Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile phone access control system based on encrypted two-dimensional code

An access control system and two-dimensional code technology, which can be applied to instruments, time registers, and individual input/output registers, etc., which can solve the problems of inconvenient management, poor security, and high cost.

Active Publication Date: 2015-12-09
WINGTECH COMM
View PDF5 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the access control system on the market is mainly based on card access control, which is costly, inconvenient to manage, and poor in security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile phone access control system based on encrypted two-dimensional code
  • Mobile phone access control system based on encrypted two-dimensional code
  • Mobile phone access control system based on encrypted two-dimensional code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0075] see figure 1 , the present invention discloses a mobile phone access control system based on an encrypted two-dimensional code, the system mainly consists of three parts: a mobile phone terminal, an access control terminal and a management server;

[0076] In this system, the soft key carrying identity information is generated by the software on the mobile phone in the form of a two-dimensional code, and has a time limit and a limit on the number of times. When in use, the mobile client software first generates a soft key and displays it on the screen of the mobile phone. The access control terminal software drives the camera to obtain the image of the soft key on the mobile phone screen and decrypts and verifies the soft key through the identity verification module integrated in the access control terminal. The rear drive electric control switch opens the door lock.

[0077] The whole system is mainly composed of three parts: mobile terminal, access control terminal a...

Embodiment 2

[0106] A mobile phone access control system based on an encrypted two-dimensional code, the system includes: a mobile phone terminal, an access control terminal and a management server; the mobile terminal generates a soft key and displays it on the mobile phone screen, and the access control terminal drives a camera to obtain the soft key on the mobile phone screen image, and decrypt and verify the soft key through the identity verification module integrated in the access control terminal, and drive the electric control switch to open the door lock after passing the identity verification.

[0107] Described mobile terminal mainly comprises a software, is responsible for generating or obtains the soft key image that comprises encrypted two-dimensional code image from server; soft key image and decide whether to open the door lock according to the verification result; the management server is responsible for key issuance and authority management, and realizes the distributed man...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile phone access control system based on an encrypted two-dimensional code. The system comprises: a mobile phone terminal, an access control terminal and a management server. The mobile phone terminal generates a soft key and displays it on the mobile phone screen, the access control terminal drives a camera to acquire the soft key image on the mobile phone screen, and performs decryption verification on the soft key through an authentication module integrated to the access control terminal, after passing authentication, an electric control switch is driven to open the access lock. The mobile phone access control system provided by the invention can effectively reduce the cost, and improve management convenience and safety.

Description

technical field [0001] The invention belongs to the technical field of electronic information, and relates to an access control system, in particular to a mobile phone access control system based on an encrypted two-dimensional code. Background technique [0002] In recent years, smart phone technology has developed rapidly, and mobile phones have penetrated into various fields from the traditional single voice call function; this invention mainly discusses the application of mobile phones in access control. At present, the access control system on the market is mainly based on swiping card access control. This method has high cost, inconvenient management and poor security. [0003] There are many communication methods for access control authentication through mobile phone software, such as WiFi, Infrared, Bluetooth, etc., and there are also various data formats for identity verification, such as encrypted text, QR code, etc. [0004] In view of this, there is an urgent ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07C9/00
Inventor 李保印
Owner WINGTECH COMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products