CN115085911B - Security enhancement method and system based on entrance guard - Google Patents
Security enhancement method and system based on entrance guard Download PDFInfo
- Publication number
- CN115085911B CN115085911B CN202210527673.7A CN202210527673A CN115085911B CN 115085911 B CN115085911 B CN 115085911B CN 202210527673 A CN202210527673 A CN 202210527673A CN 115085911 B CN115085911 B CN 115085911B
- Authority
- CN
- China
- Prior art keywords
- access control
- mobile terminal
- key
- information
- card reader
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 238000004891 communication Methods 0.000 claims abstract description 35
- 239000000284 extract Substances 0.000 claims abstract description 10
- 238000012795 verification Methods 0.000 claims description 19
- 230000006978 adaptation Effects 0.000 claims description 13
- 238000013459 approach Methods 0.000 claims description 5
- 238000009795 derivation Methods 0.000 claims description 4
- 230000001360 synchronised effect Effects 0.000 abstract description 49
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000004080 punching Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/23—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention provides a security enhancement method and a security enhancement system based on an access control, wherein the method comprises the following steps that an access control card reading device extracts a derivative key from n local derivative keys according to a synchronous key pointer as a first real-time unlocking key, generates a random number, encrypts the random number by the first real-time unlocking key to obtain ciphertext information, sends the ciphertext information to an access control APP of a mobile terminal through an NFC communication link, the access control APP extracts the derivative key from n derivative keys in a card application according to the synchronous key pointer as a second real-time unlocking key, decrypts the ciphertext information by the second real-time unlocking key to obtain plaintext information and returns the plaintext information to the access control card reading device, and the access control card reading device compares whether the plaintext information is consistent with the random number or not, if so, continuously judges whether the corresponding seed key exceeds effective time or not, and if not, the access control APP is opened. The invention can effectively improve the portability of users and the safety of the access control system.
Description
Technical Field
The invention relates to the technical field of intelligent door locks, in particular to a security enhancement method and system based on an access control.
Background
The existing door control systems of resident communities or offices are various in variety, including simple card punching systems, namely users carry door cards with user identifications inside, the door cards are close to card readers when entering doors, if the door cards are authorized to be accessed, a background server sends information allowing access to the door control systems, the door control systems open doors provided with the card readers for the users to access, the method has the advantages that equipment is simple, the steps of entering the doors of the users are relatively simple, the defects are obvious, that if the door cards are lost, any person picking up the door cards can enter at will, and the method is a great challenge for resident and office safety.
Based on the above, it is proposed to copy information of the access control card by using a mobile phone and store the copied information in a mobile phone wallet in the form of a copy card, when the access control needs to be opened, the mobile phone performs NFC communication with an access control card reader, and if the copied information in the mobile phone wallet is authorized, the access control card reader opens the access control. In this way, although the user does not need to carry the door card, the security coefficient is not high because anyone can copy and acquire the door card information.
Disclosure of Invention
Based on the above, it is necessary to provide a security enhancement method and system based on access control, which not only can promote the portability of users, but also can effectively promote the security of access control systems.
The first aspect of the invention provides a security enhancement method based on access control, which comprises the following steps:
Step 1, downloading and installing an access control APP at a mobile terminal, registering registered user information to a cloud platform through the access control APP, and registering self equipment identification information to the cloud platform through access control card reading equipment;
step 2, establishing a binding relation between the user information and the equipment identification information by the cloud platform, generating an AID and a PIN code based on the binding relation, respectively transmitting the AID and the PIN code to an access control APP and an access control card reading device of the mobile terminal, generating a card application by the access control APP of the mobile terminal based on the received AID, and storing the PIN code in the card application;
step 3, generating a seed key by the cloud platform, setting the effective time of the seed key according to management requirements, and simultaneously, drawing up a synchronous key pointer;
step 4, the cloud platform sends the seed key, the effective time of the seed key and the synchronous key pointer to the entrance guard card reading equipment, and sends the seed key and the synchronous key pointer to a card application of the mobile terminal;
Step 5, the access control APP of the mobile terminal and the access control card reading equipment generate n derived keys based on the same seed key and the same key derivation algorithm respectively, and perform local storage;
Step 6, when the mobile terminal approaches the access control card reading equipment, the access control card reading equipment and the mobile terminal establish an NFC communication link based on the same AID and PIN code;
Step 7, the entrance guard card reading equipment extracts a derivative key from n derivative keys pre-stored locally according to the synchronous key pointer as a first real-time unlocking key, generates a random number, encrypts the random number by adopting the first real-time unlocking key to obtain ciphertext information, and then sends the ciphertext information to an entrance guard APP of the mobile terminal through the NFC communication link;
Step 8, the access control APP of the mobile terminal extracts a derivative key from n derivative keys in the card application according to the synchronous key pointer as a second real-time unlocking key, decrypts the ciphertext information by adopting the second real-time unlocking key to obtain plaintext information and returns the plaintext information to the access control card reading equipment through the NFC communication link;
and 9, comparing whether the plaintext information is consistent with the random number or not by the access control card reading equipment, if so, continuously judging whether the corresponding seed key exceeds the effective time, and if not, executing the operation of opening the access control.
The invention provides a security enhancement system based on an access control, which comprises a mobile terminal, an access control card reading device and a cloud platform, wherein the mobile terminal and the access control card reading device are respectively in network communication with the cloud platform, and the mobile terminal is in near-end communication with the access control card reading device;
the mobile terminal is used for downloading and installing an access control APP and registering user information to the cloud platform through the access control APP;
the cloud platform is used for establishing a binding relation between the user information and the equipment identification information of the access card reading equipment, generating an AID and a PIN code based on the binding relation, respectively sending the AID and the PIN code to an access control APP of the mobile terminal and the access card reading equipment, generating a card application based on the AID by the access control APP of the mobile terminal and storing the PIN code in the card application, generating a seed key, setting the effective time of the seed key according to management requirements, simultaneously drawing a synchronous key pointer, sending the seed key, the effective time of the seed key and the synchronous key pointer to the access card reading equipment, and sending the seed key and the synchronous key pointer to the card application of the mobile terminal, so that the access control APP of the mobile terminal and the access card reading equipment respectively generate n derivative keys based on the same seed key and the same key derivative algorithm, and locally storing the derivative keys;
The access control APP of the mobile terminal is used for extracting one derivative key from n derivative keys in the card application according to the synchronous key pointer to serve as a second real-time unlocking key, decrypting ciphertext information from the access control card reading equipment by adopting the second real-time unlocking key to obtain plaintext information, and returning the plaintext information to the access control card reading equipment through the NFC communication link;
The access control card reading device is used for registering self device identification information to the cloud platform, is also used for establishing an NFC communication link with the mobile terminal based on the same AID and PIN code when the mobile terminal is close to the cloud platform, is also used for extracting a derivative key from n local derivative keys according to the synchronous key pointer after establishing the NFC communication link as a first real-time unlocking key to generate a random number, encrypts the random number by the first real-time unlocking key to obtain ciphertext information, and then sends the ciphertext information to an access control APP of the mobile terminal through the NFC communication link, and is also used for comparing whether plaintext information from the mobile terminal is consistent with the random number or not, if so, continuing to judge whether the corresponding seed key exceeds the effective time, if not, executing access control opening operation.
According to the invention, the keys are synchronized between the mobile terminal and the access control card reading equipment based on the synchronous pointer mode, so that access control operation is performed based on the synchronized keys, and a user does not need to carry a traditional access control card in the whole operation process, so that the portability of the user is improved. In addition, the keys of access control operation are different in the similar time, and even if other people steal all the derivative keys, normal access control operation cannot be realized due to lack of synchronous pointers or asynchronous pointers, so that replay attack by other people through stealing the keys is effectively prevented, and the security of the access control system is further improved.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the invention will become apparent and may be better understood from the following description of embodiments taken in conjunction with the accompanying drawings in which:
FIG. 1 shows a flow chart of a door access based security enhancement method of the present invention;
Fig. 2 shows a block diagram of a door access based security enhancement system of the present invention.
Detailed Description
In order that the above-recited objects, features and advantages of the present application will be more clearly understood, a more particular description of the application will be rendered by reference to the appended drawings and appended detailed description. It should be noted that, without conflict, the embodiments of the present application and features in the embodiments may be combined with each other.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, but the present invention may be practiced in other ways than those described herein, and therefore the scope of the present invention is not limited to the specific embodiments disclosed below.
Example 1
As shown in fig. 1, the invention provides a security enhancement method based on entrance guard, which comprises the following steps:
Step 1, downloading and installing an access control APP at a mobile terminal, registering registered user information to a cloud platform through the access control APP, and registering self equipment identification information to the cloud platform through access control card reading equipment;
step 2, establishing a binding relation between the user information and the equipment identification information by the cloud platform, generating an AID and a PIN code based on the binding relation, respectively transmitting the AID and the PIN code to an access control APP and an access control card reading device of the mobile terminal, generating a card application by the access control APP of the mobile terminal based on the received AID, and storing the PIN code in the card application;
step 3, generating a seed key by the cloud platform, setting the effective time of the seed key according to management requirements, and simultaneously, drawing up a synchronous key pointer;
step 4, the cloud platform sends the seed key, the effective time of the seed key and the synchronous key pointer to the entrance guard card reading equipment, and sends the seed key and the synchronous key pointer to a card application of the mobile terminal;
Step 5, the access control APP of the mobile terminal and the access control card reading equipment generate n derived keys based on the same seed key and the same key derivation algorithm respectively, and perform local storage;
step 6, when the mobile terminal approaches the access control card reading equipment, the access control card reading equipment and the mobile terminal establish an NFC communication link based on the same AID and PIN code;
step 7, the entrance guard card reading equipment extracts a derivative key from the n local derivative keys according to the synchronous key pointer as a first real-time unlocking key, generates a random number, encrypts the random number by adopting the first real-time unlocking key to obtain ciphertext information, and then sends the ciphertext information to an entrance guard APP of the mobile terminal through the NFC communication link;
Step 8, the access control APP of the mobile terminal extracts one derivative key from n derivative keys in the card application according to the synchronous key pointer as a second real-time unlocking key, decrypts the ciphertext information by adopting the second real-time unlocking key, obtains plaintext information and returns the plaintext information to the access control card reading equipment;
and 9, comparing whether the received plaintext information is consistent with the random number (the random number generated in the step 7) by the access control card reading equipment, if so, continuously judging whether the corresponding seed key exceeds the effective time, and if not, executing the operation of opening the access control.
In general, when the entrance guard card reading equipment leaves a factory or delivers a customer, the equipment identification information of the entrance guard card reading equipment needs to be registered with the cloud platform, if the user needs to request to open the entrance guard, the user sends request information to the cloud platform, the request information at least comprises user information and the entrance guard card reading equipment identification information which needs to be opened, the cloud platform is used for checking later, and if the checking passes, the binding relation of the user information and the entrance guard card reading equipment is established.
It can be understood that in places such as hotels, guesthouses, apartments and the like, access rights for effective time are only required to be opened for users according to requirements, and the access rights are effective in a check-in period, so that the invention realizes the safety management of the access rights in a time dimension by setting the effective time of a seed key.
The cloud platform establishes a binding relation based on user information and equipment identification information and generates AID and PIN codes based on the binding relation, so that different user information and the same equipment identification information can establish a many-to-one binding relation, and under the condition that a plurality of users commonly manage and use the same access control card reading equipment, the cloud platform correspondingly generates effective time and synchronous key pointers of a plurality of groups of AID, PIN codes, seed keys and seed keys, sends each group of AID, PIN codes, seed keys and synchronous key pointers to an access control APP of a corresponding mobile terminal (corresponding to the user information), and sends a plurality of groups of AID, PIN codes, seed keys, effective time and synchronous key pointers of the seed keys to the same access control card reading equipment;
therefore, the invention can realize the safety management of the same access control among the access control APP of different mobile terminals by setting the binding relation between different user information and the same equipment identification information in many-to-one mode.
It can be understood that after the binding relation of many to one is established, multiple groups of access control management information, namely AID, PIN code, seed key, effective time of the seed key and synchronous key pointer, are prestored in the access control card reading equipment, the multiple groups of access control management information correspond to access control APPs of multiple mobile terminals, the seed key, the effective time of the seed key and the synchronous key pointer in the access control management information of different groups can be different, so that the access control APPs of different mobile terminals are not affected when the same access control is managed together.
