Two-dimension code-based access control method and two-dimension code-based access control system
The invention discloses a two-dimension code based access control method and a two-dimension code-based access control system. The method comprises the following steps: carrying out a two-dimension code scanning step, namely, scanning the two-dimension code carrying access control privilege informat...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | ZENG HUANTAO LI JIAN CHEN PENG JING LIJIAN |
description | The invention discloses a two-dimension code based access control method and a two-dimension code-based access control system. The method comprises the following steps: carrying out a two-dimension code scanning step, namely, scanning the two-dimension code carrying access control privilege information which comprises owner identity information or visitor identity information; carrying out an analysis processing step, namely, analyzing the access control privilege information and converting the access control privilege information into network data carrying the access control privilege information, and transmitting the network data via a network; carrying out a back-stage management step, namely, receiving the network data, and verifying the network data at the back stage, and judging whether the verification is legal, and if so, opening the access control switch. According to the two-dimension code-based access control method and the two-dimension code-based access control system, the management safety can be improved, and also the demand on human resources can be lowered. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN104464045A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN104464045A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN104464045A3</originalsourceid><addsrcrecordid>eNrjZEgMKc_XTcnMTc0rzszPU0jOT0nVTUosTk1RSExOTi0uBorklRTl5yjkppZk5ANF81IUSojUUlxZXJKay8PAmpaYU5zKC6W5GRTdXEOcPXRTC_LjU4sLEpNT81JL4p39DA1MTMxMDExMHY2JUQMAEIM9xw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Two-dimension code-based access control method and two-dimension code-based access control system</title><source>esp@cenet</source><creator>ZENG HUANTAO ; LI JIAN ; CHEN PENG ; JING LIJIAN</creator><creatorcontrib>ZENG HUANTAO ; LI JIAN ; CHEN PENG ; JING LIJIAN</creatorcontrib><description>The invention discloses a two-dimension code based access control method and a two-dimension code-based access control system. The method comprises the following steps: carrying out a two-dimension code scanning step, namely, scanning the two-dimension code carrying access control privilege information which comprises owner identity information or visitor identity information; carrying out an analysis processing step, namely, analyzing the access control privilege information and converting the access control privilege information into network data carrying the access control privilege information, and transmitting the network data via a network; carrying out a back-stage management step, namely, receiving the network data, and verifying the network data at the back stage, and judging whether the verification is legal, and if so, opening the access control switch. According to the two-dimension code-based access control method and the two-dimension code-based access control system, the management safety can be improved, and also the demand on human resources can be lowered.</description><language>eng</language><subject>ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDEDFOR ELSEWHERE ; CHECKING-DEVICES ; GENERATING RANDOM NUMBERS ; PHYSICS ; REGISTERING OR INDICATING THE WORKING OF MACHINES ; TIME OR ATTENDANCE REGISTERS ; VOTING OR LOTTERY APPARATUS</subject><creationdate>2015</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20150325&DB=EPODOC&CC=CN&NR=104464045A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20150325&DB=EPODOC&CC=CN&NR=104464045A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>ZENG HUANTAO</creatorcontrib><creatorcontrib>LI JIAN</creatorcontrib><creatorcontrib>CHEN PENG</creatorcontrib><creatorcontrib>JING LIJIAN</creatorcontrib><title>Two-dimension code-based access control method and two-dimension code-based access control system</title><description>The invention discloses a two-dimension code based access control method and a two-dimension code-based access control system. The method comprises the following steps: carrying out a two-dimension code scanning step, namely, scanning the two-dimension code carrying access control privilege information which comprises owner identity information or visitor identity information; carrying out an analysis processing step, namely, analyzing the access control privilege information and converting the access control privilege information into network data carrying the access control privilege information, and transmitting the network data via a network; carrying out a back-stage management step, namely, receiving the network data, and verifying the network data at the back stage, and judging whether the verification is legal, and if so, opening the access control switch. According to the two-dimension code-based access control method and the two-dimension code-based access control system, the management safety can be improved, and also the demand on human resources can be lowered.</description><subject>ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDEDFOR ELSEWHERE</subject><subject>CHECKING-DEVICES</subject><subject>GENERATING RANDOM NUMBERS</subject><subject>PHYSICS</subject><subject>REGISTERING OR INDICATING THE WORKING OF MACHINES</subject><subject>TIME OR ATTENDANCE REGISTERS</subject><subject>VOTING OR LOTTERY APPARATUS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2015</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZEgMKc_XTcnMTc0rzszPU0jOT0nVTUosTk1RSExOTi0uBorklRTl5yjkppZk5ANF81IUSojUUlxZXJKay8PAmpaYU5zKC6W5GRTdXEOcPXRTC_LjU4sLEpNT81JL4p39DA1MTMxMDExMHY2JUQMAEIM9xw</recordid><startdate>20150325</startdate><enddate>20150325</enddate><creator>ZENG HUANTAO</creator><creator>LI JIAN</creator><creator>CHEN PENG</creator><creator>JING LIJIAN</creator><scope>EVB</scope></search><sort><creationdate>20150325</creationdate><title>Two-dimension code-based access control method and two-dimension code-based access control system</title><author>ZENG HUANTAO ; LI JIAN ; CHEN PENG ; JING LIJIAN</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN104464045A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2015</creationdate><topic>ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDEDFOR ELSEWHERE</topic><topic>CHECKING-DEVICES</topic><topic>GENERATING RANDOM NUMBERS</topic><topic>PHYSICS</topic><topic>REGISTERING OR INDICATING THE WORKING OF MACHINES</topic><topic>TIME OR ATTENDANCE REGISTERS</topic><topic>VOTING OR LOTTERY APPARATUS</topic><toplevel>online_resources</toplevel><creatorcontrib>ZENG HUANTAO</creatorcontrib><creatorcontrib>LI JIAN</creatorcontrib><creatorcontrib>CHEN PENG</creatorcontrib><creatorcontrib>JING LIJIAN</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>ZENG HUANTAO</au><au>LI JIAN</au><au>CHEN PENG</au><au>JING LIJIAN</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Two-dimension code-based access control method and two-dimension code-based access control system</title><date>2015-03-25</date><risdate>2015</risdate><abstract>The invention discloses a two-dimension code based access control method and a two-dimension code-based access control system. The method comprises the following steps: carrying out a two-dimension code scanning step, namely, scanning the two-dimension code carrying access control privilege information which comprises owner identity information or visitor identity information; carrying out an analysis processing step, namely, analyzing the access control privilege information and converting the access control privilege information into network data carrying the access control privilege information, and transmitting the network data via a network; carrying out a back-stage management step, namely, receiving the network data, and verifying the network data at the back stage, and judging whether the verification is legal, and if so, opening the access control switch. According to the two-dimension code-based access control method and the two-dimension code-based access control system, the management safety can be improved, and also the demand on human resources can be lowered.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_CN104464045A |
source | esp@cenet |
subjects | ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDEDFOR ELSEWHERE CHECKING-DEVICES GENERATING RANDOM NUMBERS PHYSICS REGISTERING OR INDICATING THE WORKING OF MACHINES TIME OR ATTENDANCE REGISTERS VOTING OR LOTTERY APPARATUS |
title | Two-dimension code-based access control method and two-dimension code-based access control system |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T12%3A28%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=ZENG%20HUANTAO&rft.date=2015-03-25&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN104464045A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |