Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Two-dimension code generation/verification method used in access control environment, and apparatus thereof

A verification method and two-dimensional code technology, applied in the field of two-dimensional code verification methods and devices for surveillance cameras, can solve the problems of low security of access control passwords, achieve the effect of improving security and avoiding direct exposure

Inactive Publication Date: 2016-05-04
GUANGDONG VIMICRO
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the problem of low security of access control passwords in the related art, the present invention proposes a method and device for generating two-dimensional codes in an access control environment, and a method and device for verifying two-dimensional codes for monitoring cameras in an access control environment. The device can verify the user's identity with a two-dimensional code to avoid the direct input of the user's password, thereby improving the security of the user's password

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-dimension code generation/verification method used in access control environment, and apparatus thereof
  • Two-dimension code generation/verification method used in access control environment, and apparatus thereof
  • Two-dimension code generation/verification method used in access control environment, and apparatus thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments of the present invention belong to the protection scope of the present invention.

[0054] According to an embodiment of the present invention, a method for generating a two-dimensional code used in an access control environment is provided.

[0055] Such as figure 1 As shown, the two-dimensional code generation method according to the embodiment of the present invention includes:

[0056] Step S101, determining the key information of the user corresponding to the two-dimensional code;

[0057] Step S103, determining a pre-configured user password;

[0058] Step S105, per...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a two-dimension code generation method used in access control environment, and an apparatus thereof, and a two-dimension code verification method used in access control environment, and an apparatus thereof. The two-dimension code generation method comprises the following steps: determining user's key information corresponding to a two-dimension code; operating the key information and a user cipher according to a preconfigured algorithm to generate digital signature information; combining the digital signature information with the key information to generate false-proof information; and coding the false-proof information through a two-dimension code coding technology to generate a two-dimension code. The user cipher and the user's key information are processed to generate the digital signature information, and the digital signature information is integrated in the two-dimension cod, so the two-dimension code carries user's identity verifying information, and direct exposure of an access control cipher (the user cipher) is avoided, thereby the security of the user cipher is improved.

Description

technical field [0001] The invention relates to the field of access control, in particular to a method and device for generating a two-dimensional code in an access control environment, and a method and device for verifying a two-dimensional code for a monitoring camera in an access control environment. Background technique [0002] At present, the existing home access control generally adopts the way of manually inputting the keyboard password to realize the opening of the access control, but there are many problems in the traditional way of manually inputting the password to open the access control. Then it is easy to be secretly photographed by criminals; for another example, because the digital layout of the keyboard password is fixed, when the user presses some keys on the keyboard, it is easy for criminals to analyze the composition of the password; in addition, due to the keyboard input method The access control password usually has only one fixed password shared by m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00G06K19/06
Inventor 黄强雄韩峻纪宏达
Owner GUANGDONG VIMICRO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products