Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Access control method, device and system

An access control and access control technology, which is applied in transmission systems, instruments, electrical components, etc., can solve problems such as security risks in the access control system, low efficiency of two-dimensional codes, increased server transmission pressure and terminal traffic, etc., to save traffic and improve safety effect

Inactive Publication Date: 2018-04-20
广州思加特科技有限公司
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The existing access control system has the following disadvantages: during the generation and transmission of QR code pictures on the cloud server, the transmission pressure of the server and the terminal traffic are increased, resulting in low efficiency for the terminal to obtain the QR code; the QR code follows the established rules After being generated and sent to the terminal, it is easy to decipher the string rules through the QR code recognizer and be copied to generate an effective QR code, which poses a great hidden danger to the security of the access control system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method, device and system
  • Access control method, device and system
  • Access control method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0046] see figure 1 , a kind of access control method that the embodiment of the present invention provides, comprises the following steps:

[0047] S101. The mobile terminal sends a first request to the key authorization server, so that the key authorization server generates an electronic key string based on the first request and sends it to the cloud encryption server for encryption, and the key authorization server receives the cloud key string. The encrypted e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access control method which includes the steps: a device authorization server authorizes an access control terminal ID; the access control terminal ID and user information are combined into a character string by a key authorization server; a cloud encryption server performs densification treatment on the character string by a cloud encryption way; a mobile terminal makesthe encrypted character string generate a two-dimensional code picture by a two-dimensional conversion algorithm; the access control terminal scans the two-dimensional code picture and a door is opened through decryption and determination. The invention also discloses an access control device and an access control system. With use of the embodiment of the invention, the real-time performance of the terminal to obtain the two-dimensional code and Internet data saving can be guaranteed, and at the same time, the security of the two-dimensional code in the information transmission process is improved.

Description

technical field [0001] The invention relates to the field of intelligent security technology, in particular to an access control method, device and system. Background technique [0002] Access control systems are widely used in the current intelligent security technology field. In the existing access control systems, two-dimensional code pictures are usually used to transmit information, including cloud servers, which are used to store user house numbers and corresponding user terminal numbers. Establish binding, generate and send two-dimensional code pictures; user terminal, used to receive and display two-dimensional code pictures; access control terminal, including data receiving module, two-dimensional code scanning module, two-dimensional code recognition module, control module, display Module and electronically controlled lock, wherein the data receiving module is used to receive two-dimensional code pictures; the two-dimensional code scanning module is used for scanni...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07C9/00H04L29/06
CPCG07C9/32G07C9/38H04L63/0428
Inventor 王涛丁成勇陈艺
Owner 广州思加特科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products