CN107046524A - It is a kind of based on ultrasonic wave use intelligent entrance guard method and system - Google Patents

It is a kind of based on ultrasonic wave use intelligent entrance guard method and system Download PDF

Info

Publication number
CN107046524A
CN107046524A CN201611076232.0A CN201611076232A CN107046524A CN 107046524 A CN107046524 A CN 107046524A CN 201611076232 A CN201611076232 A CN 201611076232A CN 107046524 A CN107046524 A CN 107046524A
Authority
CN
China
Prior art keywords
password
log
user
entrance guard
intelligent entrance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611076232.0A
Other languages
Chinese (zh)
Inventor
张哲文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Playright Mdt Infotech Ltd
Original Assignee
Shenzhen Playright Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Playright Mdt Infotech Ltd filed Critical Shenzhen Playright Mdt Infotech Ltd
Priority to CN201611076232.0A priority Critical patent/CN107046524A/en
Publication of CN107046524A publication Critical patent/CN107046524A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B11/00Transmission systems employing sonic, ultrasonic or infrasonic waves
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the invention discloses a kind of based on method and system of the ultrasonic wave using intelligent entrance guard, method includes:The subscriber identity information of remote monitoring server collection neighbours living is simultaneously sent to intelligent entrance guard;Intelligent entrance guard receives the registration request of user, and the information carried in registration request is matched with subscriber identity information;The match is successful then receives registration request;Prompting user inputs the first log-in password comprising ultrasonic signal by mobile terminal and includes the second log-in password of double finger-print ciphers after encryption, if user does not carry access card, intelligent entrance guard receives the first log-in password and the second log-in password that user is inputted by mobile terminal, allows user to enter after being verified.Using the present invention, the security and convenience of intelligent entrance guard can be improved, opening gate when facilitating the user not carry access card.

Description

It is a kind of based on ultrasonic wave use intelligent entrance guard method and system
Technical field
The present invention relates to intelligent entrance guard technical field, more particularly to it is a kind of based on ultrasonic wave using the method for intelligent entrance guard and System.
Background technology
In recent years, intelligent Community is quickly grown, and many newly-built cells are provided with safety-protection system, as digital display circuit is hard The reduction of part cost, increasing cell has used the safety-protection system based on data signal, and starts popularization.Unit gate inhibition And cell gate inhibition is most basic safety-protection system in intelligent Community, for the producer moved in, property can typically provide access card use Come cell unlocking gate inhibition or unit gate inhibition, the authority of every card is different, and generally the access card of producer only allows solution The gate inhibition of cell and unit where lock, and whether the card number of the foundation opened the door to be exactly user hold access card is legal.
In some cases, if after gate control system authority list obtained by other people, it is possible to cause the information leakage of authority list, Obtain in the card that the people of authority list can forge the card number programming known to oneself, so, this card forged can just be obtained The authority of gate inhibition must be unlocked.In the prior art, generally ensured safety by the way of to card number encryption.But, on the one hand, only There is IC-card to encrypt, other such as magnetic cards, ID cards can not be encrypted, and this generates limitation.On the other hand, even if IC Card is encrypted, but still can not prevent from obtaining card number of the people of authority list in authority list to replicate access card.
Therefore, it is poor using gate inhibition's card safety, and sometimes resident family may leave behind or lose access card, this When, it is necessary to a kind of method of safe and reliable opening gate.
The content of the invention
Technical problem to be solved of the embodiment of the present invention is there is provided a kind of based on side of the ultrasonic wave using intelligent entrance guard Method and system.With solve when user does not carry access card can not opening gate the problem of.
In order to solve the above-mentioned technical problem, first aspect of the embodiment of the present invention provides a kind of ultrasonic wave that is based on and uses intelligence The method of gate inhibition, including:
Remote monitoring server gathers the subscriber identity information of neighbours living, and subscriber identity information is sent to intelligent door Prohibit;
The intelligent entrance guard receives the registration request of user, and the information carried in registration request and subscriber identity information are entered Row matching;
If the match is successful, receive the registration request;
After registration request is received, the intelligent entrance guard prompting user inputs the first log-in password;
Mobile terminal receives the ultrasonic wave generation instruction of user's input, according to ultrasonic wave generation instruction generation ultrasonic wave Signal;
The intelligent entrance guard monitors the ultrasonic signal that the mobile terminal is sent, and is converted into data signal, preserves It is used as the first log-in password;
The intelligent entrance guard has been collected after the first log-in password, is kept wireless connection with the mobile terminal and is pointed out to use Family inputs the second log-in password;
Mobile terminal shows the nine grids of subsidiary Digital ID by touch screen, points out user to select at least two grid defeated Enter different fingerprints, the Digital ID of the grid selected user and the user fingerprints collected on the grid carry out default add The encryption of close algorithm, generates the second log-in password, second log-in password is sent into the intelligent entrance guard;
If user does not carry access card, the ultrasonic signal that the intelligent entrance guard monitoring mobile terminal is sent simultaneously is converted to number The first log-in password is verified after word signal;
After first log-in password is verified, the intelligent entrance guard prompting user inputs the second log-in password, The second log-in password that user is sent by the mobile terminal is received, according to default solution corresponding with the predetermined encryption algorithm Close algorithm is decrypted and verified;
After second log-in password is verified, it is allowed to which user enters.
Second aspect of the embodiment of the present invention provides a kind of system, including:
Remote monitoring server, the subscriber identity information for gathering neighbours living, and by subscriber identity information send to Intelligent entrance guard;
The intelligent entrance guard is used for the registration request for receiving user, and the information carried in registration request and user identity are believed Breath is matched;If the match is successful, receive the registration request;After registration request is received, the intelligent entrance guard User is pointed out to input the first log-in password;
Mobile terminal, the ultrasonic wave for receiving user's input generates instruction, according to ultrasonic wave generation instruction generation Ultrasonic signal;
The intelligent entrance guard is additionally operable to monitor the ultrasonic signal that the mobile terminal is sent, and is converted into digital letter Number, preservation is used as the first log-in password;The intelligent entrance guard has been collected after the first log-in password, is kept with the mobile terminal Wireless connection simultaneously points out user to input the second log-in password;Mobile terminal is additionally operable to show subsidiary Digital ID by touch screen Nine grids, point out user to select at least two grid to input different fingerprints, the Digital ID of the grid selected user and The user fingerprints that are collected on the grid carry out the encryption of predetermined encryption algorithm, generate the second log-in password, by described the Two log-in passwords are sent to the intelligent entrance guard;If user does not carry access card, the intelligent entrance guard is monitored mobile terminal and sent Ultrasonic signal and being converted to the first log-in password is verified after data signal;When first log-in password checking is logical After crossing, intelligent entrance guard prompting user inputs the second log-in password, receives user is sent by the mobile terminal the Two log-in passwords, are decrypted and verify according to default decipherment algorithm corresponding with the predetermined encryption algorithm;
The intelligent entrance guard is additionally operable to after second log-in password is verified, it is allowed to which user enters.
Implement the embodiment of the present invention, have the advantages that:
By the way that intelligent entrance guard, mobile terminal and remote monitoring server are connected and composed into intelligent access control system, user passes through Intelligent entrance guard and remote monitoring server are registered after user identity is confirmed, it is ensured that the correctness of user identity;Then by Mobile terminal and intelligent entrance guard coordinate the first log-in password that typing is converted into by ultrasonic signal and comprising double after encryption Second log-in password of fingerprint;Ultrasonic signal security is higher, is difficult to be stolen, and user can be by verifying the side of password Formula opening gate, due to adding the second log-in password, therefore relative to the mode of single password, security is higher, and second The input mode of log-in password is double fingerprints, and crypticity and interest are stronger, and user's input extremely facilitates, beneficial to lifting user's body Test, and send for the information after encryption, one layer of security protection can be further added by the basis of fingerprint security itself, The risk that information is intercepted leakage can be substantially reduced, the security of system is improved.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to institute in embodiment The accompanying drawing needed to use is briefly described, it should be apparent that, drawings in the following description are only some implementations of the present invention Example, for those of ordinary skill in the art, on the premise of not paying creative work, can also be obtained according to these accompanying drawings Obtain other accompanying drawings.
Fig. 1 is that the embodiment of the present invention is a kind of based on schematic flow sheet of the ultrasonic wave using the method for intelligent entrance guard;
Fig. 2 is a kind of composition schematic diagram of system of the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
Fig. 1 is refer to, is that the embodiment of the present invention is a kind of based on schematic flow sheet of the ultrasonic wave using the method for intelligent entrance guard, In the present embodiment, it the described method comprises the following steps:
S101, remote monitoring server gather neighbours living subscriber identity information, and by subscriber identity information send to Intelligent entrance guard.
Alternatively, subscriber identity information includes user biological characteristic information, ID card information, photo, phone number, individual At least one in setting code, in order to ensure the correctness of user identity, can be used in combination with much information, so as to typing system The information for neighbours living of system.
S102, intelligent entrance guard receives the registration request of user, by the information carried in registration request and subscriber identity information Matched.
S103, if the match is successful, receives the registration request.
S104, after registration request is received, the intelligent entrance guard prompting user inputs the first log-in password.
S105, mobile terminal receives the ultrasonic wave generation instruction of user's input, according to ultrasonic wave generation instruction generation Ultrasonic signal.
Ultrasonic signal human body ear can not be heard, can be sent by the loudspeaker of mobile terminal.
S106, the intelligent entrance guard monitors the ultrasonic signal that the mobile terminal is sent, and is converted into data signal, Preservation is used as the first log-in password.
S107, the intelligent entrance guard has been collected after the first log-in password, and wireless connection is kept simultaneously with the mobile terminal User is pointed out to input the second log-in password.
S108, mobile terminal shows the nine grids of subsidiary Digital ID by touch screen, points out user's selection at least two Grid inputs different fingerprints, and the Digital ID of the grid selected user and the user fingerprints collected on the grid are carried out The encryption of predetermined encryption algorithm, generates the second log-in password, second log-in password is sent into the intelligent entrance guard.
Alternatively, the grid random alignment in the nine grids.It can so avoid checking that user uses by illegal molecule Which finger fingerprint, can not also determine the Digital ID of grid.
Due to needing to input at least two different fingerprints, therefore security is higher than the security of conventional single fingerprint. And the grid in the nine grids can be with random alignment.The position of so each user's input all changes, and is difficult by other Invalid user stealing.For example, user have selected the 1 lattice input right hand index fingerprint in nine grids, refer in the 6 lattice input right hand Fingerprint, then user can be simultaneously with right hand forefinger 1 lattice of percussion when verifying password, and right hand middle finger taps 6 lattice, it is of course also possible to first 1 lattice are tapped with right hand forefinger, then 6 lattice are tapped with right hand middle finger, the position of 1 lattice and 6 lattice may change every time, and in unblock When input fingerprint order can be the same or different, the embodiment of the present invention is not limited in any way.
If worrying single ultrasonic signal as cipher safety not enough, can also increase by the second log-in password. For example, in the present embodiment, just introducing security of second log-in password to improve password.And second log-in password exists The double fingerprints inputted in nine grids even many finger-print ciphers, for example, user can press nine palaces respectively simultaneously with forefinger and middle finger 1 key and 6 keys in lattice input the second log-in password.Using the double fingerprints for pressing nine grids as the second log-in password, add The interest of password authentification;And the finger print information sent is the information being encrypted according to predetermined encryption algorithm, therefore Further safeguard protection has been carried out on the basis of finger print safety.Although there is provided two passwords, user's input ten Divide convenient and simple, only need to both be improved in the nine grids after brush identity card on pressing intelligent entrance guard, relatively single password The security of intelligent entrance guard, turn avoid the trouble that Complicated Flow is brought, user experience is preferable
S109, if user does not carry access card, the ultrasonic signal that the intelligent entrance guard monitoring mobile terminal is sent simultaneously turns It is changed to after data signal and the first log-in password is verified.
Certainly, even if user carries access card, the mode described in the present embodiment can also be used to carry out opening gate.
S110, after first log-in password is verified, the intelligent entrance guard prompting user input second is registered Password, receives the second log-in password that user is sent by the mobile terminal, according to corresponding with the predetermined encryption algorithm Default decipherment algorithm is decrypted and verified.
Alternatively, the predetermined encryption algorithm and the default decipherment algorithm are unsymmetrical key, and the predetermined encryption Algorithm is associated and while dynamic change with the default decipherment algorithm.
Wherein, symmetric key encryption is also named secret/private key encryption (Secret Key Encryption, SKE), i.e., Sending and receiving the both sides of data must use identical/symmetrical key that computing is encrypted and decrypted to plaintext.It is asymmetric Key encryption be also public key encryption (Public Key Encryption, PKE), refer to everyone have a pair uniquely it is right The key answered:Public-key cryptography and private cipher key, public key external disclosure, private key are preserved by privacy;With wherein one key come Encryption, can only just decrypt key with another.The side for sending data is added with the public key of the opposing party to the information of transmission It is close, then it is decrypted by recipient with the private key of oneself.The issue and management that public key encryption technology solves key are asked Topic, is the core of current commercial code.Using public key technique, the both sides for entering row data communication can safely confirm other side There is provided the identifiability of communication for identity and public-key cryptography.
Alternatively, the AES is corresponding with decipherment algorithm and dynamic change simultaneously.For example, many set correspondences can be consulted Enciphering and deciphering algorithm, followed by agreement use wherein a set of when using every time, and mobile terminal can pass through transmission algorithm mark letter Cease to inform intelligent entrance guard.So the enciphering and deciphering algorithm of dynamic change can further lifting system security.
Double-protection, first layer can be provided for system by being used as the first log-in password by the finger print information after transmission encryption The decryption protection being made up of AES, the second layer is that the complicated calculations being made up of the uniqueness and complexity of finger print information are prevented Shield so that illegally molecule can not be cracked or simulating mobile terminal is sent to the signal of intelligent entrance guard, it is ensured that the safety of system.
S111, after second log-in password is verified, it is allowed to which user enters.
In the present embodiment, by the way that intelligent entrance guard, mobile terminal and remote monitoring server are connected and composed into intelligent entrance guard System, user is registered by intelligent entrance guard and remote monitoring server after user identity is confirmed, it is ensured that user identity Correctness;Then typing is converted into by ultrasonic signal with mobile terminal and intelligent entrance guard the first log-in password and bag The second log-in password containing double fingerprints after encryption;Ultrasonic signal security is higher, is difficult to be stolen, and user can pass through The mode opening gate of password is verified, due to adding the second log-in password, therefore relative to the mode of single password, security It is higher, and the input mode of the second log-in password is double fingerprints, crypticity and interest are stronger, and user's input extremely facilitates, profit In lifting Consumer's Experience, and send for the information after encryption, can be further added by the basis of fingerprint security itself One layer of security protection, can substantially reduce the risk that information is intercepted leakage, improve the security of system.
Alternatively, in addition to intelligent entrance guard locally preserves the first log-in password and the second log-in password is verified, also It can be verified by remote monitoring server.Although remote monitoring server carries out checking, possible efficiency can be slightly slow, Security can be further lifted, especially when intelligent entrance guard breaks down and can not verified, is carried out by remote monitoring server Checking, can further lifting system work stability.
When being verified using remote monitoring server, the first log-in password and second can be registered by intelligent entrance guard Password is sent directly to remote monitoring server and preserved.
Alternatively, when intelligent entrance guard is damaged or needs to carry out system update, it is necessary to when changing intelligent entrance guard, the intelligent door Prohibit to send first log-in password and second log-in password to the remote monitoring server and preserve;
When the intelligent entrance guard is changed, the remote monitoring server sends the code data of preservation to replacing Intelligent entrance guard afterwards.
So that it is guaranteed that changing the integrality and security of front and rear user data.
Because present cell the elderly is more and more, the first log-in password can be ultrasonic signal, without having to worry about user Forget, but the second log-in password it is easy to forget that.Now can be using following flow come opening gate.
If user forgets second log-in password, after the intelligent entrance guard is proved to be successful to the first log-in password, The mobile terminal receives the call request of user;
The mobile terminal sends the call request to the remote monitoring server, or by the call request Sent in the way of short message or phone to the mobile phone of the keeper;
After the keeper confirms user identity by the monitored picture of remote monitoring server, remote monitoring service Device receives the remote control open command of the keeper, opens the intelligent entrance guard.
Alternatively, the mobile terminal is mobile phone, tablet personal computer or wearable device.
When multiple authentication failure after for example continuous 3 authentication faileds, then intelligent entrance guard can a period of time in disconnect with The password authentification request that the mobile terminal is sent is rejected in the connection of the mobile terminal within a period of time.
It refer to Fig. 2, remote monitoring server 200, mobile terminal 300 and at least one intelligent entrance guard 100.Intelligent entrance guard 100 include being used for cameras that monitored picture is provided for remote monitoring server 200, for monitoring ultrasonic signal and by ultrasound Ripple signal is converted to the monitoring module of data signal, and for decrypting and verifying the authentication module of password.Remote monitoring service Device 200 includes display and the server for data storage, and mobile terminal includes the generation mould for being used to generate ultrasonic signal Block and the encrypting module for gathering the finger print acquisition module of fingerprint and being encrypted to finger print information.
Specifically, remote monitoring server 200, the subscriber identity information for gathering neighbours living, and by user identity Information is sent to intelligent entrance guard;
The intelligent entrance guard 100 is used for the registration request for receiving user, by the information carried in registration request and user's body Part information is matched;If the match is successful, receive the registration request;After registration request is received, the intelligence Gate inhibition prompting user inputs the first log-in password;
Mobile terminal 300, the ultrasonic wave for receiving user's input generates instruction, according to ultrasonic wave generation instruction life Into ultrasonic signal;
The intelligent entrance guard 100 is additionally operable to monitor the ultrasonic signal that the mobile terminal is sent, and is converted into numeral Signal, preservation is used as the first log-in password;The intelligent entrance guard has been collected after the first log-in password, is protected with the mobile terminal Hold wireless connection and point out user to input the second log-in password, mobile terminal 300 is additionally operable to show subsidiary numeral by touch screen The nine grids of mark, point out user to select at least two grid to input different fingerprints, and the numeral of the grid selected user is marked Knowledge and the user fingerprints collected on the grid carry out the encryption of predetermined encryption algorithm, generate the second log-in password, will Second log-in password is sent to the intelligent entrance guard;If user does not carry access card, the intelligent entrance guard 100 is additionally operable to prison Listen ultrasonic signal that mobile terminal is sent and be converted to and the first log-in password is verified after data signal;When described first After log-in password is verified, the intelligent entrance guard prompting user inputs the second log-in password, receives user and is moved by described The second log-in password that dynamic terminal is sent, is decrypted and tests according to default decipherment algorithm corresponding with the predetermined encryption algorithm Card;After second log-in password is verified, it is allowed to which user enters.
Alternatively, the grid random alignment in the nine grids.
The predetermined encryption algorithm and the default decipherment algorithm are unsymmetrical key, and the predetermined encryption algorithm and institute State default decipherment algorithm association and simultaneously dynamic change.
Alternatively, the intelligent entrance guard 100 is additionally operable to:
First log-in password and second log-in password are sent to the remote monitoring server 200 and preserved;
The remote monitoring server 200 is additionally operable to:
When the intelligent entrance guard 100 is changed, the remote monitoring server 200 sends the code data of preservation Intelligent entrance guard to after changing.
Alternatively, alternatively, if user forgets second log-in password, the intelligent entrance guard 100 be additionally operable to After first log-in password of family input is proved to be successful, the mobile terminal 300 is additionally operable to receive the call request of user;By institute State call request to send to the remote monitoring server, or the call request is sent in the way of short message or phone To the mobile phone of the keeper;
It is described long-range after the keeper confirms user identity by the monitored picture of remote monitoring server 200 Monitoring server 200 is additionally operable to receive the remote control open command of the keeper, opens the intelligent entrance guard.
Wherein, the mobile terminal is mobile phone, tablet personal computer or wearable device.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation be all between difference with other embodiments, each embodiment identical similar part mutually referring to. For device embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, related part referring to The part explanation of embodiment of the method.
By the description of above-described embodiment, the present invention has advantages below:
By the way that intelligent entrance guard, mobile terminal and remote monitoring server are connected and composed into intelligent access control system, user passes through Intelligent entrance guard and remote monitoring server are registered after user identity is confirmed, it is ensured that the correctness of user identity;Then by Mobile terminal and intelligent entrance guard coordinate the first log-in password that typing is converted into by ultrasonic signal and comprising double after encryption Second log-in password of fingerprint;Ultrasonic signal security is higher, is difficult to be stolen, and user can be by verifying the side of password Formula opening gate, due to adding the second log-in password, therefore relative to the mode of single password, security is higher, and second The input mode of log-in password is double fingerprints, and crypticity and interest are stronger, and user's input extremely facilitates, beneficial to lifting user's body Test, and send for the information after encryption, one layer of security protection can be further added by the basis of fingerprint security itself, The risk that information is intercepted leakage can be substantially reduced, the security of system is improved.
One of ordinary skill in the art will appreciate that realize all or part of flow in above-described embodiment method, being can be with The hardware of correlation is instructed to complete by computer program, described program can be stored in a computer read/write memory medium In, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, abbreviation ROM) or random access memory (Random Access Memory, abbreviation RAM) etc..
Above disclosure is only preferred embodiment of present invention, can not limit the right model of the present invention with this certainly Enclose, therefore the equivalent variations made according to the claims in the present invention, still belong to the scope that the present invention is covered.

Claims (10)

1. a kind of method that intelligent entrance guard is used based on ultrasonic wave, it is characterised in that including:
Remote monitoring server gathers the subscriber identity information of neighbours living, and subscriber identity information is sent to intelligent entrance guard;
The intelligent entrance guard receives the registration request of user, by the information carried in registration request and subscriber identity information progress Match somebody with somebody;
If the match is successful, receive the registration request;
After registration request is received, the intelligent entrance guard prompting user inputs the first log-in password;
Mobile terminal receives the ultrasonic wave generation instruction of user's input, according to ultrasonic wave generation instruction generation ultrasonic wave letter Number;
The intelligent entrance guard monitors the ultrasonic signal that the mobile terminal is sent, and is converted into data signal, preserves conduct First log-in password;
The intelligent entrance guard has been collected after the first log-in password, is kept wireless connection with the mobile terminal and is pointed out user defeated Enter the second log-in password;
Mobile terminal shows the nine grids of subsidiary Digital ID by touch screen, points out user to select the input of at least two grid not Same fingerprint, the Digital ID of the grid selected user and the user fingerprints collected on the grid carry out predetermined encryption calculation The encryption of method, generates the second log-in password, second log-in password is sent into the intelligent entrance guard;
If user does not carry access card, the ultrasonic signal that the intelligent entrance guard monitoring mobile terminal is sent simultaneously is converted to digital letter The first log-in password is verified after number;
After first log-in password is verified, the intelligent entrance guard prompting user inputs the second log-in password, receives The second log-in password that user is sent by the mobile terminal, is calculated according to default decryption corresponding with the predetermined encryption algorithm Method is decrypted and verified;
After second log-in password is verified, it is allowed to which user enters.
2. the method as described in claim 1, it is characterised in that the grid random alignment in the nine grids.
3. the method as described in claim 1, it is characterised in that also include:
The intelligent entrance guard sends first log-in password and second log-in password to the remote monitoring server Preserve;
When the intelligent entrance guard is changed, the remote monitoring server sends the code data of preservation to replacing Intelligent entrance guard.
4. the method as described in claim 1, it is characterised in that if user forgets second log-in password, the intelligence After gate inhibition is proved to be successful to the first log-in password, the mobile terminal receives the call request of user;
The mobile terminal sends the call request to the remote monitoring server, or by the call request with short Information or the mode of phone are sent to the mobile phone of the keeper;
After the keeper confirms user identity by the monitored picture of remote server, remote monitoring server receives institute The remote control open command of keeper is stated, the intelligent entrance guard is opened.
5. the method as described in claim any one of 1-4, it is characterised in that the predetermined encryption algorithm and the default decryption Algorithm is unsymmetrical key, and the predetermined encryption algorithm associates simultaneously dynamic change simultaneously with the default decipherment algorithm.
6. a kind of system, it is characterised in that including:
Remote monitoring server, the subscriber identity information for gathering neighbours living, and subscriber identity information is sent to intelligence Gate inhibition;
The intelligent entrance guard is used for the registration request for receiving user, and the information carried in registration request and subscriber identity information are entered Row matching;If the match is successful, receive the registration request;After registration request is received, the intelligent entrance guard prompting User inputs the first log-in password;
Mobile terminal, the ultrasonic wave for receiving user's input generates instruction, according to ultrasonic wave generation instruction generation ultrasound Ripple signal;
The intelligent entrance guard is additionally operable to monitor the ultrasonic signal that the mobile terminal is sent, and is converted into data signal, protects Deposit as the first log-in password;The intelligent entrance guard has been collected after the first log-in password, keeps wireless with the mobile terminal Connect and point out user to input the second log-in password;Mobile terminal is additionally operable to show nine palaces of subsidiary Digital ID by touch screen Lattice, point out user to select at least two grid to input different fingerprints, the Digital ID of the grid selected user and in the lattice The user fingerprints collected on son carry out the encryption of predetermined encryption algorithm, the second log-in password are generated, by second note Volume password is sent to the intelligent entrance guard;If user does not carry access card, the intelligent entrance guard is additionally operable to monitor mobile terminal hair The ultrasonic signal that goes out and being converted to is verified after data signal to the first log-in password;When first log-in password checking After, the intelligent entrance guard prompting user inputs the second log-in password, receives what user was sent by the mobile terminal Second log-in password, is decrypted and verifies according to default decipherment algorithm corresponding with the predetermined encryption algorithm;
The intelligent entrance guard is additionally operable to after second log-in password is verified, it is allowed to which user enters.
7. system as claimed in claim 6, it is characterised in that the grid random alignment in the nine grids.
8. system as claimed in claim 6, it is characterised in that the intelligent entrance guard is additionally operable to:
First log-in password and second log-in password are sent to the remote monitoring server and preserved;
The remote monitoring server is additionally operable to:
When the intelligent entrance guard is changed, the remote monitoring server sends the code data of preservation to replacing Intelligent entrance guard.
9. system as claimed in claim 6, it is characterised in that if user forgets second log-in password, the intelligence Gate inhibition is additionally operable to after being proved to be successful to the first log-in password that user inputs, and the mobile terminal is additionally operable to receive exhaling for user Cry request;The call request is sent to the remote monitoring server, or by the call request with short message or electricity The mode of words is sent to the mobile phone of the keeper;
After the keeper confirms user identity by the monitored picture of remote monitoring server, the remote monitoring service Device is additionally operable to receive the remote control open command of the keeper, opens the intelligent entrance guard.
10. the system as described in claim any one of 6-9, it is characterised in that the predetermined encryption algorithm and the default solution Close algorithm is unsymmetrical key, and the predetermined encryption algorithm associates simultaneously dynamic change simultaneously with the default decipherment algorithm.
CN201611076232.0A 2016-11-29 2016-11-29 It is a kind of based on ultrasonic wave use intelligent entrance guard method and system Pending CN107046524A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611076232.0A CN107046524A (en) 2016-11-29 2016-11-29 It is a kind of based on ultrasonic wave use intelligent entrance guard method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611076232.0A CN107046524A (en) 2016-11-29 2016-11-29 It is a kind of based on ultrasonic wave use intelligent entrance guard method and system

Publications (1)

Publication Number Publication Date
CN107046524A true CN107046524A (en) 2017-08-15

Family

ID=59543476

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611076232.0A Pending CN107046524A (en) 2016-11-29 2016-11-29 It is a kind of based on ultrasonic wave use intelligent entrance guard method and system

Country Status (1)

Country Link
CN (1) CN107046524A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020181851A1 (en) * 2019-03-12 2020-09-17 苏州易德龙科技股份有限公司 Zigbee wireless network-based warehouse monitoring system
CN113487783A (en) * 2021-07-06 2021-10-08 西北工业大学 Method for realizing access control system control based on biological feature recognition function of smart phone
US20220038456A1 (en) * 2020-07-28 2022-02-03 Vmware, Inc. Dynamic service management using voice-activated devices

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014111920A1 (en) * 2013-01-17 2014-07-24 Sure Erasure Ltd. System and method for monitoring of an electro-mechanical device
CN104065487A (en) * 2014-07-08 2014-09-24 华南理工大学 Random secret value IBC identity authentication method based on digital fingerprint
CN105117630A (en) * 2015-08-21 2015-12-02 宇龙计算机通信科技(深圳)有限公司 Fingerprint authentication method, fingerprint authentication apparatus, and terminal
CN105303659A (en) * 2015-10-10 2016-02-03 深圳市雨滴科技有限公司 Method and device for identifying access control identity based on ultrasonic waves
CN105847303A (en) * 2016-06-12 2016-08-10 深圳益强信息科技有限公司 Verification method and system of intelligent access control unit
CN105847451A (en) * 2016-06-12 2016-08-10 深圳益强信息科技有限公司 Method and system for controlling intelligent access control unit by using mobile terminal
CN105872104A (en) * 2016-06-12 2016-08-17 深圳益强信息科技有限公司 Method and system for managing intelligent entrance guard by combining mobile terminal
CN205541041U (en) * 2016-04-20 2016-08-31 曹真睿 Access control system based on ultrasonic wave discernment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014111920A1 (en) * 2013-01-17 2014-07-24 Sure Erasure Ltd. System and method for monitoring of an electro-mechanical device
CN104065487A (en) * 2014-07-08 2014-09-24 华南理工大学 Random secret value IBC identity authentication method based on digital fingerprint
CN105117630A (en) * 2015-08-21 2015-12-02 宇龙计算机通信科技(深圳)有限公司 Fingerprint authentication method, fingerprint authentication apparatus, and terminal
CN105303659A (en) * 2015-10-10 2016-02-03 深圳市雨滴科技有限公司 Method and device for identifying access control identity based on ultrasonic waves
CN205541041U (en) * 2016-04-20 2016-08-31 曹真睿 Access control system based on ultrasonic wave discernment
CN105847303A (en) * 2016-06-12 2016-08-10 深圳益强信息科技有限公司 Verification method and system of intelligent access control unit
CN105847451A (en) * 2016-06-12 2016-08-10 深圳益强信息科技有限公司 Method and system for controlling intelligent access control unit by using mobile terminal
CN105872104A (en) * 2016-06-12 2016-08-17 深圳益强信息科技有限公司 Method and system for managing intelligent entrance guard by combining mobile terminal

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020181851A1 (en) * 2019-03-12 2020-09-17 苏州易德龙科技股份有限公司 Zigbee wireless network-based warehouse monitoring system
US20220038456A1 (en) * 2020-07-28 2022-02-03 Vmware, Inc. Dynamic service management using voice-activated devices
US11601427B2 (en) * 2020-07-28 2023-03-07 Vmware, Inc. Dynamic service management using voice-activated devices
CN113487783A (en) * 2021-07-06 2021-10-08 西北工业大学 Method for realizing access control system control based on biological feature recognition function of smart phone

Similar Documents

Publication Publication Date Title
CN106104562B (en) System and method for securely storing and recovering confidential data
CN108055235A (en) A kind of control method of smart lock, relevant device and system
CN101350724B (en) Encrypting method base on biology characteristic information
CN103327002A (en) Cloud storage access control system based on attribute
CN108900296B (en) Secret key storage method based on biological feature identification
CN106815905A (en) A kind of method and system based on mobile terminal checking
CN107046556A (en) A kind of method and system of checking
CN107864124A (en) A kind of end message method for security protection, terminal and bluetooth lock
CN102891749A (en) Method and communication terminal for data encryption
CN106815906A (en) A kind of intelligent entrance guard management method and system based on optic communication
CN106033625A (en) Lockset, mobile terminal, lockset control method, and lockset control system
CN108010166A (en) Electronic door lock system
CN106600767A (en) Verification method and system based on identification card
CN107046524A (en) It is a kind of based on ultrasonic wave use intelligent entrance guard method and system
CN106650372A (en) open method and device of administrator authority
CN105959116B (en) A kind of password input system and method cryptographically inputting password
CN106815907A (en) A kind of method and intelligent access control system based on picture password management intelligent entrance guard
US7587051B2 (en) System and method for securing information, including a system and method for setting up a correspondent pairing
CN106855924A (en) Embedded intelligent chip equipment and background application system
Halderman et al. Privacy management for portable recording devices
CN101415185A (en) Mobile terminal, method and system for keeping secret of platform-striding information
CN115776413B (en) Iris encryption-based data transmission method and system
CN109961542A (en) A kind of entrance guard device, verifying device, verifying system and its verification method
CN106713278A (en) Alarm method and system
CN106211146A (en) Safety communication record adding method, information communicating method and call method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170815