CN105139491B - A kind of cell phone access control based on ciphering type Quick Response Code - Google Patents

A kind of cell phone access control based on ciphering type Quick Response Code Download PDF

Info

Publication number
CN105139491B
CN105139491B CN201510486990.9A CN201510486990A CN105139491B CN 105139491 B CN105139491 B CN 105139491B CN 201510486990 A CN201510486990 A CN 201510486990A CN 105139491 B CN105139491 B CN 105139491B
Authority
CN
China
Prior art keywords
image
soft key
mobile phone
gate inhibition
mtd
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510486990.9A
Other languages
Chinese (zh)
Other versions
CN105139491A (en
Inventor
李保印
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wingtech Communication Co Ltd
Original Assignee
Wingtech Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wingtech Communication Co Ltd filed Critical Wingtech Communication Co Ltd
Priority to CN201510486990.9A priority Critical patent/CN105139491B/en
Publication of CN105139491A publication Critical patent/CN105139491A/en
Application granted granted Critical
Publication of CN105139491B publication Critical patent/CN105139491B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Lock And Its Accessories (AREA)

Abstract

Present invention is disclosed a kind of cell phone access control based on ciphering type Quick Response Code, the system includes:Mobile phone terminal, gate inhibition end and management server;Mobile phone terminal generates soft key and is shown on mobile phone screen, gate inhibition end driving camera obtains the soft key image on mobile phone screen, and checking is decrypted to soft key in the authentication module by being integrated in gate inhibition end, by driving electric control switch to open door lock after authentication.Cell phone access control proposed by the present invention can effectively reduce cost, improve the convenience and security of management.

