Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control method based on Internet of Things, access control system and storage medium

An access control and Internet of Things technology, applied in the field of Internet of Things, can solve the problems of difficult identification, easy loss, low access control security, etc., and achieve the effect of improving security

Pending Publication Date: 2022-03-08
E SURFING IOT CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, most of the intelligent access control is based on radio frequency card technology, fingerprint technology or facial recognition technology. The radio frequency card technology must require the user to carry the door card with him, which is inconvenient and easy to lose; When there is dirt or wounds, it is not easy to identify; and facial recognition technology is expensive and difficult to popularize
With the popularization of smart phones, two-dimensional codes have gradually become a new identification method. Although the two-dimensional code identification method is convenient to use and low in cost, static two-dimensional codes are also easy to copy by taking pictures. lower sex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method based on Internet of Things, access control system and storage medium
  • Access control method based on Internet of Things, access control system and storage medium
  • Access control method based on Internet of Things, access control system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0030] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0031] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an access control method based on Internet of Things, an access control system and a storage medium. The method belongs to the technical field of Internet of Things, and comprises the following steps: a terminal receives a random number issued by a management server, and encrypts the random number, a current timestamp and a user ID logging in the terminal through a management public key to generate a two-dimensional code image; the access control device identifies the two-dimensional code image and signs through the access control private key to obtain a signed binary code; the management server verifies the signature binary code through the access control public key to obtain a binary code, decrypts the binary code through the management private key to obtain a random number, a user ID and a timestamp, and detects whether a preset condition is met or not; if yes, the management server signs the preset door opening instruction through the management private key to obtain a signed door opening instruction; the access control device verifies the signature door opening instruction through the management public key to obtain a preset door opening instruction so as to open the access control. According to the embodiment of the invention, the security of the access control can be improved.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to an access control method, an access control system and a storage medium based on the Internet of Things. Background technique [0002] At present, most of the intelligent access control is based on radio frequency card technology, fingerprint technology or facial recognition technology. The radio frequency card technology must require the user to carry the door card with him, which is inconvenient and easy to lose; When there is dirt or wounds on it, it is not easy to identify; and facial recognition technology is expensive and difficult to popularize. With the popularization of smart phones, two-dimensional codes have gradually become a new identification method. Although the two-dimensional code identification method is convenient to use and low in cost, static two-dimensional codes are also easy to copy by taking pictures. Sex is lower. Contents of the invent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07C9/23G07C9/27
CPCG07C9/23G07C9/27
Inventor 黄海昆
Owner E SURFING IOT CO LTD