Identity authorization controlling method and system

An authorization control and identity technology, applied in the field of identity authorization control methods and systems, can solve problems such as low efficiency, and achieve the effects of avoiding costs, saving costs, and improving the efficiency of identity authorization.

Inactive Publication Date: 2015-03-04
HITACHI BUILDING TECH GUANGZHOU CO LTD
View PDF4 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to provide an identity authorization control method and system for the problem of low efficiency when performing permission removal of control objects

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authorization controlling method and system
  • Identity authorization controlling method and system
  • Identity authorization controlling method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The present invention will be described in further detail below in conjunction with the embodiments and accompanying drawings, but the embodiments of the present invention are not limited thereto.

[0018] Such as figure 1 As shown, it is a schematic flow diagram of an embodiment of the identity authorization control method of the present invention, including steps:

[0019] Step S101: the first terminal encrypts the authorization data according to a preset encryption algorithm, obtains the encrypted authorization data, and sends the encrypted authorization data to the second terminal;

[0020] The authorization data is the data corresponding to the non-contact card reader performing the authorization removal operation. Further, the contactless card reader can judge whether the authorization data is correct according to the authorization data, thereby judging whether to perform the operation of removing the authorization of the control object. The encryption algorithm ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authorization controlling method and an identity authorization controlling system. The method comprises the following steps that a first terminal encrypts authorization data according to a preset encryption algorithm, acquires encryption authorization data and transmits the encryption authorization data to a second terminal; the second terminal receives the encryption authorization data and transmits the encryption authorization data to a non-contact card reader in a near-distance wireless communication way; when sensing the second terminal in the near-distance wireless communication way, the non-contact card reader acquires the encryption authorization data, decrypts the encryption authorization data according to a decryption algorithm corresponding to the encryption algorithm to acquire the authorization data, performs identity authorization for the second terminal according to the authorization data, and releases the limits of authority of a controlled target. By the scheme, the identity authorization efficiency of the second terminal is greatly improved, the efficiency of releasing the limits of authority of the controlled target is improved, meanwhile, the cost caused by manufacturing an IC (integrated circuit) card is avoided, and the cost is saved.

Description

technical field [0001] The invention relates to the technical field of control, in particular to an identity authorization control method and system. Background technique [0002] In order to realize functions such as security and registration, it is often necessary to set the authority of the control object. For example, access control is set at the entrance of the office building lobby, at the entrance of the company, at the residential building, and at the elevator panel control authority in the stair system. [0003] At present, it is possible to set the authorization data in the IC card, and then issue the IC card to the user. The user swipes the IC card on the non-contact card reader, and the non-contact card reader performs corresponding processing according to the read authorization data. Remove permission operation. [0004] But, adopt above-mentioned method, every user must just can release the authority of control object through IC card, especially some temporar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/36
CPCG06F21/35G06F21/445
Inventor 潘煜熙刘华金张永生仲兆峰郭伟文
Owner HITACHI BUILDING TECH GUANGZHOU CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products