Description

A kind of cell phone access control based on ciphering type Quick Response Code
Technical field
The invention belongs to electronic information technical field, is related to a kind of gate control system, more particularly to one kind is based on ciphering type two Tie up the cell phone access control of code.
Background technology
In recent years, smart mobile phone technology obtained rapid development, and mobile phone is from traditional single voice call function to each Individual field infiltration;The main application that mobile phone is discussed in terms of access control of the invention.Gate control system in the market mainly with Swipe the card based on gate inhibition, this mode cost is higher, and management is also inconvenient, and security is poor.
By cell phone software realize that the communication mode of gate inhibition's certification has a variety of, such as WiFi, Infrared, Bluetooth, The data format of authentication also has a variety of, such as ciphertext, Quick Response Code.
In view of this, nowadays there is an urgent need to design a kind of new gate control system, to overcome the above-mentioned of existing gate control system Defect.
The content of the invention
The technical problems to be solved by the invention are:A kind of cell phone access control based on ciphering type Quick Response Code is provided, can Cost effectively is reduced, improves the convenience and security of management.
In order to solve the above technical problems, the present invention adopts the following technical scheme that:
A kind of cell phone access control based on ciphering type Quick Response Code, the system is mainly by mobile phone terminal, gate inhibition end and management Server three parts are formed;
The mobile phone terminal mainly includes a software, is responsible for generation or is obtained from server comprising ciphering two-dimension code image Soft key image;
The gate inhibition end is mainly made up of access controller, gate inhibition's power supply and electromagnetic lock, and gate inhibition end is set by image recognition It is standby to gather soft key image and opening door lock is decided whether according to the result;
The management server is responsible for, to key granting and rights management, realizing the distributed pipes of key, user, door lock Reason;
User downloads installation mobile phone terminal software by management server, and is authorized by registering to obtain to use;User borrows Assistant's machine Software Create image in 2 D code --- soft key;This Quick Response Code figure is identified by the image recognition apparatus at gate inhibition end Picture, then decrypt and carry out the identification of door opener, finally judge whether opening door lock;
In the system, the soft key of identity information is carried in the form of Quick Response Code by mobile phone terminal Software Create, and there is timeliness Limited with number;In use, mobile phone terminal software firstly generates soft key and is shown on mobile phone screen, gate inhibition end software-driven is taken the photograph As the soft key image on head acquisition mobile phone screen and the authentication module by being integrated in gate inhibition end solves to soft key Close checking, by driving electric control switch to open door lock after authentication;
The system is based on using a variety of security strategies:(a) the ageing limitation of soft key, to prevent soft key stolen or Replicate, soft key can auto-destruct after setting time;(b) soft key access times limitation, the soft key of mobile phone terminal generation is only It can use once, use is destroyed immediately later, is so also possible to prevent soft key and is maliciously usurped;(c) mobile phone terminal soft key Licensing scheme, to prevent user from cracking or illegal download, system use application for registration licensing mode, i.e. user must apply It could be used after obtaining keyed feature code;(d) unauthorized use software is prevented;Mobile phone terminal can set software setting up password, prevent Mobile phone illegally uses caused by losing, and mobile phone can also be soft to sending short message by mobile phone " destruction " mobile phone terminal by management end after losing Part;
The system includes soft key generation module, and the generation of soft key is completed by mobile phone terminal software, or passes through clothes Business device end software is completed;The algorithm of mobile phone terminal Software Create ciphering two-dimension code image is compiled by authentication information generation unit, Base64 Code converting unit and soft key generation unit;
Including authentication information in soft key, identity information includes mobile phone IMEI code, address name, post information, IMEI code is mainly used in binding mobile phone;Essential information can be shown on door lock screen in door-lock opening;Authentication information also wraps Timestamp information is included, for ageing judgement of the gate inhibition end to soft key;
Authentication information generation unit is calculated using DES algorithm for encryption authentication information or using triple des or AES encryption Method;Comprise the concrete steps that:1st step, using the software setting up password of user's input as key, by extending, replacing, being grouped, shifting, 16 sets of sub-keys are obtained after iterative processing;2nd step, to identity information plaintext on the basis of above key is generated, it is grouped The identity information that displacement and iteration are encrypted;
Base64 transcoder units are carrying out code conversion;The authentication information of encryption is changed using Base64 codings For the ascii character sequence available for generation Quick Response Code.The general principle of conversion is that 3 octets are converted into 46 Byte, two 0 are mended before each 6 afterwards, form 8;Carried out further according to the value of each byte with specific coding schedule Replace, the corresponding character in coding schedule is made up of English character, numeral and conventional sign, just in the acceptable character of Quick Response Code Scope;By this conversion, being just converted to the identity information of encryption can be with two-dimentional representation in character information, but this letter Breath is still encryption;
Soft key generation unit uses the coding form of widely used QRCode Quick Response Codes, and its general principle is to input Character (C1C2 ... Cn) is converted into numerical value (D1D2 ... Dn) sequence according to coding schedule, and mode indicators and word are added before sequence Cataloged procedure is completed after symbol number, finally using image generating technologies, generates the ciphering two-dimension code image of the system --- it is i.e. soft Key, the image will be identified by the image recognition apparatus at gate inhibition end and decide whether opening door lock;
The system also includes door lock Open control module, and the door opening process of soft key is realized at gate inhibition end;Gate inhibition takes the photograph at end As the image in 2 D code that head shooting mobile phone screen generates, and the image obtained to shooting is corrected processing, Quick Response Code identification, body Part checking and door lock open three processing stages;Door lock Open control module include image correction unit, Quick Response Code recognition unit, Door lock opening unit;
Image correction unit is corrected to carry out gray proces, denoising and rotation to the image of shooting;Image rectification Unit includes gray proces subelement, denoising subelement, rotation correction subelement;
Gray proces subelement is colored to obtain image acquiescence from camera, and data volume is huge, is not easy to identify Processing is, it is necessary to be first converted into gray level image;Gray processing handles formula:
W=a × R+b × G+c × B, a+b+c=1.0
Wherein, W is gray level image pixel value, and R, G, B represent the color component value of original color image respectively, and a, b, c divide Not Wei three color components coefficient;In order to obtain higher Quick Response Code discrimination, a=0.3, b=0.11, c=0.59 are set;
Denoising subelement meets Poisson distribution to be removed using the medium filtering of appropriately sized rectangular window Salt grain noise;Remove noise algorithm be:
Wherein, λ is the average of Poisson distribution;
Rotation correction subelement to before identification image rotation to horizontal direction;First want the level of detection image partially Gyration, image could be rotated according to angle;Detection image X deflection angle need by image binaryzation, edge extracting and 3 steps of Hough transform, finally according to deflection angle rotate counterclockwise image;Rotation correction subelement includes image binaryzation Processing unit, edge detection unit, Hough transform unit, rotation correction unit;
Image binaryzation processing unit is convenient to carry out Quick Response Code identification to convert the image into black white image.Substantially it is former Reason is in the case where keeping characteristics of image, gives up the redundancy in image;Realization principle is one threshold value of selection and carried out Conversion so that image information only includes two kinds of colouring informations of black and white;