Further, in the step 6, when the access control card reading device and the mobile terminal establish an NFC communication link based on the AID and the PIN code, the method is executed:
The access control card reading equipment generates adaptation request information based on the AID and transmits the adaptation request information to the mobile terminal, wherein the adaptation request information comprises the AID;
The mobile terminal traverses a local card packet to find a card application consistent with the AID in the adaptation request information;
After receiving a response message of the mobile terminal for finding a corresponding card application, the access control card reading device sends a PIN verification instruction to the mobile terminal, wherein the PIN verification instruction comprises a PIN code;
After the corresponding card application of the mobile terminal receives the PIN verification instruction, comparing whether the PIN code in the PIN verification instruction is consistent with a pre-stored PIN code, and if so, returning verification passing information.
It can be understood that the AID is an identification ID of the card application, and since a plurality of card applications may be stored in a card package of the mobile terminal, different card applications hold different AIDs, the mobile terminal is traversed to read the card application with the same AID based on the current access control card reading device, if the card application is read, the subsequent PIN code verification is continued, and if the card application is not read, the reading failure information is fed back.
It should be noted that when the entrance guard APP of different mobile terminals manages and uses the same entrance guard together, the AID and PIN code in the entrance guard management information of different groups are different;
Since the access card reading device may store a plurality of AIDs in advance, when the access card reading device generates the adaptation request information based on the AIDs, the access card reading device may obtain the required AIDs according to the following manner:
When the mobile terminal is close to the access control card reading equipment, the mobile terminal performs near field communication with the access control card reading equipment based on an NFC communication function, the access control card reading equipment reads equipment identification (or NFC identification) from the mobile terminal, and searches for corresponding AID based on a mapping relation between the pre-stored equipment identification (or NFC identification) of the mobile terminal and access control management information.
Further, after the step 9, the method further includes the steps of:
after the entrance guard card reading equipment sends entrance guard successfully-opened information to the mobile terminal, updating a local synchronous key pointer to the next pointer;
And after the mobile terminal receives the entrance guard successfully-opened information, updating a local synchronous key pointer to the next pointer so as to enable the synchronous key pointer updated by the entrance guard card reading equipment to be consistent with the synchronous key pointer updated by the mobile terminal.
It should be noted that when different access control APP of the mobile terminal are managing and using the same access control together, the synchronous key pointers in the access control management information of different groups may be different, so as to ensure that the synchronous key pointers in the access control management information corresponding to the access control APP and the access control card reading device of the same mobile terminal are consistent before updating and consistent after updating.
Furthermore, the synchronous key pointers are in a clock shape, the initial pointer positions of the mobile terminal and the entrance guard card reading equipment are the same, the number of the preset pointers is m, the m pointers respectively correspond to different derivative keys, m is smaller than or equal to n, and the m pointers periodically poll the n derivative keys.
It will be appreciated that the synchronisation key pointer is used to point to a storage location for a derivative key.
The method and the device for realizing the off-line access control authentication of the mobile terminal are capable of realizing the off-line access control authentication rapidly and safely when the mobile terminal approaches the access control card reading device, and improving user experience when the mobile terminal approaches the access control card reading device.
Further, the step 9 further includes the following steps:
and if the corresponding seed key is judged to exceed the effective time, feeding back the access failure information to the mobile terminal.
Specifically, the mobile terminal may be a mobile phone terminal, an intelligent watch or other portable devices capable of being provided with an access control APP and an NFC communication function.
Example 2
Based on the embodiment 1, the embodiment provides a specific implementation manner of a security enhancement system based on entrance guard, as shown in fig. 2;
The security enhancement system based on the entrance guard comprises a mobile terminal, an entrance guard card reading device and a cloud platform, wherein the mobile terminal and the entrance guard card reading device are respectively in network communication with the cloud platform, and the mobile terminal and the entrance guard card reading device are in near-end communication;
the mobile terminal is used for downloading and installing an access control APP and registering user information to the cloud platform through the access control APP;
The cloud platform is used for establishing a binding relation between the user information and the equipment identification information of the access card reading equipment, generating an AID and a PIN code based on the binding relation, respectively sending the AID and the PIN code to an access control APP of the mobile terminal and the access card reading equipment, generating a card application based on the AID by the access control APP of the mobile terminal and storing the PIN code in the card application, generating a seed key, setting the effective time of the seed key according to management requirements, simultaneously, formulating a synchronous key pointer, sending the seed key, the effective time of the seed key and the synchronous key pointer to the access card reading equipment, and sending the seed key and the synchronous key pointer to the card application of the mobile terminal, so that the access control APP of the mobile terminal and the access card reading equipment respectively generate n identical derivative keys based on the same seed key and the same key derivative algorithm, and locally store the n identical derivative keys;
The access control APP of the mobile terminal is used for extracting one derivative key from n derivative keys in the card application according to the synchronous key pointer to serve as a second real-time unlocking key, decrypting ciphertext information from the access control card reading equipment by adopting the second real-time unlocking key to obtain plaintext information, and returning the plaintext information to the access control card reading equipment through the NFC communication link;
The access control card reading device is used for registering self device identification information to the cloud platform, establishing an NFC communication link with the mobile terminal based on the same AID and PIN code when the mobile terminal is close to the cloud platform, extracting a derivative key from n local derivative keys according to the synchronous key pointer to serve as a first real-time unlocking key to generate a random number, encrypting the random number by the first real-time unlocking key to obtain ciphertext information, then sending the ciphertext information to an access control APP of the mobile terminal through the NFC communication link, and further comparing whether plaintext information from the mobile terminal is consistent with the random number or not, if so, continuing to judge whether the corresponding seed key exceeds the effective time, and if not, executing access control opening operation.
The access control card reading device and the mobile terminal establish an NFC communication link before the mobile terminal and the access control card reading device based on the same AID and PIN code, the access control card reading device extracts a derivative key from n local derivative keys according to the synchronous key pointer to serve as a first real-time unlocking key to generate a random number, the random number is encrypted by the first real-time unlocking key to obtain ciphertext information, the ciphertext information is then sent to an access control APP of the mobile terminal through the NFC communication link, the access control APP of the mobile terminal extracts a derivative key from n derivative keys in the card application according to the same synchronous key pointer to serve as a second real-time unlocking key, the second real-time unlocking key is adopted to decrypt the ciphertext information to obtain plaintext information and return the plaintext information to the access control card reading device, the access control card reading device compares whether the plaintext information is consistent with the random number or not, if the plaintext information is consistent, whether the corresponding seed key exceeds the effective time is continuously judged, and if the plaintext information is not consistent, the access control APP is opened.
Further, when the access control card reading device and the mobile terminal establish an NFC communication link based on the same AID and PIN code,
The access control card reading equipment is specifically used for generating adaptation request information based on AID and transmitting the adaptation request information to the mobile terminal, and sending a PIN verification instruction to the mobile terminal after receiving a response message of the mobile terminal for finding a corresponding card application, wherein the adaptation request information comprises AID and the PIN verification instruction comprises PIN;
The mobile terminal is specifically used for traversing a local card packet to find a card application consistent with the AID in the adaptation request information, comparing whether a PIN code in the PIN verification instruction is consistent with a pre-stored PIN code after the PIN verification instruction is received by the corresponding card application of the mobile terminal, and returning verification passing information if the PIN code is consistent with the pre-stored PIN code.
Further, after the door access opening operation is performed,
The entrance guard card reading equipment is also used for sending entrance guard success opening information to the mobile terminal and updating a local synchronous key pointer to the next pointer;
And the mobile terminal is further used for updating the local synchronous key pointer to the next pointer after receiving the entrance guard successfully-opened information so as to enable the synchronous key pointer updated by the entrance guard card reading equipment to be consistent with the synchronous key pointer updated by the mobile terminal.
Furthermore, the synchronous key pointers are in a clock shape, the initial pointer positions of the mobile terminal and the entrance guard card reading equipment are the same, the number of the preset pointers is m, the m pointers respectively correspond to different derivative keys, m is smaller than or equal to n, and the m pointers periodically poll the n derivative keys.
According to the invention, the keys are synchronized between the mobile terminal and the access control card reading equipment based on the synchronous pointer mode, so that access control operation is performed based on the synchronized keys, and a user does not need to carry a traditional access control card in the whole operation process, so that the portability of the user is improved. In addition, the invention has one-time pad, even if the real-time unlocking keys adopted for the access control operation are different in similar time, even if other people steal all the derivative keys, the normal access control operation cannot be realized due to lack of synchronous pointers or asynchronous pointers, and the replay attack of other people through stealing the keys can be effectively prevented, so that the security of the access control system is further improved.
The foregoing is merely illustrative of the present invention, and the present invention is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (9)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210527673.7A CN115085911B (en) | 2022-05-16 | 2022-05-16 | Security enhancement method and system based on entrance guard |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210527673.7A CN115085911B (en) | 2022-05-16 | 2022-05-16 | Security enhancement method and system based on entrance guard |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN115085911A CN115085911A (en) | 2022-09-20 |
| CN115085911B true CN115085911B (en) | 2025-01-14 |
Family
ID=83248155
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202210527673.7A Active CN115085911B (en) | 2022-05-16 | 2022-05-16 | Security enhancement method and system based on entrance guard |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN115085911B (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN116994364B (en) * | 2023-08-29 | 2024-06-28 | 深圳市亲邻科技有限公司 | Entrance guard card-free data loading interaction method |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102415103A (en) * | 2009-02-24 | 2012-04-11 | 超越宽带技术有限公司 | Cable television safety communication system for one-way limited access |
| CA3122951A1 (en) * | 2020-06-18 | 2021-12-18 | Royal Bank Of Canada | System and method for electronic credential tokenization |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109643473A (en) * | 2017-07-13 | 2019-04-16 | 深圳市汇顶科技股份有限公司 | A kind of method, apparatus and system of identity legitimacy verifying |
| CN109272609A (en) * | 2018-08-19 | 2019-01-25 | 天津新泰基业电子股份有限公司 | A kind of CPU safety door inhibition control method and system |
| CN113821835B (en) * | 2021-11-24 | 2022-02-08 | 飞腾信息技术有限公司 | Key management method, key management device and computing equipment |
-
2022
- 2022-05-16 CN CN202210527673.7A patent/CN115085911B/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102415103A (en) * | 2009-02-24 | 2012-04-11 | 超越宽带技术有限公司 | Cable television safety communication system for one-way limited access |
| CA3122951A1 (en) * | 2020-06-18 | 2021-12-18 | Royal Bank Of Canada | System and method for electronic credential tokenization |
Also Published As
| Publication number | Publication date |
|---|---|
| CN115085911A (en) | 2022-09-20 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11070364B2 (en) | Secure communication method and smart lock system based thereof | |
| CN109272606B (en) | Intelligent lock supervision equipment and method based on block chain and storage medium | |
| US7114178B2 (en) | Security system | |
| US8559642B2 (en) | Cryptographic communication with mobile devices | |
| CN102262793B (en) | Entrance guard control method and entrance guard control system | |
| CN108055235A (en) | A kind of control method of smart lock, relevant device and system | |
| CN110462691A (en) | Method for unlocking, mobile terminal, intelligent door lock and the Cloud Server of intelligent door lock | |
| CN109448197A (en) | A kind of cloud intelligent lock system and key management method based on multi-enciphering mode | |
| US20180359635A1 (en) | Securitization of Temporal Digital Communications Via Authentication and Validation for Wireless User and Access Devices | |
| CN105279832A (en) | Intelligent door lock system and control method thereof | |
| CN106504391A (en) | A control method, device and system for intelligent access control | |
| CN105099690A (en) | OTP and user behavior-based certification and authorization method in mobile cloud computing environment | |
| CN111243133A (en) | Bluetooth door lock system based on dynamic password generation and matching and unlocking method | |
| CN113129525A (en) | Method and apparatus for authenticating a user of a storage compartment device | |
| CN109035515A (en) | The control method and door-locking system of smart lock | |
| CN104539420A (en) | General intelligent hardware safe secret key management method | |
| CN110598469A (en) | Information processing method and device and computer storage medium | |
| CN115085911B (en) | Security enhancement method and system based on entrance guard | |
| CN114170709B (en) | Cash box management method and system based on Internet of Things | |
| JP2000184448A (en) | Personal communication system and its communicating method | |
| CN114783091B (en) | Temporary password generation method, device, equipment and storage medium | |
| CN113593088A (en) | Intelligent unlocking method, intelligent lock, mobile terminal and server | |
| KR101745482B1 (en) | Communication method and apparatus in smart-home system | |
| CN116563977B (en) | Identity authentication management method, electronic device, smart lock and related devices | |
| CN110113153A (en) | NFC secret key updating method, terminal and system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |