Access control authentication method based on dynamic two-dimensional code and device

A technology of dynamic two-dimensional code and authentication method, which is applied in the field of access control authentication based on dynamic two-dimensional code, can solve the problems of troublesome cost and poor security of access control equipment, and achieve the goal of improving anti-theft capability, high security, and preventing malicious opening of access control Effect

Pending Publication Date: 2018-08-28
深圳市西克智能技术有限公司
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the embodiment of the present invention provides an access control authentication method based on a dynamic two-dimensional code to solve the poor security of the two-dimensional code access control system in the prior art and to convert the original access control equipment that recognizes the access control card into an identification QR code access control equipment is cumbersome and expensive

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control authentication method based on dynamic two-dimensional code and device
  • Access control authentication method based on dynamic two-dimensional code and device
  • Access control authentication method based on dynamic two-dimensional code and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present invention. It will be apparent, however, to one skilled in the art that the invention may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.

[0042] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0043] It ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is suitable for the technical field of access control, and provides an access control authentication method based on a dynamic two-dimensional code. The access control authentication method comprises the following steps of scanning an image of the two-dimensional code, and decrypting, so as to obtain the information of the two-dimensional code; judging whether the current time is setwithin the effective time or not, and judging whether the frequency of scanning the image of the same two-dimensional code is smaller than or equal than the effective frequency or not; when the current time is set within the effective time, and the frequency of scanning the image of the same two-dimensional code is smaller than or equal than the effective frequency, sending ID (identification) ofa user to an access control controller. The access control authentication method has the advantages that by analyzing and decrypting the two-dimensional code, the failure to analyze the two-dimensional code or decrypt the data indicates that the scanned two-dimensional code is not the correct two-dimensional code for opening a door, thereby effectively preventing the malicious opening of the access control; the effective time and effective frequency are judged after decrypting, thereby furthermore preventing the malicious opening of the access control, improving the anti-theft ability, and reaching higher security.

Description

technical field [0001] The invention belongs to the technical field of access control, in particular to an access control authentication method based on a dynamic two-dimensional code. Background technique [0002] With the advancement of science and technology, intelligent access control technology has been widely used in the management and control of public places such as office buildings and intelligent communities. At present, most of the existing access control systems use the access control card technology, because the access control card is inconvenient to carry. Here, you only need to scan the two-dimensional code when using it. Although this technology is more convenient to use and the cost is relatively low, but because the existing two-dimensional code access control uses fixed two-dimensional code pictures, it is easy to be used. Others copy or take pictures, poor security. Moreover, in order to convert the original access control equipment that recognizes the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G07C9/00G06K17/00
CPCG06K17/0025G07C9/22G07C9/27
Inventor 唐勇刘小林
Owner 深圳市西克智能技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products