Edge detection unit is detecting the edge of black white image;Image is entered using the horizontal operator in Sobel operators Row convolution, and image border is obtained by threshold process.In algorithm implementation process, it is used as by 3 × 3 templates in core and image Each pixel do convolution and computing, then high-high brightness and the minimum average measured are edge in image;
Hough transform unit obtains deflection angle will pass through the image after rim detection by Hough transform;Calculate Method principle is represented for the straight line L of x-y plane with polar form, by setting straight line inclination angle theta value and picture altitude ρ, (θ, ρ) matrix is set, chooses each black pixel point in image, ρ values, the respective value in (θ, ρ) matrix are calculated to each θ values Accumulated value adds 1.The maximum place of accumulated value is found, is a horizontal edge line of QR codes, now corresponding angle of inclination is 90 ° of-θ, therefore, so as to judge that image needs 90 ° of-θ of rotate counterclockwise;
Rotation correction unit is to bring the θ obtained before values into equation below, if being around datum mark rotate counterclockwise On the occasion of clockwise turning to negative value;Postrotational image generally has a little distortion, reason be obtained new coordinate value not necessarily For integer, it is also necessary to the new value drawn is corrected using grey scale interpolation computing;
x0,y0To rotate the coordinate value of preceding pixel, x1,y1For postrotational coordinate value;
Quick Response Code recognition unit therefrom obtains the soft key information of encryption to identify the image in 2 D code by conversion, And obtain plaintext key information by decryption;
After door lock opening unit is to obtain the identity information that soft key case contains, by gate inhibition's end module by identity information with The authorization message that server end preserves is analyzed, and determines whether opening gate according to result;In order to ensure key Ageing limitation, after key uses once, removed at once from server, next use must regenerate;If identity Authentication failed, then gate inhibition end prompted.
A kind of cell phone access control based on ciphering type Quick Response Code, the system include:Mobile phone terminal, gate inhibition end and management clothes Business device;
Mobile phone terminal generates soft key and is shown on mobile phone screen, and gate inhibition end driving camera obtains soft on mobile phone screen Key image, and checking is decrypted to soft key in the authentication module by being integrated in gate inhibition end, after authentication Electric control switch is driven to open door lock.
As a preferred embodiment of the present invention, the mobile phone terminal mainly includes a software, is responsible for generation or from service Device obtains the soft key image for including ciphering two-dimension code image;
The gate inhibition end is mainly made up of access controller, gate inhibition's power supply and electromagnetic lock, and gate inhibition end is set by image recognition It is standby to gather soft key image and opening door lock is decided whether according to the result;
The management server is responsible for, to key granting and rights management, realizing the distributed pipes of key, user, door lock Reason.
As a preferred embodiment of the present invention, user downloads installation mobile phone terminal software by management server, and leads to Registration is crossed to obtain using mandate;User generates image in 2 D code --- soft key by cell phone software;By the image at gate inhibition end Identification equipment identifies this image in 2 D code, then decrypts and carries out the identification of door opener, finally judges whether to open door Lock;
In the system, the soft key of identity information is carried in the form of Quick Response Code by mobile phone terminal Software Create, and there is timeliness Limited with number;In use, mobile phone terminal software firstly generates soft key and is shown on mobile phone screen, gate inhibition end software-driven is taken the photograph As the soft key image on head acquisition mobile phone screen and the authentication module by being integrated in gate inhibition end solves to soft key Close checking, by driving electric control switch to open door lock after authentication.
As a preferred embodiment of the present invention, the system is based on using a variety of security strategies:(a) soft key is ageing Limitation, to prevent that soft key is stolen or replicates, soft key can auto-destruct after setting time;(b) soft key access times Limitation, the soft key of mobile phone terminal generation are used only once, and use is destroyed immediately later, is so also possible to prevent soft key and is disliked Meaning is usurped;(c) licensing scheme of the soft key of mobile phone terminal, to prevent user from cracking or illegal download, system is using registration Shen Please licensing mode, i.e., user must apply obtain keyed feature code after could use;(d) unauthorized use software is prevented;Mobile phone End software setting up password can be set, prevent mobile phone lose caused by illegally use, mobile phone lose after can also by management end to Sending short message by mobile phone " destruction " mobile phone terminal software.
As a preferred embodiment of the present invention, the system includes soft key generation module, and the generation of soft key passes through Mobile phone terminal software is completed, or is completed by server software;The algorithm of mobile phone terminal Software Create ciphering two-dimension code image by Authentication information generation unit, Base64 transcoder units and soft key generation unit;
Including authentication information in soft key, identity information includes mobile phone IMEI code, address name, post information, IMEI code is mainly used in binding mobile phone;Essential information can be shown on door lock screen in door-lock opening;Authentication information also wraps Timestamp information is included, for ageing judgement of the gate inhibition end to soft key;
Authentication information generation unit is calculated using DES algorithm for encryption authentication information or using triple des or AES encryption Method;Comprise the concrete steps that:1st step, using the software setting up password of user's input as key, by extending, replacing, being grouped, shifting, 16 sets of sub-keys are obtained after iterative processing;2nd step, to identity information plaintext on the basis of above key is generated, it is grouped The identity information that displacement and iteration are encrypted;
Base64 transcoder units are carrying out code conversion;The authentication information of encryption is changed using Base64 codings For the ascii character sequence available for generation Quick Response Code.The general principle of conversion is that 3 octets are converted into 46 Byte, two 0 are mended before each 6 afterwards, form 8;Carried out further according to the value of each byte with specific coding schedule Replace, the corresponding character in coding schedule is made up of English character, numeral and conventional sign, just in the acceptable character of Quick Response Code Scope;By this conversion, being just converted to the identity information of encryption can be with two-dimentional representation in character information, but this letter Breath is still encryption;
Soft key generation unit uses the coding form of widely used QRCode Quick Response Codes, and its general principle is to input Character (C1C2 ... Cn) is converted into numerical value (D1D2 ... Dn) sequence according to coding schedule, and mode indicators and word are added before sequence Cataloged procedure is completed after symbol number, finally using image generating technologies, generates the ciphering two-dimension code image of the system --- it is i.e. soft Key, the image will be identified by the image recognition apparatus at gate inhibition end and decide whether opening door lock.
As a preferred embodiment of the present invention, the system also includes door lock Open control module, the enabling of soft key Process is realized at gate inhibition end;The image in 2 D code of gate inhibition end camera shooting mobile phone screen generation, and to shooting obtained image Processing, Quick Response Code identification, authentication and door lock is corrected to open.
As a preferred embodiment of the present invention, the door lock Open control module includes image correction unit, Quick Response Code Recognition unit, door lock opening unit;
Image correction unit is corrected to carry out gray proces, denoising and rotation to the image of shooting;
Quick Response Code recognition unit therefrom obtains the soft key information of encryption to identify the image in 2 D code by conversion, And obtain plaintext key information by decryption;
After door lock opening unit is to obtain the identity information that soft key case contains, by gate inhibition's end module by identity information with The authorization message that server end preserves is analyzed, and determines whether opening gate according to result;In order to ensure key Ageing limitation, after key uses once, removed at once from server, next use must regenerate;If identity Authentication failed, then gate inhibition end prompted.
As a preferred embodiment of the present invention, described image correction unit includes gray proces subelement, denoising Subelement, rotation correction subelement;
Gray proces subelement is colored to obtain image acquiescence from camera, and data volume is huge, is not easy to identify Processing is, it is necessary to be first converted into gray level image;
The gray proces subelement gray processing handles formula:
W=a × R+b × G+c × B, a+b+c=1.0
Wherein, W is gray level image pixel value, and R, G, B represent the color component value of original color image respectively, and a, b, c divide Not Wei three color components coefficient;In order to obtain higher Quick Response Code discrimination, a=0.3, b=0.11, c=0.59 are set;
Denoising subelement meets Poisson distribution to be removed using the medium filtering of appropriately sized rectangular window Salt grain noise;Remove noise algorithm be:
Wherein, λ is the average of Poisson distribution;
Rotation correction subelement to before identification image rotation to horizontal direction;First want the level of detection image partially Gyration, image could be rotated according to angle;Detection image X deflection angle need by image binaryzation, edge extracting and 3 steps of Hough transform, finally according to deflection angle rotate counterclockwise image.
As a preferred embodiment of the present invention, rotation correction subelement includes image binaryzation processing unit, edge is supervised Survey unit, Hough transform unit, rotation correction unit;
Image binaryzation processing unit is convenient to carry out Quick Response Code identification to convert the image into black white image.Substantially it is former Reason is in the case where keeping characteristics of image, gives up the redundancy in image;Realization principle is one threshold value of selection and carried out Conversion so that image information only includes two kinds of colouring informations of black and white;
Edge detection unit is detecting the edge of black white image;Image is entered using the horizontal operator in Sobel operators Row convolution, and image border is obtained by threshold process.In algorithm implementation process, it is used as by 3 × 3 templates in core and image Each pixel do convolution and computing, then high-high brightness and the minimum average measured are edge in image;
Hough transform unit obtains deflection angle will pass through the image after rim detection by Hough transform;Calculate Method principle is represented for the straight line L of x-y plane with polar form, by setting straight line inclination angle theta value and picture altitude ρ, (θ, ρ) matrix is set, chooses each black pixel point in image, ρ values, the respective value in (θ, ρ) matrix are calculated to each θ values Accumulated value adds 1.The maximum place of accumulated value is found, is a horizontal edge line of QR codes, now corresponding angle of inclination is 90 ° of-θ, therefore, so as to judge that image needs 90 ° of-θ of rotate counterclockwise;
Rotation correction unit is to bring the θ obtained before values into equation below, if being around datum mark rotate counterclockwise On the occasion of clockwise turning to negative value;Postrotational image generally has a little distortion, reason be obtained new coordinate value not necessarily For integer, it is also necessary to the new value drawn is corrected using grey scale interpolation computing;
x0,y0To rotate the coordinate value of preceding pixel, x1,y1For postrotational coordinate value.
The beneficial effects of the present invention are:Cell phone access control proposed by the present invention can effectively reduce cost, improve pipe The convenience and security of reason.
Gate control system proposed by the present invention is realized based on ciphering type Quick Response Code and image recognition technology, is shown in Mobile phone screen The ciphering type QRCode (soft key) at curtain end includes certificate data, and soft key is gathered by the image recognition apparatus at gate inhibition end Image simultaneously carries out authentication to user, by driving gate inhibition end electric-control system opening door lock after authentication.
Brief description of the drawings
Fig. 1 is the Organization Chart of gate control system of the present invention.
Fig. 2 is the fundamental diagram of gate control system of the present invention.
Fig. 3 is the soft key generating principle figure of gate control system of the present invention.
Embodiment
The preferred embodiment that the invention will now be described in detail with reference to the accompanying drawings.
Embodiment one
Referring to Fig. 1, present invention is disclosed a kind of cell phone access control based on ciphering type Quick Response Code, the system are main It is made up of mobile phone terminal, gate inhibition end and management server three parts;
In the system, the soft key of identity information is carried in the form of Quick Response Code by mobile phone terminal Software Create, and there is timeliness Limited with number.In use, mobile phone client software firstly generates soft key and is shown on mobile phone screen, gate inhibition end software drives Dynamic camera obtains the soft key image on mobile phone screen and the authentication module by being integrated in gate inhibition end is entered to soft key Row decryption verification, by driving electric control switch to open door lock after authentication.
Whole system is mainly made up of mobile phone terminal, gate inhibition end and management server three parts, as shown in Figure 1:(a) mobile phone terminal A mainly software, it is responsible for generation or the soft key image for including ciphering two-dimension code image is obtained from server.(b) gate inhibition end Mainly it is made up of access controller, gate inhibition's power supply and electromagnetic lock, gate inhibition end gathers soft key image simultaneously by image recognition apparatus Opening door lock is decided whether according to the result.(c) management server is responsible for key granting and rights management, realize key, User, the distributed management of door lock.
As shown in Fig. 2 the operation principle of the system is:(a) user is soft by management server download installation mobile phone terminal Part, and obtained by registering using mandate;(b) user generates image in 2 D code --- soft key by cell phone software;(c) by The image recognition apparatus at gate inhibition end identifies this image in 2 D code, then decrypts and carries out the identification of door opener, finally sentences It is disconnected whether opening door lock.
To ensure the tight security of gate inhibition, system is based on using a variety of security strategies:(a) the ageing limitation of soft key, To prevent that soft key is stolen or replicates, soft key can auto-destruct after general 5 minutes;(b) soft key access times limitation, hand The soft key of generator terminal generation is used only once, and use is destroyed immediately later, is so also possible to prevent soft key and is maliciously usurped; (c) licensing scheme of the soft key of mobile phone terminal, to prevent user from cracking or illegal download, system use application for registration mandate mould Formula, i.e. user must apply using after obtaining keyed feature code;(d) unauthorized use software is prevented.Mobile phone terminal can be set Software setting up password, prevent mobile phone from illegally being used caused by losing, mobile phone can also be sent after losing by management end to mobile phone Short message " destruction " mobile phone terminal software.
【Soft key generation module】
The system includes soft key generation module, and the generation of soft key is completed by mobile phone terminal software, actually also may be used To be designed to complete by server software.The algorithm of mobile phone terminal Software Create ciphering two-dimension code image is given birth to by authentication information Into the several parts composition such as, enciphering transformation, Base64 coding and QR codings, as shown in figure 3, the base of various pieces introduced below Present principles.
The system includes soft key generation module, and the generation of soft key is completed by mobile phone terminal software, or passes through clothes Business device end software is completed;The algorithm of mobile phone terminal Software Create ciphering two-dimension code image is compiled by authentication information generation unit, Base64 Code converting unit and soft key generation unit.
Including authentication information in soft key, identity information includes mobile phone IMEI code, address name, post information, IMEI code is mainly used in binding mobile phone;Essential information can be shown on door lock screen in door-lock opening;Authentication information also wraps Timestamp information is included, for contents such as ageing judgement of the gate inhibition end to soft key.
Authentication information generation unit is calculated using DES algorithm for encryption authentication information or using triple des or AES encryption Method;Using comprising the concrete steps that for DES algorithm for encryption authentication informations:1st step, using user input software setting up password as Key, by extending, replace, be grouped, shift, being obtained after iterative processing 16 sets of sub-keys (can certainly be other quantity); 2nd step, to identity information plaintext on the basis of above key is generated, carry out the identity that packet displacement and iteration are encrypted and believe Breath.
Base64 transcoder units are carrying out code conversion.Due to the character that can be included in Quick Response Code be it is limited, And the character of des encryption generation can exceed that the character range that represents of Quick Response Code, therefore it is necessary to carry out code conversion. Base64 transcoder units encode the ASCII be converted to the authentication information of encryption available for generation Quick Response Code using Base64 Character string.The general principle of conversion is 3 octets to be converted into the byte of 46, is mended afterwards before each 6 Two 0, formed 8 (can certainly be other digits);It is replaced further according to the value of each byte with specific coding schedule, Corresponding character in coding schedule is made up of English character, numeral and conventional sign, just in the acceptable character range of Quick Response Code; By this conversion, just by the identity information of encryption be converted to can with two-dimentional representation in character information, but this information according to It is so encryption.
Authentication information by Base64 code conversions is all made up of English character, numeral and conventional sign, convenient life Into image in 2 D code.Soft key generation unit uses the coding form of widely used QRCode Quick Response Codes, and its general principle is Numerical value (D1D2 ... Dn) sequence is converted into according to coding schedule to input character (C1C2 ... Cn), and pattern instruction is added before sequence Cataloged procedure is completed after symbol and character number, finally using image generating technologies, generates the ciphering two-dimension code figure of the system Picture --- i.e. soft key, the image will be identified by the image recognition apparatus at gate inhibition end and decide whether opening door lock.
【Door lock Open control module】
The system also includes door lock Open control module, and the door opening process of soft key is realized at gate inhibition end;Gate inhibition takes the photograph at end As the image in 2 D code that head shooting mobile phone screen generates, and the image obtained to shooting is corrected processing, Quick Response Code identification, body Part checking and door lock open three processing stages;Door lock Open control module include image correction unit, Quick Response Code recognition unit, Door lock opening unit.
Image correction unit is corrected to carry out gray proces, denoising and rotation to the image of shooting.
Quick Response Code recognition unit therefrom obtains the soft key information of encryption to identify the image in 2 D code by conversion, And obtain plaintext key information by decryption.
After door lock opening unit is to obtain the identity information that soft key case contains, by gate inhibition's end module by identity information with The authorization message that server end preserves is analyzed, and determines whether opening gate according to result;In order to ensure key Ageing limitation, after key uses once, removed at once from server, next use must regenerate;If identity Authentication failed, then gate inhibition end prompted.
Wherein, image correction unit includes gray proces subelement, denoising subelement, rotation correction subelement.
Gray proces subelement is colored to obtain image acquiescence from camera, and data volume is huge, is not easy to identify Processing is, it is necessary to be first converted into gray level image;Gray processing handles formula:
W=a × R+b × G+c × B, a+b+c=1.0
Wherein, W is gray level image pixel value, and R, G, B represent the color component value of original color image respectively, and a, b, c divide Not Wei three color components coefficient;In order to obtain higher Quick Response Code discrimination, a=0.3, b=0.11, c=0.59 are set.
Denoising subelement meets Poisson distribution to be removed using the medium filtering of appropriately sized rectangular window Salt grain noise;Remove noise algorithm be:
Wherein, λ is the average of Poisson distribution.
Rotation correction subelement to before identification image rotation to horizontal direction;First want the level of detection image partially Gyration, image could be rotated according to angle;Detection image X deflection angle need by image binaryzation, edge extracting and 3 steps of Hough transform, finally according to deflection angle rotate counterclockwise image;Rotation correction subelement includes image binaryzation Processing unit, edge detection unit, Hough transform unit, rotation correction unit.
Image binaryzation processing unit is convenient to carry out Quick Response Code identification to convert the image into black white image.Substantially it is former Reason is in the case where keeping characteristics of image, gives up the redundancy in image;Realization principle is one threshold value of selection and carried out Conversion so that image information only includes two kinds of colouring informations of black and white.
Edge detection unit is detecting the edge of black white image;Image is entered using the horizontal operator in Sobel operators Row convolution, and image border is obtained by threshold process.In algorithm implementation process, it is used as by 3 × 3 templates in core and image Each pixel do convolution and computing, then high-high brightness and the minimum average measured are edge in image.
Hough transform unit obtains deflection angle will pass through the image after rim detection by Hough transform;Calculate Method principle is represented for the straight line L of x-y plane with polar form, by setting straight line inclination angle theta value and picture altitude ρ, (θ, ρ) matrix is set, chooses each black pixel point in image, ρ values, the respective value in (θ, ρ) matrix are calculated to each θ values Accumulated value adds 1.The maximum place of accumulated value is found, is a horizontal edge line of QR codes, now corresponding angle of inclination is 90 ° of-θ, therefore, so as to judge that image needs 90 ° of-θ of rotate counterclockwise.
Rotation correction unit is to bring the θ obtained before values into equation below, if being around datum mark rotate counterclockwise On the occasion of clockwise turning to negative value;Postrotational image generally has a little distortion, reason be obtained new coordinate value not necessarily For integer, it is also necessary to the new value drawn is corrected using grey scale interpolation computing;
x0,y0To rotate the coordinate value of preceding pixel, x1,y1For postrotational coordinate value.
Embodiment two
A kind of cell phone access control based on ciphering type Quick Response Code, the system include:Mobile phone terminal, gate inhibition end and management clothes Business device;Mobile phone terminal generates soft key and is shown on mobile phone screen, and gate inhibition end driving camera obtains the soft key on mobile phone screen Spoon image, and checking is decrypted to soft key in the authentication module by being integrated in gate inhibition end, passes through authentication rear-guard Dynamic electric control switch opens door lock.
The mobile phone terminal mainly includes a software, is responsible for generation or is obtained from server comprising ciphering two-dimension code image Soft key image;The gate inhibition end is mainly made up of access controller, gate inhibition's power supply and electromagnetic lock, and gate inhibition end passes through image recognition Equipment gathers soft key image and decides whether opening door lock according to the result;The management server is responsible for key granting And rights management, realize the distributed management of key, user, door lock.
In summary, the beneficial effects of the present invention are:Cell phone access control proposed by the present invention can be reduced into effectively This, improves the convenience and security of management.
Gate control system proposed by the present invention is realized based on ciphering type Quick Response Code and image recognition technology, is shown in Mobile phone screen The ciphering type QRCode (soft key) at curtain end includes certificate data, and soft key is gathered by the image recognition apparatus at gate inhibition end Image simultaneously carries out authentication to user, by driving gate inhibition end electric-control system opening door lock after authentication.
Here description of the invention and application are illustrative, are not wishing to limit the scope of the invention to above-described embodiment In.The deformation and change of embodiments disclosed herein are possible, real for those skilled in the art The replacement and equivalent various parts for applying example are known.It should be appreciated by the person skilled in the art that the present invention is not being departed from Spirit or essential characteristics in the case of, the present invention can in other forms, structure, arrangement, ratio, and with other components, Material and part are realized.In the case where not departing from scope and spirit of the present invention, embodiments disclosed herein can be entered The other deformations of row and change.

Claims (9)

1. a kind of cell phone access control based on ciphering type Quick Response Code, it is characterised in that the system is mainly by mobile phone terminal, gate inhibition End and management server three parts are formed;
The mobile phone terminal mainly includes a software, is responsible for generation or the soft key for including ciphering two-dimension code image is obtained from server Spoon image;
The gate inhibition end is mainly made up of access controller, gate inhibition's power supply and electromagnetic lock, and gate inhibition is adopted at end by image recognition apparatus Collect soft key image and opening door lock is decided whether according to the result;
The management server is responsible for, to key granting and rights management, realizing the distributed management of key, user, door lock;
User downloads installation mobile phone terminal software by management server, and is authorized by registering to obtain to use;User is by hand Machine Software Create image in 2 D code --- soft key;This image in 2 D code is identified by the image recognition apparatus at gate inhibition end, after And decrypt and carry out the identification of door opener, finally judge whether opening door lock;
In the system, carry the soft key of identity information in the form of Quick Response Code by mobile phone terminal Software Create, and with timeliness and time Number limitation;In use, mobile phone terminal software firstly generates soft key and is shown on mobile phone screen, gate inhibition end software-driven camera Obtain the soft key image on mobile phone screen and soft key is decrypted by being integrated in the authentication module at gate inhibition end and tested Card, by driving electric control switch to open door lock after authentication;
The system is based on using a variety of security strategies:(a) the ageing limitation of soft key, to prevent that soft key is stolen or answers System, soft key can auto-destructs after setting time;(b) soft key access times limitation, the soft key of mobile phone terminal generation can only Using once, use is destroyed immediately later, is so also possible to prevent soft key and is maliciously usurped;(c) mobile phone terminal soft key is awarded Power mechanism, to prevent user from cracking or illegal download, system use application for registration licensing mode, i.e. user must apply obtaining It could be used after taking keyed feature code;(d) unauthorized use software is prevented;Mobile phone terminal can set software setting up password, prevent hand Machine illegally uses caused by losing, mobile phone lose after also by management end to sending short message by mobile phone " destruction " mobile phone terminal software;
The system includes soft key generation module, and the generation of soft key is completed by mobile phone terminal software, or passes through server Software is held to complete;The algorithm of mobile phone terminal Software Create ciphering two-dimension code image is turned by authentication information generation unit, Base64 codings Change unit and soft key generation unit is realized;
Including authentication information in soft key, authentication information includes mobile phone IMEI code, address name, post information, IMEI code is mainly used in binding mobile phone;Set information is shown in door-lock opening on door lock screen;When authentication information also includes Between stab information, for ageing judgement of the gate inhibition end to soft key;
Authentication information generation unit is using DES algorithm for encryption authentication information or uses triple des or AES encryption algorithm;Tool Body step is:1st step, using the software setting up password of user's input as key, by extending, replacing, being grouped, shifting, iteration 16 sets of sub-keys are obtained after processing;2nd step, to authentication information plaintext on the basis of above key is generated, it is grouped The authentication information that displacement and iteration are encrypted;
Base64 transcoder units are carrying out code conversion;Being converted to the authentication information of encryption using Base64 codings can For generating the ascii character sequence of Quick Response Code;The general principle of conversion is 3 octets to be converted into the byte of 46, Two 0 are mended before each 6 afterwards, forms 8;It is replaced further according to the value of each byte with specific coding schedule, Corresponding character in coding schedule is made up of English character, numeral and conventional sign, just in the acceptable character range of Quick Response Code; By this conversion, the authentication information of encryption is just converted into the character information with two-dimentional representation, but this information according to It is so encryption;
Soft key generation unit uses the coding form of widely used QRCode Quick Response Codes, and its general principle is to inputting character (C1C2 ... Cn) is converted into numerical value (D1D2 ... Dn) sequence according to coding schedule, and mode indicators and character are added before sequence Cataloged procedure is completed after number, finally using image generating technologies, generates ciphering two-dimension code image --- the i.e. soft key of the system, The image will be identified by the image recognition apparatus at gate inhibition end and decide whether opening door lock;
The system also includes door lock Open control module, and the door opening process of soft key is realized at gate inhibition end;Gate inhibition end camera The image in 2 D code of mobile phone screen generation is shot, and the image obtained to shooting is corrected processing, Quick Response Code identifies, identity is tested Card and door lock open three processing stages;Door lock Open control module includes image correction unit, Quick Response Code recognition unit, door lock Opening unit;
Image correction unit is corrected to carry out gray proces, denoising and rotation to the image of shooting;Image correction unit Including gray proces subelement, denoising subelement, rotation correction subelement;
(1) it is colored that gray proces subelement obtains image acquiescence from camera, and data volume is huge, is not easy to identifying processing, Need to be first converted into gray level image;Gray processing handles formula:
W=a × R+b × G+c × B, a+b+c=1.0
Wherein, W is gray level image pixel value, and R, G, B represent the color component value of original color image respectively, and a, b, c are respectively The coefficient of three color components;In order to obtain higher Quick Response Code discrimination, a=0.3, b=0.11, c=0.59 are set;
Denoising subelement meets the salt grain of Poisson distribution to be removed using the medium filtering of appropriately sized rectangular window Noise;Remove noise algorithm be:
Wherein, λ is the average of Poisson distribution;
Rotation correction subelement is before identification image rotation to horizontal direction;The X deflection angle of detection image is first wanted, Image could be rotated according to angle;Detection image X deflection angle needs to become by image binaryzation, edge extracting and Hough 3 steps are changed, finally according to deflection angle rotate counterclockwise image;It is single that rotation correction subelement includes image binaryzation processing Member, edge detection unit, Hough transform unit, rotation correction unit;
Image binaryzation processing unit is convenient to carry out Quick Response Code identification to convert the image into black white image;General principle is In the case where keeping characteristics of image, give up the redundancy in image;Realization principle is to select a threshold value and changed, So that image information only includes two kinds of colouring informations of black and white;
Edge detection unit is detecting the edge of black white image;Image is rolled up using the horizontal operator in Sobel operators Product, and image border is obtained by threshold process;In algorithm implementation process, it is used as core by 3 × 3 templates, and in image Each pixel does convolution and computing, then using high-high brightness in image and the minimum average measured as edge;
Hough transform unit obtains deflection angle will pass through the image after rim detection by Hough transform;Algorithm is former Reason is to be represented for the straight line L of x-y plane with polar form, by setting straight line inclination angle theta value and picture altitude ρ, if (θ, ρ) matrix is put, chooses each black pixel point in image, ρ values are calculated to each θ values, respective value adds up in (θ, ρ) matrix Value plus 1;Find the maximum place of accumulated value, be a horizontal edge line of QR codes, now corresponding angle of inclination be 90 °- θ, therefore, so as to judge that image needs 90 ° of-θ of rotate counterclockwise;
Rotation correction unit to bring the θ obtained before values into equation below, if around datum mark rotate counterclockwise be on the occasion of, Clockwise turn to negative value;Postrotational image generally has a little distortion, reason be obtained new coordinate value differ be set to it is whole Number, it is also necessary to be corrected using grey scale interpolation computing to the new value drawn;
<mrow> <mfenced open = "[" close = "]"> <mtable> <mtr> <mtd> <msub> <mi>x</mi> <mn>1</mn> </msub> </mtd> </mtr> <mtr> <mtd> <msub> <mi>y</mi> <mn>1</mn> </msub> </mtd> </mtr> </mtable> </mfenced> <mo>=</mo> <mfenced open = "[" close = "]"> <mtable> <mtr> <mtd> <mrow> <mi>c</mi> <mi>o</mi> <mi>s</mi> <mi>&amp;theta;</mi> </mrow> </mtd> <mtd> <mrow> <mi>s</mi> <mi>i</mi> <mi>n</mi> <mi>&amp;theta;</mi> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mo>-</mo> <mi>s</mi> <mi>i</mi> <mi>n</mi> <mi>&amp;theta;</mi> </mrow> </mtd> <mtd> <mrow> <mi>cos</mi> <mi>&amp;theta;</mi> </mrow> </mtd> </mtr> </mtable> </mfenced> <mfenced open = "[" close = "]"> <mtable> <mtr> <mtd> <msub> <mi>x</mi> <mn>0</mn> </msub> </mtd> </mtr> <mtr> <mtd> <msub> <mi>y</mi> <mn>0</mn> </msub> </mtd> </mtr> </mtable> </mfenced> </mrow>
x0,y0To rotate the coordinate value of preceding pixel, x1,y1For postrotational coordinate value;
Quick Response Code recognition unit therefrom obtains the soft key information of encryption to identify the image in 2 D code by conversion, and passes through Cross decryption and obtain plaintext key information;
After door lock opening unit is to obtain the authentication information that soft key case contains, authentication is believed by gate inhibition's end module Cease the authorization message preserved with server end to be analyzed, and opening gate is determined whether according to result;In order to ensure key The ageing limitation of spoon, after key uses once, removed at once from server, next use must regenerate;If Authentication fails, then gate inhibition end is prompted.
2. a kind of cell phone access control based on ciphering type Quick Response Code, it is characterised in that the system includes:Mobile phone terminal, gate inhibition End and management server;
Mobile phone terminal generates soft key and is shown on mobile phone screen, and gate inhibition end driving camera obtains the soft key on mobile phone screen Image, and checking is decrypted to soft key in the authentication module by being integrated in gate inhibition end, by being driven after authentication Electric control switch opens door lock;
The system includes soft key generation module, and the generation of soft key is completed by mobile phone terminal software, or passes through server Software is held to complete;The algorithm of mobile phone terminal Software Create ciphering two-dimension code image is turned by authentication information generation unit, Base64 codings Change unit and soft key generation unit is realized;
Including authentication information in soft key, authentication information includes mobile phone IMEI code, address name, post information, IMEI code is mainly used in binding mobile phone;Set information is shown in door-lock opening on door lock screen;When authentication information also includes Between stab information, for ageing judgement of the gate inhibition end to soft key;
Authentication information generation unit is using DES algorithm for encryption authentication information or uses triple des or AES encryption algorithm;Tool Body step is:1st step, using the software setting up password of user's input as key, by extending, replacing, being grouped, shifting, iteration 16 sets of sub-keys are obtained after processing;2nd step, to identity information plaintext on the basis of above key is generated, carry out packet displacement The identity information encrypted with iteration;
Base64 transcoder units are carrying out code conversion;Being converted to the authentication information of encryption using Base64 codings can For generating the ascii character sequence of Quick Response Code;The general principle of conversion is 3 octets to be converted into the byte of 46, Two 0 are mended before each 6 afterwards, forms 8;It is replaced further according to the value of each byte with specific coding schedule, Corresponding character in coding schedule is made up of English character, numeral and conventional sign, just in the acceptable character range of Quick Response Code; By this conversion, the identity information of encryption is just converted into the character information with two-dimentional representation, but this information is still Encryption;
Soft key generation unit uses the coding form of widely used QRCode Quick Response Codes, and its general principle is to inputting character (C1C2 ... Cn) is converted into numerical value (D1D2 ... Dn) sequence according to coding schedule, and mode indicators and character are added before sequence Cataloged procedure is completed after number, finally using image generating technologies, generates ciphering two-dimension code image --- the i.e. soft key of the system, The image will be identified by the image recognition apparatus at gate inhibition end and decide whether opening door lock.
3. the cell phone access control according to claim 2 based on ciphering type Quick Response Code, it is characterised in that:
The mobile phone terminal mainly includes a software, is responsible for generation or the soft key for including ciphering two-dimension code image is obtained from server Spoon image;
The gate inhibition end is mainly made up of access controller, gate inhibition's power supply and electromagnetic lock, and gate inhibition is adopted at end by image recognition apparatus Collect soft key image and opening door lock is decided whether according to the result;
The management server is responsible for, to key granting and rights management, realizing the distributed management of key, user, door lock.
4. the cell phone access control according to claim 2 based on ciphering type Quick Response Code, it is characterised in that:
User downloads installation mobile phone terminal software by management server, and is authorized by registering to obtain to use;User is by hand Machine Software Create image in 2 D code --- soft key;This image in 2 D code is identified by the image recognition apparatus at gate inhibition end, after And decrypt and carry out the identification of door opener, finally judge whether opening door lock;
In the system, carry the soft key of identity information in the form of Quick Response Code by mobile phone terminal Software Create, and with timeliness and time Number limitation;In use, mobile phone terminal software firstly generates soft key and is shown on mobile phone screen, gate inhibition end software-driven camera Obtain the soft key image on mobile phone screen and soft key is decrypted by being integrated in the authentication module at gate inhibition end and tested Card, by driving electric control switch to open door lock after authentication.
5. the cell phone access control according to claim 2 based on ciphering type Quick Response Code, it is characterised in that:
The system is based on using a variety of security strategies:(a) the ageing limitation of soft key, to prevent that soft key is stolen or answers System, soft key can auto-destructs after setting time;(b) soft key access times limitation, the soft key of mobile phone terminal generation can only Using once, use is destroyed immediately later, is so also possible to prevent soft key and is maliciously usurped;(c) mobile phone terminal soft key is awarded Power mechanism, to prevent user from cracking or illegal download, system use application for registration licensing mode, i.e. user must apply obtaining It could be used after taking keyed feature code;(d) unauthorized use software is prevented;Mobile phone terminal can set software setting up password, prevent hand Machine illegally uses caused by losing, mobile phone lose after also by management end to sending short message by mobile phone " destruction " mobile phone terminal software.
6. the cell phone access control according to claim 2 based on ciphering type Quick Response Code, it is characterised in that:
The system also includes door lock Open control module, and the door opening process of soft key is realized at gate inhibition end;Gate inhibition end camera The image in 2 D code of mobile phone screen generation is shot, and the image obtained to shooting is corrected processing, Quick Response Code identifies, identity is tested Card and door lock are opened.
7. the cell phone access control according to claim 6 based on ciphering type Quick Response Code, it is characterised in that:
The door lock Open control module includes image correction unit, Quick Response Code recognition unit, door lock opening unit;
Image correction unit is corrected to carry out gray proces, denoising and rotation to the image of shooting;
Quick Response Code recognition unit therefrom obtains the soft key information of encryption to identify the image in 2 D code by conversion, and passes through Cross decryption and obtain plaintext key information;
After door lock opening unit is to obtain the identity information that soft key case contains, by gate inhibition's end module by identity information with servicing The authorization message that device end preserves is analyzed, and determines whether opening gate according to result;In order to ensure the timeliness of key Property limitation, once key using after once, removed at once from server, next use must regenerate;If authentication Failure, then gate inhibition end is prompted.
8. the cell phone access control according to claim 7 based on ciphering type Quick Response Code, it is characterised in that:
Described image correction unit includes gray proces subelement, denoising subelement, rotation correction subelement;
Gray proces subelement from camera obtain image acquiescence be colored, data volume is huge, be not easy to identifying processing, it is necessary to It is first converted into gray level image;
The gray proces subelement gray processing handles formula:
W=a × R+b × G+c × B, a+b+c=1.0
Wherein, W is gray level image pixel value, and R, G, B represent the color component value of original color image respectively, and a, b, c are respectively The coefficient of three color components;In order to obtain higher Quick Response Code discrimination, a=0.3, b=0.11, c=0.59 are set;
Denoising subelement meets the salt grain of Poisson distribution to be removed using the medium filtering of appropriately sized rectangular window Noise;Remove noise algorithm be:
Wherein, λ is the average of Poisson distribution;
Rotation correction subelement is before identification image rotation to horizontal direction;The X deflection angle of detection image is first wanted, Image could be rotated according to angle;Detection image X deflection angle needs to become by image binaryzation, edge extracting and Hough 3 steps are changed, finally according to deflection angle rotate counterclockwise image.
9. the cell phone access control according to claim 8 based on ciphering type Quick Response Code, it is characterised in that:
Rotation correction subelement includes image binaryzation processing unit, edge detection unit, Hough transform unit, rotation correction Unit;
Image binaryzation processing unit is convenient to carry out Quick Response Code identification to convert the image into black white image;General principle is In the case where keeping characteristics of image, give up the redundancy in image;Realization principle is to select a threshold value and changed, So that image information only includes two kinds of colouring informations of black and white;
Edge detection unit is detecting the edge of black white image;Image is rolled up using the horizontal operator in Sobel operators Product, and image border is obtained by threshold process;In algorithm implementation process, it is used as core by 3 × 3 templates, and in image Each pixel does convolution and computing, then using high-high brightness in image and the minimum average measured as edge;
Hough transform unit obtains deflection angle will pass through the image after rim detection by Hough transform;Algorithm is former Reason is to be represented for the straight line L of x-y plane with polar form, by setting straight line inclination angle theta value and picture altitude ρ, if (θ, ρ) matrix is put, chooses each black pixel point in image, ρ values are calculated to each θ values, respective value adds up in (θ, ρ) matrix Value plus 1;Find the maximum place of accumulated value, be a horizontal edge line of QR codes, now corresponding angle of inclination be 90 °- θ, therefore, so as to judge that image needs 90 ° of-θ of rotate counterclockwise;
Rotation correction unit to bring the θ obtained before values into equation below, if around datum mark rotate counterclockwise be on the occasion of, Clockwise turn to negative value;Postrotational image generally has a little distortion, reason be obtained new coordinate value differ be set to it is whole Number, it is also necessary to be corrected using grey scale interpolation computing to the new value drawn;
<mrow> <mfenced open = "[" close = "]"> <mtable> <mtr> <mtd> <msub> <mi>x</mi> <mn>1</mn> </msub> </mtd> </mtr> <mtr> <mtd> <msub> <mi>y</mi> <mn>1</mn> </msub> </mtd> </mtr> </mtable> </mfenced> <mo>=</mo> <mfenced open = "[" close = "]"> <mtable> <mtr> <mtd> <mrow> <mi>c</mi> <mi>o</mi> <mi>s</mi> <mi>&amp;theta;</mi> </mrow> </mtd> <mtd> <mrow> <mi>s</mi> <mi>i</mi> <mi>n</mi> <mi>&amp;theta;</mi> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mo>-</mo> <mi>s</mi> <mi>i</mi> <mi>n</mi> <mi>&amp;theta;</mi> </mrow> </mtd> <mtd> <mrow> <mi>cos</mi> <mi>&amp;theta;</mi> </mrow> </mtd> </mtr> </mtable> </mfenced> <mfenced open = "[" close = "]"> <mtable> <mtr> <mtd> <msub> <mi>x</mi> <mn>0</mn> </msub> </mtd> </mtr> <mtr> <mtd> <msub> <mi>y</mi> <mn>0</mn> </msub> </mtd> </mtr> </mtable> </mfenced> </mrow>
x0,y0To rotate the coordinate value of preceding pixel, x1,y1For postrotational coordinate value.
CN201510486990.9A 2015-08-10 2015-08-10 A kind of cell phone access control based on ciphering type Quick Response Code Active CN105139491B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510486990.9A CN105139491B (en) 2015-08-10 2015-08-10 A kind of cell phone access control based on ciphering type Quick Response Code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510486990.9A CN105139491B (en) 2015-08-10 2015-08-10 A kind of cell phone access control based on ciphering type Quick Response Code

Publications (2)

Publication Number Publication Date
CN105139491A CN105139491A (en) 2015-12-09
CN105139491B true CN105139491B (en) 2017-11-28

Family

ID=54724820

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510486990.9A Active CN105139491B (en) 2015-08-10 2015-08-10 A kind of cell phone access control based on ciphering type Quick Response Code

Country Status (1)

Country Link
CN (1) CN105139491B (en)

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105262752A (en) * 2015-10-26 2016-01-20 广州畅联信息科技有限公司 Data processing method and device of virtual key, mobile terminal and server
CN106934264A (en) * 2015-12-31 2017-07-07 深圳先进技术研究院 A kind of intelligent unlocking method, device and lock device
CN105472037A (en) * 2016-01-06 2016-04-06 深圳市呤云科技有限公司 Method and device for opening entrance guard through scanning two-dimension code
CN105701899A (en) * 2016-04-07 2016-06-22 上海斐讯数据通信技术有限公司 Intelligent access control method and system
CN107067557A (en) * 2016-11-16 2017-08-18 国网山东省电力公司日照供电公司 A kind of two-dimentional key of intelligent charging spot is from lock administration system
CN106898065B (en) 2017-01-21 2020-01-17 云丁网络技术(北京)有限公司 Unlocking method of intelligent door lock
CN106846655B (en) * 2017-01-23 2022-08-30 湖南晶威科技有限公司 Internet-based key management cabinet and control method
CN107492162A (en) * 2017-06-01 2017-12-19 景德镇学院 Intelligent access control system based on ciphering type Quick Response Code and WiFi technology
CN107016769A (en) * 2017-06-05 2017-08-04 合肥展游软件开发有限公司 A kind of intelligent access control system for residential quarters
CN107342854A (en) * 2017-06-20 2017-11-10 杭州高锦科技有限公司 The encrypting and decrypting method and intelligent access control system of gate inhibition's Quick Response Code authority information
CN107358700A (en) * 2017-07-17 2017-11-17 合肥锦和信息技术有限公司 A kind of intelligent access control system being used for for residential quarters
US10937264B2 (en) 2017-11-01 2021-03-02 Ademco Inc. Systems and methods for disarming a security system monitoring a secured area using a two-dimensional scannable access code
CN107945331A (en) * 2017-11-21 2018-04-20 广州思加特科技有限公司 A kind of access control method, apparatus and system
CN108986328A (en) * 2018-05-29 2018-12-11 惠州智享物流科技有限公司 The self-service lease management system of pallet
CN108868348B (en) * 2018-06-15 2020-04-14 威海利赫自动化科技有限公司 Low-power consumption safety lock based on photoresistor coding and decoding
CN108921988B (en) * 2018-06-25 2021-04-02 西安石油大学 Door lock system and control method
CN108833118B (en) * 2018-07-25 2021-12-10 合肥学院 Safety access method and system applying rational interpolation containing parameter Thiele type
CN108961511B (en) * 2018-07-25 2021-11-23 合肥学院 Unlocking method and system applying rational interpolation containing parameter Thiele type continuous fraction
CN109102602B (en) * 2018-07-25 2021-07-20 合肥学院 Unlocking method and system applying interpolation of Newton type polynomial containing parameters
US10789800B1 (en) 2019-05-24 2020-09-29 Ademco Inc. Systems and methods for authorizing transmission of commands and signals to an access control device or a control panel device
WO2021023164A1 (en) 2019-08-02 2021-02-11 云丁网络技术(北京)有限公司 Intelligent lock control method and system
CN110415419A (en) * 2019-08-21 2019-11-05 杭州享钥科技有限公司 Electron key share system in access control system based on mobile terminal
CN111540093A (en) * 2020-04-29 2020-08-14 三仟(杭州)数字科技有限公司 Access control system and control method thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101826227A (en) * 2010-04-30 2010-09-08 广州合立正通信息网络集成有限公司 Triple-authentication gate control system and control method
CN103955975A (en) * 2014-04-22 2014-07-30 广州闪购软件服务有限公司 Cellphone-based dynamic two-dimension code access control system
CN103955982A (en) * 2014-05-22 2014-07-30 国家电网公司 Method and device for identifying time-varying dynamic two-dimensional code entrance guard
CN203759775U (en) * 2014-03-21 2014-08-06 高椿明 Double-encrypted access control system based on two-dimensional code recognition

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000353259A (en) * 1999-06-09 2000-12-19 Palstaff Kk Entrance/exit management system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101826227A (en) * 2010-04-30 2010-09-08 广州合立正通信息网络集成有限公司 Triple-authentication gate control system and control method
CN203759775U (en) * 2014-03-21 2014-08-06 高椿明 Double-encrypted access control system based on two-dimensional code recognition
CN103955975A (en) * 2014-04-22 2014-07-30 广州闪购软件服务有限公司 Cellphone-based dynamic two-dimension code access control system
CN103955982A (en) * 2014-05-22 2014-07-30 国家电网公司 Method and device for identifying time-varying dynamic two-dimensional code entrance guard

Also Published As

Publication number Publication date
CN105139491A (en) 2015-12-09

Similar Documents

Publication Publication Date Title
CN105139491B (en) A kind of cell phone access control based on ciphering type Quick Response Code
CN103729341B (en) The method and apparatus of positioning electronic seal and the device for realizing E-seal
CN103646455B (en) The compound method of a kind of Intelligent lock device and using method thereof, electron key
CN101300808B (en) Method and arrangement for secure autentication
CN102572314B (en) Image sensor and payment authentication method
CN106100850B (en) Intelligent and safe chip signing messages transmission method and system based on two dimensional code
EP3304394B1 (en) Authentication methods and systems
WO2017045594A1 (en) Anti-counterfeit method
CN104463016B (en) Data safety storing method suitable for IC cards and two-dimension codes
CN107277059A (en) A kind of one-time password identity identifying method and system based on Quick Response Code
CN106936588A (en) A kind of trustship method, the apparatus and system of hardware controls lock
CN109617675A (en) Both sides&#39; identification authentication method and system between a kind of charge-discharge facility and user terminal
CN105956452A (en) Method and system for unlocking device
CN104951939A (en) Electronic bank card system and application method thereof as well as electronic method of bank card
CN107784207A (en) Display methods, device, equipment and the storage medium at financial APP interfaces
CN104424579A (en) Security traceability management system
CN106953732A (en) The key management system and method for chip card
CN114170658A (en) Face recognition encryption authentication method and system combining watermark and deep learning
CN104899737B (en) Fingerprint IRLRD feature encryptions method and the mobile-payment system based on this method and method
CN111768523A (en) CTID-based NFC intelligent door lock unlocking method, system, equipment and medium
CN106953731A (en) The authentication method and system of a kind of terminal management person
CN101013944A (en) Method and apparatus for inputting/displaying/transmitting user information using USB key
CN111597521B (en) Method and system for safely processing data of mobile terminal of transformer substation
WO2020173455A1 (en) Method for authorized use of projector
US20160189015A1 (en) Data exchange methods, systems and apparatus using color images

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant