Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A secure two-dimensional code access control authentication system and method

An authentication method and two-dimensional code technology, applied in the field of security, can solve the problems such as the inability to solve the identity authentication of outsiders, the easy leakage of passwords, and the increase of the workload of the delivery staff.

Active Publication Date: 2020-10-30
HUBEI UNIV OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Inductive access control system means that authorized users can apply for a sensor device with their own personal information, and then control the access control through the sensor device, but because each user needs to configure a sensor device, resulting in waste of resources
The password-based access control system means that the person with the password can open the access control. Since the access control equipment is placed in a public environment, the password is easily leaked, leading to crimes.
In addition, the existing access control management methods cannot solve the problem of identity authentication of outsiders
For example, when a community resident purchases food through a mobile app, the food delivery staff will deliver the food, but usually because of the inability to verify the identity of the food delivery staff and to prevent safety accidents, the food delivery staff is not allowed to enter the community, and users need to pick up the food by themselves
This will lead to poor user experience and increase the workload of delivery staff

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure two-dimensional code access control authentication system and method
  • A secure two-dimensional code access control authentication system and method
  • A secure two-dimensional code access control authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to facilitate the understanding and implementation of the present invention by those of ordinary skill in the art, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. invention.

[0025] like figure 1 As shown, the present invention provides a security two-dimensional code access control authentication system with hidden password, including a household key and password distribution module, a household terminal coding hidden password two-dimensional code module, a visitor intelligent terminal module, an access control decoding module, and an access control verification module. control module;

[0026] Household key and password distribution module for distributing keys and passwords;

[0027] Resident terminal coding hidden password QR code module, which is used to generate hidden one-time password QR code with timestamp and send it to the visitor smart terminal module as needed;

[0028...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure two-dimensional code access control authentication system and method. The system includes a resident key and password distribution module for distributing the key and password; The time-stamped one-time password two-dimensional code is sent to the visitor intelligent terminal module; the visitor intelligent terminal module receives the two-dimensional code generated by the resident terminal coding hidden password two-dimensional code module, and decodes it for the access control decoding module; the access control decoding module, It is used to read the basic information and hidden password in the two-dimensional code, and store the basic information such as the time of entering the building, personal information, etc.; the access control verification control module verifies the password and controls the access control switch according to the verification result; this method is based on two-dimensional The inherent error correction mechanism of code encoding hides the password to open the door in the basic information after encryption, which ensures that the identity of the entering personnel is verified without the password being leaked, and the identification efficiency is high and the security is high.

Description

technical field [0001] The invention belongs to the field of security technology, and relates to an access control authentication system and method, in particular to an access control authentication system and method that hides a password in a two-dimensional code. Background technique [0002] At present, in order to prevent the occurrence of criminal incidents, some communities and student dormitories have installed access control equipment. Most of the modern access control systems are inductive access control systems and password access control systems. The inductive access control system means that authorized users can handle the induction equipment with their own personal information, and then control the access control through the induction equipment, but because each user needs to configure the induction equipment, it will cause a waste of resources. The password-based access control system means that a person with a password can open the access control. Because the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/23G07C9/27G07C9/21
CPCG07C9/23G07C9/27
Inventor 张明武陈效沈华李兵兵孙代杰
Owner HUBEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products