CN115439967B - Visitor passing verification method and device based on optical communication technology - Google Patents

Visitor passing verification method and device based on optical communication technology Download PDF

Info

Publication number
CN115439967B
CN115439967B CN202211155078.1A CN202211155078A CN115439967B CN 115439967 B CN115439967 B CN 115439967B CN 202211155078 A CN202211155078 A CN 202211155078A CN 115439967 B CN115439967 B CN 115439967B
Authority
CN
China
Prior art keywords
visitor
information
sequence
optical
access control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211155078.1A
Other languages
Chinese (zh)
Other versions
CN115439967A (en
Inventor
吴志华
陈建柏
陈浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Green Man Technology Co ltd
Original Assignee
Green Man Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Green Man Technology Co ltd filed Critical Green Man Technology Co ltd
Priority to CN202211155078.1A priority Critical patent/CN115439967B/en
Publication of CN115439967A publication Critical patent/CN115439967A/en
Application granted granted Critical
Publication of CN115439967B publication Critical patent/CN115439967B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a visitor passing verification method based on an optical communication technology, which comprises the following steps: after receiving the visitor request sent by the visitor terminal, the server forwards the visitor request to the associated owner terminal for human verification, and after the verification is passed, visitor information and a visitor passing instruction are obtained and stored; the method comprises the steps that a server obtains an associated access control equipment number and public key information thereof based on visitor information, encrypts the visitor information by using the public key information and a visitor passing instruction, and converts the visitor information into binary codes to obtain a first optical sequence; the server sends visitor information to the corresponding access control equipment to update a preset visitor information list, and sends an access control equipment number and a first optical sequence to the visitor terminal; the visitor terminal acquires a visitor passing instruction input by a visitor and converts the visitor passing instruction into a binary code to obtain a second optical sequence; the corresponding access control equipment decodes the optical signals sent by the visitor terminal based on the first optical sequence and the second optical sequence, and the visitor terminal is verified through the private key and released after the verification is passed.

Description

Visitor passing verification method and device based on optical communication technology
Technical Field
The invention belongs to the technical field of optical communication, and particularly relates to a visitor passing verification method and device based on an optical communication technology.
Background
In the intelligent communities and intelligent parks, personnel passing is an important scene, and visitors are taken as external personnel and are important to management. To realize accurate control of the passing right, the current general solutions in the industry mainly have three types: card swiping verification, two-dimensional code verification and face verification. The three schemes have the defects:
card swiping verification: the passers-by needs to hold the entity cards, the use experience is not convenient, the entity cards are easy to lose, and potential safety hazards exist;
two-dimensional code verification: the equipment cost is high, the equipment needs to be online in real time to perform authentication, the two-dimensional code can be captured and copied, and a vulnerability exists;
Face verification: the equipment cost is expensive, and the privacy safety of the human face is related.
Disclosure of Invention
The invention aims to provide a visitor passing verification method and device based on an optical communication technology, which are used for solving the problems in the background technology.
In order to achieve the above purpose, the present invention provides the following technical solutions:
A visitor passing verification method based on an optical communication technology comprises the following steps:
step 1, after receiving a visitor request sent by a visitor terminal, a server forwards the visitor request to an associated owner terminal for human verification, and after the verification is passed, visitor information and a visitor passing instruction are obtained and stored;
Step 2, the server acquires the related access control equipment number and public key information thereof based on the visitor information, encrypts the visitor information by using the public key information and the visitor passing instruction, and converts the visitor information into binary codes to obtain a first optical sequence;
Step 3, the server sends visitor information to the corresponding access control equipment to update a preset visitor information list, and sends the number of the access control equipment and a first optical sequence to the visitor terminal;
Step 4, the visitor terminal acquires a visitor passing instruction input by a visitor and converts the visitor passing instruction into a binary code to obtain a second optical sequence;
And 5, decoding the optical signals sent by the visitor terminal based on the first optical sequence and the second optical sequence by the corresponding access control equipment, checking through the private key, and releasing after the checking is passed.
Preferably, the visitor request includes a visitor name, a visitor cell phone number, owner information, and access time.
Preferably, the step 1 includes the steps of:
step 1.1, a visitor inputs a visitor request at a visitor terminal and sends the visitor request to a server;
Step 1.2, the server receives the visitor request, searches the associated owner terminal in the owner information association table and sends the owner terminal;
And 1.3, the owner reviews the visitor request at the owner terminal, if the visitor request has flaws, the visitor passing instruction is input after correction, otherwise, the visitor passing instruction is directly input, and the visitor passing instruction is sent to the server for storage.
Preferably, the step 2 includes the steps of:
Step 2.1, inquiring the number of the access control equipment in an owner information association table preset by a server by taking the owner information as a retrieval element, and searching corresponding public key information in the preset access control equipment association table based on the number of the access control equipment;
Step 2.2, after primary encryption is carried out on the visitor information by using the public key information, secondary encryption is carried out on the visitor information through a visitor passing instruction, and an encrypted visitor sequence is obtained;
and 2.3, converting the encrypted visitor sequence into binary codes to obtain a first light sequence.
Preferably, the encryption algorithm of the primary encryption is a hash algorithm, and a hash value is obtained.
Preferably, the secondary encryption is dividing a hash value by the guest pass instruction.
Preferably, the step 5 includes the steps of:
step 5.1, the access control equipment decodes the optical signal to obtain a first optical sequence and a second optical sequence;
step 5.2, obtaining visitor information encrypted by using public key information based on the first optical sequence and the second optical sequence;
Step 5.3, encrypting the visitor information in the visitor information list based on the private key information to obtain the private key encrypted visitor information;
Step 5.4, comparing the visitor information encrypted by the public key information with the visitor information encrypted by the private key in a consistency way, if so, executing the step 5.5, otherwise, not releasing;
and 5.5, judging whether the current time is within the access time or not based on the consistent visitor information in the visitor information list, if so, releasing, otherwise, not releasing.
Preferably, the visitor request further includes a number of passes, and after the step 5.5 is executed, whether the current number of accesses reaches the number of accesses is determined based on the visitor information consistent with the visitor information list, if yes, the visitor information in the visitor information list is released and deleted.
A visitor pass verification device based on an optical communication technology, comprising:
The visitor terminal is used for sending a visitor request, acquiring a first light sequence and a visitor passing instruction, converting the visitor passing instruction into a second light sequence and sending out light signals based on the first light sequence and the second light sequence;
The owner terminal is used for acquiring and verifying the forwarded visitor request, and sending visitor information and visitor passing instructions after verification is passed;
The server is used for acquiring a visitor request, forwarding and acquiring visitor information and a visitor passing instruction, forwarding the visitor information, encrypting the visitor information based on the visitor information and the visitor passing instruction to obtain a first optical sequence and sending the first optical sequence;
And the access control equipment is used for updating the visitor information list, receiving the optical signal, converting the optical signal, checking the visitor information list based on the conversion result and a preset visitor information list, and releasing the visitor information list after the visitor information list passes the check.
Preferably, the access control device comprises an optical sequence receiving device, and the optical sequence receiving device comprises:
a silicon light pipe for receiving the light sequence sent by the flash lamp of the mobile phone and converting the light sequence into an electric signal;
An amplifying circuit that amplifies the converted electric signal;
a clock chip for providing an accurate clock for the circuit;
MCU, check based on conversion result and visitor information list, pass after check;
and the database is used for storing the visitor information list and the public key information.
Compared with the prior art, the invention has the beneficial effects that:
According to the method, the visitor information is obtained through setting the visitor request and verifying by the owner, so that the safety of the community and park traffic is ensured; the visitor information and the visitor passing instruction are encrypted and converted into the optical sequence for verification, an entity card is not needed, the equipment cost is low, and privacy security is not involved; the visitor passing instruction in the visitor terminal is notified by an owner, is converted into a second optical sequence by the visitor passing instruction, is combined with the first optical sequence to realize the communication of optical signals, and then is decrypted and checked by the access control equipment, so that the reliability of entering personnel is further ensured. The manager can better manage visitor traffic in the scenes of parks, communities, special places and the like by using the digital technology, and meanwhile visitor traffic experience is improved.
Drawings
Fig. 1 is a flowchart of a visitor pass verification method based on an optical communication technology of the present invention.
Fig. 2 is a block diagram of a visitor passing verification device based on an optical communication technology according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all embodiments of the invention. All other embodiments, which can be made by a person skilled in the art without any inventive effort, are intended to be within the scope of the present invention, based on the embodiments of the present invention.
A visitor passing verification method based on an optical communication technology comprises the following 5 steps.
And step 1, after receiving a visitor request sent by a visitor terminal, the server forwards the visitor request to an associated owner terminal for human verification, and after the verification is passed, visitor information and a visitor passing instruction are obtained and stored.
The step 1 comprises the following steps:
Step 1.1, a visitor inputs a visitor request at a visitor terminal and sends the visitor request to a server, wherein the visitor request comprises a visitor name, a visitor mobile phone number, owner information and access time;
step 1.2, the server receives the visitor request, searches the associated owner terminal in a preset owner information association table, and sends the visitor request to the owner terminal;
And 1.3, the owner reviews the visitor request at the owner terminal, if the visitor request has flaws, the visitor passing instruction is input after correction, otherwise, the visitor passing instruction is directly input, and the visitor passing instruction is sent to the server for storage.
In the invention, the software function carrier of the visitor request input part can be mobile phone app, applet or H5 page, and the prior registration mode of the visitor comprises but is not limited to autonomous code scanning registration, manager registration and the like.
In the step 1 of the invention, the visitor has no knowledge about the park or community as the interviewee, so that the interviewee is verified by the owner after sending the access request, and the interviewee is corrected when the access request is problematic, thereby ensuring the correct access request and simultaneously playing the role of reminding the interviewee.
And 2, the server acquires the related access control equipment number and public key information thereof based on the visitor information, encrypts the visitor information by using the public key information and the visitor passing instruction, and converts the visitor information into binary codes to obtain a first optical sequence.
The step 2 comprises the following steps:
Step 2.1, inquiring the number of the access control equipment in an owner information association table preset by a server by taking the owner information as a retrieval element, and searching corresponding public key information in the preset access control equipment association table based on the number of the access control equipment;
Step 2.2, after primary encryption is carried out on the visitor information by using the public key information, secondary encryption is carried out on the visitor information through a visitor passing instruction, and an encrypted visitor sequence is obtained;
And 2.3, converting the encrypted visitor sequence into binary codes to obtain a first light sequence.
In the step 2.2 of the invention, the encryption algorithm of the primary encryption is a hash algorithm, and a hash value is obtained; the secondary encryption is to divide the hash value by the guest pass instruction. Here, the guest instruction is generally a decimal sequence, and the hash value obtained by hash calculation is a hexadecimal sequence, and the hexadecimal sequence needs to be converted into decimal in the process of secondary encryption and then divided.
In step 2.3 of the present invention, the encrypted guest sequence is a decimal sequence, which then needs to be converted into a binary sequence, thereby facilitating the emission of an optical signal.
And step 3, the server sends the visitor information to the corresponding access control equipment to update a visitor information list preset in the access control equipment, and sends the access control equipment number and the first optical sequence to the visitor terminal.
In step 3 of the invention, each access control device stores a corresponding visitor information list for storing all visitor information of the access control device, and after receiving the visitor information in the server, the access control device stores the visitor information in the visitor information list. Meanwhile, the server also needs to send the access control equipment number and the first optical sequence to the visitor terminal, so that the visitor can find the passing access control equipment through the corresponding access control equipment number, and the passing access control equipment is convenient to check and communicate through the first optical sequence.
And step 4, the visitor terminal acquires a visitor passing instruction input by a visitor, and converts the visitor passing instruction into a binary code to obtain a second optical sequence.
In step 4 of the present invention, the visitor passing instruction input by the visitor is notified by the interviewee, and how to notify is not limited herein.
And 5, decoding the optical signals sent by the visitor terminal based on the first optical sequence and the second optical sequence by the corresponding access control equipment, checking through the private key, and releasing after the checking is passed.
Step 5 comprises the steps of:
step 5.1, the access control equipment decodes the optical signal to obtain a first optical sequence and a second optical sequence;
step 5.2, obtaining visitor information encrypted by using public key information based on the first optical sequence and the second optical sequence;
Step 5.3, encrypting the visitor information in the visitor information list based on the private key information to obtain the private key encrypted visitor information;
Step 5.4, comparing the visitor information encrypted by the public key information with the visitor information encrypted by the private key in a consistency way, if so, executing the step 5.5, otherwise, not releasing;
and 5.5, judging whether the current time is within the access time or not based on the consistent visitor information in the visitor information list, if so, releasing, otherwise, not releasing.
In step 5.1 of the present invention, each optical sequence sent by the mobile phone end needs to follow a set of optical communication protocol, so as to increase fault tolerance and environmental light interference resistance. Protocol rules: the long light of Ams is sent to represent the initial signal, then binary data bits are sent, the lamp Bms is turned off by default before each data bit is sent, and then if the lamp Cms is turned on, binary '0' is sent; if the light Dms is on, a binary "1" is sent, and then one parity bit is sent after the E-bit data bit is sent. Each 4-bit binary number corresponds to one-bit decimal number, and in total, E-bit binary data is transmitted, and then the E/4-bit decimal password is corresponding. A. B, C, D, E parameters can be freely configured to meet different requirements, and the invention is not limited and only provides protocol rules.
In step 5.2 of the present invention, the first optical sequence and the second optical sequence are multiplied to obtain the visitor information encrypted by the public key information.
In step 5.3 of the invention, the private key information is private key information of the access control equipment, the visitor information in the visitor information list is sent by the server, and the private key information carries out hash calculation on the visitor information in the visitor information list to obtain a hash value, namely the visitor information encrypted by the private key; since there are a plurality of guest information in the guest information list, a plurality of hash values are obtained.
In step 5.4 of the present invention, the visitor information encrypted by the public key information is compared with the hash value in the visitor list, and if the hash value is consistent, it is indicated that the visitor information of the visitor exists in the access control device.
In step 5.5 of the invention, the time of receiving the optical signal is taken as the current access time, and whether the current access time is within the preset access time is judged, if yes, the access requirement is met, and the gate inhibition equipment is opened and released.
Further, the visitor request further includes a number of passes, and after the step 5.5 is executed, whether the current number of accesses reaches the number of accesses is judged based on the visitor information consistent with the visitor information list, if yes, the visitor information in the visitor information list is released and deleted.
According to the invention, the access times are set in the access time, and when the access times are reached, the access control equipment deletes the visitor information in the visitor information list, so that the access smoothness is ensured, and meanwhile, the traffic safety of a park or community can be further improved.
On the basis, the invention also provides a visitor passing verification device based on the optical communication technology, which comprises the following steps:
The visitor terminal is used for sending a visitor request, acquiring a first light sequence and a visitor passing instruction, converting the visitor passing instruction into a second light sequence and sending out light signals based on the first light sequence and the second light sequence;
The owner terminal is used for acquiring and verifying the forwarded visitor request, and sending visitor information and visitor passing instructions after verification is passed;
The server is used for acquiring a visitor request, forwarding and acquiring visitor information and a visitor passing instruction, forwarding the visitor information, encrypting the visitor information based on the visitor information and the visitor passing instruction to obtain a first optical sequence and sending the first optical sequence;
And the access control equipment is used for updating the visitor information list, receiving the optical signal, converting the optical signal, checking the visitor information list based on the conversion result and a preset visitor information list, and releasing the visitor information list after the visitor information list passes the check.
The entrance guard equipment comprises an optical sequence receiving device, wherein the optical sequence receiving device comprises:
a silicon light pipe for receiving the light sequence sent by the flash lamp of the mobile phone and converting the light sequence into an electric signal;
The amplifying circuit amplifies the converted electric signals, so that subsequent signal processing is facilitated;
a clock chip for providing an accurate clock for the circuit and matching time factors in the received optical signals;
MCU is in charge of decryption and verification of the optical signals, verification is carried out based on the conversion result and a preset visitor information list, and the verification is released after passing;
and the database is used for storing the visitor information list and the public key information.
The silicon light pipe detection device has the advantages of high response speed, high sensitivity, good linearity, low noise and the like, and can receive optical signals. By adopting the optical communication technology, unique optical signals can be sent and analyzed through a specific communication protocol.

Claims (5)

1. The visitor passing verification method based on the optical communication technology is characterized by comprising the following steps of:
Step 1, after receiving a visitor request sent by a visitor terminal, a server forwards the visitor request to an associated owner terminal for human verification, and after the verification is passed, visitor information and a visitor passing instruction are obtained and stored; the visitor request comprises a visitor name, a visitor mobile phone number, owner information and access time;
Step 2, the server acquires the related access control equipment number and public key information thereof based on the visitor information, encrypts the visitor information by using the public key information and the visitor passing instruction, and converts the visitor information into binary codes to obtain a first optical sequence;
the step 2 comprises the following steps:
Step 2.1, inquiring the number of the access control equipment in an owner information association table preset by a server by taking the owner information as a retrieval element, and searching corresponding public key information in the preset access control equipment association table based on the number of the access control equipment;
Step 2.2, calculating a hash value of the visitor information by using the public key information through a hash algorithm, and dividing the hash value by the visitor pass instruction to obtain an encrypted visitor sequence;
Step 2.3, converting the encrypted visitor sequence into binary codes to obtain a first light sequence;
Step 3, the server sends visitor information to the corresponding access control equipment to update a preset visitor information list, and sends the number of the access control equipment and a first optical sequence to the visitor terminal;
Step 4, the visitor terminal acquires a visitor passing instruction input by a visitor and converts the visitor passing instruction into a binary code to obtain a second optical sequence;
Step 5, the corresponding access control equipment decodes the optical signals sent by the visitor terminal based on the first optical sequence and the second optical sequence, and checks through the private key, and releases after the check is passed;
step 5.1, the access control equipment decodes the optical signal to obtain a first optical sequence and a second optical sequence;
step 5.2, obtaining visitor information encrypted by using public key information based on the first optical sequence and the second optical sequence;
Step 5.3, encrypting the visitor information in the visitor information list based on the private key information to obtain the private key encrypted visitor information;
Step 5.4, comparing the visitor information encrypted by the public key information with the visitor information encrypted by the private key in a consistency way, if so, executing the step 5.5, otherwise, not releasing;
and 5.5, judging whether the current time is within the access time or not based on the consistent visitor information in the visitor information list, if so, releasing, otherwise, not releasing.
2. The visitor pass verification method based on the optical communication technology as claimed in claim 1, wherein said step 1 comprises the steps of:
step 1.1, a visitor inputs a visitor request at a visitor terminal and sends the visitor request to a server;
Step 1.2, the server receives the visitor request, searches the associated owner terminal in the owner information association table and sends the owner terminal;
And 1.3, the owner reviews the visitor request at the owner terminal, if the visitor request has flaws, the visitor passing instruction is input after correction, otherwise, the visitor passing instruction is directly input, and the visitor passing instruction is sent to the server for storage.
3. The visitor passing verification method based on the optical communication technology as claimed in claim 1, wherein the visitor request further includes a passing number, and after the step 5.5 is executed, it is judged whether the current access number reaches the access number based on the visitor information consistent with the visitor information list, if so, the visitor information in the visitor information list is released and deleted.
4. A visitor pass verification device based on an optical communication technique, characterized in that a visitor pass verification method as claimed in any one of claims 1-3 is used, said device comprising:
The visitor terminal is used for sending a visitor request, acquiring a first light sequence and a visitor passing instruction, converting the visitor passing instruction into a second light sequence and sending out light signals based on the first light sequence and the second light sequence;
The owner terminal is used for acquiring and verifying the forwarded visitor request, and sending visitor information and visitor passing instructions after verification is passed;
The server is used for acquiring a visitor request, forwarding and acquiring visitor information and a visitor passing instruction, forwarding the visitor information, encrypting the visitor information based on the visitor information and the visitor passing instruction to obtain a first optical sequence and sending the first optical sequence;
And the access control equipment is used for updating the visitor information list, receiving the optical signal, converting the optical signal, checking the visitor information list based on the conversion result and a preset visitor information list, and releasing the visitor information list after the visitor information list passes the check.
5. The visitor pass verification device based on the optical communication technology as claimed in claim 4, wherein said access control device comprises an optical sequence receiving means comprising:
a silicon light pipe for receiving the light sequence sent by the flash lamp of the mobile phone and converting the light sequence into an electric signal;
An amplifying circuit that amplifies the converted electric signal;
a clock chip for providing an accurate clock for the circuit;
MCU, check based on conversion result and visitor information list, pass after check;
and the database is used for storing the visitor information list and the public key information.
CN202211155078.1A 2022-09-22 2022-09-22 Visitor passing verification method and device based on optical communication technology Active CN115439967B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211155078.1A CN115439967B (en) 2022-09-22 2022-09-22 Visitor passing verification method and device based on optical communication technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211155078.1A CN115439967B (en) 2022-09-22 2022-09-22 Visitor passing verification method and device based on optical communication technology

Publications (2)

Publication Number Publication Date
CN115439967A CN115439967A (en) 2022-12-06
CN115439967B true CN115439967B (en) 2024-10-11

Family

ID=84248753

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211155078.1A Active CN115439967B (en) 2022-09-22 2022-09-22 Visitor passing verification method and device based on optical communication technology

Country Status (1)

Country Link
CN (1) CN115439967B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488887A (en) * 2015-12-28 2016-04-13 慧锐通智能科技股份有限公司 Entrance guard access control method

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104851166B (en) * 2015-05-08 2018-04-06 邹骁 A kind of gate control system, method and relevant device
KR101638585B1 (en) * 2015-05-11 2016-07-11 (주)토마토전자 entrance system exploiting smart phone
US10181229B2 (en) * 2015-09-18 2019-01-15 Hyatt Corporation Method and system for implementing a universal key card
US10055926B2 (en) * 2016-09-09 2018-08-21 Tyco Integrated Security, LLC Architecture for access management
CN111784887A (en) * 2019-11-29 2020-10-16 北京沃东天骏信息技术有限公司 Authorization releasing method, device and system for user access
CN114050903A (en) * 2021-11-23 2022-02-15 广东电网有限责任公司 Traffic management method, device, system, server and medium

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488887A (en) * 2015-12-28 2016-04-13 慧锐通智能科技股份有限公司 Entrance guard access control method

Also Published As

Publication number Publication date
CN115439967A (en) 2022-12-06

Similar Documents

Publication Publication Date Title
CN109639714B (en) Internet of things identity registration and verification method based on block chain
US11270532B2 (en) Lock control device, information processing method, program, and communication terminal
CN105243715B (en) A kind of automatic register method of cell visiting subscriber and system based on dynamic two-dimension code
CN109327457A (en) A kind of internet of things equipment identity identifying method and system based on block chain
US20080120707A1 (en) Systems and methods for authenticating a device by a centralized data server
US10791106B2 (en) Digital credential with embedded authentication instructions
CN111881481B (en) Medical data processing method, device, equipment and storage medium based on blockchain
JP2019512976A (en) Identity registration method and device
JP2010098769A (en) Method and system for data communication
CN114024744B (en) Information protection method based on cloud computing and blockchain service and artificial intelligent platform
CN109714169B (en) Data credible circulation platform based on strict authorization and circulation method thereof
CN105765941A (en) Illegal access server prevention method and device
JP2005303459A (en) Access point, radio lan connecting method, medium recording radio lan connecting program and radio lan system
CN112307515A (en) Database-based data processing method and device, electronic equipment and medium
CN115439967B (en) Visitor passing verification method and device based on optical communication technology
CN113272670A (en) Position information providing system and position information providing method
CN107396363B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
US11683180B1 (en) Protecting digital media with nested hashing techniques
CN114827998B (en) Satellite terminal network access authentication device based on encryption chip
CN113132106B (en) User identity recognition system
CN109218320B (en) Website link security verification method and device, computer equipment and storage medium
CN117834103B (en) Multimedia data sharing method, system and related equipment based on block chain
CN111431854B (en) Wi-Fi received signal strength-based double-factor authentication method and electronic device
CN111800256B (en) Old people two-dimensional code electronic license application method and system
CN117565815A (en) Method for unlocking instrument by digital car key and biological recognition technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant