CN114863597B - Access management method, system and device based on trusted bar code - Google Patents
Access management method, system and device based on trusted bar code Download PDFInfo
- Publication number
- CN114863597B CN114863597B CN202210778239.6A CN202210778239A CN114863597B CN 114863597 B CN114863597 B CN 114863597B CN 202210778239 A CN202210778239 A CN 202210778239A CN 114863597 B CN114863597 B CN 114863597B
- Authority
- CN
- China
- Prior art keywords
- access
- trusted
- credible
- management platform
- bar code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000007726 management method Methods 0.000 title claims abstract description 218
- 238000012795 verification Methods 0.000 claims abstract description 50
- 238000000034 method Methods 0.000 claims abstract description 41
- 230000000875 corresponding effect Effects 0.000 claims abstract description 22
- 238000004458 analytical method Methods 0.000 claims abstract description 12
- 230000009471 action Effects 0.000 claims description 39
- 230000001276 controlling effect Effects 0.000 claims description 22
- 230000008569 process Effects 0.000 claims description 22
- 230000007246 mechanism Effects 0.000 claims description 18
- 210000001503 joint Anatomy 0.000 claims description 9
- 238000001514 detection method Methods 0.000 claims description 5
- 238000012545 processing Methods 0.000 claims description 4
- 238000005516 engineering process Methods 0.000 abstract description 7
- 230000008520 organization Effects 0.000 description 9
- 238000010586 diagram Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 2
- 238000003032 molecular docking Methods 0.000 description 2
- 230000002085 persistent effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/215—Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses an access management method, system and device based on a trusted barcode, wherein the method comprises the following steps: the user carries out identity authentication through the application of the mobile terminal, selects a target place and requests a credible access bar code within a preset validity period after the authentication is successful; the access management platform judges whether the user meets the access authority requirement or not according to the request, if so, the platform requests the trusted barcode management platform to generate a trusted access barcode, and returns the trusted access barcode to the mobile terminal for application; acquiring a trusted access bar code, performing clock synchronization with a trusted bar code management platform, and then playing the bar code; the credible code scanning terminal carries out snapshot and analysis on a bar code played by the application of the mobile terminal, uploads snapshot data and an analysis result to the access management platform for verification, and executes corresponding action according to the equipment attribute of the credible code scanning terminal after the verification is successful. The invention adopts the credible bar code technology, and solves the problems that the traditional two-dimensional code is easy to copy, spread and embezzle and has poor safety.
Description
Technical Field
The invention relates to the technical field of access management, in particular to an access management method, system and device based on a trusted barcode.
Background
At present, most communities and parks are provided with access control systems, so that residents can conveniently come in and go out, and the safety of the communities and parks is ensured. The technologies commonly used at present include radio frequency card technology, biometric identification (human face, fingerprint, etc.), two-dimensional code technology, etc. Although the radio frequency card technology is fast and light, when the owner's access card is lost and picked up by a person, the access card is easily used by a lawless person, so that the owner enters a residential area to perform illegal activities, and personal and property safety of the owner of the residential area is seriously affected. But the visitor personnel who do not have entrance guard then can't get into, have caused inconveniently to make entrance guard effect not good, or too tight of pipe lets the resident family inconvenient, or too loose of pipe, make entrance guard system shape the same nominal.
Aiming at the problems existing in the existing access control system, the access control using the face and two-dimensional code technology appears, and therefore visitors can apply for temporary access conveniently. However, the face technology has great potential safety hazard, the policy is not recommended to use at present, and people have great doubt; and the two-dimensional code access control adopts fixed two-dimensional code pictures, is easily copied, spread and stolen, and has poor safety.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides an access management method, system and device based on a trusted bar code.
The purpose of the invention is realized by the following technical scheme:
an access management method based on a credible bar code comprises a bright code access, a code scanning access and a life service platform access; the bright code access comprises the following steps:
s1: the user carries out identity authentication through the application of the mobile terminal, selects a target place and requests a credible in-and-out bar code within a preset validity period after the authentication is successful; the target sites comprise districts and parks/office buildings; the user service information comprises take-out order information and civil-host order information;
s2: the access management platform judges whether the user meets the access authority requirement or not according to the request, if so, the access management platform requests the trusted barcode management platform to generate a trusted access barcode, and returns the trusted access barcode to the mobile terminal application;
s3: the mobile terminal application acquires a credible access bar code, performs clock synchronization with the credible bar code management platform, and plays the credible access bar code according to a preset playing progress;
s4: the credible code scanning terminal carries out snapshot and analysis on the played credible access bar code, uploads snapshot data and an analysis result to the access management platform for verification, and executes corresponding actions according to the equipment attribute of the credible code scanning terminal after the verification is successful, wherein the actions specifically comprise the following steps: if the trusted bar code scanning terminal is an access control device, executing a door opening action; the credible bar code scanning terminal is used for controlling and executing actions of calling an elevator and selecting a floor by an elevator control device.
Specifically, the code scanning access specifically comprises the following steps:
step A: a user snapshottes a trusted bar code displayed on a trusted bar code display terminal according to default snapshooting parameters through a mobile terminal application, and performs image enhancement, selection, cutting, positioning and quality judgment operations on a snapshot picture to form a group of snapshot data; searching, positioning and analyzing the access function code of the snapshot data through the application of the mobile terminal to obtain bar code data; uploading user information, snapshot data and access function code bar code data in the mobile terminal application to an access management platform for verification;
and B, step B: the access management platform decrypts the received access function code to obtain cell data, time and equipment ID of the credible bar code display terminal, wherein the cell data comprises an access address, user attributes, access time and access times; the access management platform analyzes the received user information, reads an access address of a corresponding user, performs data matching judgment on the access address of the trusted barcode display terminal and cell data in the user information, judges whether the access time and the access times in the user information conform to the access time and the access times set by the access management platform if the access address and the cell data in the user information exist, and performs trusted barcode verification if the access time and the access times conform to the access times set by the access management platform;
and C: the access management platform sends the access function code data and the uploaded snap-shot picture set to the trusted barcode management platform, and initiates a trusted barcode verification request to the trusted barcode management platform; the trusted barcode management platform returns the verification result to the access management platform, the access management platform distributes the verification result to the mobile terminal application and the trusted barcode display terminal, and controls the terminal equipment to execute corresponding actions according to the attribute of the trusted barcode display terminal equipment, and the method specifically comprises the following steps: if the trusted bar code display terminal equipment is access control equipment, executing door opening action; the credible bar code display terminal device is an elevator control device for controlling the elevator to execute the actions of calling the elevator and selecting floors.
Specifically, the step S1 specifically includes: the user opens an access application on the mobile terminal to perform identity authentication, wherein the identity authentication mode comprises face identification, fingerprint identification, living body detection, testimony comparison and CTID credible identity authentication; after the identity authentication is successful, the user selects a target place to be accessed within the preset validity period, the access application carries out data encryption according to the user authentication information and the target place information to generate an access function code and submits an access request to the access management platform to request a credible access bar code; the life service platform is in butt joint with the access management platform, an access management platform interface is called to inquire user service information, and a credible access bar code is requested according to the user service information obtained by inquiry; the target sites comprise districts and parks/office buildings; the user service information includes take-away order information and civil-host order information.
Specifically, the S4 specifically includes the following substeps:
s401: the credible code scanning terminal snapshottes the credible access code displayed on the mobile terminal according to default snapshotting parameters;
s402: the trusted code scanning terminal performs image enhancement, selection, cutting, positioning and quality judgment operation processing on the captured image to form a group of captured data related to the trusted access code; the trusted code scanning terminal searches, positions and analyzes the access function codes in the snapshot data to obtain bar code data; if the access function code cannot be successfully analyzed, exiting the access flow and reporting an error;
s403: decrypting the analyzed bar code data to obtain target location data, and comparing the target location data set by the credible code scanning terminal with the analyzed target location data in the bar code; if the comparison result is not matched, exiting the access flow and reporting errors;
s404: after the comparison is passed, the credible code scanning terminal uploads the analyzed bar code data and the snapshot content to the access management platform and initiates a credible door opening code verification request; the access management platform initiates a trusted bar code verification request to the trusted bar code management platform;
s405: the trusted barcode management platform returns the verification result to the access management platform, the access management platform returns the verification result to the mobile terminal application and the trusted code scanning terminal, and after verification is successful, corresponding actions are executed according to the equipment attribute of the trusted code scanning terminal, specifically: if the trusted bar code scanning terminal is an access control device, executing a door opening action; the credible bar code scanning terminal is used for controlling and executing actions of calling an elevator and selecting a floor by an elevator control device.
Further, the access management method further comprises visitor invitation and visitor request, wherein the visitor request process comprises the following steps:
s261: if the visitor does not have an account for entering and exiting the management platform, account registration is needed firstly; a visitor registers an account number on an application, inputs visitor information and performs real-name authentication; the visitor information is input according to a user data definition format;
s262: the visitor submits an access request to a standing user of a designated organization;
s263: the standing user receives the access request information of the visitor on the application of the mobile terminal and grants the visitor access; if the permanent user does not agree with the access request of the visitor, ending the visitor request flow;
s264: the resident requests visitor access requests from the access management platform and sets access authority for the visitor access, wherein the access authority comprises access times and access time periods;
s265: the access management platform generates an access authority of a designated mechanism for the visitor;
s266: and when the visitor enters the specified mechanism, the visitor selects an access function in the application to operate the trusted code scanning terminal and the trusted bar code display terminal and execute corresponding actions.
Specifically, the guest invitation process includes the following steps:
s271: a user applies for inviting visitors to an access management platform; the visitor must be a user who has successfully registered on the access management platform and has completed real-name authentication;
s272: a user sets visitor access permission, including setting visitor access time and visitor access times;
s273: the target place manager is connected with the in-out management platform through the life service platform and generates access authority for the visitor according to the setting of the user,
s274: a user sends an invitation to a visitor, and the invitation sends in-station information which can pass through an access management platform;
s275: and when the visitor enters the specified mechanism, the visitor selects an access function in the application to operate the trusted code scanning terminal and the trusted bar code display terminal and execute corresponding actions.
Specifically, the entering and exiting of the life service platform specifically comprises the following steps:
the method comprises the following steps: a life service platform of a third party is in data butt joint with the access management platform, and is registered in the access management platform to apply for operation permission;
step two: a user submits an order in a life service platform;
step three: the living service platform assigns the order to a designated server, and the server receives the order;
step four: the living service platform inquires the access authority of the order placing user from the access management platform, and inquires the access authority of the order placing user in a specified mechanism on the access management platform by using user information; when the ordering user has the access right of a designated mechanism, the life service platform requests the access management platform to send visitor invitation to a server, and sets the access right, access time and access times of the server;
step five: the entrance and exit management platform generates a credible door opening code, and the credible door opening code is issued to the mobile terminal of the server through the life service platform;
step six: the server shows the credible door opening code through the mobile terminal, and the credible code scanning terminal scans the code for analysis and verification of the credible door opening code, and executes corresponding actions according to the equipment attribute of the credible code scanning terminal after the verification is successful, and the method specifically comprises the following steps: if the trusted barcode scanning terminal is an access control device, executing a door opening action; the credible bar code scanning terminal is used for controlling and executing actions of calling an elevator and selecting a floor by an elevator control device.
An access management device based on a trusted barcode is used for realizing the access management method based on the trusted barcode, and comprises a trusted barcode scanning terminal, a trusted barcode display terminal and a mobile terminal; the credible code scanning terminal is used for setting cell data, terminal names, position information and equipment IDs, snapshotting and analyzing credible access bar codes displayed on the mobile terminal, and controlling access equipment to execute actions according to information issued by the access management platform; the credible bar code display terminal is used for setting parameters of the credible bar code display terminal, generating an access function code, playing and displaying a credible access bar code and controlling access equipment to execute actions according to information issued by the access management platform; the mobile terminal is used for the user to finish identity authentication and access business through application.
An access management system based on a trusted barcode comprises an access management platform, a life service platform, a trusted barcode management platform, an identity authentication platform, a mobile terminal application, a trusted barcode display terminal and a trusted code scanning terminal application; the access management platform is respectively connected with the trusted barcode management platform, the life service platform, the identity authentication platform, the mobile terminal application, the trusted barcode display terminal and the trusted code scanning terminal application, and provides uniform basic access business service for users; the identity authentication platform is used for providing identity authentication for a user, and the identity authentication mode comprises face recognition, fingerprint recognition, living body detection, testimony comparison and CTID credible identity authentication; the life service platform is used for being in butt joint with the third-party service platform and providing third-party service order management for the user; the mobile terminal application is used for providing the user with the service of completing identity authentication and access; the credible code scanning terminal is used for setting cell data, terminal name, position information and equipment ID by a user, snapshotting and analyzing a credible access bar code displayed on the mobile terminal, and controlling access equipment to execute actions according to information issued by the access management platform; the credible bar code display terminal is used for setting parameters of the credible bar code display terminal, generating an access function code and playing and displaying a credible access bar code, and controlling access equipment to execute actions according to information issued by the access management platform.
The invention has the beneficial effects that: the credible access bar code provided by the invention is very convenient to use, and the characteristic that the credible bar code cannot be copied is utilized, the credible bar code is innovatively applied between the life service platform and the access management platform, so that an access convenient means is provided for life service personnel, access information is recorded, and the life service personnel who frequently access in a district and a park every day are managed and recorded. The invention uses the mobile phone as the virtual key which can not be transmitted and copied, thereby not only ensuring the convenient use of the user, but also ensuring the safety of the system.
