Discussion on blockchain and QR code security authorization technology

Discussion on blockchain and QR code security authorization technology

This article describes a QR code device authorization solution based on blockchain technology. Here, we use the access control system of an enterprise as an example to explore the combination of QR code and blockchain to achieve an anonymous QR code access control authorization permission. In traditional access control systems, the management of access personnel is mainly through card swiping, fingerprint, iris, or manual authorization.
In the traditional access control management system, it is very convenient for internal employee management and has complete functions. Especially with the rapid development of the Internet in recent years, more and more small and medium-sized enterprises have begun to install their own access control systems to realize the automatic management of the entry and exit of employees in the enterprise. Whether it is card swiping or fingerprint technology, it is necessary to collect the personal information of the in-and-out personnel in advance, and then store it in the access control management system for management. This is very convenient for internal long-term employees, but it is not very convenient for temporary personnel who enter and exit dynamically. For example, for visitors who come to visit, or temporary maintenance workers who come for a few hours, etc., if cards are issued for these temporary personnel, or identity information is collected, although it is also very fast, it is not a good way. First, the cost is high, and second, it is inconvenient to manage. The unit needs to prepare some spare cards or collect data in advance, store them in the access control system, or require customer service personnel to be online all the time for reception management.
Based on this consideration, we hope to find a way to solve the needs of temporary users for access control equipment. We thought of QR code recognition technology. Thanks to the rapid development of mobile phones, almost everyone in China has a mobile phone, which provides a feasible solution for creating an access control system with QR code authorization technology. The following figure is a schematic diagram of an access control device based on QR code technology:

The rapid development of QR code technology and the widespread popularity of mobile devices such as mobile phones have made the above solution possible. Visitors can make an appointment for a visit through their mobile phones or the Internet, and then get a temporary QR code authorization license image. They can then print this QR code on paper or save it on their mobile phones. When it reaches the access control device, the access control device can recognize this QR code to achieve visitor access authorization management. This is unattended.
We can successfully copy the QR code technology to the existing access control system. We only need to add the QR code distribution and recognition function to it. The cost is very low and it also creates a good management cost-effectiveness. It reduces the difficulty of managing the existing access control system and improves work efficiency.
Based on the QR code, we have imagined an application scenario: anonymous visitor authorization management. For example, criminal investigation personnel or special personnel need to enter a certain area, but they do have a legal need or need to do so for the protection of privacy or security. We hope to only authorize those who hold designated equipment, certificates, or designated personnel required by certain rules. Then the following blockchain-based QR code authorization technology is a good solution.
In this solution, both the company and the visitor only trust one thing, which is the information on the blockchain. As long as it is on this chain, there is a possibility of obtaining authorization. For example, we want to hold an anonymous part. The following figure is an analysis of the principle diagram of anonymous authorization of QR code with blockchain added:

In this picture, the visitor has obtained the legal private key, public key and other key data through the blockchain, and the access control system only recognizes this information. Only with this information can it be possible to pass through the access control system, which creates the possibility of passing through the access control system completely anonymously.

Author's note: Thanks to the enthusiastic help from the members of the BitNet community.

Author: 642
Reward BTC: 1LFRJod9JatD8fPbDt5UQeQfQMLWtBZo1y
Reward VPN: Vb4iqcjftXiJVCd35nh5iiz2Bhiex5FuLv
Editor: printermps
Source: Babbitt Information


<<:  FamilyMart's 3,000 convenience stores have adopted BitoEX Bitcoin wallet

>>:  The global mobile workforce is growing, and blockchain technology is helping business management

Recommend

Palmistry

Palmistry We can learn about our own fortune, des...

DeFi expert: Ethereum 2.0 cannot solve the problem of high gas fees

On September 3, DeFi experts and computer scienti...

The face has the characteristics of a concubine, and the earlobes are very large

In fact, everyone’s facial features are different...

The facial features of a woman with nine virtues

The facial features of a woman with nine virtues ...

What kind of woman is most suitable for a man based on his eyes?

Eyes are the windows to the soul and can represen...

What does a mole on the right rib mean?

As one of the traditional physiognomy techniques, ...

What are the characteristics of people with bad luck?

It is said that everything is determined by fate ...

Is it good to have a mole next to the left bridge of the nose?

Is it good to have a mole next to the left bridge...

Is it good for a woman to have a gap between her front teeth?

Is it good for a woman to have big gaps between h...

Will people with many wrinkles on their faces be unfaithful?

1. People with many wrinkles on their cheeks have...