A double-encrypted access control system based on mobile phone QR codes

An access control system and double encryption technology, applied in user identity/authority verification, instruments, time registers, etc., can solve the problem of insecurity and cost of access control system, and achieve the goal of increasing convenience, identifying safety and reliability, and improving security. Effect

Active Publication Date: 2016-03-30
四川极智朗润科技有限公司
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to overcome the insecurity and high cost of the existing access control system, and provide a low-cost, double-encrypted mobile phone two-dimensional code-based double-encrypted access control system using plain codes and mobile phone two-dimensional codes. Two-dimensional code as the carrier, the identification method is simple, safe and reliable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A double-encrypted access control system based on mobile phone QR codes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The technical solution of the present invention will be further described below in conjunction with the accompanying drawings, but the content protected by the present invention is not limited to the following description.

[0019] Such as figure 1 As shown, a double-encrypted access control system based on a mobile phone two-dimensional code, it includes a key part 1 and a lock body part 2, and the key part 1 includes a plain code encryption module 11, a secret code encryption module 12 and a two-dimensional code password sequence module 13. The lock body part 2 includes an image processing module 21 and an information discrimination module 23:

[0020] Plain code encryption module 11: the user manually inputs a password to obtain a plain code sequence 111;

[0021] Cipher encryption module 12: Obtain the plain code symbol-cipher code comparison table 121 by the plain code element input in turn and set the corresponding password, and then the password in the plain cod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a double-encryption entrance guard system based on a handset two-dimension code. The system comprises an evident code encryption module (11), a secret code encryption module (12), a two-dimension code secret-code sequence module (13), an image processing module (21) and an information distinguishing module (23), wherein the evident code encryption module (11) is used for obtaining an evident code sequence (111) when a user inputs a password manually; the secret code encryption module (12) is used for generating an evident code / element-two-dimension code comparison table (123); the two-dimension code secret-code sequence module (13) is used for generating and displaying a two-dimension code sequence on a handset screen; the image processing module (21) is used for recognizing and decoding a two-dimension code image; and the information distinguishing module (23) is used for distinguishing two-dimension code content information (22). The double-encryption entrance guard system based on the handset two-dimension code adopts two codes of the evident code and the two-dimension code secret code, so that double-encryption performance is achieved, a one-to-one correspondence relation of the evident code and the secret code is set by the user and has no rule to follow, moreover, the codes are invisible after setting, so that the recognition is safer and more reliable, and the safety of the entrance guard system is improved; and the handset two-dimension code is used in the entrance guard system, therefore, the convenience of the entrance guard system is increased, and the cost of the entrance guard system is reduced.

Description

technical field [0001] The invention relates to an access control system, in particular to a double-encrypted access control system based on a mobile phone two-dimensional code. Background technique [0002] In recent years, with the improvement of people's living standards, safety awareness has gradually increased, and people have higher and higher requirements for access control systems. Access control systems are installed on many occasions to prevent security accidents. At present, there are many kinds of access control systems in China, and there are many relevant literature and patents. Here, only a few representative access control systems are listed for illustration. "Design of Wireless Access Control System Based on RFID Technology", this type of access control system unlocks the door lock through wireless communication. "Family Intelligent Access Control System Based on Face Recognition and 3G Communication" and "Smart Fingerprint Access Control System", this type...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/00H04L9/32
Inventor 高椿明李兵郑龙华
Owner 四川极智朗润科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products