Discussion on blockchain and QR code security authorization technology

Discussion on blockchain and QR code security authorization technology

This article describes a QR code device authorization solution based on blockchain technology. Here, we use the access control system of an enterprise as an example to explore the combination of QR code and blockchain to achieve an anonymous QR code access control authorization permission. In traditional access control systems, the management of access personnel is mainly through card swiping, fingerprint, iris, or manual authorization.
In the traditional access control management system, it is very convenient for internal employee management and has complete functions. Especially with the rapid development of the Internet in recent years, more and more small and medium-sized enterprises have begun to install their own access control systems to realize the automatic management of the entry and exit of employees in the enterprise. Whether it is card swiping or fingerprint technology, it is necessary to collect the personal information of the in-and-out personnel in advance, and then store it in the access control management system for management. This is very convenient for internal long-term employees, but it is not very convenient for temporary personnel who enter and exit dynamically. For example, for visitors who come to visit, or temporary maintenance workers who come for a few hours, etc., if cards are issued for these temporary personnel, or identity information is collected, although it is also very fast, it is not a good way. First, the cost is high, and second, it is inconvenient to manage. The unit needs to prepare some spare cards or collect data in advance, store them in the access control system, or require customer service personnel to be online all the time for reception management.
Based on this consideration, we hope to find a way to solve the needs of temporary users for access control equipment. We thought of QR code recognition technology. Thanks to the rapid development of mobile phones, almost everyone in China has a mobile phone, which provides a feasible solution for creating an access control system with QR code authorization technology. The following figure is a schematic diagram of an access control device based on QR code technology:

The rapid development of QR code technology and the widespread popularity of mobile devices such as mobile phones have made the above solution possible. Visitors can make an appointment for a visit through their mobile phones or the Internet, and then get a temporary QR code authorization license image. They can then print this QR code on paper or save it on their mobile phones. When it reaches the access control device, the access control device can recognize this QR code to achieve visitor access authorization management. This is unattended.
We can successfully copy the QR code technology to the existing access control system. We only need to add the QR code distribution and recognition function to it. The cost is very low and it also creates a good management cost-effectiveness. It reduces the difficulty of managing the existing access control system and improves work efficiency.
Based on the QR code, we have imagined an application scenario: anonymous visitor authorization management. For example, criminal investigation personnel or special personnel need to enter a certain area, but they do have a legal need or need to do so for the protection of privacy or security. We hope to only authorize those who hold designated equipment, certificates, or designated personnel required by certain rules. Then the following blockchain-based QR code authorization technology is a good solution.
In this solution, both the company and the visitor only trust one thing, which is the information on the blockchain. As long as it is on this chain, there is a possibility of obtaining authorization. For example, we want to hold an anonymous part. The following figure is an analysis of the principle diagram of anonymous authorization of QR code with blockchain added:

In this picture, the visitor has obtained the legal private key, public key and other key data through the blockchain, and the access control system only recognizes this information. Only with this information can it be possible to pass through the access control system, which creates the possibility of passing through the access control system completely anonymously.

Author's note: Thanks to the enthusiastic help from the members of the BitNet community.

Author: 642
Reward BTC: 1LFRJod9JatD8fPbDt5UQeQfQMLWtBZo1y
Reward VPN: Vb4iqcjftXiJVCd35nh5iiz2Bhiex5FuLv
Editor: printermps
Source: Babbitt Information


<<:  FamilyMart's 3,000 convenience stores have adopted BitoEX Bitcoin wallet

>>:  The global mobile workforce is growing, and blockchain technology is helping business management

Recommend

What kind of palm is the most blessed for boys?

We all say that we can tell a person’s fortune by...

What does a mole on the arm mean?

What does a mole on the arm mean? If you have a m...

The face of great wealth

Some people are born with a silver spoon in their...

Analysis: What kind of palmistry can help one become an official

In the ideology of the Chinese nation, being an o...

Analysis: Bitcoin investors hold onto their coins, while miners hoard them

According to Cryptopotato on August 31, Bitcoin m...

What crow's feet reveal about your love life

What crow's feet reveal about your love life ...

A man who always smiles and is very friendly

Some people always look very cold and indifferent...

Bitcoin has gone crazy again, breaking through 8,600 to set a new all-time high!

In just a few days, the price of Bitcoin soared f...

Are women with thick earlobes happy after marriage?

No matter who you are, you all hope that you can ...

Revealing what kind of face is the best and most prosperous for a woman

I believe that everyone hopes to be lucky enough ...

A complete analysis of nasolabial folds

Not everyone has nasolabial folds, so what do naso...

Which palmistry shows that people are generous with money?

Based on their attitude towards money, people can...