Drawings
FIG. 1 is a flow chart of the method steps of the present invention;
FIG. 2 is a highlight access flow diagram;
FIG. 3 is a flowchart of an application of the trusted code-scanning terminal;
FIG. 4 is a flow chart of code scanning access;
FIG. 5 is a guest request flow diagram;
FIG. 6 is a guest invitation flow diagram;
fig. 7 is a view showing the entrance and exit management of the campus/office building;
FIG. 8 is a system architecture diagram;
fig. 9 is a clock synchronization flow chart.
Detailed Description
The following detailed description is given to select technical features, objects and advantages of the present invention in order to make the technical features, objects and advantages of the present invention more clearly understood. It should be understood that the embodiments described are illustrative of some, but not all embodiments of the invention, and are not to be construed as limiting the scope of the invention. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments of the present invention, belong to the protection scope of the present invention.
The first embodiment is as follows:
in this embodiment, an access management method based on a trusted barcode includes a bright code access and a code scanning access. In this embodiment, the trusted entrance/exit barcode is specifically a trusted door opening code. As shown in fig. 1, the bright code access comprises the following steps:
s1: the user carries out identity authentication through the application of the mobile terminal, selects a target place and requests a credible in-and-out bar code within a preset validity period after the authentication is successful; the target sites comprise districts and parks/office buildings; the user service information comprises takeout order information and resident order information;
s2: the access management platform judges whether the user meets the access authority requirement or not according to the request, if so, the access management platform requests the trusted barcode management platform to generate a trusted access barcode, and returns the trusted access barcode to the mobile terminal application;
s3: the mobile terminal application acquires a credible access bar code, performs clock synchronization with the credible bar code management platform, and plays the credible access bar code according to a preset playing progress;
s4: the credible code scanning terminal carries out snapshot and analysis on the played credible access bar code, uploads snapshot data and an analysis result to the access management platform for verification, and executes corresponding actions according to the equipment attribute of the credible code scanning terminal after the verification is successful, wherein the actions specifically comprise the following steps: if the trusted bar code scanning terminal is an access control device, executing a door opening action; the credible bar code scanning terminal is used for controlling and executing actions of calling an elevator and selecting a floor by an elevator control device.
As shown in fig. 2, the detailed implementation process of the entry and exit of the highlighted code includes the following steps:
s231: the user opens an access application and selects an access function; when the access function is selected, the user can be required to perform identity authentication, and the identity authentication mode comprises the following steps: face recognition, fingerprint recognition, living body detection, testimony comparison, trusted identity (CTID) and other modes; and human identity verification, face verification and the like. The successful result of the identity authentication can be kept for a certain period of validity, the access function is requested in the validity period, the identity authentication is not needed, and otherwise, the identity authentication is required to be carried out again.
S232: the user selects a cell to be accessed, the access application generates an access function code, and requests an access management platform for a trusted door opening code.
S233: and the access management platform judges the access authority of the user to the cell, and the authority requirements comprise: the method has the access cell authority, and the access time and the access times also meet the authority requirements; and if the access management platform meets the authority requirement, the access management platform requests the trusted barcode management platform to generate a trusted door opening code and returns the trusted door opening code to the user application.
S234: and the user application acquires the credible door opening code, reads the platform time, sets the playing progress and starts playing. During the playing process, the validity period of the credible door opening code is detected, and if the validity period is exceeded, the credible door opening code is requested to be updated
S235: and the user displays the played credible opening code in front of the image acquisition module of the credible code scanning terminal.
S236: the trusted code scanning terminal carries out snapshot and analysis on the trusted access bar code played by the application of the mobile terminal, uploads snapshot data and an analysis result to the access management platform for verification, and executes corresponding actions according to the equipment attribute of the trusted code scanning terminal after the verification is successful.
S237: and (4) taking different actions according to the attribute of the credible code scanning terminal, if the credible code scanning terminal is an access control device, executing a door opening action, and if the credible code scanning terminal is an elevator control device, executing an elevator call and setting an access floor according to user information.
In this embodiment, as shown in fig. 3, step S236 specifically includes the following steps:
s2361: the trusted code scanning terminal carries out snapshot on the trusted opening code displayed on the mobile terminal according to default snapshot parameters;
s2362: the trusted code scanning terminal processes the captured picture, for example: and performing image operations such as image enhancement, selection, cutting, positioning, quality judgment and the like to form a group of snapshot data. The trusted code scanning terminal searches, positions and analyzes the access function codes in the snapshot picture. Analyzing the access function code to obtain bar code data; if the access function code cannot be successfully analyzed, the access flow is exited and an error is reported.
S2363: processing the bar code data according to the platform setting and the generation principle of the in-out function code;
s2364: decrypting the analyzed bar code data to obtain cell data, time, user data, equipment ID and other data; and comparing the cell data set by the credible code scanning terminal with the cell data analyzed from the bar code.
S2364': and reading data bound with the data from the platform by using the bar code data, and comparing the cell data set by the credible code scanning terminal with the cell data in the platform read data.
S2365: the credible code scanning terminal is set according to the attribute of the terminal, and the cell data comparison modes are different. The method specifically comprises the following steps: when the credible code scanning terminal is set as a gate entrance guard, only the mechanism address in the access address needs to be compared. When the trusted code scanning terminal is set as a unit entrance guard, the 'organization address', 'building' and 'unit' in the access address need to be compared. When the credible code scanning terminal is set to be used for controlling the elevator, the 'organization address', 'building' and 'unit' in the access address need to be compared, and the 'floor' data in the access address is read to carry out elevator calling and floor setting. If the comparison result does not match, the exit and entry process is exited and an error is reported.
S2366: the credible code scanning terminal uploads the analyzed bar code data and the snapshot content to the access management platform and initiates a credible door opening code verification request. And the access management platform initiates a trusted bar code verification request to the trusted bar code management platform.
S2367: the trusted barcode management platform returns the verification result to the access management platform, and the access management platform returns the verification result to the mobile terminal application and the trusted barcode scanning terminal.
In this embodiment, as shown in fig. 4, the code scanning access specifically includes the following steps:
s241: and opening the application on the mobile terminal, and selecting a code scanning function.
S242: the application on the mobile terminal carries out snapshot on the credible opening code displayed on the credible bar code display terminal according to the default snapshot parameters; the application processes the captured picture, for example: and performing image operations such as image enhancement, selection, cutting, positioning, quality judgment and the like to form a group of snapshot data.
S243: and the application on the mobile terminal searches, positions and analyzes the access function codes in the snapshot picture. And analyzing the access function code to obtain access function code data. If the access function code cannot be successfully analyzed, exiting the access flow and reporting an error; and transmitting the user information of the application, the analyzed access function code data and the captured picture set to an access management platform, and requesting the platform to verify and execute actions.
S244: the access management platform decrypts the received access function code so as to obtain cell data, time, equipment ID and other data of the trusted bar code display terminal; the access management platform processes the received user information and reads an access address of a corresponding user; and judging whether the access address of the trusted bar code display terminal is in the cell data of the user information or not, wherein the access time and the access times meet the authority requirements.
S245: and the access management platform sends the access function code data and the uploaded snap-shot picture set to the trusted barcode management platform, and initiates a trusted barcode verification request to the trusted barcode management platform.
S246: and the trusted bar code management platform returns the verification result to the access management platform.
S247: and the access management platform returns the verification result to the mobile terminal and the credible bar code display terminal.
S248: and the execution action takes different actions according to the attribute of the trusted barcode display terminal. If the trusted bar code display terminal is an access control device, executing a door opening action; and if the credible bar code display terminal is an elevator control device, executing an elevator call and setting an access floor according to the user information.
In this embodiment, as shown in fig. 5, the method further includes a visitor request, and the specific flow is as follows:
s261: if the visitor does not have an account for entering and exiting the management platform, account registration is first required. The visitor needs to register an account number on the application and enter visitor information, and the visitor information is entered according to user data definition. The first registered user needs to perform real-name authentication and to authenticate the mobile phone number. The real-name authentication method comprises the following steps: comparing the testimony of a witness, authenticating the face of a person and authenticating short messages. The authentication mode for authenticating the mobile phone number comprises the following steps: the phone number authentication, the short message authentication and other modes.
S262: the visitor submits an access request to a standing user of a designated organization, and the request can be submitted in an instant chat tool, a mobile phone short message and other modes; a persistent user of an organization refers to the attribute of the organization's address being "persistent" in the user data definition.
S263: the standing user receives the access request information of the visitor on the application and grants the visitor access; and if the standing user does not agree with the access request of the visitor, ending the visitor request flow.
S264: the resident requests visitor access requests from the access management platform, and sets access permissions such as time, times and the like for the visitor access.
S265: the access management platform generates access rights for the visitor to the designated institution.
S266: when the visitor enters the specified mechanism, the visitor selects an access function (code scanning and code lighting) on the application, and then the trusted code scanning terminal and the trusted bar code display terminal can be operated to execute corresponding actions.
As shown in fig. 6, the method further includes a guest invitation process, which includes the following specific procedures:
s271: the user applies for inviting visitors to the access management platform, and the visitors must be users who are successfully registered on the access management platform and are subjected to real-name authentication.
S272: and the user sets visitor access authority and sets visitor access time and access times.
S273: and the third-party living service platforms such as the community/park management platform are docked to the access management platform, and access authority is generated for the visitor according to the setting of the user.
S274: the user sends invitation to the visitor, and the invitation sends in-station information, instant chat tools, mobile phone short messages and the like which can pass through the access management platform.
S275: when the visitor enters the specified mechanism, the visitor selects an access function (code scanning and code lighting) on the application, and then the trusted code scanning terminal and the trusted bar code display terminal can be operated to execute corresponding actions.
Example two:
in order to implement the method of the first embodiment, the present embodiment provides an access management device based on a trusted barcode, including a trusted barcode scanning terminal, a trusted barcode display terminal, and a mobile terminal; the credible code scanning terminal is used for setting cell data, terminal names, position information and equipment IDs, snapshotting and analyzing credible access bar codes displayed on the mobile terminal, and controlling access equipment to execute actions according to information issued by the access management platform; the credible bar code display terminal is used for setting parameters of the credible bar code display terminal, generating an access function code and playing and displaying a credible access bar code; the mobile terminal is used for the user to finish identity authentication and access business through application.
The following specifically explains the workflow of each terminal device in detail:
1. credible code scanning terminal. The trusted code scanning terminal can set cell data, and specify a terminal name, location information, and a device ID.
As shown in fig. 3, the trusted code scanning terminal has the following working flow:
s2361: and the credible code scanning terminal snapshottes the credible door opening code displayed on the mobile terminal according to the default snapshotting parameters.
S2362: the trusted code scanning terminal processes the captured picture, for example: and performing image operations such as image enhancement, selection, cutting, positioning, quality judgment and the like to form a group of snapshot data. The trusted code scanning terminal searches, positions and analyzes the access function codes in the snapshot picture. And analyzing the in-out function code to obtain bar code data. If the access function code cannot be successfully analyzed, the access flow is exited and an error is reported.
S2363: and processing the bar code data according to the platform setting and the generation principle of the access function code.
S2364: and decrypting the analyzed bar code data to obtain cell data, time, user data, equipment ID and other data, and comparing the cell data set by the credible code scanning terminal with the cell data analyzed from the bar code.
S2364': and reading data bound with the bar code data from the platform by using the bar code data, and comparing the cell data set by the credible code scanning terminal with the cell data in the platform read data.
S2365: the credible code scanning terminal is set according to the attribute of the terminal, and the cell data comparison modes are different. The method specifically comprises the following steps: when the trusted code scanning terminal is set as a gate entrance guard, only the mechanism address in the access address needs to be compared. When the trusted code scanning terminal is set as a unit entrance guard, the 'organization address', 'building' and 'unit' in the access address need to be compared. When the credible code scanning terminal is set to be used for controlling the elevator, the 'mechanism address', 'building' and 'unit' in the access address need to be compared, and the 'floor' data in the access address is read to carry out elevator calling and floor setting. If the comparison result does not match, the exit and entry process is exited and an error is reported.
S2366: the credible code scanning terminal uploads the analyzed bar code data and the snapshot content to the access management platform and initiates a credible door opening code verification request. And the access management platform initiates a trusted bar code verification request to the trusted bar code management platform.
S2367: the trusted barcode management platform returns the verification result to the access management platform, and the access management platform returns the verification result to the mobile terminal application and the trusted barcode scanning terminal.
2. And a trusted bar code display terminal. The trusted bar code display terminal is used for setting parameters of the trusted bar code display terminal, and the parameters comprise: cell data, terminal name, location information, device ID, etc.
The specific working process is as follows:
generating an access function code: the credible bar code display terminal combines the cell data, time and equipment ID in the parameters of the credible bar code display terminal according to a certain form and encrypts the cell data, the time and the equipment ID to generate an in-out function code.
Requesting generation of a trusted open code: the trusted bar code display terminal sends the access function code to the access management platform to request generation of a trusted door opening code, and the access management platform requests the trusted bar code management platform to generate the trusted door opening code.
And returning an authentic door opening code: and returning the generated or updated credible door opening code to the credible bar code display terminal.
Setting the playing progress, playing: the trusted bar code display terminal sets the playing progress and starts to play the trusted door opening code.
