CN105405185A - Safety verifying method and apparatus thereof - Google Patents
Safety verifying method and apparatus thereof Download PDFInfo
- Publication number
- CN105405185A CN105405185A CN201510703624.4A CN201510703624A CN105405185A CN 105405185 A CN105405185 A CN 105405185A CN 201510703624 A CN201510703624 A CN 201510703624A CN 105405185 A CN105405185 A CN 105405185A
- Authority
- CN
- China
- Prior art keywords
- user
- safety cabinet
- mandate
- enciphered message
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 72
- 238000013475 authorization Methods 0.000 claims abstract description 98
- 238000004891 communication Methods 0.000 claims abstract description 96
- 238000012795 verification Methods 0.000 claims description 64
- 238000012360 testing method Methods 0.000 claims description 22
- 230000008878 coupling Effects 0.000 claims description 10
- 238000010168 coupling process Methods 0.000 claims description 10
- 238000005859 coupling reaction Methods 0.000 claims description 10
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 claims description 10
- 230000008569 process Effects 0.000 claims description 8
- 238000001514 detection method Methods 0.000 claims description 4
- 230000032683 aging Effects 0.000 description 18
- 238000005516 engineering process Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 8
- 230000000694 effects Effects 0.000 description 6
- 230000008901 benefit Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
- G07C9/00912—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for safes, strong-rooms, vaults or the like
Abstract
The invention provides a safety verifying method and a safety verifying apparatus. The safety verifying method comprises the following steps: user identity information stored in a current user terminal is obtained through a communication link with the current user terminal; a temporary secret key is generated when the current user is judged to be the unauthorized user of a safety cabinet according to the user identity information; and the user identity information and the temporary secret key are sent to the authorized user of the safety cabinet to make the authorized user judge whether the current user as the temporarily authorized user of the safety cabinet according to the user identity information, and whether temporarily authorized authorization encryption information for opening the safety cabinet or not is determined according to above obtained judgment result. The above technical scheme allows time-efficient temporary authorization authority of the safety cabinet to be open to the unauthorized user, so the problem of unable safe opening of the safety cabinet when the authorized user is not around is effectively solved, use convenience is improved, and the safety of the safety cabinet is ensured, thereby the user experience is improved.
Description
Technical field
The present invention relates to Smart Home technical field, in particular to a kind of safe verification method and a kind of safety verification device.
Background technology
At present, when third party (refers to the user not carrying out safety certification (such as finger print identifying) in safety cabinet authentication system, i.e. unauthorized user) when wanting the thing got in safety cabinet, after in person must being opened by authorized user (referring to the user carrying out safety certification (such as finger print identifying) in safe system), again the thing of safety cabinet is taken out and give third party (unauthorized user), that is, for third party's (unauthorized user) that temporary needs opens safety cabinet, authorized user can only be sought help from, opened by authorized user, but when authorized user no longer side time, then inconvenience can be brought, have impact on the experience of user.
Therefore, how to solve when authorized user not aside time unauthorized user cannot open the technical matters that safety cabinet becomes urgently to be resolved hurrily safely.
Summary of the invention
The present invention is just based on above-mentioned technical matters, propose a kind of new technical scheme, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, with effectively solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, improve the security that ease of use guarantees safety cabinet simultaneously, thus promote Consumer's Experience.
In view of this, a first aspect of the present invention, proposes a kind of safe verification method, comprising: obtained the subscriber identity information stored in described active user's terminal by the communication link between active user's terminal; When judging the unauthorized user of active user as safety cabinet according to described subscriber identity information, generate temporary key; Described subscriber identity information and described temporary key are sent to the authorizes user terminal of described safety cabinet, judge that whether described active user is the temporary Authorization user of described safety cabinet for described authorizes user terminal according to described subscriber identity information, and determine whether to send to described active user's terminal to open described safety cabinet and the mandate enciphered message of encrypting through described temporary key according to judged result.
In this technical scheme, when unauthorized user wants to open the safety cabinet needing to carry out authentication, first temporary key is generated, this temporary key can be stochastic generation, and by be used for judging active user as unauthorized user subscriber identity information (such as, address name, contact method, head portrait, finger print information and iris information etc.) and temporary key be together sent to the authorizes user terminal of safety cabinet, thus make authorizes user terminal judge whether this unauthorized user is the temporary Authorization user needing temporarily to open safety cabinet according to this subscriber identity information, and further according to judged result determine whether to this current user terminal send for opening safety cabinet and the mandate enciphered message using this temporary key to be encrypted, so, can solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, also the security of safety cabinet fully can be guaranteed while improving the ease of use of safety cabinet, thus improve Consumer's Experience.
In technique scheme, preferably, also comprise: detect the described mandate enciphered message whether received in the first Preset Time from described active user's terminal; Determine whether to be decrypted process, with authorized decryption information by described temporary key to described mandate enciphered message according to testing result.
In this technical scheme, preferably also comprise to detect in the first Preset Time whether by described communications link reception to the mandate enciphered message from active user's terminal, with the mandate decryption information determining whether to use this temporary key to decipher according to testing result this mandate enciphered message obtains opening safety cabinet, wherein, first Preset Time can be the effective time of this temporary key, such as 2 minutes, certainly, also can be other times value, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, the safety in utilization of safety cabinet can be improved further while guaranteeing the smooth opening safety cabinet of unauthorized user.
In above-mentioned arbitrary technical scheme, preferably, describedly determine whether to be decrypted described mandate enciphered message by described temporary key according to testing result, specifically comprise with authorized decryption information: when testing result is no, judge that described temporary key is invalid; When the test results is yes, by described temporary key described mandate enciphered message is decrypted and obtains described mandate decryption information, and judge whether described mandate decryption information mates with preset authorization authorization information; And when being judged to be coupling, open described safety cabinet to described active user's Family administration authority, otherwise, forbid opening described safety cabinet.
In this technical scheme, if safety cabinet does not receive the mandate enciphered message from unauthorized user in the first Preset Time, then can judge that temporary key is invalid, namely cannot pass through this mandate enciphered message opening safety cabinet again after unauthorized user, guarantee the safety in utilization of safety cabinet, and when detect in the first Preset Time, to receive this mandate enciphered message time, then be decrypted authorized decryption information by this temporary key, and judge that this mandate decryption information preset authorization authorization information whether safety cabinet stores matches, and the administration authority of active user's safety cabinet authorized by opening safety cabinet when judging coupling, otherwise forbid opening this safety cabinet, so, confirm that active user is temporary Authorization user in authorizes user terminal, and at the appointed time in receive the mandate enciphered message from this active user and decipher a laggard step and demonstrate,prove its legitimacy, open safety cabinet for safety to provide and ensure further, thus improve the experience of user further.
In addition, when by communications link reception mandate enciphered message between active user's terminal, obviously, the subscriber identity information simultaneously again obtaining active user is needed to carry out identity verify, to determine whether as same user.
In above-mentioned arbitrary technical scheme, preferably, described mandate enciphered message, described mandate decryption information and described preset authorization authorization information comprise: finger print information and iris information.
In this technical scheme, authorize enciphered message, authorize decryption information and preset authorization authorization information to include but not limited to: finger print information and iris information, also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
In above-mentioned arbitrary technical scheme, preferably, the communication link between described active user's terminal is set up by NFC or bluetooth.
In this technical scheme, the mode setting up the communication link between safety cabinet and active user's terminal includes but not limited to: NFC (NearFieldCommunication, near-field communication/the short distance wireless communication technology) or bluetooth, the mode of communication smoothly therebetween also can be realized by other.
According to a second aspect of the invention, propose a kind of safe verification method, comprising: receive the subscriber identity information from the unauthorized user of safety cabinet and temporary key; Judge that whether described unauthorized user is the temporary Authorization user of described safety cabinet according to described subscriber identity information; When judging that described unauthorized user is not described temporary Authorization user, termination of security proving program; When judging described unauthorized user as described temporary Authorization user, obtaining the identity identification information of authorized user, and through described temporary key, authorized enciphered message being encrypted to described identity identification information; Described mandate enciphered message is sent to described unauthorized user in the second Preset Time, opens according to described mandate enciphered message the administration authority that described safety cabinet obtains described safety cabinet for described unauthorized user.
In this technical scheme, judge whether it is the temporary Authorization user needing temporarily to open safety cabinet according to the subscriber identity information of the unauthorized user from safety cabinet received, and the safety verification program opening safety cabinet is stopped when being judged to be no, otherwise, the identity identification information of the authorized user got is encrypted authorized enciphered message through temporary key, and unauthorized user is sent in the second Preset Time, for unauthorized user according to this mandate enciphered message opening safety cabinet, wherein, second Preset Time should be less than the effective time of temporary key, to guarantee that unauthorized user can opening safety cabinet smoothly, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, with effectively solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, improve the security that ease of use guarantees safety cabinet simultaneously, thus lifting Consumer's Experience.
In technique scheme, preferably, described mandate enciphered message, described identity identification information comprise: finger print information and iris information.
In this technical scheme, mandate enciphered message, identity identification information include but not limited to: finger print information and iris information, also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
According to a third aspect of the invention we, propose a kind of safe verification method, comprise: by the communication link between safety cabinet, the subscriber identity information of pre-stored is sent to described safety cabinet, judge whether active user is authorized user or temporary Authorization user for safety cabinet and authorizes user terminal respectively according to described subscriber identity information; Receive the mandate enciphered message through encrypting from the temporary key of described safety cabinet that described authorizes user terminal sends; In the 3rd Preset Time, by described communication link, described mandate enciphered message is sent to described safety cabinet, determines whether according to described mandate enciphered message and described temporary key the administration authority opening described safety cabinet to described active user for described safety cabinet.
In this technical scheme, by the communication link between active user's terminal and safety cabinet, the subscriber identity information of pre-stored in unauthorized user terminal is sent to safety cabinet, and then determine whether it is authorized user or temporary Authorization user for safety cabinet and authorizes user terminal according to this subscriber identity information (such as, address name, contact method, head portrait, finger print information and iris information etc.), and be also included in the 3rd Preset Time and will be sent to safety cabinet through the mandate enciphered message from the temporary key encryption of safety cabinet by this communication link from authorizes user terminal, with the administration authority making safety cabinet determine whether to open to this unauthorized user safety cabinet according to this mandate enciphered message and temporary key after reaffirming current user identities, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, with effectively solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, improve the security that ease of use guarantees safety cabinet simultaneously, thus lifting Consumer's Experience.
In technique scheme, preferably, described mandate enciphered message comprises: finger print information and iris information.
In this technical scheme, enciphered message is authorized to comprise but be not limited to: finger print information and iris information also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
In technique scheme, preferably, the communication link between described safety cabinet is set up by NFC or bluetooth.
In this technical scheme, the mode setting up the communication link between active user's terminal and safety cabinet includes but not limited to: NFC (NearFieldCommunication, near-field communication/the short distance wireless communication technology) or bluetooth, the mode of communication smoothly therebetween also can be realized by other.
According to a forth aspect of the invention, propose a kind of safety verification device, comprising: first communication module, for being obtained the subscriber identity information stored in described active user's terminal by the communication link between active user's terminal; Generation module, for when judging the unauthorized user of active user as safety cabinet according to described subscriber identity information, generates temporary key; First sending module, for described subscriber identity information and described temporary key being sent to the authorizes user terminal of described safety cabinet, judge that whether described active user is the temporary Authorization user of described safety cabinet for described authorizes user terminal according to described subscriber identity information, and determine whether to send to described active user's terminal to open described safety cabinet and the mandate enciphered message of encrypting through described temporary key according to judged result.
In this technical scheme, when unauthorized user wants to open the safety cabinet needing to carry out authentication, first temporary key is generated, this temporary key can be stochastic generation, and by be used for judging active user as unauthorized user subscriber identity information (such as, address name, contact method, head portrait, finger print information and iris information etc.) and temporary key be together sent to the authorizes user terminal of safety cabinet, thus make authorizes user terminal judge whether this unauthorized user is the temporary Authorization user needing temporarily to open safety cabinet according to this subscriber identity information, and further according to judged result determine whether to this current user terminal send for opening safety cabinet and the mandate enciphered message using this temporary key to be encrypted, so, can solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, also the security of safety cabinet fully can be guaranteed while improving the ease of use of safety cabinet, thus improve Consumer's Experience.
In technique scheme, preferably, also comprise: detection module, for detect in the first Preset Time whether by described communications link reception to the described mandate enciphered message from described active user's terminal; Deciphering module, is decrypted process, with authorized decryption information by described temporary key to described mandate enciphered message for determining whether according to testing result.
In this technical scheme, preferably also comprise to detect in the first Preset Time whether by described communications link reception to the mandate enciphered message from active user's terminal, with the mandate decryption information determining whether to use this temporary key to decipher according to testing result this mandate enciphered message obtains opening safety cabinet, wherein, first Preset Time can be the effective time of this temporary key, such as 2 minutes, certainly, also can be other times value, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, the safety in utilization of safety cabinet can be improved further while guaranteeing the smooth opening safety cabinet of unauthorized user.
In above-mentioned arbitrary technical scheme, preferably, described deciphering module specifically for: when testing result is no, judge that described temporary key is invalid, otherwise, by described temporary key described mandate enciphered message is decrypted and obtains described mandate decryption information; And described safety verification device also comprises: authentication module, for judging whether described mandate decryption information mates with preset authorization authorization information; First control module, for when being judged to be coupling, controls to open described safety cabinet to described active user's Family administration authority, otherwise, control to forbid opening described safety cabinet.
In this technical scheme, if safety cabinet does not receive the mandate enciphered message from unauthorized user in the first Preset Time, then can judge that temporary key is invalid, namely cannot pass through this mandate enciphered message opening safety cabinet again after unauthorized user, guarantee the safety in utilization of safety cabinet, and when detect in the first Preset Time, to receive this mandate enciphered message time, then be decrypted authorized decryption information by this temporary key, and judge that this mandate decryption information preset authorization authorization information whether safety cabinet stores matches, and the administration authority of active user's safety cabinet authorized by opening safety cabinet when judging coupling, otherwise forbid opening this safety cabinet, so, confirm that active user is temporary Authorization user in authorizes user terminal, and at the appointed time in receive the mandate enciphered message from this active user and decipher a laggard step and demonstrate,prove its legitimacy, open safety cabinet for safety to provide and ensure further, thus improve the experience of user further.
