Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Openid-based access control method

A technology of access control and control method, which is applied in the direction of electromagnetic radiation induction, instruments, and induction recording carriers, etc., can solve the problems of high server burden, affecting users' normal travel, and heavy input workload, so as to avoid data storage and The need for maintenance, saving storage and computing costs, and the effect of reducing the burden

Active Publication Date: 2019-07-16
深圳市微开互联科技有限公司
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since a community usually includes multiple gates, building gates or unit doors and many other access controls, each access control corresponds to many users with the right of way, which causes a large amount of data to be pre-stored on the server. , for example, for the access control of each gate, it is necessary to pre-store at least the information of all residents in the entire community, and for each unit door, it is necessary to pre-store at least the information of all residents in the corresponding unit, so the server performs authority judgment every time It is necessary to read large categories of data all the time, which makes the burden on the server high
Moreover, since these data need to be manually input in advance, the workload of input is huge and error-prone, once a mistake will affect the normal travel of some users
In addition, in the existing technology, if user information is to be pre-stored, it is usually necessary to obtain the user's WeChat account, which may easily cause leakage of user information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Openid-based access control method
  • Openid-based access control method
  • Openid-based access control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Aiming at the aforementioned problems existing in the WeChat door opening method of the prior art, the present invention provides an access control method based on openid, which can significantly simplify the amount of data read by the server when judging the authority to open the door, and at the same time is beneficial to protect user information. vent. The access control method of the present invention mainly judges whether the user has the right to open the corresponding access control according to the binding room situation of the user on the access control official account, and the amount of data read by the server is small and is not easy to make mistakes.

[0041]The room mentioned in the present invention should generally be understood as the smallest property right unit of a house, such as a house property in a residential area. However, in some cases, it can also be understood as a specific room in a property right unit, such as in an office building. One of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an openid-based access control method. The method comprises steps: an access control server receives opening request information sent when a user scans an access control two-dimensional code; the access control server reads the openid of the user and the two-dimensional code identifier of the access control two-dimensional code, and according to the openid, whether the useris already bound with a room in the name of the homeowner or the family member on an access control official account; the access control server determines the access control opening permission rangeof the user according to the identifier of the room, and an access control identifier corresponding to the access control two-dimensional code is determined based on the two-dimensional code identifier; and the access control server determines whether the access control corresponding to the access control identifier is included in the access control opening permission range, and if yes, opening iscarried out. The association relationship between each access control and each user does not need to be stored, the data input workload and the data amount read by the access control server during the working process can be reduced obviously, the error probability in data input can be avoided, and the burden of the access control server is also lessened.

Description

technical field [0001] The invention relates to the technical field of WeChat door opening, in particular to an openid-based access control method. Background technique [0002] The emergence of WeChat door opening technology has given people great convenience, so that people do not need to carry traditional keys, access control cards and other items, but only use the smart phone installed with WeChat to realize such things as community doors, building doors, and unit doors. Even the opening of the room door and other access control. In particular, since the WeChat door-opening technology is implemented based on the WeChat platform, users do not need to download the client program specifically, which reduces the traffic overhead and storage space overhead caused by the user's download and installation of the application program, making the user's acceptance higher, thus facilitating this Promotion of technology. [0003] In the prior art WeChat door opening implementation ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07C9/00G06K7/14
CPCG06K7/1417G07C9/00309
Inventor 周韦华
Owner 深圳市微开互联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products