Visible light-activated access control method with hidden channel

An optical control access control and hidden channel technology, which is applied in the field of optical communication, can solve problems such as the security impact of access control devices, and achieve the effects of avoiding information interception, improving privacy, and avoiding information forgery and identity forgery.

Inactive Publication Date: 2015-12-16
GUILIN UNIVERSITY OF TECHNOLOGY
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The security of the access control device realized by this method is affected to a certain extent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Visible light-activated access control method with hidden channel

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0039] An embodiment of the visible light control access control method with hidden channel of the present invention is as follows:

[0040] (1) Establish a visible light-controlled access control device with a hidden channel, including: a mobile unlocking terminal 9 and a light-controlled access control lock 12 .

[0041]The mobile unlocking terminal 9 includes: a light emitting module 8 , a display scanning module 7 , a control module 10 , and an optical key receiving module 14 .

[0042] The light emitting module 8 is used to send the light signal 11 of the identity information of the mobile unlocking terminal 9 and the authentication information of unlocking, and the function of this module is realized by LED.

[0043] The display scanning module 7 is used for scanning and receiving the two-dimensional code displayed by the display module 4 of the light-controlled access control lock 12, and the function of this module is realized by a two-dimensional code scanning head. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a visible light-activated access control method with a hidden channel. A visible light-activated access control apparatus with a hidden channel is established that comprises a light-operated access control lock and a mobile unlocking terminal; unlocking is controlled via mutual certification between the lock and the terminal. The hidden channel is established with a backlight module and a light key receiving module, and key light signals are transmitted via lighting backlight. The light-operated access control lock certificates validity of the moving unlocking terminal via light information transmitted by a light transmitting module, so that an illegal mobile unlocking terminal is avoided trying to unlock the access control. The mobile unlocking terminal certificates the validity of the light-operated access control lock jointly via graphic symbols of a display module and hidden key backlight signals of the backlight module, thereby preventing a fake light-operated access control lock from intercepting user information and from cracking an unlock password. By using the method, possible safety hazards of the prior art, such as information intercepting, are avoided partly, and both safety and privacy are further improved.

Description

technical field [0001] The invention belongs to the technical field of optical communication, and in particular relates to a visible light control access control method with a hidden channel. Background technique [0002] Now lawbreakers use various methods to intercept user information and steal user property, which can be described as "every trick", such as: "phishing" websites that pretend to be banks or e-commerce platforms and steal private information such as bank account numbers and passwords submitted by users; The magnetic card reader installed in the card slot of the ATM machine and the camera at the keyboard, etc. These are things users want to avoid happening. [0003] For an access control system, both the access control terminal and the key terminal hope to avoid information forgery and identity forgery of the other party. Invention application (201310405814.9) combines VLC technology with image and graphic recognition technology and proposes a light-controll...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
Inventor 邓健志
Owner GUILIN UNIVERSITY OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products