In addition, when by communications link reception mandate enciphered message between active user's terminal, obviously, the subscriber identity information simultaneously again obtaining active user is needed to carry out identity verify, to determine whether as same user.
In above-mentioned arbitrary technical scheme, preferably, described mandate enciphered message, described mandate decryption information and described preset authorization authorization information comprise: finger print information and iris information.
In this technical scheme, authorize enciphered message, authorize decryption information and preset authorization authorization information to include but not limited to: finger print information and iris information, also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
In above-mentioned arbitrary technical scheme, preferably, described first communication module is by NFC or the communication link between bluetooth foundation with described active user's terminal.
In this technical scheme, the mode setting up the communication link between safety cabinet and active user's terminal includes but not limited to: NFC (NearFieldCommunication, near-field communication/the short distance wireless communication technology) or bluetooth, the mode of communication smoothly therebetween also can be realized by other.
According to a fifth aspect of the invention, propose a kind of safety cabinet, comprise the safety verification device according to any one of technique scheme, therefore, this safety cabinet has the technique effect identical with the safety verification device according to any one of technique scheme, does not repeat them here.
According to a sixth aspect of the invention, propose a kind of safety verification device, comprising: the first receiver module, for receiving subscriber identity information from the unauthorized user of safety cabinet and temporary key; Judge module, for judging that according to described subscriber identity information whether described unauthorized user is the temporary Authorization user of described safety cabinet; Second control module, for when judging that described unauthorized user is not described temporary Authorization user, controls termination of security proving program; Acquisition module, for when judging described unauthorized user as described temporary Authorization user, obtains the identity identification information of authorized user; Encrypting module, for being encrypted authorized enciphered message through described temporary key to described identity identification information; Second sending module, for described mandate enciphered message is sent to described unauthorized user in the second Preset Time, opens according to described mandate enciphered message the administration authority that described safety cabinet obtains described safety cabinet for described unauthorized user.
In this technical scheme, judge whether it is the temporary Authorization user needing temporarily to open safety cabinet according to the subscriber identity information of the unauthorized user from safety cabinet received, and the safety verification program opening safety cabinet is stopped when being judged to be no, otherwise, the identity identification information of the authorized user got is encrypted authorized enciphered message through temporary key, and unauthorized user is sent in the second Preset Time, for unauthorized user according to this mandate enciphered message opening safety cabinet, wherein, second Preset Time should be less than the effective time of temporary key, to guarantee that unauthorized user can opening safety cabinet smoothly, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, with effectively solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, improve the security that ease of use guarantees safety cabinet simultaneously, thus lifting Consumer's Experience.
In technique scheme, preferably, described mandate enciphered message, described identity identification information comprise: finger print information and iris information.
In this technical scheme, mandate enciphered message, identity identification information include but not limited to: finger print information and iris information, also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
According to a seventh aspect of the invention, propose a kind of terminal, comprise the safety verification device according to any one of technique scheme, therefore, this terminal has the technique effect identical with the safety verification device according to any one of technique scheme, does not repeat them here.
According to an eighth aspect of the invention, propose a kind of safety verification device, comprise: second communication module, for the subscriber identity information of pre-stored being sent to described safety cabinet by the communication link between safety cabinet, judge whether active user is authorized user or temporary Authorization user for safety cabinet and authorizes user terminal respectively according to described subscriber identity information; Second receiver module, for receiving the mandate enciphered message through encrypting from the temporary key of described safety cabinet that described authorizes user terminal sends; And described second communication module also for: in the 3rd Preset Time, by described communication link, described mandate enciphered message is sent to described safety cabinet, determines whether according to described mandate enciphered message and described temporary key the administration authority opening described safety cabinet to described active user for described safety cabinet.
In this technical scheme, by the communication link between active user's terminal and safety cabinet, the subscriber identity information of pre-stored in unauthorized user terminal is sent to safety cabinet, and then determine whether it is authorized user or temporary Authorization user for safety cabinet and authorizes user terminal according to this subscriber identity information (such as, address name, contact method, head portrait, finger print information and iris information etc.), and be also included in the 3rd Preset Time and will be sent to safety cabinet through the mandate enciphered message from the temporary key encryption of safety cabinet by this communication link from authorizes user terminal, with the administration authority making safety cabinet determine whether to open to this unauthorized user safety cabinet according to this mandate enciphered message and temporary key after reaffirming current user identities, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, with effectively solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, improve the security that ease of use guarantees safety cabinet simultaneously, thus lifting Consumer's Experience.
In technique scheme, preferably, described mandate enciphered message comprises: finger print information and iris information.
In this technical scheme, enciphered message is authorized to comprise but be not limited to: finger print information and iris information also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
In technique scheme, preferably, described second communication module is by NFC or the communication link between bluetooth foundation with described safety cabinet.
In this technical scheme, the mode setting up the communication link between active user's terminal and safety cabinet includes but not limited to: NFC (NearFieldCommunication, near-field communication/the short distance wireless communication technology) or bluetooth, the mode of communication smoothly therebetween also can be realized by other.
According to a ninth aspect of the invention, propose a kind of terminal, comprise the safety verification device according to any one of technique scheme, therefore, this terminal has the technique effect identical with the safety verification device according to any one of technique scheme, does not repeat them here.
By above technical scheme, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, with effectively solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, improve the security that ease of use guarantees safety cabinet simultaneously, thus promote Consumer's Experience.
Accompanying drawing explanation
Fig. 1 shows the schematic flow sheet of safe verification method according to an embodiment of the invention;
Fig. 2 shows the schematic flow sheet of safe verification method according to another embodiment of the invention;
Fig. 3 shows the schematic flow sheet of safe verification method according to still another embodiment of the invention;
Fig. 4 shows the block diagram of safety verification device according to an embodiment of the invention;
Fig. 5 shows the block diagram of safety verification device according to another embodiment of the invention;
Fig. 6 shows the block diagram of safety verification device according to still another embodiment of the invention;
Fig. 7 shows the block diagram of security authentication systems according to an embodiment of the invention.
Embodiment
In order to more clearly understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that, when not conflicting, the feature in the embodiment of the application and embodiment can combine mutually.
Set forth a lot of detail in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not by the restriction of following public specific embodiment.
Fig. 1 shows the schematic flow sheet of safe verification method according to an embodiment of the invention.
As shown in Figure 1, safe verification method according to an embodiment of the invention, comprising: step 102, is obtained the subscriber identity information stored in described active user's terminal by the communication link between active user's terminal; Step 104, when judging the unauthorized user of active user as safety cabinet according to described subscriber identity information, generates temporary key; Step 106, described subscriber identity information and described temporary key are sent to the authorizes user terminal of described safety cabinet, judge that whether described active user is the temporary Authorization user of described safety cabinet for described authorizes user terminal according to described subscriber identity information, and determine whether to send to described active user's terminal to open described safety cabinet and the mandate enciphered message of encrypting through described temporary key according to judged result.
In this technical scheme, when unauthorized user wants to open the safety cabinet needing to carry out authentication, first temporary key is generated, this temporary key can be stochastic generation, and by be used for judging active user as unauthorized user subscriber identity information (such as, address name, contact method, head portrait, finger print information and iris information etc.) and temporary key be together sent to the authorizes user terminal of safety cabinet, thus make authorizes user terminal judge whether this unauthorized user is the temporary Authorization user needing temporarily to open safety cabinet according to this subscriber identity information, and further according to judged result determine whether to this current user terminal send for opening safety cabinet and the mandate enciphered message using this temporary key to be encrypted, so, can solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, also the security of safety cabinet fully can be guaranteed while improving the ease of use of safety cabinet, thus improve Consumer's Experience.
In technique scheme, preferably, also comprise: detect the described mandate enciphered message whether received in the first Preset Time from described active user's terminal; Determine whether to be decrypted process, with authorized decryption information by described temporary key to described mandate enciphered message according to testing result.
In this technical scheme, preferably also comprise to detect in the first Preset Time whether by described communications link reception to the mandate enciphered message from active user's terminal, with the mandate decryption information determining whether to use this temporary key to decipher according to testing result this mandate enciphered message obtains opening safety cabinet, wherein, first Preset Time can be the effective time of this temporary key, such as 2 minutes, certainly, also can be other times value, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, the safety in utilization of safety cabinet can be improved further while guaranteeing the smooth opening safety cabinet of unauthorized user.
In above-mentioned arbitrary technical scheme, preferably, describedly determine whether to be decrypted described mandate enciphered message by described temporary key according to testing result, specifically comprise with authorized decryption information: when testing result is no, judge that described temporary key is invalid; When the test results is yes, by described temporary key described mandate enciphered message is decrypted and obtains described mandate decryption information, and judge whether described mandate decryption information mates with preset authorization authorization information; And when being judged to be coupling, open described safety cabinet to described active user's Family administration authority, otherwise, forbid opening described safety cabinet.
In this technical scheme, if safety cabinet does not receive the mandate enciphered message from unauthorized user in the first Preset Time, then can judge that temporary key is invalid, namely cannot pass through this mandate enciphered message opening safety cabinet again after unauthorized user, guarantee the safety in utilization of safety cabinet, and when detect in the first Preset Time, to receive this mandate enciphered message time, then be decrypted authorized decryption information by this temporary key, and judge that this mandate decryption information preset authorization authorization information whether safety cabinet stores matches, and the administration authority of active user's safety cabinet authorized by opening safety cabinet when judging coupling, otherwise forbid opening this safety cabinet, so, confirm that active user is temporary Authorization user in authorizes user terminal, and at the appointed time in receive the mandate enciphered message from this active user and decipher a laggard step and demonstrate,prove its legitimacy, open safety cabinet for safety to provide and ensure further, thus improve the experience of user further.
In addition, when by communications link reception mandate enciphered message between active user's terminal, obviously, the subscriber identity information simultaneously again obtaining active user is needed to carry out identity verify, to determine whether as same user.
In above-mentioned arbitrary technical scheme, preferably, described mandate enciphered message, described mandate decryption information and described preset authorization authorization information comprise: finger print information and iris information.
In this technical scheme, authorize enciphered message, authorize decryption information and preset authorization authorization information to include but not limited to: finger print information and iris information, also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
In above-mentioned arbitrary technical scheme, preferably, the communication link between described active user's terminal is set up by NFC or bluetooth.
In this technical scheme, the mode setting up the communication link between safety cabinet and active user's terminal includes but not limited to: NFC (NearFieldCommunication, near-field communication/the short distance wireless communication technology) or bluetooth, the mode of communication smoothly therebetween also can be realized by other.
Fig. 2 shows the schematic flow sheet of safe verification method according to another embodiment of the invention.
As shown in Figure 2, safe verification method according to another embodiment of the invention, comprising: step 202, receives the subscriber identity information from the unauthorized user of safety cabinet and temporary key; According to described subscriber identity information, step 204, judges that whether described unauthorized user is the temporary Authorization user of described safety cabinet, when being judged to be no, and termination of security proving program, otherwise perform step 206; Step 206, obtains the identity identification information of authorized user, and is encrypted authorized enciphered message through described temporary key to described identity identification information; Step 208, is sent to described unauthorized user by described mandate enciphered message in the second Preset Time, opens the administration authority that described safety cabinet obtains described safety cabinet for described unauthorized user according to described mandate enciphered message.
In this technical scheme, judge whether it is the temporary Authorization user needing temporarily to open safety cabinet according to the subscriber identity information of the unauthorized user from safety cabinet received, and the safety verification program opening safety cabinet is stopped when being judged to be no, otherwise, the identity identification information of the authorized user got is encrypted authorized enciphered message through temporary key, and unauthorized user is sent in the second Preset Time, for unauthorized user according to this mandate enciphered message opening safety cabinet, wherein, second Preset Time should be less than the effective time of temporary key, to guarantee that unauthorized user can opening safety cabinet smoothly, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, with effectively solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, improve the security that ease of use guarantees safety cabinet simultaneously, thus lifting Consumer's Experience.
In technique scheme, preferably, described mandate enciphered message, described identity identification information comprise: finger print information and iris information.
In this technical scheme, mandate enciphered message, identity identification information include but not limited to: finger print information and iris information, also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
Fig. 3 shows the schematic flow sheet of safe verification method according to still another embodiment of the invention.
As shown in Figure 3, safe verification method according to still another embodiment of the invention, comprise: step 302, by the communication link between safety cabinet, the subscriber identity information of pre-stored is sent to described safety cabinet, judges whether active user is authorized user or temporary Authorization user for safety cabinet and authorizes user terminal respectively according to described subscriber identity information; Step 304, receives the mandate enciphered message through encrypting from the temporary key of described safety cabinet that described authorizes user terminal sends; Step 306, in the 3rd Preset Time, by described communication link, described mandate enciphered message is sent to described safety cabinet, determines whether according to described mandate enciphered message and described temporary key the administration authority opening described safety cabinet to described active user for described safety cabinet.
In this technical scheme, by the communication link between active user's terminal and safety cabinet, the subscriber identity information of pre-stored in unauthorized user terminal is sent to safety cabinet, and then determine whether it is authorized user or temporary Authorization user for safety cabinet and authorizes user terminal according to this subscriber identity information (such as, address name, contact method, head portrait, finger print information and iris information etc.), and be also included in the 3rd Preset Time and will be sent to safety cabinet through the mandate enciphered message from the temporary key encryption of safety cabinet by this communication link from authorizes user terminal, with the administration authority making safety cabinet determine whether to open to this unauthorized user safety cabinet according to this mandate enciphered message and temporary key after reaffirming current user identities, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, with effectively solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, improve the security that ease of use guarantees safety cabinet simultaneously, thus lifting Consumer's Experience.
In technique scheme, preferably, described mandate enciphered message comprises: finger print information and iris information.
In this technical scheme, enciphered message is authorized to comprise but be not limited to: finger print information and iris information also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
In technique scheme, preferably, the communication link between described safety cabinet is set up by NFC or bluetooth.
In this technical scheme, the mode setting up the communication link between active user's terminal and safety cabinet includes but not limited to: NFC (NearFieldCommunication, near-field communication/the short distance wireless communication technology) or bluetooth, the mode of communication smoothly therebetween also can be realized by other.
Fig. 4 shows the block diagram of safety verification device according to an embodiment of the invention.
As shown in Figure 4, safety verification device 400 according to an embodiment of the invention, first communication module 402, generation module 404 and the first sending module 406.Wherein, described first communication module 402 is for obtaining the subscriber identity information stored in described active user's terminal by the communication link between active user's terminal; Described generation module 404, for when judging the unauthorized user of active user as safety cabinet according to described subscriber identity information, generates temporary key; Described first sending module 406 is for being sent to the authorizes user terminal of described safety cabinet by described subscriber identity information and described temporary key, judge that whether described active user is the temporary Authorization user of described safety cabinet for described authorizes user terminal according to described subscriber identity information, and determine whether to send to described active user's terminal to open described safety cabinet and the mandate enciphered message of encrypting through described temporary key according to judged result.
In this technical scheme, when unauthorized user wants to open the safety cabinet needing to carry out authentication, first temporary key is generated, this temporary key can be stochastic generation, and by be used for judging active user as unauthorized user subscriber identity information (such as, address name, contact method, head portrait, finger print information and iris information etc.) and temporary key be together sent to the authorizes user terminal of safety cabinet, thus make authorizes user terminal judge whether this unauthorized user is the temporary Authorization user needing temporarily to open safety cabinet according to this subscriber identity information, and further according to judged result determine whether to this current user terminal send for opening safety cabinet and the mandate enciphered message using this temporary key to be encrypted, so, can solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, also the security of safety cabinet fully can be guaranteed while improving the ease of use of safety cabinet, thus improve Consumer's Experience.
In technique scheme, preferably, also comprise: detection module 408 and deciphering module 410.Wherein, described detection module 408 for detect in the first Preset Time whether by described communications link reception to the described mandate enciphered message from described active user's terminal; Described deciphering module 410 is decrypted process, with authorized decryption information by described temporary key to described mandate enciphered message for determining whether according to testing result.
In this technical scheme, preferably also comprise to detect in the first Preset Time whether by described communications link reception to the mandate enciphered message from active user's terminal, with the mandate decryption information determining whether to use this temporary key to decipher according to testing result this mandate enciphered message obtains opening safety cabinet, wherein, first Preset Time can be the effective time of this temporary key, such as 2 minutes, certainly, also can be other times value, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, the safety in utilization of safety cabinet can be improved further while guaranteeing the smooth opening safety cabinet of unauthorized user.
In above-mentioned arbitrary technical scheme, preferably, described deciphering module 410 specifically for: when testing result is no, judge that described temporary key is invalid, otherwise, by described temporary key described mandate enciphered message is decrypted and obtains described mandate decryption information; And described safety verification device 400 also comprises: authentication module 412 and the first control module 414; Wherein, described authentication module 412 is for judging whether described mandate decryption information mates with preset authorization authorization information; Described first control module 414, for when being judged to be coupling, controls to open described safety cabinet to described active user's Family administration authority, otherwise, control to forbid opening described safety cabinet.
In this technical scheme, if safety cabinet does not receive the mandate enciphered message from unauthorized user in the first Preset Time, then can judge that temporary key is invalid, namely cannot pass through this mandate enciphered message opening safety cabinet again after unauthorized user, guarantee the safety in utilization of safety cabinet, and when detect in the first Preset Time, to receive this mandate enciphered message time, then be decrypted authorized decryption information by this temporary key, and judge that this mandate decryption information preset authorization authorization information whether safety cabinet stores matches, and the administration authority of active user's safety cabinet authorized by opening safety cabinet when judging coupling, otherwise forbid opening this safety cabinet, so, confirm that active user is temporary Authorization user in authorizes user terminal, and at the appointed time in receive the mandate enciphered message from this active user and decipher a laggard step and demonstrate,prove its legitimacy, open safety cabinet for safety to provide and ensure further, thus improve the experience of user further.
In addition, when by communications link reception mandate enciphered message between active user's terminal, obviously, the subscriber identity information simultaneously again obtaining active user is needed to carry out identity verify, to determine whether as same user.
In above-mentioned arbitrary technical scheme, preferably, described mandate enciphered message, described mandate decryption information and described preset authorization authorization information comprise: finger print information and iris information.
In this technical scheme, authorize enciphered message, authorize decryption information and preset authorization authorization information to include but not limited to: finger print information and iris information, also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
In above-mentioned arbitrary technical scheme, preferably, described first communication module 402 is by NFC or the communication link between bluetooth foundation with described active user's terminal.
In this technical scheme, the mode setting up the communication link between safety cabinet and active user's terminal includes but not limited to: NFC (NearFieldCommunication, near-field communication/the short distance wireless communication technology) or bluetooth, the mode of communication smoothly therebetween also can be realized by other.
The invention allows for a kind of safety cabinet, comprise the safety verification device 400 according to any one of technique scheme, therefore, this safety cabinet has the technique effect identical with the safety verification device 400 according to any one of technique scheme, does not repeat them here.
Fig. 5 shows the block diagram of safety verification device according to another embodiment of the invention.
As shown in Figure 5, safety verification device 500 according to another embodiment of the invention, comprising: the first receiver module 502, judge module 504, second control module 506, acquisition module 508, encrypting module 510 and the second sending module 512.Wherein, described first receiver module 502 is for receiving subscriber identity information from the unauthorized user of safety cabinet and temporary key; Described judge module 504 is for judging that according to described subscriber identity information whether described unauthorized user is the temporary Authorization user of described safety cabinet; Described second control module 506, for when judging that described unauthorized user is not described temporary Authorization user, controls termination of security proving program; Described acquisition module 508, for when judging described unauthorized user as described temporary Authorization user, obtains the identity identification information of authorized user; Described encrypting module 510 is for being encrypted authorized enciphered message through described temporary key to described identity identification information; Described second sending module 512, for described mandate enciphered message is sent to described unauthorized user in the second Preset Time, opens according to described mandate enciphered message the administration authority that described safety cabinet obtains described safety cabinet for described unauthorized user.
In this technical scheme, judge whether it is the temporary Authorization user needing temporarily to open safety cabinet according to the subscriber identity information of the unauthorized user from safety cabinet received, and the safety verification program opening safety cabinet is stopped when being judged to be no, otherwise, the identity identification information of the authorized user got is encrypted authorized enciphered message through temporary key, and unauthorized user is sent in the second Preset Time, for unauthorized user according to this mandate enciphered message opening safety cabinet, wherein, second Preset Time should be less than the effective time of temporary key, to guarantee that unauthorized user can opening safety cabinet smoothly, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, with effectively solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, improve the security that ease of use guarantees safety cabinet simultaneously, thus lifting Consumer's Experience.
In technique scheme, preferably, described mandate enciphered message, described identity identification information comprise: finger print information and iris information.
In this technical scheme, mandate enciphered message, identity identification information include but not limited to: finger print information and iris information, also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
The invention allows for a kind of terminal, comprise the safety verification device 500 according to any one of technique scheme, therefore, this terminal has the technique effect identical with the safety verification device 500 according to any one of technique scheme, does not repeat them here.
Fig. 6 shows the block diagram of safety verification device according to still another embodiment of the invention.
As shown in Figure 6, safety verification device 600 according to still another embodiment of the invention, comprising: second communication module 602 and the second receiver module 604.Wherein, according to described subscriber identity information, described second communication module 602, for the subscriber identity information of pre-stored being sent to described safety cabinet by the communication link between safety cabinet, judges whether active user is authorized user or temporary Authorization user for safety cabinet and authorizes user terminal respectively; The mandate enciphered message through encrypting from the temporary key of described safety cabinet that described second receiver module 604 sends for receiving described authorizes user terminal; And described second communication module 602 also for: in the 3rd Preset Time, by described communication link, described mandate enciphered message is sent to described safety cabinet, determines whether according to described mandate enciphered message and described temporary key the administration authority opening described safety cabinet to described active user for described safety cabinet.
In this technical scheme, by the communication link between active user's terminal and safety cabinet, the subscriber identity information of pre-stored in unauthorized user terminal is sent to safety cabinet, and then determine whether it is authorized user or temporary Authorization user for safety cabinet and authorizes user terminal according to this subscriber identity information (such as, address name, contact method, head portrait, finger print information and iris information etc.), and be also included in the 3rd Preset Time and will be sent to safety cabinet through the mandate enciphered message from the temporary key encryption of safety cabinet by this communication link from authorizes user terminal, with the administration authority making safety cabinet determine whether to open to this unauthorized user safety cabinet according to this mandate enciphered message and temporary key after reaffirming current user identities, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, with effectively solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, improve the security that ease of use guarantees safety cabinet simultaneously, thus lifting Consumer's Experience.
In technique scheme, preferably, described mandate enciphered message comprises: finger print information and iris information.
In this technical scheme, enciphered message is authorized to comprise but be not limited to: finger print information and iris information also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
In technique scheme, preferably, described second communication module 602 is by NFC or the communication link between bluetooth foundation with described safety cabinet.
In this technical scheme, the mode setting up the communication link between active user's terminal and safety cabinet includes but not limited to: NFC (NearFieldCommunication, near-field communication/the short distance wireless communication technology) or bluetooth, the mode of communication smoothly therebetween also can be realized by other.
The invention allows for a kind of terminal, comprise the safety verification device 600 according to any one of technique scheme, therefore, this terminal has the technique effect identical with the safety verification device 600 according to any one of technique scheme, does not repeat them here.
Fig. 7 shows the block diagram of security authentication systems according to an embodiment of the invention.
As shown in Figure 7, security authentication systems 700 according to an embodiment of the invention, comprising: safety cabinet 702, authorizes user terminal 704 and unauthorized user terminal 706.Wherein, described safety cabinet 702 comprises: NFC functional module 7022 (being equivalent to first communication module 402), identity verify module 7024 (being equivalent to generation module 404 and authentication module 412), built-in SIM card module 7026 (being equivalent to the first sending module 406) and fingerprint module 7028, wherein, NFC functional module 7022 is used for collecting unauthorized user information, identity verify module 7024 is used for prestoring the finger print information of authorized user, generate temporary encryption keys (i.e. temporary key, have ageing) and finger print information checking, built-in SIM card module 7026 is used for communicating with authorized user, and fingerprint module 7028 is used for gathering authorized user finger print information and process finger print information, described authorizes user terminal 704 comprises: finger print acquisition module (being equivalent to acquisition module 508), is used for gathering the finger print information (i.e. identity identification information) of authorized user, described unauthorized user terminal 706 is with NFC functional module (being namely equivalent to comprise second communication module 602), SE (the SecureElement of the NFC module of this unauthorized user terminal 706, safety element) the corresponding safety cabinet application of middle download, this application records unauthorized user personal information (i.e. subscriber identity information) simultaneously: telephone number, name etc.
Particularly, the workflow step of security authentication systems 700 is as follows:
Step 1: when unauthorized user (i.e. active user) is wanted to open the safety cabinet 702 based on fingerprint authentication, first in unauthorized user terminal 706 NFC module SE in install corresponding safety cabinet application, and fill in userspersonal information's (comprising name, cell-phone number etc.), then unauthorized user terminal 706 contacts with NFC functional module 7022 region of safety cabinet 702.
Step 2: the NFC functional module 7022 of safety cabinet 702 is collected and resolved the userspersonal information of the unauthorized user collected, and sends to identity verify module 7024.
Step 3: after identity verify module 7024 receives userspersonal information, verify with the user profile in database, if unauthorized user, then generate a temporary encryption keys (having ageing), userspersonal information and temporary encryption keys are sent to SIM card module 7026 simultaneously.
The information (comprising userspersonal information and the temporary encryption keys of unauthorized user) that identity verify module 7024 is sent by step 4:SIM card module 7026 sends to authorizes user terminal 704.
Step 5: (comprise userspersonal information and the temporary encryption keys of unauthorized user) after the information that the SIM card module 7026 that authorizes user terminal 704 collects safety cabinet 702 is sent, first temporary Authorization user is determined whether according to userspersonal information, if, it is then the finger print information gathering user by authorizes user terminal 704, and use the finger print information of temporary encryption keys to authorized user to be encrypted, then the finger print information (mandate enciphered message) after encryption is sent to unauthorized user terminal 706.
Step 6: the finger print information after the encryption received is written in the SEApplet (applet) of NFC module by unauthorized user terminal 706, unauthorized user carries out identity verify by NFC module again, NFC functional module 7022 region namely again in safety cabinet 702.
Step 7: the NFC functional module 7022 of safety cabinet 702 is by the information collected (comprising the finger print information after the userspersonal information of unauthorized user and the encryption of authorized user), and send to identity verify module 7024, the identity of identity verify module 7024 pairs of unauthorized users judges, if need the casual user of authentication (needing to judge whether to exceed the ageing of temporary encryption keys) before being judged as simultaneously, corresponding temporary encryption keys is then used to be decrypted the finger print information after encryption, finger print information after deciphering is verified in fingerprint database (collecting and process fingerprint by fingerprint module 7028 to obtain) simultaneously, if be verified, then open safety cabinet.
So, also Consumer's Experience is improved while offering convenience property.
More than be described with reference to the accompanying drawings technical scheme of the present invention, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, with effectively solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, improve the security that ease of use guarantees safety cabinet simultaneously, thus promote Consumer's Experience.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1. a safe verification method, is characterized in that, comprising:
The subscriber identity information stored in described active user's terminal is obtained by the communication link between active user's terminal;
When judging the unauthorized user of active user as safety cabinet according to described subscriber identity information, generate temporary key;
Described subscriber identity information and described temporary key are sent to the authorizes user terminal of described safety cabinet, judge that whether described active user is the temporary Authorization user of described safety cabinet for described authorizes user terminal according to described subscriber identity information, and determine whether to send to described active user's terminal to open described safety cabinet and the mandate enciphered message of encrypting through described temporary key according to judged result.
2. safe verification method according to claim 1, is characterized in that, also comprises:
To detect in the first Preset Time whether by described communications link reception to the described mandate enciphered message from described active user's terminal;
Determine whether to be decrypted process, with authorized decryption information by described temporary key to described mandate enciphered message according to testing result.
3. safe verification method according to claim 2, is characterized in that, describedly determines whether to be decrypted described mandate enciphered message by described temporary key according to testing result, specifically comprises with authorized decryption information:
When testing result is no, judge that described temporary key is invalid;
When the test results is yes, by described temporary key described mandate enciphered message is decrypted and obtains described mandate decryption information, and judge whether described mandate decryption information mates with preset authorization authorization information; And
When being judged to be coupling, open described safety cabinet to described active user's Family administration authority, otherwise, forbid opening described safety cabinet.
4. a safe verification method, is characterized in that, comprising:
Receive the subscriber identity information from the unauthorized user of safety cabinet and temporary key;
Judge that whether described unauthorized user is the temporary Authorization user of described safety cabinet according to described subscriber identity information;
When judging that described unauthorized user is not described temporary Authorization user, termination of security proving program;
When judging described unauthorized user as described temporary Authorization user, obtaining the identity identification information of authorized user, and through described temporary key, authorized enciphered message being encrypted to described identity identification information;
Described mandate enciphered message is sent to described unauthorized user in the second Preset Time, opens according to described mandate enciphered message the administration authority that described safety cabinet obtains described safety cabinet for described unauthorized user.
5. a safe verification method, is characterized in that, comprising:
By the communication link between safety cabinet, the subscriber identity information of pre-stored is sent to described safety cabinet, judges whether active user is authorized user or temporary Authorization user for safety cabinet and authorizes user terminal respectively according to described subscriber identity information;
Receive the mandate enciphered message through encrypting from the temporary key of described safety cabinet that described authorizes user terminal sends;
In the 3rd Preset Time, by described communication link, described mandate enciphered message is sent to described safety cabinet, determines whether according to described mandate enciphered message and described temporary key the administration authority opening described safety cabinet to described active user for described safety cabinet.
6. a safety verification device, is characterized in that, comprising:
First communication module, for obtaining the subscriber identity information stored in described active user's terminal by the communication link between active user's terminal;
Generation module, for when judging the unauthorized user of active user as safety cabinet according to described subscriber identity information, generates temporary key;
First sending module, for described subscriber identity information and described temporary key being sent to the authorizes user terminal of described safety cabinet, judge that whether described active user is the temporary Authorization user of described safety cabinet for described authorizes user terminal according to described subscriber identity information, and determine whether to send to described active user's terminal to open described safety cabinet and the mandate enciphered message of encrypting through described temporary key according to judged result.
7. safety verification device according to claim 6, is characterized in that, also comprise:
Detection module, for detect in the first Preset Time whether by described communications link reception to the described mandate enciphered message from described active user's terminal;
Deciphering module, is decrypted process, with authorized decryption information by described temporary key to described mandate enciphered message for determining whether according to testing result.
8. safety verification device according to claim 7, it is characterized in that, described deciphering module specifically for: when testing result is no, judge that described temporary key is invalid, otherwise, by described temporary key described mandate enciphered message is decrypted and obtains described mandate decryption information; And
Described safety verification device also comprises:
Authentication module, for judging whether described mandate decryption information mates with preset authorization authorization information;
First control module, for when being judged to be coupling, controls to open described safety cabinet to described active user's Family administration authority, otherwise, control to forbid opening described safety cabinet.
9. a safety verification device, is characterized in that, comprising:
First receiver module, for receiving subscriber identity information from the unauthorized user of safety cabinet and temporary key;
Judge module, for judging that according to described subscriber identity information whether described unauthorized user is the temporary Authorization user of described safety cabinet;
Second control module, for when judging that described unauthorized user is not described temporary Authorization user, controls termination of security proving program;
Acquisition module, for when judging described unauthorized user as described temporary Authorization user, obtains the identity identification information of authorized user;
Encrypting module, for being encrypted authorized enciphered message through described temporary key to described identity identification information;
Second sending module, for described mandate enciphered message is sent to described unauthorized user in the second Preset Time, opens according to described mandate enciphered message the administration authority that described safety cabinet obtains described safety cabinet for described unauthorized user.
10. a safety verification device, is characterized in that, comprising:
Second communication module, for the subscriber identity information of pre-stored being sent to described safety cabinet by the communication link between safety cabinet, judge whether active user is authorized user and temporary Authorization user for safety cabinet and authorizes user terminal respectively according to described subscriber identity information;
Second receiver module, for receiving the mandate enciphered message through encrypting from the temporary key of described safety cabinet that described authorizes user terminal sends; And
Described second communication module also for: in the 3rd Preset Time, by described communication link, described mandate enciphered message is sent to described safety cabinet, determines whether according to described mandate enciphered message and described temporary key the administration authority opening described safety cabinet to described active user for described safety cabinet.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510703624.4A CN105405185B (en) | 2015-10-23 | 2015-10-23 | Safe verification method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510703624.4A CN105405185B (en) | 2015-10-23 | 2015-10-23 | Safe verification method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105405185A true CN105405185A (en) | 2016-03-16 |
CN105405185B CN105405185B (en) | 2018-10-26 |
Family
ID=55470650
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510703624.4A Active CN105405185B (en) | 2015-10-23 | 2015-10-23 | Safe verification method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105405185B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105550553A (en) * | 2015-06-30 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Permission management method, terminal, device and system |
CN106056713A (en) * | 2016-06-08 | 2016-10-26 | 珠海明居智能科技有限公司 | Remote authorization method for combination locks |
CN106127888A (en) * | 2016-06-14 | 2016-11-16 | 天津宅美智能科技有限公司 | Smart lock operational approach and smart lock operating system |
CN106778178A (en) * | 2016-12-28 | 2017-05-31 | 广东虹勤通讯技术有限公司 | The call method and device of fingerprint business card |
CN108320355A (en) * | 2017-12-29 | 2018-07-24 | 中国船舶重工集团公司第七八研究所 | A kind of the emergency cryptosystem open system and its open method of intelligent door lock |
CN108734818A (en) * | 2017-04-25 | 2018-11-02 | 北京猎户星空科技有限公司 | Gate inhibition's operating method, device, terminal device and server |
CN109255211A (en) * | 2017-07-12 | 2019-01-22 | 波音公司 | Mobile security countermeasure |
CN110443936A (en) * | 2019-09-09 | 2019-11-12 | 珠海格力电器股份有限公司 | Control method, device, equipment, locker and the storage medium of cabinet door |
CN115664865A (en) * | 2022-12-27 | 2023-01-31 | 安徽国审信息科技有限公司 | Verification data transmission method, system, computer equipment and storage medium |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101551920A (en) * | 2009-05-04 | 2009-10-07 | 中兴通讯股份有限公司 | Entrance guard system and validated user remote unlocking method |
CN101833804A (en) * | 2010-04-30 | 2010-09-15 | 中山大学 | Access control system with remote identity authentication |
CN103366434A (en) * | 2013-07-28 | 2013-10-23 | 桂林理工大学 | Control method for electronic lock |
CN103729926A (en) * | 2014-01-20 | 2014-04-16 | 陈万兴 | Bluetooth access control system based on remote authorization of intelligent terminal and control method thereof |
WO2014081223A1 (en) * | 2012-11-26 | 2014-05-30 | Kim Sun Wook | Home door-lock system allowing remote opening and closing control, and method therefor |
CN104123777A (en) * | 2014-08-05 | 2014-10-29 | 上海众人科技有限公司 | Access control remote authorization method |
CN104167040A (en) * | 2014-09-02 | 2014-11-26 | 深圳攀多物联科技有限公司 | Remote control method and system of electronic lock |
CN104219058A (en) * | 2014-09-28 | 2014-12-17 | 小米科技有限责任公司 | Identity authentication and authorization method and device |
CN104484929A (en) * | 2014-12-22 | 2015-04-01 | 唐玉勇 | Novel community safety application system and implementing method |
CN104599349A (en) * | 2013-10-30 | 2015-05-06 | 海尔集团公司 | Management method for access control system |
CN104732626A (en) * | 2015-01-22 | 2015-06-24 | 西安酷派软件科技有限公司 | Entrance guard authorization management method and entrance guard authorization management system |
CN104809773A (en) * | 2014-01-23 | 2015-07-29 | 中国移动通信集团公司 | Entrance guard control method, entrance guard control apparatus, and entrance guard system |
CN104952130A (en) * | 2015-06-16 | 2015-09-30 | 广州杰赛科技股份有限公司 | Intelligent lock control method and device as well as system |
-
2015
- 2015-10-23 CN CN201510703624.4A patent/CN105405185B/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101551920A (en) * | 2009-05-04 | 2009-10-07 | 中兴通讯股份有限公司 | Entrance guard system and validated user remote unlocking method |
CN101833804A (en) * | 2010-04-30 | 2010-09-15 | 中山大学 | Access control system with remote identity authentication |
WO2014081223A1 (en) * | 2012-11-26 | 2014-05-30 | Kim Sun Wook | Home door-lock system allowing remote opening and closing control, and method therefor |
CN103366434A (en) * | 2013-07-28 | 2013-10-23 | 桂林理工大学 | Control method for electronic lock |
CN104599349A (en) * | 2013-10-30 | 2015-05-06 | 海尔集团公司 | Management method for access control system |
CN103729926A (en) * | 2014-01-20 | 2014-04-16 | 陈万兴 | Bluetooth access control system based on remote authorization of intelligent terminal and control method thereof |
CN104809773A (en) * | 2014-01-23 | 2015-07-29 | 中国移动通信集团公司 | Entrance guard control method, entrance guard control apparatus, and entrance guard system |
CN104123777A (en) * | 2014-08-05 | 2014-10-29 | 上海众人科技有限公司 | Access control remote authorization method |
CN104167040A (en) * | 2014-09-02 | 2014-11-26 | 深圳攀多物联科技有限公司 | Remote control method and system of electronic lock |
CN104219058A (en) * | 2014-09-28 | 2014-12-17 | 小米科技有限责任公司 | Identity authentication and authorization method and device |
CN104484929A (en) * | 2014-12-22 | 2015-04-01 | 唐玉勇 | Novel community safety application system and implementing method |
CN104732626A (en) * | 2015-01-22 | 2015-06-24 | 西安酷派软件科技有限公司 | Entrance guard authorization management method and entrance guard authorization management system |
CN104952130A (en) * | 2015-06-16 | 2015-09-30 | 广州杰赛科技股份有限公司 | Intelligent lock control method and device as well as system |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105550553B (en) * | 2015-06-30 | 2019-11-12 | 宇龙计算机通信科技(深圳)有限公司 | A kind of right management method, terminal, equipment and system |
CN105550553A (en) * | 2015-06-30 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Permission management method, terminal, device and system |
CN106056713A (en) * | 2016-06-08 | 2016-10-26 | 珠海明居智能科技有限公司 | Remote authorization method for combination locks |
CN106056713B (en) * | 2016-06-08 | 2019-02-15 | 珠海明居智能科技有限公司 | A kind of remote-authorization method of coded lock |
CN106127888B (en) * | 2016-06-14 | 2019-06-11 | 天津宅美智能科技有限公司 | Intelligent lock operation method and smart lock operating system |
CN106127888A (en) * | 2016-06-14 | 2016-11-16 | 天津宅美智能科技有限公司 | Smart lock operational approach and smart lock operating system |
CN106778178A (en) * | 2016-12-28 | 2017-05-31 | 广东虹勤通讯技术有限公司 | The call method and device of fingerprint business card |
CN108734818A (en) * | 2017-04-25 | 2018-11-02 | 北京猎户星空科技有限公司 | Gate inhibition's operating method, device, terminal device and server |
CN109255211A (en) * | 2017-07-12 | 2019-01-22 | 波音公司 | Mobile security countermeasure |
CN109255211B (en) * | 2017-07-12 | 2023-09-15 | 波音公司 | Mobile security countermeasure |
CN108320355A (en) * | 2017-12-29 | 2018-07-24 | 中国船舶重工集团公司第七八研究所 | A kind of the emergency cryptosystem open system and its open method of intelligent door lock |
CN110443936A (en) * | 2019-09-09 | 2019-11-12 | 珠海格力电器股份有限公司 | Control method, device, equipment, locker and the storage medium of cabinet door |
CN115664865A (en) * | 2022-12-27 | 2023-01-31 | 安徽国审信息科技有限公司 | Verification data transmission method, system, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN105405185B (en) | 2018-10-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105405185A (en) | Safety verifying method and apparatus thereof | |
CN108551455B (en) | Configuration method and device of smart card | |
CN105654580B (en) | Access control method and system, electronic lock, management and visitor's terminal | |
CN105516103B (en) | Method, device and system for binding intelligent household electrical appliance | |
EP2579220A1 (en) | Entrance guard control method and system thereof | |
CN108471610B (en) | Bluetooth connection control system | |
CN105847247A (en) | Authentication system and working method thereof | |
CN107454035B (en) | Identity authentication method and device | |
WO2007027290A2 (en) | Method and apparatus for user authentication | |
JP2005196776A (en) | Safe data communication method and its system between communication terminal and communication equipment | |
CN103297403A (en) | Method and system for achieving dynamic password authentication | |
CN101621794A (en) | Method for realizing safe authentication of wireless application service system | |
KR101716067B1 (en) | Method for mutual authentication between a terminal and a remote server by means of a third-party portal | |
CN110738776B (en) | Method and system for opening Bluetooth access control, Bluetooth device and working method thereof | |
CN104144411B (en) | Encryption, decryption terminal and the encryption and decryption approaches applied to terminal | |
CN104424676A (en) | Identity information sending method, identity information sending device, access control card reader and access control system | |
CN106850540A (en) | A kind of terminal control method, terminal and system | |
CN112672342B (en) | Data transmission method, device, equipment, system and storage medium | |
CN106792700A (en) | The method for building up and system of a kind of secure communication environment of wearable device | |
CN105631271A (en) | Unlocking method, unlocking device, wearable intelligent equipment and terminal | |
CN114765534A (en) | Private key distribution system based on national password identification cryptographic algorithm | |
CN105868975A (en) | Electronic finance account management method and system, and mobile terminal | |
CN112020716A (en) | Remote biometric identification | |
CN109151823A (en) | The method and system of eSIM card authentication | |
CN109451504B (en) | Internet of things module authentication method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20231213 Address after: 518000 floor 21, block a, Kupai building, intersection of Keyuan Avenue and Baoshen Road, north high tech Zone, songpingshan community, Xili street, Nanshan District, Shenzhen, Guangdong Patentee after: YULONG COMPUTER TELECOMMUNICATION SCIENTIFIC (SHENZHEN) Co.,Ltd. Address before: 523000 Dongguan Songshan Lake Hi-tech Industrial Development Zone, Guangdong Province Patentee before: DONGGUAN COOLPAD SOFTWARE TECH Co.,Ltd. |
|
TR01 | Transfer of patent right |