[go: up one dir, main page]

WO2016115788A1 - Access authorization management method and system - Google Patents

Access authorization management method and system Download PDF

Info

Publication number
WO2016115788A1
WO2016115788A1 PCT/CN2015/078010 CN2015078010W WO2016115788A1 WO 2016115788 A1 WO2016115788 A1 WO 2016115788A1 CN 2015078010 W CN2015078010 W CN 2015078010W WO 2016115788 A1 WO2016115788 A1 WO 2016115788A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
access
access control
temporary
key
Prior art date
Application number
PCT/CN2015/078010
Other languages
French (fr)
Chinese (zh)
Inventor
张子敬
杨建彬
李春林
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2016115788A1 publication Critical patent/WO2016115788A1/en

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a method and system for managing access authorization.
  • the issuance of the access control card needs to be registered.
  • each owner needs to register the registration card after the property management office, or a separate IC card, or The user's personal data is written in the SE applet access control application of the user's mobile phone.
  • the number of the access card is limited, and the owner applies for registration.
  • the property department can only ask the owner to confirm the visiting status or the owner can open the door to receive the visitors. The operation process is too cumbersome and brings a lot of inconvenience.
  • the object of the present invention is to provide a method and system for managing access control authorization, which can conveniently implement access control authorization management for visiting clients and improve user convenience.
  • the present invention provides a method for managing an access authorization, the method comprising:
  • the first client obtains at least one key from the server
  • the switch of the access control is controlled according to the temporary access control information of the second user end.
  • the access card information of the first user terminal includes an access card number and ciphertext information
  • the step of generating temporary access control information according to the access card information of the first user end and the key include:
  • the access card number and the encrypted processed essay information are combined into the temporary access information.
  • the step of controlling the access control according to the temporary access control information of the second user terminal includes:
  • the access controller reads temporary access information of the second user end
  • the access controller sends the temporary access control information to the server for verification. If the access control controller passes the access control, the access control controller keeps the access control closed and issues a reminder.
  • the server verification includes:
  • the method further includes:
  • the present invention further provides an access authorization management system, the system comprising at least a first user terminal, a second user terminal, an access controller, and a server, wherein:
  • the first user terminal includes:
  • a key acquisition module configured to acquire at least one key from the server
  • An information generating module configured to generate temporary access control information according to the access card information of the first user end and the key
  • a first sending module configured to send the temporary access control information to the second user end
  • the access controller is configured to control the switch of the access control according to the temporary access control information of the second user end.
  • the access card information of the first user terminal includes an access card number and ciphertext information
  • the information generating module includes:
  • An encryption submodule configured to encrypt the ciphertext information by using the key
  • a combination submodule configured to combine the access control card number and the encrypted processed ciphertext information into the temporary access control information.
  • the access controller includes:
  • An information reading module configured to read temporary access control information of the second user end
  • An information sending module configured to send the temporary access control information to the server for verification
  • a switch control module configured to control to open the access control when the temporary access control information is verified, or the access control controller keeps the access control closed;
  • the information reminding module is configured to send a reminding message when the temporary access control information fails to pass the verification.
  • the server includes:
  • a first obtaining module configured to acquire the access card number
  • a second acquiring module configured to acquire the key and the first user end information according to the access card number
  • An information decryption module configured to decrypt the ciphertext information of the encryption process by using the key
  • the information matching module matches the ciphertext information with the information in the database.
  • the first user terminal further includes:
  • the permission setting module is configured to set the number of times of using the temporary access control information and/or the use time limit.
  • the invention obtains a key from the server through the authorized first user terminal, and further processes the temporary access control information through the key and the access card information of the first user end.
  • the temporary access information may be sent to the second user end corresponding to the user, and the second user sends a door opening request to the access controller through the access control information, and the access controller is configured according to the second user end.
  • Temporary access control information controls the access control switch.
  • FIG. 1 is a schematic structural diagram of an access authorization management system according to an embodiment of the present invention.
  • FIG. 2 is a schematic structural diagram of an access authorization management system according to another embodiment of the present invention.
  • FIG. 3 is a flowchart of a method for managing an access authorization according to an embodiment of the present invention.
  • FIG. 4 is a flow chart of a method for managing access control authorization according to another embodiment of the present invention.
  • the present invention provides an access authorization management system.
  • the system 100 includes at least a first user terminal 10, a server 20, a second user terminal 30, and an access controller 40. Specifically, the following:
  • the first user terminal 10 that is, the user terminal corresponding to the authorized user, for example, in the building access control system, the authorized user can be understood as the owner, and the first user terminal can be understood as the terminal integrated with the access control function used by the authorized user, for example, integrated.
  • NFC Near Field Communication
  • PDA Personal Digital Assistant
  • the first client 10 includes:
  • the key obtaining module 11 is configured to acquire at least one key from the server 20.
  • the key is a temporary key that can be generated and set by the server 20, such as the duration of use.
  • the information generating module 12 is configured to generate temporary access control information according to the access card information and the key of the first user terminal 10. When the temporary access information is generated, the first client 10 may add the temporary access information to the temporary use identifier through the information generating module 12.
  • the first sending module 13 is configured to send the temporary access information to the second client 30.
  • the second user terminal 30 of the present invention is a use terminal of an unauthorized user, and has no right to apply for registration of the access control card.
  • an unauthorized user can be understood as a temporary visiting guest, and the second user terminal 30 can be understood as an NFC-enabled mobile phone, PDA, tablet, etc. used by unauthorized users.
  • the temporary access control information After receiving the temporary access control information, it writes its own SE Applet.
  • the access controller 40 reads the temporary access control information and controls the switch of the access control according to the temporary access control information of the second user terminal 30.
  • the access card information of the first user terminal 10 of the present invention includes an access card number and a ciphertext information.
  • the information generating module 12 includes:
  • the encryption sub-module 121 is configured to process the ciphertext information by using the key encryption process.
  • the combination sub-module 122 is configured to combine the access control card number and the encrypted processed ciphertext information into the temporary access control information.
  • the access card number is used as the plaintext information
  • the ciphertext information includes the electronic authentication information in the access card of the first user terminal 10.
  • the access controller 40 includes:
  • the information reading module 41 is configured to read temporary access control information of the second user terminal 30.
  • the information sending module 42 is configured to send the temporary access control information to the server 20 for verification.
  • the switch control module 43 is configured to control the opening of the access control when the temporary access control information is verified, otherwise the access control controller keeps the access control closed.
  • the information reminding module 44 is configured to send reminder information when the temporary access control information fails to pass the verification.
  • the access controller 40 interacts with the server 20 and sends the temporary access control information to the server 20 for verification.
  • the server 20 returns the verification result to the access controller 40, and the access controller 40 controls the switch of the access control system based on the verification result.
  • the server 20 includes:
  • the first obtaining module 21 is configured to obtain the access card number.
  • the second obtaining module 22 is configured to acquire the key and the information of the first user terminal 10 according to the access card number.
  • the information decryption module 23 is configured to decrypt the ciphertext information of the encryption process by using the key.
  • the information matching module 24 matches the ciphertext information with the information in the database.
  • the access controller 40 reports the read temporary access information to the server 20.
  • the access control server decomposes the message, first obtaining the plaintext part, and passing the plaintext. (that is, the access card number authorized by the authorized user) searches the database for all the information of the access card, including the authorized user (first user) personal information and the authority and the authority to distribute the temporary access card, and the server 20 will pass the plaintext card number.
  • the decryption key is obtained, and the ciphertext portion of the temporary access control information is decrypted by the decryption key.
  • the server 20 compares the decrypted information with the information in the database, and after the verification is passed, the access controller 40 is notified to unlock and release.
  • the invention can conveniently realize the access authorization management of the visiting client and improve the convenience of the user.
  • the first client 10 of the present invention may further set a permission setting module 14 for setting the number of times of use and/or the use time of the temporary access control information. After the temporary access card is dispatched, it is valid within the set time. After the expiration, the temporary access card is invalid. Or the temporary access card can only use the set number when the temporary access card is distributed. If the number of times exceeds the maximum, the temporary access card is invalid.
  • a permission setting module 14 for setting the number of times of use and/or the use time of the temporary access control information.
  • the present invention provides a method for managing an access authorization, which can be implemented by the access authorization management system 100 shown in FIG. 1.
  • the method includes:
  • the first client 10 acquires at least one key from the server 20.
  • the key is temporary
  • the key can be generated by the server 20 and set its usage rights, such as the duration of use.
  • the communication manner between the first client 10 and the server 20 may be a wireless or mobile network, and the wireless network includes Wifi, Bluetooth, NFC, etc., and the mobile network includes mobile cellular networks such as 2G, 3G, and 4G.
  • Step S302 generating temporary access control information according to the access card information of the first user terminal 10 and the key.
  • the first client 10 may add the temporary access information to the temporary use identifier through the information generating module 12.
  • Step S303 the temporary access control information is sent to the second user terminal 30.
  • the second user terminal 30 of the present invention is a use terminal of an unauthorized user, and has no right to apply for registration of the access control card.
  • an unauthorized user can be understood as a temporary visiting guest, and the second user terminal 30 can be understood as an NFC-enabled mobile phone, PDA, tablet, etc. used by unauthorized users.
  • After receiving the temporary access control information it writes its own SE Applet.
  • Step S304 controlling the switch of the access control according to the temporary access control information of the second user terminal 30.
  • the invention generates a set of temporary access encryption key for each authorized user by the server 20, and the authorized user can obtain the temporary access encryption key of the corresponding authority through the network.
  • the authorized user sequentially obtains a temporary access encryption key.
  • the access card information is encrypted and sent to the visitor's terminal, and the visitor's terminal writes the received information into its own SE Applet, so that the visitor can verify the entry by swiping the access control, which greatly improves the user's convenience.
  • FIG. 4 is a flowchart of a method for managing access control authorization according to another embodiment of the present invention, which may be implemented by the system 100 shown in FIG. 2, where the access card information of the first user terminal 10 includes an access card number and a ciphertext. Information, the method includes:
  • step S401 at least one key is acquired from the server 20.
  • Step S402 the ciphertext information is processed by the key encryption process.
  • Step S403 combining the access card number and the encrypted processed ciphertext information into the temporary access control information.
  • Step S404 sending temporary access control information to the second user terminal 30
  • Step S405 reading temporary access information of the second user terminal 30.
  • step S406 the temporary access control information is sent to the server 20 for verification.
  • Step S407 acquiring the access card number.
  • Step S408 acquiring the key and the information of the first user end 10 according to the access card number.
  • Step S409 decrypting the ciphertext information of the encryption process by using the key.
  • Step S410 matching the ciphertext information with the information in the database to verify.
  • step S411 the temporary access control information is opened by the verification control.
  • step S412 the temporary access control information does not pass the verification access controller to keep the access control closed.
  • step S413 a reminder message that the verification fails is issued.
  • the present invention can also set the number of uses and/or the time limit of use of the temporary access control information by the first client terminal 10. After the temporary access card is dispatched, it is valid within the set time. After the expiration, the temporary access card is invalid. Or the temporary access card can only use the set number when the temporary access card is distributed. If the number of times exceeds the maximum, the temporary access card is invalid.
  • These settings may be set by the first client 10 or the server 20, or may be carried in temporary access information, and the server 20 records the usage process.
  • the present invention obtains a key from the server through the authorized first user terminal, and further processes the temporary access control information through the key and the access card information of the first user end.
  • the temporary access information may be sent to the second user end corresponding to the user, and the second user sends a door opening request to the access controller through the access control information, and the access controller is configured according to the second user end.
  • Temporary access control information controls the access control switch.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)
  • Telephonic Communication Services (AREA)
  • Lock And Its Accessories (AREA)

Abstract

An access authorization management method and system. The method comprises: a first client obtaining at least one secret key from a server (S301); generating temporary access information according to the access card information of the first client and the secret key (S302); sending the temporary access information to a second client (S303); controlling the opening and closing of the access according to the temporary access information of the second client (S304). The method and the system can conveniently realize the access authorization management for visiting customers, and improve the convenience of users.

Description

门禁授权管理方法与系统Access control authorization management method and system
本申请要求于2015年1月22日提交中国专利局、申请号为201510032680.X,发明名称为“门禁授权管理方法与系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。The present application claims priority to Chinese Patent Application No. 201510032680.X, filed on Jan. 22, 2015, entitled "Access Control Authorization Management Method and System", the entire contents of which are incorporated herein by reference. in.
技术领域Technical field
本发明涉及通信技术领域,尤其涉及一种门禁授权管理方法与系统。The present invention relates to the field of communications technologies, and in particular, to a method and system for managing access authorization.
背景技术Background technique
现有门禁系统中,门禁卡的发放需要登记注册,如在楼宇门禁系统中,每户业主需要在物业管理处登记注册后由物业发放门禁卡,或是单独的一张IC卡片,或是在用户手机的SE applet门禁应用中写入用户个人数据。但该门禁卡的个数是有限制的,由业主申请登记注册。但对于临时来访的客人,只能由物业部门询问业主确认来访身份或由业主刷卡开门接待来访客人。操作流程过于繁琐,带来很多不便。In the existing access control system, the issuance of the access control card needs to be registered. For example, in the building access control system, each owner needs to register the registration card after the property management office, or a separate IC card, or The user's personal data is written in the SE applet access control application of the user's mobile phone. However, the number of the access card is limited, and the owner applies for registration. However, for temporary visitors, the property department can only ask the owner to confirm the visiting status or the owner can open the door to receive the visitors. The operation process is too cumbersome and brings a lot of inconvenience.
综上可知,现有技术在实际使用上显然存在不便与缺陷,所以有必要加以改进。In summary, the prior art obviously has inconveniences and defects in practical use, so it is necessary to improve.
发明内容Summary of the invention
针对上述的缺陷,本发明的目的在于提供一种门禁授权管理方法与系统,可以方便的实现对来访客户的门禁授权管理,提高用户的便利性。In view of the above drawbacks, the object of the present invention is to provide a method and system for managing access control authorization, which can conveniently implement access control authorization management for visiting clients and improve user convenience.
为了实现上述目的,本发明提供一种门禁授权管理方法,所述方法包括:In order to achieve the above object, the present invention provides a method for managing an access authorization, the method comprising:
第一用户端从服务器获取至少一密钥;The first client obtains at least one key from the server;
根据第一用户端的门禁卡信息和所述密钥,生成临时门禁信息;Generating temporary access control information according to the access card information of the first user end and the key;
将所述临时门禁信息发送至第二用户端;Sending the temporary access information to the second user end;
根据所述第二用户端的临时门禁信息控制门禁的开关。The switch of the access control is controlled according to the temporary access control information of the second user end.
根据本发明的门禁授权管理方法,所述第一用户端的门禁卡信息包括门禁卡号和暗文信息;According to the access authorization management method of the present invention, the access card information of the first user terminal includes an access card number and ciphertext information;
所述根据第一用户端的门禁卡信息和所述密钥,生成临时门禁信息的步骤 包括:The step of generating temporary access control information according to the access card information of the first user end and the key include:
将所述暗文信息通过所述密钥加密处理;And encrypting the ciphertext information by using the key;
将所述门禁卡号和加密处理的暗文信息组合为所述临时门禁信息。The access card number and the encrypted processed essay information are combined into the temporary access information.
根据本发明的门禁授权管理方法,根据第二用户端的临时门禁信息控制门禁的开关步骤包括:According to the access authorization management method of the present invention, the step of controlling the access control according to the temporary access control information of the second user terminal includes:
门禁控制器读取所述第二用户端的临时门禁信息;The access controller reads temporary access information of the second user end;
门禁控制器将所述临时门禁信息发送至服务器验证,若通过验证则门禁控制器打开门禁,否则门禁控制器保持门禁关闭,并发出提醒。The access controller sends the temporary access control information to the server for verification. If the access control controller passes the access control, the access control controller keeps the access control closed and issues a reminder.
根据本发明的门禁授权管理方法,所述服务器验证包括:According to the access authorization management method of the present invention, the server verification includes:
获取所述门禁卡号;Obtaining the access card number;
根据所述门禁卡号获取所述密钥及第一用户端信息;Obtaining the key and the first user end information according to the access card number;
通过所述密钥对所述加密处理的暗文信息解密处理;Decrypting the encrypted processed ciphertext information by the key;
将所述暗文信息与数据库中的信息匹配验证。Matching the ciphertext information with the information in the database.
根据本发明的门禁授权管理方法,所述方法还包括:According to the access authorization management method of the present invention, the method further includes:
设定所述临时门禁信息的使用次数和/或使用时限。Set the number of times the temporary access information is used and/or the time limit for use.
本发明还相应的提供一种门禁授权管理系统,所述系统至少包括第一用户端、第二用户端、门禁控制器和服务器,其中:The present invention further provides an access authorization management system, the system comprising at least a first user terminal, a second user terminal, an access controller, and a server, wherein:
所述第一用户端包括:The first user terminal includes:
密钥获取模块,用于从服务器获取至少一密钥;a key acquisition module, configured to acquire at least one key from the server;
信息生成模块,用于根据所述第一用户端的门禁卡信息和所述密钥,生成临时门禁信息;以及An information generating module, configured to generate temporary access control information according to the access card information of the first user end and the key;
第一发送模块,用于将所述临时门禁信息发送至所述第二用户端;a first sending module, configured to send the temporary access control information to the second user end;
所述门禁控制器,用于根据所述第二用户端的临时门禁信息控制门禁的开关。The access controller is configured to control the switch of the access control according to the temporary access control information of the second user end.
根据本发明的门禁授权管理系统,所述第一用户端的门禁卡信息包括门禁卡号和暗文信息;According to the access authorization management system of the present invention, the access card information of the first user terminal includes an access card number and ciphertext information;
所述信息生成模块包括:The information generating module includes:
加密子模块,用于将所述暗文信息通过所述密钥加密处理;An encryption submodule, configured to encrypt the ciphertext information by using the key;
组合子模块,用于将所述门禁卡号和加密处理的暗文信息组合为所述临时门禁信息。 And a combination submodule configured to combine the access control card number and the encrypted processed ciphertext information into the temporary access control information.
根据本发明的门禁授权管理系统,所述门禁控制器包括:According to the access authorization management system of the present invention, the access controller includes:
信息读取模块,用于读取所述第二用户端的临时门禁信息;An information reading module, configured to read temporary access control information of the second user end;
信息发送模块,用于将所述临时门禁信息发送至服务器验证;An information sending module, configured to send the temporary access control information to the server for verification;
开关控制模块,用于所述临时门禁信息通过验证时控制打开门禁,否则门禁控制器保持门禁关闭;以及a switch control module, configured to control to open the access control when the temporary access control information is verified, or the access control controller keeps the access control closed;
信息提醒模块,用于所述临时门禁信息未通过验证时发出提醒信息。The information reminding module is configured to send a reminding message when the temporary access control information fails to pass the verification.
根据本发明的门禁授权管理系统,所述服务器包括:According to the access authorization management system of the present invention, the server includes:
第一获取模块,用于获取所述门禁卡号;a first obtaining module, configured to acquire the access card number;
第二获取模块,用于根据所述门禁卡号获取所述密钥及第一用户端信息;a second acquiring module, configured to acquire the key and the first user end information according to the access card number;
信息解密模块,用于通过所述密钥对所述加密处理的暗文信息解密处理;An information decryption module, configured to decrypt the ciphertext information of the encryption process by using the key;
信息匹配模块,将所述暗文信息与数据库中的信息匹配验证。The information matching module matches the ciphertext information with the information in the database.
根据本发明的门禁授权管理系统,所述第一用户端还包括:According to the access authorization management system of the present invention, the first user terminal further includes:
权限设置模块,用于设定所述临时门禁信息的使用次数和/或使用时限。The permission setting module is configured to set the number of times of using the temporary access control information and/or the use time limit.
本发明通过已授权的第一用户端从服务器获取密钥,进而通过该密钥及第一用户端的门禁卡信息处理为临时的门禁信息。当有其它用户来拜访时,可向该用户对应的第二用户端发送该临时门禁信息,第二用户端通过该门禁信息向门禁控制器发送开门请求,门禁控制器根据所述第二用户端的临时门禁信息控制门禁的开关。借此,本发明可以方便的实现对来访客户的门禁授权管理,提高用户的便利性。The invention obtains a key from the server through the authorized first user terminal, and further processes the temporary access control information through the key and the access card information of the first user end. When the other user comes to visit, the temporary access information may be sent to the second user end corresponding to the user, and the second user sends a door opening request to the access controller through the access control information, and the access controller is configured according to the second user end. Temporary access control information controls the access control switch. Thereby, the invention can conveniently realize the access authorization management of the visiting client and improve the convenience of the user.
附图说明DRAWINGS
图1是本发明一实施例的门禁授权管理系统结构示意图;1 is a schematic structural diagram of an access authorization management system according to an embodiment of the present invention;
图2是本发明另一实施例的门禁授权管理系统结构示意图;2 is a schematic structural diagram of an access authorization management system according to another embodiment of the present invention;
图3是本发明一实施例的门禁授权管理方法流程图;3 is a flowchart of a method for managing an access authorization according to an embodiment of the present invention;
图4是本发明另一实施例的门禁授权管理方法流程图。4 is a flow chart of a method for managing access control authorization according to another embodiment of the present invention.
具体实施方式detailed description
为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅 仅用以解释本发明,并不用于限定本发明。The present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only The invention is only intended to be illustrative, and is not intended to limit the invention.
参见图1,本发明提供了一种门禁授权管理系统,该系统100至少包括第一用户端10、服务器20、第二用户端30以及门禁控制器40,具体的:Referring to FIG. 1, the present invention provides an access authorization management system. The system 100 includes at least a first user terminal 10, a server 20, a second user terminal 30, and an access controller 40. Specifically, the following:
第一用户端10,即对应已授权用户的使用终端,如在楼宇门禁系统中,授权用户可以理解为业主,第一用户端可理解为授权用户使用的集成了门禁功能的终端,比如集成了NFC(Near Field Communication,近距离无线通讯)功能的手机、PDA(Personal Digital Assistant,个人数字助理)、平板电脑等。并且第一用户端10包括有:The first user terminal 10, that is, the user terminal corresponding to the authorized user, for example, in the building access control system, the authorized user can be understood as the owner, and the first user terminal can be understood as the terminal integrated with the access control function used by the authorized user, for example, integrated. NFC (Near Field Communication) mobile phone, PDA (Personal Digital Assistant), tablet, etc. And the first client 10 includes:
密钥获取模块11,用于从服务器20获取至少一密钥。该密钥是临时的密钥,可以由服务器20生成并设定其使用权限,比如使用时长。The key obtaining module 11 is configured to acquire at least one key from the server 20. The key is a temporary key that can be generated and set by the server 20, such as the duration of use.
信息生成模块12,用于根据第一用户端10的门禁卡信息和密钥,生成临时门禁信息。在临时门禁信息生成时,第一用户端10可以通过信息生成模块12将该临时门禁信息加入临时使用标识。The information generating module 12 is configured to generate temporary access control information according to the access card information and the key of the first user terminal 10. When the temporary access information is generated, the first client 10 may add the temporary access information to the temporary use identifier through the information generating module 12.
第一发送模块13,用于将临时门禁信息发送至第二用户端30。The first sending module 13 is configured to send the temporary access information to the second client 30.
本发明所述的第二用户端30为非授权用户的使用终端,其没有申请登记注册门禁卡的权限,如在楼宇门禁系统中,非授权用户可以理解为临时来访的客人,第二用户端30可理解为非授权用户使用的集成了NFC功能的手机、PDA及平板电脑等,其在收到临时门禁信息后,即写入自身的SE Applet。The second user terminal 30 of the present invention is a use terminal of an unauthorized user, and has no right to apply for registration of the access control card. For example, in the building access control system, an unauthorized user can be understood as a temporary visiting guest, and the second user terminal 30 can be understood as an NFC-enabled mobile phone, PDA, tablet, etc. used by unauthorized users. After receiving the temporary access control information, it writes its own SE Applet.
第二用户端30靠近门禁控制器40时,门禁控制器40即读取临时门禁信息,并根据所述第二用户端30的临时门禁信息控制门禁的开关。When the second user terminal 30 is close to the access controller 40, the access controller 40 reads the temporary access control information and controls the switch of the access control according to the temporary access control information of the second user terminal 30.
具体的说,本发明所述第一用户端10的门禁卡信息包括门禁卡号和暗文信息,并结合图2,所述信息生成模块12包括:Specifically, the access card information of the first user terminal 10 of the present invention includes an access card number and a ciphertext information. Referring to FIG. 2, the information generating module 12 includes:
加密子模块121,用于将所述暗文信息通过所述密钥加密处理。The encryption sub-module 121 is configured to process the ciphertext information by using the key encryption process.
组合子模块122,用于将所述门禁卡号和加密处理的暗文信息组合为所述临时门禁信息。The combination sub-module 122 is configured to combine the access control card number and the encrypted processed ciphertext information into the temporary access control information.
在临时门禁信息中,门禁卡号作为明文信息,暗文信息则包括了第一用户端10的门禁卡内的电子鉴权信息。In the temporary access control information, the access card number is used as the plaintext information, and the ciphertext information includes the electronic authentication information in the access card of the first user terminal 10.
所述门禁控制器40包括:The access controller 40 includes:
信息读取模块41,用于读取第二用户端30的临时门禁信息。The information reading module 41 is configured to read temporary access control information of the second user terminal 30.
信息发送模块42,用于将临时门禁信息发送至服务器20验证。 The information sending module 42 is configured to send the temporary access control information to the server 20 for verification.
开关控制模块43,用于所述临时门禁信息通过验证时控制打开门禁,否则门禁控制器保持门禁关闭。The switch control module 43 is configured to control the opening of the access control when the temporary access control information is verified, otherwise the access control controller keeps the access control closed.
信息提醒模块44,用于所述临时门禁信息未通过验证时发出提醒信息。The information reminding module 44 is configured to send reminder information when the temporary access control information fails to pass the verification.
实际应用中,门禁控制器40读取到第二用户端的临时门禁信息后,与服务器20交互,并将临时门禁信息发送到服务器20验证。服务器20将验证结果返回门禁控制器40,门禁控制器40根据该验证结果控制门禁系统的开关。In an actual application, after the temporary access control information of the second user end is read, the access controller 40 interacts with the server 20 and sends the temporary access control information to the server 20 for verification. The server 20 returns the verification result to the access controller 40, and the access controller 40 controls the switch of the access control system based on the verification result.
优选的,本实施例中,服务器20包括:Preferably, in this embodiment, the server 20 includes:
第一获取模块21,用于获取所述门禁卡号。The first obtaining module 21 is configured to obtain the access card number.
第二获取模块22,用于根据所述门禁卡号获取所述密钥及第一用户端10的信息。The second obtaining module 22 is configured to acquire the key and the information of the first user terminal 10 according to the access card number.
信息解密模块23,用于通过所述密钥对所述加密处理的暗文信息解密处理。The information decryption module 23 is configured to decrypt the ciphertext information of the encryption process by using the key.
信息匹配模块24,将所述暗文信息与数据库中的信息匹配验证。The information matching module 24 matches the ciphertext information with the information in the database.
当第二用户端30刷临时门禁卡时,门禁控制器40会将读取的临时门禁信息上报给服务器20,门禁服务器收到该消息后会对其进行分解,首先获取明文部分,通过该明文(即授权用户注册的门禁卡卡号)在数据库中查找门禁卡的全部信息,信息包括授权用户(第一用户)个人信息以及权限及对临时门禁卡派发权限等信息,同时服务器20会通过明文卡号获取解密密钥,通过该解密密钥对临时门禁信息的密文部分进行解密,最后服务器20将解密后的信息与数据库中的信息进行比对,验证通过后通知门禁控制器40开锁放行。借此,本发明可以方便的实现对来访客户的门禁授权管理,提高用户的便利性。When the second user terminal 30 swipes the temporary access card, the access controller 40 reports the read temporary access information to the server 20. After receiving the message, the access control server decomposes the message, first obtaining the plaintext part, and passing the plaintext. (that is, the access card number authorized by the authorized user) searches the database for all the information of the access card, including the authorized user (first user) personal information and the authority and the authority to distribute the temporary access card, and the server 20 will pass the plaintext card number. The decryption key is obtained, and the ciphertext portion of the temporary access control information is decrypted by the decryption key. Finally, the server 20 compares the decrypted information with the information in the database, and after the verification is passed, the access controller 40 is notified to unlock and release. Thereby, the invention can conveniently realize the access authorization management of the visiting client and improve the convenience of the user.
更好的是,本发明的第一用户端10还可以设置权限设置模块14,用于设定所述临时门禁信息的使用次数和/或使用时限。在派发临时门禁卡后在设定时间内有效,过期后临时门禁卡无效;或者派发临时门禁卡后该门禁卡仅能使用设定的此数,使用次数超过最大值时该临时门禁卡无效,这些设置可由第一用户端10或服务器20设定,也可携带在临时门禁信息中,服务器20记录使用过程。More preferably, the first client 10 of the present invention may further set a permission setting module 14 for setting the number of times of use and/or the use time of the temporary access control information. After the temporary access card is dispatched, it is valid within the set time. After the expiration, the temporary access card is invalid. Or the temporary access card can only use the set number when the temporary access card is distributed. If the number of times exceeds the maximum, the temporary access card is invalid. These settings may be set by the first client 10 or the server 20, or may be carried in temporary access information, and the server 20 records the usage process.
参见图3,本发明提供了一种门禁授权管理方法,其可以通过如图1所示的门禁授权管理系统100实现,该方法包括:Referring to FIG. 3, the present invention provides a method for managing an access authorization, which can be implemented by the access authorization management system 100 shown in FIG. 1. The method includes:
步骤S301,第一用户端10从服务器20获取至少一密钥。该密钥是临时 的密钥,可以由服务器20生成并设定其使用权限,比如使用时长。当然第一用户端10与服务器20间的通信方式可以是无线或移动网络,无线网络包括Wifi、蓝牙、NFC等方式,移动网络包括2G、3G、4G等移动蜂窝网络。In step S301, the first client 10 acquires at least one key from the server 20. The key is temporary The key can be generated by the server 20 and set its usage rights, such as the duration of use. Of course, the communication manner between the first client 10 and the server 20 may be a wireless or mobile network, and the wireless network includes Wifi, Bluetooth, NFC, etc., and the mobile network includes mobile cellular networks such as 2G, 3G, and 4G.
步骤S302,根据第一用户端10的门禁卡信息和所述密钥,生成临时门禁信息。在临时门禁信息生成时,第一用户端10可以通过信息生成模块12将该临时门禁信息加入临时使用标识。Step S302, generating temporary access control information according to the access card information of the first user terminal 10 and the key. When the temporary access information is generated, the first client 10 may add the temporary access information to the temporary use identifier through the information generating module 12.
步骤S303,将所述临时门禁信息发送至第二用户端30。本发明所述的第二用户端30为非授权用户的使用终端,其没有申请登记注册门禁卡的权限,如在楼宇门禁系统中,非授权用户可以理解为临时来访的客人,第二用户端30可理解为非授权用户使用的集成了NFC功能的手机、PDA及平板电脑等,其在收到临时门禁信息后,即写入自身的SE Applet。Step S303, the temporary access control information is sent to the second user terminal 30. The second user terminal 30 of the present invention is a use terminal of an unauthorized user, and has no right to apply for registration of the access control card. For example, in the building access control system, an unauthorized user can be understood as a temporary visiting guest, and the second user terminal 30 can be understood as an NFC-enabled mobile phone, PDA, tablet, etc. used by unauthorized users. After receiving the temporary access control information, it writes its own SE Applet.
步骤S304,根据所述第二用户端30的临时门禁信息控制门禁的开关。Step S304, controlling the switch of the access control according to the temporary access control information of the second user terminal 30.
本发明由服务器20针对各授权用户生成一套临时门禁加密密钥,授权用户可以通过网络获取其对应权限的临时门禁加密密钥,当有来访客人时,授权用户顺序取一个临时门禁加密密钥将其门禁卡信息加密后发送到访客人的终端,来访客人的终端会将收到的信息写入到自身的SE Applet中,来访客人通过刷门禁验证进入,大大提高了用户便利性。The invention generates a set of temporary access encryption key for each authorized user by the server 20, and the authorized user can obtain the temporary access encryption key of the corresponding authority through the network. When there is a visitor, the authorized user sequentially obtains a temporary access encryption key. The access card information is encrypted and sent to the visitor's terminal, and the visitor's terminal writes the received information into its own SE Applet, so that the visitor can verify the entry by swiping the access control, which greatly improves the user's convenience.
图4是本发明另一实施例的门禁授权管理方法流程图,其可以通过如图2所示的系统100实现,本发明中所述第一用户端10的门禁卡信息包括门禁卡号和暗文信息,所述方法包括:FIG. 4 is a flowchart of a method for managing access control authorization according to another embodiment of the present invention, which may be implemented by the system 100 shown in FIG. 2, where the access card information of the first user terminal 10 includes an access card number and a ciphertext. Information, the method includes:
步骤S401,从服务器20获取至少一密钥。In step S401, at least one key is acquired from the server 20.
步骤S402,将所述暗文信息通过所述密钥加密处理。Step S402, the ciphertext information is processed by the key encryption process.
步骤S403,将门禁卡号和加密处理的暗文信息组合为所述临时门禁信息。Step S403, combining the access card number and the encrypted processed ciphertext information into the temporary access control information.
步骤S404,将临时门禁信息发送至第二用户端30Step S404, sending temporary access control information to the second user terminal 30
步骤S405,读取第二用户端30的临时门禁信息。Step S405, reading temporary access information of the second user terminal 30.
步骤S406,将临时门禁信息发送至服务器20验证。In step S406, the temporary access control information is sent to the server 20 for verification.
步骤S407,获取所述门禁卡号。Step S407, acquiring the access card number.
步骤S408,根据所述门禁卡号获取所述密钥及第一用户端10的信息。Step S408, acquiring the key and the information of the first user end 10 according to the access card number.
步骤S409,通过所述密钥对所述加密处理的暗文信息解密处理。Step S409, decrypting the ciphertext information of the encryption process by using the key.
步骤S410,将所述暗文信息与数据库中的信息匹配验证。 Step S410, matching the ciphertext information with the information in the database to verify.
步骤S411,临时门禁信息通过验证控制打开门禁。In step S411, the temporary access control information is opened by the verification control.
步骤S412,临时门禁信息未通过验证门禁控制器保持门禁关闭。In step S412, the temporary access control information does not pass the verification access controller to keep the access control closed.
步骤S413,发出验证未通过的提醒信息。In step S413, a reminder message that the verification fails is issued.
更好的是,本发明还可以通过第一用户端10设定所述临时门禁信息的使用次数和/或使用时限。在派发临时门禁卡后在设定时间内有效,过期后临时门禁卡无效;或者派发临时门禁卡后该门禁卡仅能使用设定的此数,使用次数超过最大值时该临时门禁卡无效,这些设置可由第一用户端10或服务器20设定,也可携带在临时门禁信息中,服务器20记录使用过程。More preferably, the present invention can also set the number of uses and/or the time limit of use of the temporary access control information by the first client terminal 10. After the temporary access card is dispatched, it is valid within the set time. After the expiration, the temporary access card is invalid. Or the temporary access card can only use the set number when the temporary access card is distributed. If the number of times exceeds the maximum, the temporary access card is invalid. These settings may be set by the first client 10 or the server 20, or may be carried in temporary access information, and the server 20 records the usage process.
综上所述,本发明通过已授权的第一用户端从服务器获取密钥,进而通过该密钥及第一用户端的门禁卡信息处理为临时的门禁信息。当有其它用户来拜访时,可向该用户对应的第二用户端发送该临时门禁信息,第二用户端通过该门禁信息向门禁控制器发送开门请求,门禁控制器根据所述第二用户端的临时门禁信息控制门禁的开关。借此,本发明可以方便的实现对来访客户的门禁授权管理,提高用户的便利性。In summary, the present invention obtains a key from the server through the authorized first user terminal, and further processes the temporary access control information through the key and the access card information of the first user end. When the other user comes to visit, the temporary access information may be sent to the second user end corresponding to the user, and the second user sends a door opening request to the access controller through the access control information, and the access controller is configured according to the second user end. Temporary access control information controls the access control switch. Thereby, the invention can conveniently realize the access authorization management of the visiting client and improve the convenience of the user.
当然,本发明还可有其它多种实施例,在不背离本发明精神及其实质的情况下,熟悉本领域的技术人员当可根据本发明作出各种相应的改变和变形,但这些相应的改变和变形都应属于本发明所附的权利要求的保护范围。 The invention may, of course, be embodied in a variety of other embodiments without departing from the spirit and scope of the invention. Changes and modifications are intended to be included within the scope of the appended claims.

Claims (10)

  1. 一种门禁授权管理方法,其特征在于,所述方法包括:A method for managing an access authorization, characterized in that the method comprises:
    第一用户端从服务器获取至少一密钥;The first client obtains at least one key from the server;
    根据第一用户端的门禁卡信息和所述密钥,生成临时门禁信息;Generating temporary access control information according to the access card information of the first user end and the key;
    将所述临时门禁信息发送至第二用户端;Sending the temporary access information to the second user end;
    根据所述第二用户端的临时门禁信息控制门禁的开关。The switch of the access control is controlled according to the temporary access control information of the second user end.
  2. 根据权利要求1所述的门禁授权管理方法,其特征在于,所述第一用户端的门禁卡信息包括门禁卡号和暗文信息;The access authorization management method according to claim 1, wherein the access card information of the first user end comprises an access card number and ciphertext information;
    所述根据第一用户端的门禁卡信息和所述密钥,生成临时门禁信息的步骤包括:The step of generating the temporary access control information according to the access card information of the first user end and the key includes:
    将所述暗文信息通过所述密钥加密处理;And encrypting the ciphertext information by using the key;
    将所述门禁卡号和加密处理的暗文信息组合为所述临时门禁信息。The access card number and the encrypted processed essay information are combined into the temporary access information.
  3. 根据权利要求2所述的门禁授权管理方法,其特征在于,根据第二用户端的临时门禁信息控制门禁的开关步骤包括:The access authorization management method according to claim 2, wherein the step of controlling the access control according to the temporary access control information of the second user terminal comprises:
    门禁控制器读取所述第二用户端的临时门禁信息;The access controller reads temporary access information of the second user end;
    门禁控制器将所述临时门禁信息发送至服务器验证,若通过验证则门禁控制器打开门禁,否则门禁控制器保持门禁关闭,并发出提醒。The access controller sends the temporary access control information to the server for verification. If the access control controller passes the access control, the access control controller keeps the access control closed and issues a reminder.
  4. 根据权利要求3所述的门禁授权管理方法,其特征在于,所述服务器验证包括:The access authorization management method according to claim 3, wherein the server verification comprises:
    获取所述门禁卡号;Obtaining the access card number;
    根据所述门禁卡号获取所述密钥及第一用户端信息;Obtaining the key and the first user end information according to the access card number;
    通过所述密钥对所述加密处理的暗文信息解密处理;Decrypting the encrypted processed ciphertext information by the key;
    将所述暗文信息与数据库中的信息匹配验证。Matching the ciphertext information with the information in the database.
  5. 根据权利要求1~4任一项所述的门禁授权管理方法,其特征在于,所述方法还包括:The access authorization management method according to any one of claims 1 to 4, wherein the method further comprises:
    设定所述临时门禁信息的使用次数和/或使用时限。Set the number of times the temporary access information is used and/or the time limit for use.
  6. 一种门禁授权管理系统,其特征在于,所述系统至少包括第一用户端、第二用户端、门禁控制器和服务器,其中: An access authorization management system, characterized in that the system comprises at least a first user end, a second user end, an access controller and a server, wherein:
    所述第一用户端包括:The first user terminal includes:
    密钥获取模块,用于从服务器获取至少一密钥;a key acquisition module, configured to acquire at least one key from the server;
    信息生成模块,用于根据所述第一用户端的门禁卡信息和所述密钥,生成临时门禁信息;以及An information generating module, configured to generate temporary access control information according to the access card information of the first user end and the key;
    第一发送模块,用于将所述临时门禁信息发送至所述第二用户端;a first sending module, configured to send the temporary access control information to the second user end;
    所述门禁控制器,用于根据所述第二用户端的临时门禁信息控制门禁的开关。The access controller is configured to control the switch of the access control according to the temporary access control information of the second user end.
  7. 根据权利要求6所述的门禁授权管理系统,其特征在于,所述第一用户端的门禁卡信息包括门禁卡号和暗文信息;The access authorization management system according to claim 6, wherein the access card information of the first user end comprises an access card number and esoteric information;
    所述信息生成模块包括:The information generating module includes:
    加密子模块,用于将所述暗文信息通过所述密钥加密处理;An encryption submodule, configured to encrypt the ciphertext information by using the key;
    组合子模块,用于将所述门禁卡号和加密处理的暗文信息组合为所述临时门禁信息。And a combination submodule configured to combine the access control card number and the encrypted processed ciphertext information into the temporary access control information.
  8. 根据权利要求7所述的门禁授权管理系统,其特征在于,所述门禁控制器包括:The access authorization management system according to claim 7, wherein the access controller comprises:
    信息读取模块,用于读取所述第二用户端的临时门禁信息;An information reading module, configured to read temporary access control information of the second user end;
    信息发送模块,用于将所述临时门禁信息发送至服务器验证;An information sending module, configured to send the temporary access control information to the server for verification;
    开关控制模块,用于所述临时门禁信息通过验证时控制打开门禁,否则门禁控制器保持门禁关闭;以及a switch control module, configured to control to open the access control when the temporary access control information is verified, or the access control controller keeps the access control closed;
    信息提醒模块,用于所述临时门禁信息未通过验证时发出提醒信息。The information reminding module is configured to send a reminding message when the temporary access control information fails to pass the verification.
  9. 根据权利要求8所述的门禁授权管理系统,其特征在于,所述服务器包括:The access authorization management system according to claim 8, wherein the server comprises:
    第一获取模块,用于获取所述门禁卡号;a first obtaining module, configured to acquire the access card number;
    第二获取模块,用于根据所述门禁卡号获取所述密钥及第一用户端信息;a second acquiring module, configured to acquire the key and the first user end information according to the access card number;
    信息解密模块,用于通过所述密钥对所述加密处理的暗文信息解密处理;An information decryption module, configured to decrypt the ciphertext information of the encryption process by using the key;
    信息匹配模块,将所述暗文信息与数据库中的信息匹配验证。The information matching module matches the ciphertext information with the information in the database.
  10. 根据权利要求6~9任一项所述的门禁授权管理系统,其特征在于,所述第一用户端还包括:The access authorization management system according to any one of claims 6 to 9, wherein the first user terminal further comprises:
    权限设置模块,用于设定所述临时门禁信息的使用次数和/或使用时限。 The permission setting module is configured to set the number of times of using the temporary access control information and/or the use time limit.
PCT/CN2015/078010 2015-01-22 2015-04-30 Access authorization management method and system WO2016115788A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510032680.XA CN104732626B (en) 2015-01-22 2015-01-22 Gate inhibition's authorization management method and system
CN201510032680.X 2015-01-22

Publications (1)

Publication Number Publication Date
WO2016115788A1 true WO2016115788A1 (en) 2016-07-28

Family

ID=53456492

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/078010 WO2016115788A1 (en) 2015-01-22 2015-04-30 Access authorization management method and system

Country Status (2)

Country Link
CN (1) CN104732626B (en)
WO (1) WO2016115788A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112070940A (en) * 2020-08-05 2020-12-11 日立楼宇技术(广州)有限公司 Access authorization methods, access release methods, devices, access controllers and media

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187419B (en) * 2015-08-26 2019-01-11 宇龙计算机通信科技(深圳)有限公司 A kind of authorization method, device, terminal and system
CN105046796A (en) * 2015-08-31 2015-11-11 芝麻智能科技(北京)有限公司 Unlocking control method, device and system for electronic lock
CN105205898B (en) * 2015-10-22 2017-11-03 深圳优方网络技术有限公司 A kind of electronic cipher Rights Management System of smart lock
CN105405185B (en) * 2015-10-23 2018-10-26 东莞酷派软件技术有限公司 Safe verification method and device
CN105389870A (en) * 2015-10-28 2016-03-09 广州畅联信息科技有限公司 Entrance guard management method and system
CN105405189A (en) * 2015-10-29 2016-03-16 詹卓衡 Door lock and control method thereof
CN105488887A (en) * 2015-12-28 2016-04-13 慧锐通智能科技股份有限公司 Entrance guard access control method
CN105719374A (en) * 2016-01-22 2016-06-29 慧锐通智能科技股份有限公司 Door access control method
CN106056677A (en) * 2016-05-20 2016-10-26 黄士玮 Method and device of passing sentry box barrier gate
CN106097492B (en) * 2016-06-03 2018-09-07 深圳大学 A kind of gate inhibition's access control method and access control system
CN106341817A (en) * 2016-09-05 2017-01-18 努比亚技术有限公司 Access control system, access control method, mobile terminals and access server
CN106468886A (en) * 2016-09-30 2017-03-01 海尔优家智能科技(北京)有限公司 A kind of method and apparatus of third-party control devices
CN107231340B (en) * 2016-11-25 2020-05-15 天地融科技股份有限公司 Data interaction method and system
CN107123181A (en) * 2017-04-14 2017-09-01 天地融科技股份有限公司 A kind of access control method and system
CN107516363A (en) * 2017-08-24 2017-12-26 上海与德科技有限公司 Management method, device, mobile terminal and the storage medium of intelligent residential district
CN108447149A (en) * 2018-02-05 2018-08-24 西安太极航空科技有限公司 A kind of unlocking method and device in shared house
CN108447154A (en) * 2018-03-02 2018-08-24 中国水利水电科学研究院 Safe unlocking method and device, encryption and decryption method and device, lock and server
CN108932771A (en) * 2018-05-23 2018-12-04 王力安防科技股份有限公司 A kind of long-range temporary Authorization, method for unlocking and system
CN109087417B (en) * 2018-07-23 2020-10-30 湖北工业大学 Safety two-dimensional code access control authentication system and method
CN112309005A (en) * 2019-07-24 2021-02-02 上海颉硕信息科技有限公司 Campus intelligent access control system
CN111724520A (en) * 2020-06-16 2020-09-29 江苏高聚识别技术有限公司 Automatic identification system for building door identity
CN111859325A (en) * 2020-07-18 2020-10-30 博泰车联网(南京)有限公司 Terminal, computer readable storage medium, cross-user authorization method and system
CN113888789B (en) * 2021-09-24 2023-07-07 日立楼宇技术(广州)有限公司 A data processing method and device based on visitor management system
CN115664865B (en) * 2022-12-27 2023-05-12 深圳巨隆基科技有限公司 Verification data transmission method, system, computer equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005038269A (en) * 2003-07-17 2005-02-10 Toppan Printing Co Ltd Visitor management system
CN103679884A (en) * 2013-12-02 2014-03-26 大连智慧城科技有限公司 Casual user authorization device and method for internet door control
CN104157029A (en) * 2014-05-12 2014-11-19 惠州Tcl移动通信有限公司 Access control system, mobile terminal based control method thereof and mobile terminal
CN104219058A (en) * 2014-09-28 2014-12-17 小米科技有限责任公司 Identity authentication and authorization method and device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1877060B (en) * 2005-06-08 2011-06-29 黄涛 Digital cipher lock with secure secondary authorization unlocking function
KR101111381B1 (en) * 2009-11-17 2012-02-24 최운호 User identification system, apparatus, smart card and method for ubiquitous identity management
CN103700177A (en) * 2013-12-25 2014-04-02 袁磊 Coded lock system capable of unlocking in specific time period by using encrypted authorization data
CN103745513B (en) * 2014-01-03 2017-01-18 成都创石科技有限公司 Intelligent key system
CN103903319A (en) * 2014-02-10 2014-07-02 袁磊 Electronic lock system based on internet dynamic authorization
CN104167041B (en) * 2014-09-11 2018-03-09 祁春富 The gate control system and its control method used based on smart mobile phone

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005038269A (en) * 2003-07-17 2005-02-10 Toppan Printing Co Ltd Visitor management system
CN103679884A (en) * 2013-12-02 2014-03-26 大连智慧城科技有限公司 Casual user authorization device and method for internet door control
CN104157029A (en) * 2014-05-12 2014-11-19 惠州Tcl移动通信有限公司 Access control system, mobile terminal based control method thereof and mobile terminal
CN104219058A (en) * 2014-09-28 2014-12-17 小米科技有限责任公司 Identity authentication and authorization method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112070940A (en) * 2020-08-05 2020-12-11 日立楼宇技术(广州)有限公司 Access authorization methods, access release methods, devices, access controllers and media

Also Published As

Publication number Publication date
CN104732626B (en) 2017-12-12
CN104732626A (en) 2015-06-24

Similar Documents

Publication Publication Date Title
WO2016115788A1 (en) Access authorization management method and system
CN108055235B (en) A smart lock control method, related equipment and system
CN110178161B (en) Access control system with secure pass through
CN1939028B (en) Accessing protected data on network storage from multiple devices
CN107978047B (en) Use the methods, devices and systems of password unlocking
US20140040621A1 (en) Mobile Electronic Device
CN106097492B (en) A kind of gate inhibition's access control method and access control system
CN109448197A (en) A kind of cloud intelligent lock system and key management method based on multi-enciphering mode
US11722529B2 (en) Method and apparatus for policy-based management of assets
WO2020147292A1 (en) Blockchain-based access control method and system, management terminal and access control terminal
US20090034736A1 (en) Wireless device authentication and security key management
KR20190008352A (en) Dynamic key access control systems, methods and apparatus
JP2017216596A (en) COMMUNICATION SYSTEM, COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM
JP2018160821A (en) Service use authentication system and service use authentication method
US9483889B2 (en) Method for controlling an electronically secured device and transponder for it
KR101638585B1 (en) entrance system exploiting smart phone
KR101912743B1 (en) Smart door rock system
CN106650372A (en) open method and device of administrator authority
KR101572430B1 (en) A key management method using a mobile communication terminal, a key management server and a mobile communication terminal for door lock opening and closing
KR100992802B1 (en) System for temporary opening/closing door lock and method thereof
CN111063070B (en) Digital key sharing method, digital key verification method and digital key verification equipment
JP5942910B2 (en) Key authentication system, key authentication method and program
JP2019168842A (en) Management server, authentication method, computer program and service cooperation system
CN112767576A (en) Lock authorization management method and lock authorization management system
JP2014135558A (en) Information transfer system, information transfer method, information transfer program

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15878462

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15878462

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 12/12/2017)

122 Ep: pct application non-entry in european phase

Ref document number: 15878462

Country of ref document: EP

Kind code of ref document: A1