And (3) expiration of the trusted door opening code: in the playing process, the trusted bar code display terminal checks whether the trusted door opening code is expired, and if the trusted door opening code is expired, the trusted door opening code is requested to be updated.
In this embodiment, the technical solution of the present invention is specifically explained with reference to the method of the first embodiment, and with reference to an application scenario of temporary access right management driven by orders for take-out delivery and residents and an access management scenario of a campus/office building.
The takeaway delivery management process comprises the following steps:
1. and (6) butting the platforms.
The takeout platform is docked with the access management platform, the access management platform can be embedded into the takeout platform, and the takeout platform can be used for taking a take-out order through the access management platform.
The takeaway platform registers to the access management platform, applies for operation authority, and the authorized takeaway platform can call an access management platform interface to realize information query, generate a credible opening code, check the credible opening code and other functions. The take-away platform needs to ensure that the identity of the server on its platform is authentic.
2. The take-out order forms a temporary access right.
(1) The user places an order to the take-away platform. When ordering, the user inputs the basic information such as delivery address, contact person, contact telephone and the like; the user selects a delivery mode, and the delivery mode comprises the following steps: delivering goods to the door, delivering goods to a logistics transfer station, delivering goods to a logistics cabinet, self-picking by users and the like,
(2) And (6) receiving orders. The take-out platform sends the order to the designated server, and the server takes the order
(3) And querying access authority. And the takeout platform inquires the access authority of the order-placing user from the access management platform. And inquiring the access authority of the ordering user at the specified mechanism on the access management platform by using the information of the delivery address, the contact person, the contact phone and the like of the user.
(4) Visitor offer (server). When the order placing user has the access right of a designated mechanism, the takeout platform requests the access management platform to send visitor invitation to the server, and sets the access right, the access time and the access times of the server.
(5) And issuing a credible door opening code. The access management platform sends the trusted opening code to the takeaway platform, and the takeaway platform sends a notice to the takeaway delivery application of the server and sends the trusted opening code to the takeaway delivery application of the server.
3. The server dispatches the take-out.
(1) Displaying a credible door opening code:
and reading the issued credible opening code on the takeaway delivery application of the server, reading the time of the credible bar code management platform, setting the playing progress, and starting to play the credible opening code.
And in the playing process, detecting the validity period of the credible door opening code, and if the validity period is exceeded, requesting to update the credible door opening code.
(2) Scanning the code in and out: the trusted code scanning terminal scans and analyzes the code and verifies the trusted door opening code; if the verification is successful, performing actions including: open the door, call the elevator and set the floor, etc.
The residence management process specifically comprises the following steps:
1. and (4) docking the platform and registering the residents. The residential reservation platform is in butt joint with the access management platform, the residential reservation platform registers to the access management platform, applies for operation permission, and the authorized residential reservation platform can call an access management platform interface to realize information inquiry, generate a trusted door opening code, verify the trusted door opening code and other functions.
The verified legal owner can set the house as a residential home on the access management platform, and the setting needs the auditor of the manager to be effective, such as property. Only the lawfully registered residents can use the functions of the entrance and exit management platform. The civil reservation platform must ensure the identity of passengers on the platform to be real.
2. The resident orders form temporary access rights. The method specifically comprises the following steps:
(1) Order placing
And the passenger selects the lodging on the lodging reservation platform and places an order. The information filled by passengers on the residential reservation platform needs to contain user information needed by the access management platform.
(2) Residential registration query
And the lodging reservation platform inquires whether the lodging selected by the passenger is legally registered on the access management platform or not from the access management platform.
(3) Guest invitations (passengers). The residential reservation platform requests the access management platform to send visitor invitation to the passenger, and sets the access authority and the access time of the passenger.
(4) Issue a trusted door opening code
And the access management platform sends the credible opening code to the residential reservation platform. And the lodging reservation platform sends a notice to the lodging application of the passenger and sends the credible opening code to the lodging application of the passenger.
3. The passenger check-in process comprises the following steps:
(1) Displaying credible door opening code
The passenger's resident application reads the credible door opening code issued, reads the time of going in and out of the management platform, sets the playing progress, and starts playing the credible door opening code.
And in the playing process, detecting the validity period of the trusted door opening code, and if the validity period is exceeded, requesting to update the trusted door opening code.
(2) Access code scanning device
And scanning the code by the credible code scanning terminal, analyzing and verifying the credible door opening code. If the verification is successful, performing actions including: open the door, call the elevator and set the floor, etc.
As shown in fig. 7, this embodiment further explains the process of managing entrance and exit of a campus/office building, and the drawing is focused on explaining the business relationships of property of the campus, enterprises in the campus, and residents in the campus, omitting platforms for docking such as trusted barcode management platforms, and also omitting trusted barcode scanning terminals and trusted barcode display terminals. In the process of park/office building entrance and exit management:
1. and (5) property management.
The property adds enterprises and sets cell data of the enterprises, and the property sets a system manager for the enterprises, and the system manager can add enterprise managers and enterprise employees.
2. Enterprise
Adding employees by the enterprise, wherein the employees need to fill data which needs to be filled in the user data, and automatically copying the cell data of the enterprise into the cell data of the enterprise after the employees are successfully added. If the employee does not have an account on the park entry and exit management platform, an account is automatically generated for the employee, but before the employee performs identity authentication and phone verification, the account is in an inactivated state.
3. Visitor reception terminal
(1) The visitor requests access from the staff of the enterprise and agrees with the access;
(2) The visitor shows the credible door opening code in the playing to the visitor reception terminal at the enterprise;
(3) The visitor reception terminal analyzes and verifies the credible door opening code and extracts enterprise employees who agree with visitor access;
(4) And displaying the enterprise staff on the visitor reception terminal so as to guide the visitor to complete the visit conveniently.
Example three:
in this embodiment, as shown in fig. 8, an access management system based on a trusted barcode is provided, which includes an access management platform, a life service platform, a trusted barcode management platform, an identity authentication platform, a mobile terminal application, a trusted barcode display terminal, and a trusted barcode scanning terminal application; the access management platform is respectively connected with the trusted barcode management platform, the life service platform, the identity authentication platform, the mobile terminal application, the trusted barcode display terminal and the trusted code scanning terminal application, and provides uniform basic access business service for users; the identity authentication platform is used for providing identity authentication for the user; the life service platform is used for being in butt joint with the third-party service platform and providing third-party service order management for the user; the mobile terminal application is used for providing the user with the service of completing identity authentication and access; the credible code scanning terminal is used for setting cell data, terminal name, position information and equipment ID by a user, snapshotting and analyzing a credible access bar code displayed on the mobile terminal, and controlling access equipment to execute actions according to information issued by the access management platform; the credible bar code display terminal is used for setting parameters of the credible bar code display terminal, generating an access function code and playing and displaying a credible access bar code.
Wherein, the gate, the unit door and the elevator control of the community are all provided with devices which can read the credible bar code or can display the credible bar code. These devices can perform operations of controlling access, calling an elevator, setting a floor, and the like.
And the mobile terminal application enables a user to use the mobile terminal.
The credible bar code is the key that the whole system can run, and through the credible bar code played on the mobile terminal application, the mobile terminal application becomes a virtual key, and in the user authority range, the entrance guard of the residential area/garden can be accessed, and the elevator of the residential area/garden is used.
The access management platform is a user management and basic capability providing platform, is connected with a trusted bar code management platform, a life service platform and an identity authentication platform, integrates the capabilities of the platforms and provides uniform basic capability for users.
The access management platform provides basic capability for the users uniformly, all the users are brought into the management of the access management platform, and the management is simpler and more convenient.
The identity authentication platform is a third-party platform and provides identity authentication capability, and the identity authentication mode comprises the following steps: the functions of human authentication, human face authentication, local number authentication and the like. The method can authenticate the user, the visitor, the identity document and the mobile phone number, and ensure that the mobile phone holder is the user or the visitor.
The life service platform is a third-party platform, and can bring life service providers into unified management in an order form through the butt joint with the access management platform.
The relevant data in this embodiment are defined as follows:
user data definition:
the cell data may include multiple pieces of cell data, which indicates that the user may have access rights to multiple cells, may be multiple permanent cells, or may have multiple temporary cells, and the data of the temporary cells is invalid after the access time or times are exhausted.
The user name is set by the user, and if the user is accessed through a third-party application such as an applet and a public number, the user name of the third-party application can be used.
A credential type, selecting a credential type, comprising: identification cards, passports, etc. Name, user real name. The certificate number, the serial number real name authentication of certificate, user's identity is authenticated, and the authentication mode includes: comparing the testimony of a witness, authenticating the face of a person and authenticating short messages. The user calls the telephone number commonly used by the user.
The telephone authentication, the user common number needs to pass the authentication, and the authentication mode comprises the following steps: the number authentication of the phone, the short message authentication and other modes.
The association application is a third party portal application bearing the access application, such as WeChat, payment treasure and the like, and forms a corresponding relation between accounts and the third party application.
And if the account is generated in a batch import mode, the account is in an inactivated state before telephone authentication and real-name authentication are not performed.
Cell data definition: the access address defines a specific address to be visited by the user, and by setting the access address, the access authority is defined.
An attribute defining whether the room is a user's standing or temporary visit. And the access time limits the access time, and if the access time is constant, the attribute is ignored. The number of accesses, which is limited to the number of accesses within a specified time, may be a single, multiple, or unlimited number, and if so, the attribute is ignored. The access address defines specific information. The organization address comprises province, city, county/district, street/county, community/village and organization name. The institution type may be a community, campus, hotel, etc. A building, defining a visited building. The unit defines the unit of access. Floor, defining the floor of access. House number, defining the house visited.
An access function code: the access function code is formed by combining and encrypting cell data, time, user data and equipment ID in a certain form, and the access function code is not repeatable in the system.
After the code scanning terminal or the application analyzes the access function code, the data is decrypted, and cell data, time, user data, equipment ID and other data can be obtained.
The generation of the access function code in the mobile terminal application comprises the combination and encryption of cell data, time and user data.
The access function code is generated in the credible bar code display terminal and is formed by combining and encrypting cell data, time and equipment ID.
The access function code can also be a section of random character string, the character string is not repeatable in the system, the character string is bound with corresponding data formed by combining cell data, time, user data and equipment ID on the access management platform, and after the code scanning terminal or the application analyzes the access function code, the inquiry can be carried out on the cell/park management platform to obtain the data such as the cell data, the time, the user data and the equipment ID. The definition and format of the access function code are set by the platform.
The clocks are synchronized. As shown in fig. 9, the whole system uses the time of the trusted barcode management platform as a reference, and the access management platform, the trusted barcode display terminal, and the trusted barcode scanning terminal need to perform clock synchronization to the trusted barcode management platform at regular time.
When related services are called, the time of reading the trusted barcode management platform is used as the reference time of service execution.
The trusted barcode management platform should ensure the accuracy of its own time in a proper manner, such as synchronizing to a reference time server.
The foregoing shows and describes the general principles, essential features, and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, which are described in the specification and illustrated only to illustrate the principle of the present invention, but that various changes and modifications may be made therein without departing from the spirit and scope of the present invention, which fall within the scope of the invention as claimed. The scope of the invention is defined by the appended claims and equivalents thereof.
Claims (7)
1. An access management method based on a credible bar code is characterized by comprising bright code access, code scanning access and life service platform access; the bright code access comprises the following steps:
s1: the user carries out identity authentication through the application of the mobile terminal, selects a target place and requests a credible in-and-out bar code within a preset validity period after the authentication is successful; the target sites comprise districts and parks/office buildings; the user service information comprises takeout order information and resident order information;
s2: the access management platform judges whether the user meets the access authority requirement or not according to the request, if so, the access management platform requests the trusted barcode management platform to generate a trusted access barcode and returns the trusted access barcode to the mobile terminal for application;
s3: the mobile terminal application acquires a credible access bar code, performs clock synchronization with the credible bar code management platform, and plays the credible access bar code according to a preset playing progress;
s4: the credible code scanning terminal carries out snapshot and analysis on the credible access bar code played, uploads snapshot data and an analysis result to an access management platform for verification, and executes corresponding actions according to the equipment attribute of the credible code scanning terminal after the verification is successful, wherein the actions are as follows: if the trusted bar code scanning terminal is an access control device, executing a door opening action; the credible bar code scanning terminal is used for controlling and executing the actions of calling the elevator and selecting the floor by the elevator control equipment;
the step S4 specifically includes the following substeps:
s401: the credible code scanning terminal carries out snapshot on the credible access code displayed on the mobile terminal according to the default snapshot parameters;
s402: the credible code scanning terminal carries out image enhancement, selection, cutting, positioning and quality judgment operation processing on the captured picture to form a group of captured data related to credible access codes; the trusted code scanning terminal searches, positions and analyzes the access function code in the snapshot data to obtain bar code data; if the in-out function code cannot be successfully analyzed, the in-out flow is exited, and an error is reported;
s403: decrypting the analyzed bar code data to obtain target location data, and comparing the target location data set by the credible code scanning terminal with the analyzed target location data in the bar code; if the comparison result is not matched, exiting the access flow and reporting errors;
s404: after the comparison is passed, the credible code scanning terminal uploads the analyzed bar code data and the snapshot content to the access management platform and initiates a credible door opening code verification request; the access management platform initiates a trusted bar code verification request to the trusted bar code management platform;
s405: the trusted barcode management platform returns the verification result to the access management platform, the access management platform returns the verification result to the mobile terminal application and the trusted code scanning terminal, and after verification is successful, corresponding actions are executed according to the equipment attribute of the trusted code scanning terminal, specifically: if the trusted barcode scanning terminal is an access control device, executing a door opening action; the credible bar code scanning terminal is used for controlling and executing the actions of calling the elevator and selecting the floor by the elevator control equipment;
the code scanning access specifically comprises the following steps:
step A: a user snapshottes the trusted bar code displayed on the trusted bar code display terminal through the mobile terminal application according to default snapshotting parameters, and performs image enhancement, selection, cutting, positioning and quality judgment operations on the snapshotted picture to form a group of snapshotting data; searching, positioning and analyzing the access function code of the snapshot data through the application of the mobile terminal to obtain bar code data; uploading user information, snapshot data and access function code bar code data in the mobile terminal application to an access management platform for verification;
and B, step B: the access management platform decrypts the received access function code to obtain cell data, time and equipment ID of the credible bar code display terminal, wherein the cell data comprises an access address, user attributes, access time and access times; the access management platform analyzes the received user information, reads an access address of a corresponding user, performs data matching judgment on the access address of the trusted barcode display terminal and cell data in the user information, judges whether the access time and the access times in the user information accord with the access time and the access times set by the access management platform if the access address of the trusted barcode display terminal and the cell data in the user information exist, and performs trusted barcode verification if the access time and the access times accord with the access time and the access times set by the access management platform;
and C: the access management platform sends the access function code data and the uploaded snap-shot picture set to the trusted barcode management platform, and initiates a trusted barcode verification request to the trusted barcode management platform; the trusted barcode management platform returns the verification result to the access management platform, the access management platform distributes the verification result to the mobile terminal application and the trusted barcode display terminal, and controls the terminal equipment to execute corresponding actions according to the attribute of the trusted barcode display terminal equipment, and the method specifically comprises the following steps: if the trusted bar code display terminal equipment is the access control equipment, executing door opening action; the credible bar code display terminal device is an elevator control device for controlling the elevator to execute the actions of calling the elevator and selecting floors.
2. The access management method based on the trusted barcode according to claim 1, wherein the step S1 specifically comprises: the user opens an access application on the mobile terminal to perform identity authentication, wherein the identity authentication mode comprises face identification, fingerprint identification, living body detection, testimony comparison and CTID credible identity authentication; after the identity authentication is successful, the user selects a target place to be accessed within a preset validity period, the access application generates an access function code after data encryption is carried out according to user authentication information and target place information, and submits an access request to an access management platform to request a credible access bar code; the life service platform is in butt joint with the access management platform, an access management platform interface is called to inquire user service information, and a credible access bar code is requested according to the user service information obtained by inquiry; the target sites comprise districts and parks/office buildings; the user service information includes take-away order information and residential order information.
3. The trusted barcode based access management method of claim 1, further comprising a visitor invitation and a visitor request, wherein the visitor request process comprises the following steps:
s261: if the visitor does not have an account for entering and exiting the management platform, account registration is needed firstly; a visitor registers an account number on an application, inputs visitor information and carries out real-name authentication; the visitor information is input according to a user data definition format;
s262: the visitor submits an access request to a permanent user of a specified mechanism;
s263: the standing user receives the access request information of the visitor on the application of the mobile terminal and grants the visitor access; if the permanent user does not agree with the access request of the visitor, ending the visitor request flow;
s264: the resident requests visitor access requests from the access management platform, and sets access authority for the visitor access, including access times and access time periods;
s265: the access management platform generates an access authority of a designated mechanism for the visitor;
s266: and when the visitor enters the specified mechanism, the visitor selects an access function in the application to operate the trusted code scanning terminal and the trusted bar code display terminal and execute corresponding actions.
4. The trusted barcode-based access management method of claim 3, wherein the visitor invitation process comprises the steps of:
s271: a user applies for inviting visitors to an access management platform; the visitor must be a user who has successfully registered on the access management platform and has completed real-name authentication;
s272: a user sets visitor access permission, including setting visitor access time and visitor access times;
s273: the target place manager is connected with the access management platform through the life service platform and generates access authority for the visitor according to the setting of the user,
s274: a user sends an invitation to a visitor, and the invitation sends in-station information which can pass through an access management platform;
s275: and when the visitor enters the specified mechanism, the visitor selects an access function in the application to operate the trusted code scanning terminal and the trusted bar code display terminal and execute corresponding actions.
5. The access management method based on the trusted barcode as claimed in claim 1, wherein the access of the life service platform specifically comprises the following steps:
the method comprises the following steps: a life service platform of a third party is in data butt joint with the access management platform, and is registered in the access management platform to apply for operation permission;
step two: a user submits an order in a life service platform;
step three: the living service platform assigns the order to a designated server, and the server receives the order;
step four: the living service platform inquires the access authority of the order-placing user from the access management platform, and inquires the access authority of the order-placing user in a specified mechanism on the access management platform by using user information; when the ordering user has the access right of a designated mechanism, the living service platform requests the access management platform to send visitor invitation to a server, and sets the access right, access time and access times of the server;
step five: the entrance and exit management platform generates a credible door opening code, and the credible door opening code is issued to the mobile terminal of the server through the life service platform;
step six: the server shows the credible door opening code through the mobile terminal, and the credible code scanning terminal scans the code for analysis and verification of the credible door opening code, and executes corresponding actions according to the equipment attribute of the credible code scanning terminal after the verification is successful, and the method specifically comprises the following steps: if the trusted barcode scanning terminal is an access control device, executing a door opening action; the credible bar code scanning terminal is used for controlling and executing actions of calling an elevator and selecting a floor by an elevator control device.
6. An access management device based on a trusted barcode, which is used for realizing the access management method based on the trusted barcode in any one of claims 1 to 5, and is characterized by comprising a trusted code scanning terminal, a trusted barcode display terminal and a mobile terminal; the credible code scanning terminal is used for setting cell data, terminal names, position information and equipment IDs, snapshotting and analyzing credible access bar codes displayed on the mobile terminal, and controlling access equipment to execute actions according to information issued by the access management platform; the credible bar code display terminal is used for setting parameters of the credible bar code display terminal, generating an access function code, playing and displaying a credible access bar code and controlling access equipment to execute actions according to information issued by the access management platform; the mobile terminal is used for the user to complete identity authentication and access business through application.
7. An access management system based on a trusted barcode is used for realizing the access management method based on the trusted barcode in any one of claims 1 to 5, and is characterized by comprising an access management platform, a living service platform, a trusted barcode management platform, an identity authentication platform, a mobile terminal application, a trusted barcode display terminal and a trusted barcode scanning terminal application; the access management platform is respectively connected with the trusted barcode management platform, the life service platform, the identity authentication platform, the mobile terminal application, the trusted barcode display terminal and the trusted code scanning terminal application, and provides uniform basic access business service for users; the identity authentication platform is used for providing identity authentication for a user, and the identity authentication mode comprises face recognition, fingerprint recognition, living body detection, personal authentication comparison and CTID trusted identity authentication; the life service platform is used for being in butt joint with the third-party service platform and providing third-party service order management for the user; the mobile terminal application is used for providing identity authentication and access service for the user; the credible code scanning terminal is used for setting cell data, terminal name, position information and equipment ID by a user, snapshotting and analyzing a credible access bar code displayed on the mobile terminal, and controlling access equipment to execute actions according to information issued by the access management platform; the credible bar code display terminal is used for setting parameters of the credible bar code display terminal, generating an access function code, playing and displaying a credible access bar code, and controlling access equipment to execute actions according to information issued by the access management platform.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210778239.6A CN114863597B (en) | 2022-07-04 | 2022-07-04 | Access management method, system and device based on trusted bar code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210778239.6A CN114863597B (en) | 2022-07-04 | 2022-07-04 | Access management method, system and device based on trusted bar code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114863597A CN114863597A (en) | 2022-08-05 |
CN114863597B true CN114863597B (en) | 2022-10-11 |
Family
ID=82626419
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210778239.6A Active CN114863597B (en) | 2022-07-04 | 2022-07-04 | Access management method, system and device based on trusted bar code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114863597B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116820183B (en) * | 2023-08-31 | 2023-12-08 | 泉州昆泰芯微电子科技有限公司 | Knob with rotary feedback sense and electric appliance |
CN118637441B (en) * | 2024-08-16 | 2024-10-29 | 湖州精进机械有限公司 | Elevator access control method and system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103544746A (en) * | 2012-07-08 | 2014-01-29 | 上海博路信息技术有限公司 | Electronic access control system of dynamic bar code |
CN104065999A (en) * | 2014-06-11 | 2014-09-24 | 四川政企网络信息服务有限公司 | Image processing assembly and method capable of achieving image rotation |
CN109003378A (en) * | 2018-09-18 | 2018-12-14 | 安徽灵图壹智能科技有限公司 | A kind of cell Courier Service block chain security system and method |
CN109523663A (en) * | 2018-10-23 | 2019-03-26 | 姜东明 | Gate open method and system |
CN110766354A (en) * | 2019-09-10 | 2020-02-07 | 恒大智慧科技有限公司 | Takeaway rapid distribution method, system and storage medium based on intelligent community |
CN111199601A (en) * | 2019-09-02 | 2020-05-26 | 腾讯科技(深圳)有限公司 | Access control method and device, intelligent terminal, server and storage medium |
CN114581036A (en) * | 2022-01-25 | 2022-06-03 | 广东悦舜物业服务有限公司 | Property management method and terminal based on artificial intelligence |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9367841B2 (en) * | 2011-07-18 | 2016-06-14 | Tiger T G Zhou | Facilitating mobile device payments using product code scanning |
US10607431B2 (en) * | 2014-08-15 | 2020-03-31 | Collateral Opportunities, Llc | Electronic identification, location tracking, communication and notification system with beacon clustering |
CN106899570B (en) * | 2016-12-14 | 2019-11-05 | 阿里巴巴集团控股有限公司 | The processing method of two dimensional code, apparatus and system |
CA3080097A1 (en) * | 2019-05-07 | 2020-11-07 | Jonathan Aaron Harwell | Managing and controlling access to secured areas |
CN111815833A (en) * | 2020-08-06 | 2020-10-23 | 中国人民武装警察部队工程大学 | Hotel access control authentication system based on intelligent identification and encryption technology |
-
2022
- 2022-07-04 CN CN202210778239.6A patent/CN114863597B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103544746A (en) * | 2012-07-08 | 2014-01-29 | 上海博路信息技术有限公司 | Electronic access control system of dynamic bar code |
CN104065999A (en) * | 2014-06-11 | 2014-09-24 | 四川政企网络信息服务有限公司 | Image processing assembly and method capable of achieving image rotation |
CN109003378A (en) * | 2018-09-18 | 2018-12-14 | 安徽灵图壹智能科技有限公司 | A kind of cell Courier Service block chain security system and method |
CN109523663A (en) * | 2018-10-23 | 2019-03-26 | 姜东明 | Gate open method and system |
CN111199601A (en) * | 2019-09-02 | 2020-05-26 | 腾讯科技(深圳)有限公司 | Access control method and device, intelligent terminal, server and storage medium |
CN110766354A (en) * | 2019-09-10 | 2020-02-07 | 恒大智慧科技有限公司 | Takeaway rapid distribution method, system and storage medium based on intelligent community |
CN114581036A (en) * | 2022-01-25 | 2022-06-03 | 广东悦舜物业服务有限公司 | Property management method and terminal based on artificial intelligence |
Also Published As
Publication number | Publication date |
---|---|
CN114863597A (en) | 2022-08-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10026248B2 (en) | Integrated real estate showing scheduling and key management system | |
CN103248484B (en) | Access control system and method | |
CN114863597B (en) | Access management method, system and device based on trusted bar code | |
CN106803295A (en) | Gate inhibition's authentication control method and system based on Quick Response Code | |
JP7108873B2 (en) | Face authentication management server and face authentication management method | |
CN112466026A (en) | Digital visitor system and management method thereof | |
CN110570559A (en) | Electronic key sharing method in access control system based on mobile terminal | |
KR100422377B1 (en) | System and method for maintenance of public security and exit and entrance control using bar code displayed liquid crystal display | |
US20110148576A1 (en) | Device, System and Method for Personnel Tracking and Authentication | |
CN112734248A (en) | Real estate intelligent management system | |
CN111784901A (en) | Cloud access control system based on cloud computing and mobile internet and implementation method | |
US12020525B2 (en) | Property management systems | |
CN109743322A (en) | Identity identifying method, identity authorization system | |
CA2674896C (en) | Method and system for protecting real estate from fraudulent title changes | |
US11599872B2 (en) | System and network for access control to real property using mobile identification credential | |
CN114038099B (en) | Access control authorization method, device, system, electronic equipment and storage medium | |
JP7450569B2 (en) | Visitor management system and visitor management method | |
JP4876210B2 (en) | Identifier authentication system | |
JP4876209B2 (en) | Identifier authentication system | |
JP2018123654A (en) | Key management method, key management program, and key management device | |
CN114862630B (en) | Trusted barcode-based networking contract management method and system | |
KR20230043452A (en) | Unmanned shared store part time scheduled access management method and system thereof | |
CN112735004A (en) | Virtual key distribution method, server and distribution system | |
JP2008217664A (en) | Collaboration support device, system, method and program | |
JP2008242591A (en) | Electronic voting system, election management server terminal, electronic voting method, program and recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |