CN106652129A - Door control system design method based on mobile phone APP (application) - Google Patents
Door control system design method based on mobile phone APP (application) Download PDFInfo
- Publication number
- CN106652129A CN106652129A CN201611070228.3A CN201611070228A CN106652129A CN 106652129 A CN106652129 A CN 106652129A CN 201611070228 A CN201611070228 A CN 201611070228A CN 106652129 A CN106652129 A CN 106652129A
- Authority
- CN
- China
- Prior art keywords
- visitor
- mobile phone
- information
- control system
- card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention relates to a door control system design method based on a mobile phone APP (application). The method can effectively solve the problems that an existing single card swiping door control system is unsafe and the like and provides possibilities for application requirements of an intelligent door control system. The method includes the steps: downloading a door control APP by a visitor; inputting requirement contents; opening a door by the aid of a method of 'one password for one step' among a mobile terminal, a door control terminal and a server. When a two-dimensional code scanner of a door control system faults and the like, the visitor can acquire a disposable card from an IC (integrated circuit) card machine through an identification card and enters a door according to the disposable card, so that the visitor can enter the door when uncontrollable emergency conditions happen. The method is simple and easy to operate and has high market benefits, the door control system is effectively and remotely operated and managed, and management convenience is improved.
Description
Technical field
The present invention is that the gate control system based on mobile phone A PP is designed, the present invention relates to information encryption, Quick Response Code coding and solution
Code, the technical field that is wirelessly transferred of information, more particularly to a kind of utilization Quick Response Code carries out data information transfer and authentication
Technology.
Background technology
Gate control system, the system exactly people's turnover regulated and controled in door.It based on mechanical door lock, gradually intelligence
Energyization and develop and obtain.Although conventional door lock is firm, it has a time-honored difficult problem, i.e. bad person can be by letter
Single method is opened(Such as skeleton key).
The gate control system at initial stage is electronic lock, and its main representative is that electronic magnetic card is locked, electronic password lock, the one of both locks
Determine to improve the management that people come in and go out door in degree, make channel management enter electronic age.But magnetic card fault rate is high, hold
Transreplication;The problems such as password is easily revealed, is gradually also eliminated, and application is not very very extensive.With the development of technology, gate control system
Obtain developing on a large scale very much, entered the maturity period, started to occur in that gate control system that identity is verified using Quick Response Code etc., in safety
Property, convenience, gate control system development is also become better and better.
The content of the invention
The present invention is directed to the deficiencies in the prior art, there is provided a kind of gate control system method for designing based on mobile phone A PP.
The present invention is comprised the following steps:
Step a, visitor download mobile phone gate inhibition APP, and personal information is registered as requested.Server generates specific according to visitor information
Public key m1, private key n1, send it to visitor's mobile phone terminal.
Step b, server are obtained after the enabling request of visitor's mobile phone terminal, are sent to the mobile phone gate inhibition APP of owner's mobile phone terminal
The information of visitor, asks whether to allow it to enter.If owner agrees to, server to visitor's mailbox sends checking information h1.Meanwhile,
Server is encrypted with public key m1 to a working key n2, is made Quick Response Code and is sent to visitor mobile phone gate inhibition APP.
Step c, visitor are verified after information h1 and Quick Response Code, and Quick Response Code decoding is decrypted with decoding algorithm and private key n1
Afterwards, working key n2 is obtained.Visitor is digitally signed with working key n2 to checking information h1, and makes Quick Response Code, is put in
At gate inhibition's barcode scanning, server obtains information and digital signature, to the two checking, it is errorless after, visitor obtain open the door authorize.
Server by utilizing visitor public key in the present invention only has visitor's oneself to the key encryption that works, this work key
Private key spoon could be opened.Visitor is fabricated to two-dimension code pattern using this work private key and checking information, allows gate inhibition's scanning validation.
The inventive method is simple, easily operation, and effectively realizes carrying out gate control system remote operation, management, and improves the side of management
Just property, with very high market efficiency.
Description of the drawings
Fig. 1 is the flow chart of step a in the present invention;
Fig. 2 is the flow chart of step b in the present invention;
Fig. 3 is the flow chart of step c in the present invention.
Specific embodiment
Below in conjunction with accompanying drawing, the invention will be further described.
The inventive method is specifically:
A, visitor(Mobile phone terminal a)Mobile phone gate inhibition APP is downloaded, personal information is registered as requested(Including name, phone number, postal
Case, individual human head picture and ID Card Image).Server generates specific public key m1, private key n1 according to visitor information, is sent to
Visitor mobile phone terminal a is given, as shown in Figure 1.
APP is the cell phone software for contacting client and service end, and client and service end can be carried out by certain agreement
Communication.Process of various data etc. is all the work of service end, and then service end is contacted again with client.
Public, private key is also known as asymmetric cryptosystem mode.Public key is used for everyone, can be placed on the ground of wechat public number
Side allows user to find, and the effect of public key is to the data deciphering after corresponding private key encryption.Private key is the private property of owner,
It is sacred and inviolable.Simultaneously its is extremely important, if being stolen by bad person, has very big harm to owner, society, it is therefore necessary to caution
Preserve, the effect of private key is to carry out data encryption.In a word, public key is with the effect of private key:The content of public key encryption can only be with private
Key is decrypted, and is only capable of using public key decryptions with the content of private key encryption.
B, server are obtained after the enabling request of visitor mobile phone terminal a, to owner(Mobile phone terminal b)Mobile phone gate inhibition APP sends and visits
The information of visitor, asks whether to allow it to enter.If owner agrees to, server to visitor's mailbox sends checking information h1.Meanwhile, clothes
Business device is encrypted with public key m1 to a working key n2, is made Quick Response Code and is sent to visitor's mobile phone A PP.To ensure safety, checking
Information h1 and working key n2 are effective in one hour, as shown in Figure 2.
Two-dimensional bar code is to represent binary data using black and white rectangular patterns in the plane, after it is by equipment barcode scanning, can be obtained
Take the information for including.Today's society, two-dimensional bar code be can yet be regarded as a kind of economic, convenient information transferring method.Data can pass through
The mode of Quick Response Code coding becomes two-dimension code pattern, and two-dimension code pattern can become data by way of Quick Response Code is decoded.
C, visitor are obtained after information h1 and Quick Response Code, with decoding algorithm and private key n1 to Quick Response Code solution code encryption after, obtain
Working key n2.Visitor is signed with working key n2 to information h1, and makes Quick Response Code, is put at gate inhibition's barcode scanning, checking
After errorless, obtaining opening the door authorizes, as shown in Figure 3.
Digital signature is signed on an equal basis similar to people's pairing.Generally, it is used public and private key to realize.One number
Word signature is typically complementary computing, and one is used to sign, and another is used to verify.Digital signature, is exactly to be produced by sender
The one piece of data that cannot be copied, this segment data demonstrates sender's simultaneously.
Server receives visitor and is verified after information, and to back-end data stock the information is put, for later checking.
The method of checking information, after user input checking information, and the timestamp comparation of background data base, see whether the time is expired,
If expired, checking information is invalid, if before the deadline, whether equal compares checking information.It is equal, then update the data, and
Checking information is emptied, because checking information is once effectively, unequal return interface prompt checking information is incorrect.
When gate control system two-dimensional code scanning device goes wrong or other reasons cause visitor to enter, visitor can pass through
Identity card used disposable IC-card maker from the side during the registration of oneself(Need to be through the mandate of owner, disposable IC-card life
Ability of growing up to be a useful person card release), obtain an interim enabling IC-card.Visitor is opened the door with this card insertion card inserting mouth.
IC-card, i.e. integrated circuit card, also known as smart card.It is the card base by the way that an electronic chip to be put into a standard
It is interior, form card.It is extensively used in industries such as traffic, banks.It can be divided into contact with contactless two kinds, be used herein as
Be the latter.Non-contact IC card relative to the advantage of Contact Type Ic Card be in card non-transformer and without contact.It is contactless
The Thoughts of IC-card:RF device sends the electromagnetic wave of CF to IC-card, and when with IC-card circuit resonance, IC-card will block interior
Data is activation completes picking for information to machine.
Claims (5)
1. the gate control system method for designing of mobile phone A PP is based on, it is characterised in that the method step is as follows:Step a, visitor download hand
Gate prohibits APP, and personal information is registered as requested;Server generates specific public key m1, private key n1 according to visitor information, by it
It is sent to visitor's mobile phone terminal;
Step b, server are obtained after the enabling request of visitor's mobile phone terminal, and to the mobile phone gate inhibition APP of owner's mobile phone terminal visitor is sent
Information, ask whether allow its enter;If owner agrees to, server to visitor's mailbox sends checking information h1;Meanwhile, service
Device is encrypted with public key m1 to a working key n2, is made Quick Response Code and is sent to visitor mobile phone gate inhibition APP;
Step c, visitor are verified after information h1 and Quick Response Code, after being decrypted to Quick Response Code decoding with decoding algorithm and private key n1,
Obtain working key n2;Visitor is digitally signed with working key n2 to checking information h1, and makes Quick Response Code, is put in gate inhibition
At barcode scanning, server obtains information and digital signature, to the two checking, it is errorless after, visitor obtain open the door authorize.
2. the gate control system method for designing based on mobile phone A PP according to claim 1, it is characterised in that:Described individual
Information includes name, phone number, mailbox, individual human head picture and ID Card Image.
3. the gate control system method for designing based on mobile phone A PP according to claim 1, it is characterised in that:Described checking
Information h1 and working key n2 are effective in one hour.
4. the gate control system method for designing based on mobile phone A PP according to any one of claim 1 to 3, it is characterised in that:
Server receives visitor and is verified after information, and to back-end data stock the information is put, for later checking;Checking information
Method:After user input checking information, and the timestamp comparation of background data base, see whether the time is expired, if expired,
Checking information is invalid, if before the deadline, whether equal compares checking information;It is equal, then update the data, and empty checking letter
Breath, unequal return interface prompt checking information is incorrect.
5. the gate control system method for designing based on mobile phone A PP according to any one of claim 1 to 3, it is characterised in that:
When gate control system two-dimensional code scanning device goes wrong or other reasons cause visitor to enter, the registration that visitor passes through oneself
Shi Suoyong identity cards disposable IC-card maker from the side, obtains an interim enabling IC-card, and visitor inserts plug-in card with this card
Mouthful, opened the door.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611070228.3A CN106652129B (en) | 2016-11-29 | 2016-11-29 | Access control system design method based on mobile phone APP |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611070228.3A CN106652129B (en) | 2016-11-29 | 2016-11-29 | Access control system design method based on mobile phone APP |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106652129A true CN106652129A (en) | 2017-05-10 |
CN106652129B CN106652129B (en) | 2020-01-10 |
Family
ID=58813270
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611070228.3A Active CN106652129B (en) | 2016-11-29 | 2016-11-29 | Access control system design method based on mobile phone APP |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106652129B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107274519A (en) * | 2017-06-02 | 2017-10-20 | 深圳市巨龙科教网络有限公司 | A kind of Campus Security intelligent caller management method |
CN107358693A (en) * | 2017-07-04 | 2017-11-17 | 安徽工程大学 | A kind of smart lock and method for unlocking |
CN107612798A (en) * | 2017-10-27 | 2018-01-19 | 珠海格力电器股份有限公司 | The methods, devices and systems of call door bell |
CN108055124A (en) * | 2017-11-15 | 2018-05-18 | 吕锋 | Lock administration system and lock management method |
CN108510626A (en) * | 2018-02-23 | 2018-09-07 | 深圳同心科技有限公司 | A kind of dynamic password access control management method and its management system |
CN110211261A (en) * | 2019-04-28 | 2019-09-06 | 新大陆(福建)公共服务有限公司 | A kind of intelligent door lock method for unlocking and system based on two dimensional code |
CN111784887A (en) * | 2019-11-29 | 2020-10-16 | 北京沃东天骏信息技术有限公司 | Authorization releasing method, device and system for user access |
TWI773217B (en) * | 2021-03-25 | 2022-08-01 | 中華電信股份有限公司 | System, method and computer program product for pass-through control |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103606211A (en) * | 2013-10-30 | 2014-02-26 | 小米科技有限责任公司 | Method, equipment and system used for realization of intelligent entrance guard |
CN103914901A (en) * | 2014-03-27 | 2014-07-09 | 惠州Tcl移动通信有限公司 | Unlocking method and unlocking system |
CN104038338A (en) * | 2014-05-11 | 2014-09-10 | 合肥市艾塔器网络科技有限公司 | Image recognition-based security authorization method |
CN104933793A (en) * | 2015-06-11 | 2015-09-23 | 宁波飞拓电器有限公司 | Two-dimension code electronic key implementation method based on digital signature |
CN105069876A (en) * | 2015-08-04 | 2015-11-18 | 珠海格力电器股份有限公司 | Control method and system for intelligent access control |
CN105139499A (en) * | 2015-09-08 | 2015-12-09 | 蔡炜 | Mobile phone door lock system based on asymmetric secret key and realization method thereof |
CN105337733A (en) * | 2015-11-25 | 2016-02-17 | 杭州晟元数据安全技术股份有限公司 | Two-dimensional code locking control method based on combination of synchronous-asynchronous secret key verification |
CN105427414A (en) * | 2015-11-03 | 2016-03-23 | 徐承柬 | Visitor management method and system |
US20160094345A1 (en) * | 2014-09-28 | 2016-03-31 | Emc Corporation | Generating a qr code |
CN105844758A (en) * | 2016-05-20 | 2016-08-10 | 广州邻礼信息科技有限公司 | Real estate resident user and visitor access management and implementation method |
CN106161468A (en) * | 2016-08-31 | 2016-11-23 | 广州云系信息科技有限公司 | Visitor information identification system and method |
-
2016
- 2016-11-29 CN CN201611070228.3A patent/CN106652129B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103606211A (en) * | 2013-10-30 | 2014-02-26 | 小米科技有限责任公司 | Method, equipment and system used for realization of intelligent entrance guard |
CN103914901A (en) * | 2014-03-27 | 2014-07-09 | 惠州Tcl移动通信有限公司 | Unlocking method and unlocking system |
CN104038338A (en) * | 2014-05-11 | 2014-09-10 | 合肥市艾塔器网络科技有限公司 | Image recognition-based security authorization method |
US20160094345A1 (en) * | 2014-09-28 | 2016-03-31 | Emc Corporation | Generating a qr code |
CN104933793A (en) * | 2015-06-11 | 2015-09-23 | 宁波飞拓电器有限公司 | Two-dimension code electronic key implementation method based on digital signature |
CN105069876A (en) * | 2015-08-04 | 2015-11-18 | 珠海格力电器股份有限公司 | Control method and system for intelligent access control |
CN105139499A (en) * | 2015-09-08 | 2015-12-09 | 蔡炜 | Mobile phone door lock system based on asymmetric secret key and realization method thereof |
CN105427414A (en) * | 2015-11-03 | 2016-03-23 | 徐承柬 | Visitor management method and system |
CN105337733A (en) * | 2015-11-25 | 2016-02-17 | 杭州晟元数据安全技术股份有限公司 | Two-dimensional code locking control method based on combination of synchronous-asynchronous secret key verification |
CN105844758A (en) * | 2016-05-20 | 2016-08-10 | 广州邻礼信息科技有限公司 | Real estate resident user and visitor access management and implementation method |
CN106161468A (en) * | 2016-08-31 | 2016-11-23 | 广州云系信息科技有限公司 | Visitor information identification system and method |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107274519A (en) * | 2017-06-02 | 2017-10-20 | 深圳市巨龙科教网络有限公司 | A kind of Campus Security intelligent caller management method |
CN107358693A (en) * | 2017-07-04 | 2017-11-17 | 安徽工程大学 | A kind of smart lock and method for unlocking |
CN107612798A (en) * | 2017-10-27 | 2018-01-19 | 珠海格力电器股份有限公司 | The methods, devices and systems of call door bell |
CN107612798B (en) * | 2017-10-27 | 2020-11-10 | 珠海格力电器股份有限公司 | Method, device and system for calling doorbell |
CN108055124A (en) * | 2017-11-15 | 2018-05-18 | 吕锋 | Lock administration system and lock management method |
CN108510626A (en) * | 2018-02-23 | 2018-09-07 | 深圳同心科技有限公司 | A kind of dynamic password access control management method and its management system |
CN108510626B (en) * | 2018-02-23 | 2021-08-31 | 深圳同心科技有限公司 | Dynamic password access control management method and management system thereof |
CN110211261A (en) * | 2019-04-28 | 2019-09-06 | 新大陆(福建)公共服务有限公司 | A kind of intelligent door lock method for unlocking and system based on two dimensional code |
CN111784887A (en) * | 2019-11-29 | 2020-10-16 | 北京沃东天骏信息技术有限公司 | Authorization releasing method, device and system for user access |
TWI773217B (en) * | 2021-03-25 | 2022-08-01 | 中華電信股份有限公司 | System, method and computer program product for pass-through control |
Also Published As
Publication number | Publication date |
---|---|
CN106652129B (en) | 2020-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106652129A (en) | Door control system design method based on mobile phone APP (application) | |
AU2016277638B2 (en) | Credential management system | |
US9740847B2 (en) | Method and system for authenticating a user by means of an application | |
JP7091187B2 (en) | Digital door lock with a unique master key and how to operate it | |
US20130257589A1 (en) | Access control using an electronic lock employing short range communication with mobile device | |
US20220103362A1 (en) | Biometric-based identity authentication | |
US20160012272A1 (en) | Fingerprint authentication system and a fingerprint authentication method based on nfc | |
US11963001B2 (en) | Perimeter offline secure exchange of access control token | |
CN107302435B (en) | Identity information processing method and system and corresponding server | |
CN105590199A (en) | Payment method and payment system based on dynamic two-dimensional code | |
CN102714591A (en) | Proximity based biometric identification systems and methods | |
CN103917727A (en) | Locking apparatus with enhanced security using iris image | |
AU2021351519A9 (en) | Biometric-based identity authentication | |
DE60306648D1 (en) | Device and method for secure communication based on smart cards | |
KR102009863B1 (en) | System for entrance security and method using the same | |
EP3417392A1 (en) | Method, system, device and software programme product for the remote authorization of a user of digital services | |
US20180373919A1 (en) | Fingerprint Lock Control Method and Fingerprint Lock System | |
JP2015525386A (en) | Payment device, payment system, and payment method | |
CN105391680A (en) | Identification, authentication and authorization method in a laboratory system | |
CN109147103A (en) | dynamic password intelligent unlocking system and method | |
KR101613476B1 (en) | Face recognition based authenticable door-lock control system | |
JP2006092507A (en) | Portable terminal, authentication system and method, and computer program | |
CN104462926A (en) | Intelligent card identity recognition method and system | |
KR102122555B1 (en) | System and Method for Identification Based on Finanace Card Possessed by User | |
CN108780476A (en) | Method for verifying personnel identity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |