background, and as shown in figure 1, the method comprises the following steps:
and S101, the user mobile terminal sends the authorized user identification to the management background according to the operation instruction of the user, and when the mobile terminal obtains the system positioning authorization, the mobile terminal can simultaneously send the geographic position information. It should be noted that the mobile terminal may be, but is not limited to, an applet, an app, and the like.
When the user needs to enter the corresponding community, the user mobile terminal can be operated to send the authorized user identification to the management background. For example, a user opens a user mobile terminal, clicks to enter a corresponding applet or APP, the user mobile terminal opens the applet or APP according to an operation instruction of the user, and then sends an authorized user ID to a management background through the applet or APP.
Before this, a user is required to perform registration application and authorization application to obtain an available user ID after authorization, and the specific process includes: the user sends registration information to the management background through the user mobile terminal, the management background completes user registration according to the registration information, and unique authentication information such as a mobile phone number and openid can be bound as a user identifier when the user registers; after the successful registration, the user sends an authorization application to the management background through the user mobile terminal, wherein the authorization application comprises a user identifier and an internal community address for applying authorization; after judging that the user can be authorized, the manager binds the address in the application authorization community and the user identifier through the management background; the manager can increase, modify and remove the binding relationship between more addresses and user identifications in the community through the management background according to the actual situation, and complete the authorization of the user; a user may have multiple authorized intra-community addresses; meanwhile, the management background maintains a corresponding relation list of the intra-community address and the unique device identifier, and the unique identifier information of the corresponding device can be obtained through the intra-community address. In this example, the unique device identification information includes a device type ID and a device ID, where the type ID may be an access control type ID and a ladder control type ID, and if the access control type ID is set to 1 and the ladder control type ID is set to 2; the equipment IDs can respectively correspond to equipment numbers of all the access controllers or the elevator controllers, for example, the equipment IDs corresponding to the access controllers of all the unit buildings are 1, 2 and 3 \8230, the equipment IDs corresponding to the elevator controllers of all the unit buildings are 1, 2 and 3 \8230, and the like, the type IDs are used for distinguishing the access control or the elevator control, and the equipment IDs are used for distinguishing the controllers in the corresponding types.
And S102, the management background predicts the community to be accessed according to the authorized user identification and the geographic position information to obtain the unique community identification. The method comprises the steps of utilizing a community unique identification and a user identification to match all authorized community addresses of users of a corresponding community, obtaining equipment unique identifications of all entrance guard equipment and elevator control equipment on an address path from the outside of the community to the inside of the community aiming at each community address, merging all the unique identifications to obtain a full-authority equipment unique identification list of the users in the community, reading the elevator floor number of the corresponding community address for the elevator control equipment in the elevator control equipment, and generating an equipment control command according to the equipment unique identification list and the corresponding elevator floor number.
It should be noted that the prediction method for the community to be accessed is not unique, and one possible method is to use the community that the user has accessed last time as the prediction community.
During specific implementation, for an intra-community address, such as the No. 1 building 2 unit 802, access control equipment from outside the community to the intra-community address comprises community access control equipment and 2 units of access control equipment, and elevator control equipment comprises elevator control equipment of the No. 1 building 2 unit, so that the equipment unique identification list comprises a community access unique identification, a 2 unit access unique identification and an elevator controller unique identification in the No. 1 building 2 unit. It should be noted that, the user has a plurality of addresses in the community, and the union of the unique identifiers of the devices needs to be taken, for example, the user has two authorized addresses in the community, the 1 st floor unit 802 and the 1 st floor unit 606, and then the device represented by the final elevator device identifier list is a cell access control (two authorized addresses both contain the device and only need to contain once), the 1 st floor unit access control, the 1 st floor unit elevator, and the 1 st floor unit elevator.
And S103, the management background encodes and encrypts the equipment control command by adopting a secret key set by corresponding community distribution to obtain encrypted data, generates a two-dimensional code according to the encrypted data, and feeds the two-dimensional code back to the user mobile terminal.
During specific implementation, the management background performs key encryption processing on the equipment control instruction to obtain encrypted data, the key adopts a key set by corresponding community distribution, and different communities distribute different keys. And then generating a corresponding two-dimension code according to the encrypted data, and feeding the two-dimension code back to the user mobile terminal.
The management background can endow the user identification and the authorization time limit of the address in the associated community, the management background can provide corresponding service for the user corresponding to the user identification only in the authorization time limit, and the management background does not perform permission list matching and two-dimensional code feedback after receiving the user identification outside the authorization time limit.
And S104, displaying the two-dimension code to an identification terminal of the corresponding community through the user mobile terminal, and scanning the two-dimension code by the identification terminal to obtain encrypted data.
During specific implementation, after receiving the two-dimensional code sent by the management background through the applet or APP of the user mobile terminal, the user displays the two-dimensional code to the corresponding identification terminal of the community. For safety, the two-dimension code is a dynamic two-dimension code, and the effective time is short, so that an applet or an APP at a mobile terminal of a user needs to reapply a new two-dimension code each time the applet or the APP is opened. And the identification terminal scans the two-dimensional code to obtain corresponding encrypted data.
And S105, the identification terminal decrypts the encrypted data according to the pre-stored key distributed by the corresponding community to obtain an equipment operation instruction, decodes the equipment operation instruction, and analyzes the equipment unique identification list and the elevator authorization layer number.
In specific implementation, after the identification terminal obtains the encrypted data, the encrypted data is decrypted according to a pre-stored key distributed by a corresponding community to obtain an equipment operation instruction, the operation instruction is decoded to obtain an authorized unique identifier list of the equipment, and the unique identifier of the equipment in the embodiment comprises a type ID and an equipment ID. The secret key adopts a secret key set by corresponding community distribution, and different communities distribute different secret keys.
S106, the identification terminal searches the pre-stored unique equipment identifier in a decoded unique authorized equipment identifier list, if the search is successful, the type information in the unique equipment identifier is read, the type ID is adopted in the example, the judgment is carried out, if the unique equipment identifier is the access control equipment, an access control command is generated and transmitted to an associated access controller; if the elevator control device is used, the corresponding authorized floor number of the elevator is read, and an elevator control command is generated and transmitted to the associated elevator control controller.
In specific implementation, after the identification terminal decrypts the device control instruction, the device control instruction is decoded to obtain a type ID and a device ID list, the type ID and the device ID pre-stored in the device are searched in the authorized device type ID and device ID list, if the searching is successful, the type ID is judged, and if the type ID is the access control device, the access control instruction is generated and transmitted to the associated access controller; if the type ID is the elevator control equipment, the floor authorization information of the elevator is further read, and an elevator control command is generated and transmitted to the associated elevator control controller. If an inconsistency occurs, no action is performed. The identification terminal needs to have a corresponding type ID and device ID written therein in advance.
The method of this embodiment does not need community entrance guard equipment or ladder accuse equipment to network, need not to appoint specific entrance guard equipment or ladder accuse equipment during the request equipment two-dimensional code, consequently in the interaction, need not to switch between the equipment of difference, only need simply send the two-dimensional code request can obtain the two-dimensional code of steerable authorized equipment to open the entrance guard or ladder accuse that correspond in the community, in order to replace the mode of traditional non-contact electronic card discernment, improve the security and the convenience embodiment 2 of community entrance guard management:
this embodiment provides entrance guard and terraced control system based on two-dimensional code, including user's removal end, recognition terminal and management backstage, wherein:
the user mobile terminal is used for sending the authorized user identification to the management background according to the operation instruction of the user, acquiring the geographical position information, sending the geographical position information to the background and displaying the two-dimensional code to the identification terminal of the corresponding community;
the management background is used for predicting a community to be accessed by a user according to an authorized user identifier, acquiring a community unique identifier corresponding to the community, acquiring an authorized access equipment unique identifier list and authorized elevator floor information of the user in the community by using the community unique identifier and the user identifier, generating an equipment control command by using the equipment unique identifier list and the authorized floor information of the elevator, encoding and encrypting the equipment control command by using a key distributed and set by the corresponding community to obtain encrypted data, generating a two-dimensional code according to the encrypted data, and feeding the two-dimensional code back to a user mobile terminal;
the identification terminal is used for scanning the two-dimensional code to obtain encrypted data, decrypting the encrypted data according to a pre-stored secret key distributed by a corresponding community to obtain an equipment control instruction, decoding the encrypted data to obtain an authorized equipment unique identification list, searching the pre-stored equipment unique identification in the authorized equipment unique identification list, reading equipment type information and judging the equipment type information if the equipment is successfully searched, generating an access control instruction to transmit to an associated access controller if the equipment is an access control device, and reading corresponding floor information if the equipment is an elevator control device to generate an elevator control instruction to transmit to the associated elevator control controller.
The user mobile terminal can be a mobile phone, a tablet or an intelligent wearable device (such as an intelligent watch). The identification terminal comprises a two-dimensional code scanner, a Processor and the like, wherein the two-dimensional code scanner is used for scanning a two-dimensional code to obtain corresponding encrypted data, the Processor is used for decrypting the encrypted data after code scanning and Processing and transmitting an access control instruction or a ladder control instruction, and the Processor can be a general Processor and comprises a Central Processing Unit (CPU), a Network Processor (NP) and the like; but also Digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The management back office may employ a general purpose computer, a special purpose computer, a computer network, or other programmable system.
Finally, it should be noted that: the above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (5)

1. A community one-code access control and ladder control method based on two-dimensional codes is characterized by comprising the following steps:
the user mobile terminal sends the authorized user unique identifier and the geographical position information to the management background according to the operation instruction of the user, and the geographical position information is only sent when the mobile terminal obtains the geographical position authorization;
the management background predicts the community to be accessed according to the authorized user identification and acquires all the intra-community addresses of which the users are authorized in the prediction community; aiming at each community internal address, the management background acquires unique equipment identifiers of all public access control equipment or elevator control equipment on an address path from outside the community to inside the community, wherein the unique equipment identifiers comprise equipment type information, and an equipment unique identifier list corresponding to the community internal address and authorized by a user is formed; taking a union set of the authorized equipment unique identification lists corresponding to all the addresses in the community to form an equipment unique identification list corresponding to all the authorized equipment of all the users in the community finally; meanwhile, for the elevator control equipment in the equipment unique identification list, the management background reads the floor information of the address of the corresponding user in the community corresponding to the elevator controller; coding the unique list of the equipment identifications and the floor information in the list to generate an equipment control instruction;
the management background encrypts the equipment control instruction by adopting a secret key which is distributed and set corresponding to the community to obtain encrypted data, generates a two-dimensional code according to the encrypted data and feeds the two-dimensional code back to the user mobile terminal;
displaying the two-dimension code to an identification terminal of a corresponding community through a user mobile terminal, and scanning the two-dimension code by the identification terminal to obtain encrypted data;
the identification terminal decrypts the encrypted data according to a pre-stored secret key distributed by a corresponding community to obtain an equipment control instruction, decodes the control instruction and obtains an authorized equipment unique identification list and authorized floor information corresponding to the elevator controller in the list;
the identification terminal searches the pre-stored unique device identifier in the authorized device unique identifier list; when the search is successful, the device is indicated to be positioned on an access path from the outside of the cell to an address in the community to be accessed, the device type information is further read from the pre-stored unique device identifier, and judgment is carried out; if the equipment type is the type of the access control equipment, generating an access control instruction and transmitting the access control instruction to the associated access controller; and if the equipment type is the elevator control equipment type, reading authorized floor information corresponding to the unique identifier of the corresponding equipment, generating an elevator control instruction by using the authorized floor information, and transmitting the elevator control instruction to the associated elevator control controller.
2. The two-dimensional code-based community one-code access control and elevator control method according to claim 1, wherein before the user mobile terminal sends the authorized user unique identifier to the management background, the method further comprises:
sending registration information to a management background through a user mobile terminal, and finishing user registration by the management background according to the registration information;
sending an authorization application to a management background through a user mobile terminal, wherein the authorization application comprises a user identifier and an address in a community applying for authorization;
the management background receives the authorization passing instruction, binds the user identification and the address in the application authorization community, and completes the authorization of the user; the authorized binding address can be added, modified and removed in the background according to the situation, and one user can be authorized to a plurality of intra-community addresses; meanwhile, a corresponding relation list of the addresses in the community and the equipment identifications is maintained by the background, and the corresponding equipment identifications can be found through the addresses in the community.
3. The two-dimensional code-based community one-code access control and elevator control method according to claim 2, further comprising: and the management background gives the user identification and the authorization time limit of the address in the associated community.
4. The two-dimensional code-based community one-code access control and elevator control method according to claim 1, wherein before the identification terminal scans the two-dimensional code to obtain the encrypted data, the method further comprises:
and writing the key corresponding to the community and the unique identifier of the corresponding equipment into the identification terminal.
5. Community one-code access control and elevator control system based on two-dimensional code, which is characterized in that the system is used for realizing the method of any one of claims 1 to 4, the access control and elevator control system comprises a user mobile terminal, an identification terminal and a management background, wherein:
the user mobile terminal is used for sending authorized user identification and geographic position information to the management background according to the operation instruction of the user, receiving the two-dimensional code fed back by the management background, and displaying the two-dimensional code to the identification terminal;
the management background is used for predicting the community to be visited according to the authorized user unique identification and the geographic position information, acquiring all authorized community internal address lists of the user corresponding to the user unique identification in the community to be visited, acquiring an equipment unique identification list corresponding to all installation equipment on a path from the outside of the community to the authorized community internal address for each authorized community internal address, and finally acquiring a union set of the equipment unique identification lists corresponding to all the authorized community internal addresses and outputting the union set as the corresponding equipment unique identification list corresponding to all the community internal authorized equipment; for elevator control equipment in the elevator control equipment, simultaneously acquiring floor information of an address in a community corresponding to the elevator controller; encoding the unique identification list of all authorized devices and the authorized floor information to form a device control command, encoding and encrypting the control command by adopting a key which is distributed and set corresponding to a community to obtain encrypted data, generating a two-dimensional code according to the encrypted data, and feeding the two-dimensional code back to a user mobile terminal;
the identification terminal is used for scanning the two-dimensional code to obtain encrypted data, and decrypting the encrypted data according to a pre-stored key distributed by a corresponding community to obtain an equipment control instruction; decoding to obtain a unique identifier list of the authorized equipment; searching a pre-stored unique device identifier in the unique authorized device identifier list; if the searching is successful, obtaining the equipment type information from the unique equipment identification and judging; if the type of the access control equipment is the type of the access control equipment, generating an access control instruction and transmitting the access control instruction to the associated access controller; and if the type of the elevator control equipment is the type of the elevator control equipment, taking out the floor information corresponding to the unique identifier of the corresponding elevator, generating an elevator control instruction according to the floor information, and transmitting the elevator control instruction to the associated elevator controller.
CN202211086386.3A 2022-09-06 2022-09-06 Community one-code access control and elevator control method and system based on two-dimensional code Pending CN115439966A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211086386.3A CN115439966A (en) 2022-09-06 2022-09-06 Community one-code access control and elevator control method and system based on two-dimensional code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211086386.3A CN115439966A (en) 2022-09-06 2022-09-06 Community one-code access control and elevator control method and system based on two-dimensional code

Publications (1)

Publication Number Publication Date
CN115439966A true CN115439966A (en) 2022-12-06

Family

ID=84247668

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211086386.3A Pending CN115439966A (en) 2022-09-06 2022-09-06 Community one-code access control and elevator control method and system based on two-dimensional code

Country Status (1)

Country Link
CN (1) CN115439966A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116386172A (en) * 2022-12-16 2023-07-04 财拓云计算(上海)有限公司 Data center authority management method, device, electronic equipment and readable storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104063930A (en) * 2014-06-18 2014-09-24 大连智慧城科技有限公司 Multi-access intelligent recognition system based on position and method
CN105427416A (en) * 2015-11-04 2016-03-23 广东安居宝数码科技股份有限公司 Two-dimension code unlocking method and system
CN205608843U (en) * 2016-04-28 2016-09-28 四川誉合誉科技有限公司 Entrance guard control device and access control system based on two -dimensional code scanning
CN106327649A (en) * 2016-08-31 2017-01-11 北京厚文知识产权顾问有限公司 Two-dimensional code based access control system and door opening method
CN108408513A (en) * 2018-03-19 2018-08-17 深圳市敢为特种设备物联网技术有限公司 Elevator Quick Response Code boarding control method, device and computer readable storage medium
CN108846068A (en) * 2018-06-07 2018-11-20 安徽鼎龙网络传媒有限公司 A kind of navigation operating system on micro- scene management backstage
CN112978526A (en) * 2021-03-11 2021-06-18 归巢智慧科技(深圳)有限公司 Access control method, device and system and elevator control method, device and system
KR102341883B1 (en) * 2021-04-15 2021-12-20 김경신 Smart door system with facial recognition function

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104063930A (en) * 2014-06-18 2014-09-24 大连智慧城科技有限公司 Multi-access intelligent recognition system based on position and method
CN105427416A (en) * 2015-11-04 2016-03-23 广东安居宝数码科技股份有限公司 Two-dimension code unlocking method and system
CN205608843U (en) * 2016-04-28 2016-09-28 四川誉合誉科技有限公司 Entrance guard control device and access control system based on two -dimensional code scanning
CN106327649A (en) * 2016-08-31 2017-01-11 北京厚文知识产权顾问有限公司 Two-dimensional code based access control system and door opening method
CN108408513A (en) * 2018-03-19 2018-08-17 深圳市敢为特种设备物联网技术有限公司 Elevator Quick Response Code boarding control method, device and computer readable storage medium
CN108846068A (en) * 2018-06-07 2018-11-20 安徽鼎龙网络传媒有限公司 A kind of navigation operating system on micro- scene management backstage
CN112978526A (en) * 2021-03-11 2021-06-18 归巢智慧科技(深圳)有限公司 Access control method, device and system and elevator control method, device and system
KR102341883B1 (en) * 2021-04-15 2021-12-20 김경신 Smart door system with facial recognition function

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116386172A (en) * 2022-12-16 2023-07-04 财拓云计算(上海)有限公司 Data center authority management method, device, electronic equipment and readable storage medium

Similar Documents

Publication Publication Date Title
CN101316132B (en) Integrated access control system and a method of controlling the same
KR101419984B1 (en) System and method for sharing content suing nfc in cloud circumstance
CN109688133B (en) Communication method based on account login free
CN100426719C (en) Method of identification between user device and local client use or remote-network service
KR102124838B1 (en) Access Control Method Using SmartKey AND Access Control System for Them
CN100471110C (en) Method and apparatus for managing digital rights using a portable storage device
CN101656748A (en) Second-generation ID card online inquiry system and method based on secure network
CN103544746A (en) Electronic access control system of dynamic bar code
CN104798083A (en) Method and system for verifying an access request
KR102109981B1 (en) Hotel smart key service method of hybrid security environment for different types of user terminals and hotel smart key management system for them
CN112232814A (en) Encryption and decryption method of payment key, payment authentication method and terminal equipment
CN109639644B (en) Authorization verification method and device, storage medium and electronic equipment
CN101414913A (en) Computer network authentication system and method based on virtual technology
CN112750242A (en) Unlocking method and system of dynamic coded lock and dynamic coded lock circuit
US7099476B2 (en) Method for updating a network ciphering key
CN104123777B (en) A kind of gate inhibition's remote-authorization method
JP2013037474A (en) Built-in apparatus maintenance system
CN115439966A (en) Community one-code access control and elevator control method and system based on two-dimensional code
KR102112975B1 (en) Access Control Method Using SmartKey Based On Hybrid Security Environment AND Access Control System for Them
CN114386091A (en) Information processing device based on block chain
JP2011100289A (en) Security system and authentication method
KR101572430B1 (en) A key management method using a mobile communication terminal, a key management server and a mobile communication terminal for door lock opening and closing
JP2016515778A (en) Application encryption processing method, apparatus and terminal
KR100505481B1 (en) Certification system for WEB service access using a mobile terminal
WO2004088557A1 (en) Information processing system, information processing device, method, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination