Cellphone-based dynamic two-dimension code access control system

A two-dimensional code and mobile phone technology, applied in the field of dynamic two-dimensional code access control system, can solve the problems of easy to be copied, difficult to identify, difficult to popularize, etc., and achieve the effect of low cost, convenient use and good security

Inactive Publication Date: 2014-07-30
广州闪购软件服务有限公司
View PDF7 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, most of the intelligent access control is based on radio frequency card technology, fingerprint technology or facial recognition technology. The radio frequency card technology must require the user to carry the door card with him, which is inconvenient and easy to lose; When there is dirt or wounds, it is not easy to identify; and facial recognition technology is expensive and difficult to popularize
In this case, someone prop

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The invention discloses a mobile phone-based dynamic two-dimensional code access control system, which includes a mobile phone and an access control device equipped with a two-dimensional code identification module, wherein:

[0016] The mobile phone is equipped with a two-dimensional code application module. The two-dimensional code application module first presets a fixed key, and then generates a two-dimensional code image for opening the access control through the following sequential steps: 1) Obtain the time when the key is generated, set The value of the time and the preset fixed key are encrypted for the first time through the AES128 algorithm to generate a binary string code; 2) Read the IMEI code of the mobile phone, and then encrypt the binary string code and the IMEI code through the AES128 algorithm again Obtain the binary code for unlocking the access control; 3) use the binary code for unlocking the access control to generate a two-dimensional code image k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cellphone based dynamic two-dimension code access control system. The cellphone based dynamic two-dimension code access control system comprises a cellphone and an access control device with a two-dimension code identification module, a two-dimension code application module is arranged in the cellphone, a binary string code is generated through twice encryption calculation of a preset secret key, a time parameter and the IMEI (International Mobile Equipment Identity) code of the cellphone, and a two-dimension code image generated by the binary string code is used as a key for opening the door; the two-dimension code image is obtained through scanning of the two-dimension code identification module, and the IMEI code for opening the door and the key generation time are obtained through identification and decoding, the door is opened after verification, and the key which is used for opening the door this time is abolished. The cellphone-based dynamic two-dimension code access control system has the characteristics that one key only can open the door once and can not be copied, the security is high, and the cellphone is used as the carrier of the key to achieve carrying convenience.

Description

[0001] technical field [0002] The invention relates to access control technology, in particular to a mobile phone-based dynamic two-dimensional code access control system. [0003] Background technique [0004] Intelligent access control technology is currently widely used in the access management and control of public places such as building office buildings and intelligent communities. At present, most of the intelligent access control is based on radio frequency card technology, fingerprint technology or facial recognition technology. The radio frequency card technology must require the user to carry the door card with him, which is inconvenient and easy to lose; When there is dirt or wounds on it, it is not easy to identify; and facial recognition technology is expensive and difficult to popularize. In this case, someone proposed the two-dimensional code access control technology: print the two-dimensional code on a piece of paper or save it in the mobile phone, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G07C9/00
Inventor 江林修
Owner 广州闪购软件服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products