With the popularity of scan code payment, QR code access control has gradually become mainstream. Mobile phones have become an indispensable item in everyone's daily life. The QR code access control system can use mobile phones as keys to realize scanning codes to open doors at any time, eliminating the trouble of forgetting keys or access control cards. QR code access control is widely used in scenes such as parks, office buildings, communities, schools, hospitals, etc., and solves the problem of temporary visitor registration. However, many users still have some doubts about QR code access control, such as the possibility that the door opening code may be copied, it cannot be used when the network is disconnected, the elderly are not familiar with the operation, and how children can scan codes to enter the door without mobile phones. This article will introduce the development history, working principle, security, application scenarios, wiring, installation and future prospects of QR code access control in detail.
Today I will give you a detailed explanation of the development history, working principle, security, application scenarios, wiring, installation, prospects and other aspects of QR code access control. It is a good and in-depth article, so I recommend you to collect it.
The QR code (Quick Response Code, QR Code) was invented by Masahiro Hara, an engineer at Denso Wave in Japan, in 1994. At first, QR codes were used to track auto parts, but their high capacity and fast scanning characteristics were soon found to have wider application potential. (Reference address: https://zh.wikipedia.org/wiki/QR%E7%A2%BC)
In the early 2000s, QR code technology gradually became popular and became an important tool in a variety of commercial and consumer applications. During this period, QR codes began to be used in scanning support, ticketing, advertising, product traceability and other fields.
In China, there is no clear official record or widely recognized statement about the specific earliest launch time and company of QR code access control technology. Although there is no exact earliest launch company, it is certain that after continuous development, many domestic companies have successively launched QR code access control solutions. Among them, Shenzhen Cerberus Technology Co., Ltd. is one of the companies that entered the field of QR code access control earlier. The company was established in 2014 (reference address: https://www.qcc.com/product/61c85372-d16b-426c-8ba6-ed83ec37589a.html), focusing on QR code recognition technology, providing QR code access control solutions, and has accumulated rich experience and market share in the industry.
The development of QR code access control in China started late, but with the advancement of technology, QR code access control hardware has also undergone continuous evolution. Initially, QR code access control needed to be used with third-party brand access control controllers, and there was no unified standard for the protocols of external card readers of various brands, and some access control controllers even required additional converters to use.
With the popularization of monitoring technology, the security problem of QR code access control has been solved. Many QR code access control manufacturers have integrated QR code readers with access control controllers and launched all-in-one devices that can directly control electric locks, gates, elevator controls, etc. However, there are still some special application scenarios that require a very high level of access control. Some manufacturers use external security modules to solve this problem. In order to better meet the market and different application scenarios, digital upgrades, and the Internet of Everything, various QR code access control manufacturers have also launched hardware devices such as WIFI, 4G, and 5G networking. So far, QR code access control has entered an era of flourishing, and its appearance, material, and volume are becoming more and more beautiful. At the same time, in order to solve the problem that the elderly and children cannot scan the code to open the door without a mobile phone, the QR code access control manufacturer has retained the card swiping and password functions, which is convenient for people without mobile phones to open the door at any time.
The outdoor application of QR code access control faces many challenges, such as strong light at noon, insensitive code scanning under dim light at night, waterproof and lightning protection problems, and working problems in low temperature environments. In response to these challenges, Cerberus engineers have overcome relevant technical difficulties and obtained third-party test reports.
Since the early QR code access control card reader needs to be connected to a third-party brand access control controller, there is no unified standard for the door opening code generated by each integrator, and many QR code access control card readers and access control use the standard Wiegand protocol. The door opening code directly uses pure numbers to generate static door opening codes. In this way, the door opening code is easy to be copied during use. With the emergence of QR code access control integrated machines, more system integrators have secondary developed and connected QR code access control, and the generated door opening QR code is transmitted to the software background through the network to determine the remote door opening. The security of the door opening code has been significantly improved. From the original static door opening code, it has been upgraded to dynamic QR code door opening, which has security features such as one person one code, limited time and limited number of door opening, anti-mobile phone screenshot, and anti-screen recording. In addition, in order to solve the problem that the device cannot open the door after disconnecting from the network, the QR code access control manufacturer has also added offline door opening permissions to the QR code, or sent the whitelist to the QR code device, so that even if the device is offline, it can scan the code normally to open the door.
The working principle of QR code access control can be simply understood as: generating a dynamic QR code on a mobile phone APP or mini program through an encryption algorithm. After the user scans the code, the QR code access control transmits the data to the cloud server through the TCP/IP protocol, and the software background determines whether the permission of the door opening code is legal based on logic. If it is legal, a remote door opening command is issued, and if it is illegal, the door is refused to open.
The system integrator uses encryption algorithms to generate the door opening QR code for secondary development and docking, ensuring that the information in the QR code is protected during the generation and transmission process. The encryption algorithm can prevent the QR code data from being read or tampered with by unauthorized third parties, thereby enhancing the overall security of the access control system.
The device uses a dedicated chip for QR code decoding. This chip usually has efficient and accurate decoding capabilities and can perform preliminary verification of the integrity of the QR code. The dedicated chip reduces the possibility of QR code cracking and prevents misidentification caused by damage or tampering of the QR code.
In addition to the encryption of the QR code itself, multiple verification methods are also used to ensure the legitimacy of the door opening. For example, the initial password of the QR code access control hardware configuration is changed, which requires the user to set or change the password when the hardware device is used for the first time or replaced, increasing the difficulty of illegal access. In addition, advanced verification methods such as signature verification are also applied to the system to ensure the authenticity, legitimacy and integrity of the QR code data request by verifying the signature of the request to prevent data tampering.
The QR code access control device supports HTTPS and MQTTS protocols, both of which provide data encryption and authentication functions. HTTPS encrypts HTTP communication through the SSL/TLS protocol to ensure confidentiality and integrity during data transmission; MQTTS is a secure version of the MQTT protocol, which transmits through TLS/SSL encryption and supports two-way authentication between the client and the server, further improving the security of communication.
The private key is a key element in the encryption and decryption process. The private key is controlled by the user himself, which means that the user is responsible for the security of his own data and can independently control the encryption and decryption process of the data. It ensures that the key will not be obtained by an external third party, prevents key leakage or abuse, and further enhances the security of the system and the controllability of the project
After the system integrator develops the QR code access control for the second time, the platform software directly controls the QR code access control hardware to issue remote commands, and no longer transfers through a third-party cloud platform. This design reduces the security risks of data during transmission, improves the response speed and controllability of the system, and reduces dependence on external services. Users can adjust access control policies or issue door opening commands at any time according to their needs without worrying about security vulnerabilities or delays that may exist on third-party cloud platforms.
Since data processing and storage do not rely on third-party cloud platforms, the data security of the system is guaranteed. At the same time, the expansion of system functions is not limited by the limitations of third-party services, and users can customize and expand the system as needed.
Problems often encountered in parks:
After the park uses the QR code access control system,
Problems encountered when using card access control in residential communities:
After using the QR code access control system
Problems encountered by colleges and universities:
Many colleges and universities have multiple management systems. For example, canteen consumption, dormitory management and library borrowing usually rely on the one-card system, while multimedia classrooms, laboratories, etc. require independent reservation and scheduling systems. This decentralized management model undoubtedly increases the complexity of operation.
In response to this situation, colleges and universities give full play to the advantages of campus codes as a unified management tool, and through in-depth secondary development and seamless connection with QR code access control technology, realize the comprehensive opening of various application scenarios. This solution covers canteen consumption, dormitory management, library borrowing, and reservation and use of campus facilities such as multimedia classrooms and laboratories, forming a convenient experience of one-code access.
On the unified platform, the campus code is not only the key to identity identification, but also carries the authority management function of various services. With only one campus code, teachers and students can easily complete the participation of various campus activities and access to resources. In addition, the solution is also highly flexible and can automatically adjust the user's access rights according to conditions such as graduation time to ensure the timeliness and accuracy of management. Once a student graduates, his or her corresponding access rights, service access rights, etc. will automatically expire, greatly simplifying the process of leaving school and ensuring campus safety.
Public transportation systems, such as subways and buses, face some common problems
① The inconvenience of using traditional recharge cards: users often forget to bring recharge cards, resulting in inconvenience in riding. After the card is lost, it may be picked up by others and used directly, causing property losses. Renewing the recharge card requires going to the management center, which is cumbersome and time-consuming.
② Inconvenience in recharging and bill inquiries: users need to go to self-service machines or manual windows for recharge and bill inquiries, which is particularly inconvenient for busy office workers. In addition, even if some users use NFC-enabled mobile phones to bind subway or bus cards, some mobile phones still do not support the NFC function, or users are not familiar with the binding process and cannot conveniently check bills on their mobile phones.
QR code access control can solve these problems well, using mobile phone QR codes instead of traditional subway or bus cards. Mobile phone QR codes have the following advantages:
① Convenient payment: users can scan and pay through mobile phone QR codes without having to recharge at self-service machines or manual windows in advance.
② Account binding: QR codes can be bound to users' accounts, making the payment process more convenient.
③ Inquiry at any time: users can check bills at any time through their mobile phones, and the bills are clearly visible and management is more efficient.
④ This method not only reduces the various inconveniences of traditional recharge cards, but also improves payment flexibility and bill transparency.
Problems in personnel management in hospitals, especially in inpatient departments: temporary visits and accompanying by relatives and friends, as well as access control of isolation wards, intensive care units and infectious departments. The traditional card access control system has many disadvantages: for example, the access card is not returned in time when the patient is discharged from the hospital, resulting in the card being unable to be recycled; the card issuance and authorization process for temporary visitors is cumbersome and complicated; the access card is easy to lose. Once lost, it may be picked up by others and enter and exit at will, increasing safety risks. When using card access control, physical contact may increase the risk of cross-infection, especially in isolation wards and infectious departments
QR code access control can effectively solve these problems.
① Convenient authorization: Air authorization through mobile phone numbers avoids the trouble of physical card issuance. The authorization process can be managed in real time through mobile phone applications, which greatly simplifies the management and permission settings of temporary personnel.
② Reduce cross infection: No physical contact with the QR code is required, reducing the risk of contact transmission. It is especially suitable for isolation wards and infectious departments, effectively reducing the chance of cross infection.
③ Automatic management: Authorization can be set to be valid for a limited time, and the authorization will be automatically canceled after the person leaves, ensuring effective control of the number of visitors and preventing unauthorized persons from entering.
④ Improved security: Avoid the problem of card loss and abuse. The use of QR codes reduces the risk of access cards being picked up and abused by others, and improves overall security.
This method not only improves the management efficiency of the hospital, but also provides a safer and more reliable medical environment for patients and their families.
① Transmission and lock door method: A dedicated person is required to operate the door opening and closing, which increases labor costs and management complexity.
② Face recognition access control: It raises concerns about privacy leakage, and many people have concerns about the security of their personal data.
③ Card swipe access control: It requires setting up a card issuing center, and the purchase and maintenance costs of using self-service card issuing machines are high.
The use of QR code access control system can effectively solve the above problems:
① Self-registration: personnel can scan the code to register and generate the door opening code by themselves, which simplifies the access control operation.
② Record information: The system automatically uploads the entry and exit records for easy management and tracking.
③ Privacy protection: Compared with face recognition, it is easier to protect personal privacy.
④ Reduce costs: Reduce the demand for card issuing centers, and do not require high self-service terminal equipment procurement and maintenance costs.
⑤ Monitoring cooperation: If an incident such as damage to public property occurs, the monitoring can be retrieved and traced back to the relevant personnel.
The QR code access control wiring is simple, and the electric lock uses a special lock power supply. Here, take the Cerberus Technology access control as an example, please refer to the figure below
The red wire of the QR code access control is connected to the power supply 12V
The black wire of the QR code access control is connected to the power supply GND
The yellow wire of the QR code access control is connected to the power supply PUSH
The white wire of the QR code access control is connected to GND
The NC dedicated power supply for access control is connected to one of the lock bodies
The GND dedicated power supply for access control is connected to the other lock body
The installation of QR code access control is also very simple. If you have weak current knowledge and power ability, you can install it yourself, but it is recommended to find a professional weak current master to install it.
The QR code access control system shows significant prospects in the modern access control market. First, the privacy protection of the QR code access control system is better than biometric technologies such as face recognition and fingerprint recognition, because it does not involve the user's biometrics, thereby reducing the risk of privacy leakage. Compared with traditional card access control, QR code access control solves the problem of forgetting or losing cards and avoids the additional costs of renewing cards. Users only need to generate and use QR codes through mobile phones or other devices, which greatly simplifies access control operations.
Second, the QR code access control system has the characteristics of low cost and easy deployment. The widespread application of QR code technology has significantly reduced the hardware and software costs of access control systems, making it suitable for enterprises and institutions of all sizes. The deployment process is simple, does not require complex installation programs or expensive equipment, and reduces initial investment and maintenance costs.
In addition, with the popularization of smartphones and mobile Internet, the convenience of the QR code access control system has been further improved. Users can easily generate, manage and use QR codes through mobile devices, which improves the efficiency and flexibility of access control management.
In short, the QR code access control system is expected to occupy an increasingly important position in the future access control market due to its privacy protection, cost-effectiveness, convenience and simple management, and promote the popularization and intelligent development of access control technology.