CN105405185A - Safety verifying method and apparatus thereof - Google Patents

Safety verifying method and apparatus thereof Download PDF

Info

Publication number
CN105405185A
CN105405185A CN201510703624.4A CN201510703624A CN105405185A CN 105405185 A CN105405185 A CN 105405185A CN 201510703624 A CN201510703624 A CN 201510703624A CN 105405185 A CN105405185 A CN 105405185A
Authority
CN
China
Prior art keywords
user
safety cabinet
mandate
enciphered message
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510703624.4A
Other languages
Chinese (zh)
Other versions
CN105405185B (en
Inventor
田永胜
路雄博
王秀卫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Dongguan Coolpad Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongguan Coolpad Software Technology Co Ltd filed Critical Dongguan Coolpad Software Technology Co Ltd
Priority to CN201510703624.4A priority Critical patent/CN105405185B/en
Publication of CN105405185A publication Critical patent/CN105405185A/en
Application granted granted Critical
Publication of CN105405185B publication Critical patent/CN105405185B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00912Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for safes, strong-rooms, vaults or the like

Abstract

The invention provides a safety verifying method and a safety verifying apparatus. The safety verifying method comprises the following steps: user identity information stored in a current user terminal is obtained through a communication link with the current user terminal; a temporary secret key is generated when the current user is judged to be the unauthorized user of a safety cabinet according to the user identity information; and the user identity information and the temporary secret key are sent to the authorized user of the safety cabinet to make the authorized user judge whether the current user as the temporarily authorized user of the safety cabinet according to the user identity information, and whether temporarily authorized authorization encryption information for opening the safety cabinet or not is determined according to above obtained judgment result. The above technical scheme allows time-efficient temporary authorization authority of the safety cabinet to be open to the unauthorized user, so the problem of unable safe opening of the safety cabinet when the authorized user is not around is effectively solved, use convenience is improved, and the safety of the safety cabinet is ensured, thereby the user experience is improved.

Description

Safe verification method and device
Technical field
The present invention relates to Smart Home technical field, in particular to a kind of safe verification method and a kind of safety verification device.
Background technology
At present, when third party (refers to the user not carrying out safety certification (such as finger print identifying) in safety cabinet authentication system, i.e. unauthorized user) when wanting the thing got in safety cabinet, after in person must being opened by authorized user (referring to the user carrying out safety certification (such as finger print identifying) in safe system), again the thing of safety cabinet is taken out and give third party (unauthorized user), that is, for third party's (unauthorized user) that temporary needs opens safety cabinet, authorized user can only be sought help from, opened by authorized user, but when authorized user no longer side time, then inconvenience can be brought, have impact on the experience of user.
Therefore, how to solve when authorized user not aside time unauthorized user cannot open the technical matters that safety cabinet becomes urgently to be resolved hurrily safely.
Summary of the invention
The present invention is just based on above-mentioned technical matters, propose a kind of new technical scheme, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, with effectively solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, improve the security that ease of use guarantees safety cabinet simultaneously, thus promote Consumer's Experience.
In view of this, a first aspect of the present invention, proposes a kind of safe verification method, comprising: obtained the subscriber identity information stored in described active user's terminal by the communication link between active user's terminal; When judging the unauthorized user of active user as safety cabinet according to described subscriber identity information, generate temporary key; Described subscriber identity information and described temporary key are sent to the authorizes user terminal of described safety cabinet, judge that whether described active user is the temporary Authorization user of described safety cabinet for described authorizes user terminal according to described subscriber identity information, and determine whether to send to described active user's terminal to open described safety cabinet and the mandate enciphered message of encrypting through described temporary key according to judged result.
In this technical scheme, when unauthorized user wants to open the safety cabinet needing to carry out authentication, first temporary key is generated, this temporary key can be stochastic generation, and by be used for judging active user as unauthorized user subscriber identity information (such as, address name, contact method, head portrait, finger print information and iris information etc.) and temporary key be together sent to the authorizes user terminal of safety cabinet, thus make authorizes user terminal judge whether this unauthorized user is the temporary Authorization user needing temporarily to open safety cabinet according to this subscriber identity information, and further according to judged result determine whether to this current user terminal send for opening safety cabinet and the mandate enciphered message using this temporary key to be encrypted, so, can solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, also the security of safety cabinet fully can be guaranteed while improving the ease of use of safety cabinet, thus improve Consumer's Experience.
In technique scheme, preferably, also comprise: detect the described mandate enciphered message whether received in the first Preset Time from described active user's terminal; Determine whether to be decrypted process, with authorized decryption information by described temporary key to described mandate enciphered message according to testing result.
In this technical scheme, preferably also comprise to detect in the first Preset Time whether by described communications link reception to the mandate enciphered message from active user's terminal, with the mandate decryption information determining whether to use this temporary key to decipher according to testing result this mandate enciphered message obtains opening safety cabinet, wherein, first Preset Time can be the effective time of this temporary key, such as 2 minutes, certainly, also can be other times value, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, the safety in utilization of safety cabinet can be improved further while guaranteeing the smooth opening safety cabinet of unauthorized user.
In above-mentioned arbitrary technical scheme, preferably, describedly determine whether to be decrypted described mandate enciphered message by described temporary key according to testing result, specifically comprise with authorized decryption information: when testing result is no, judge that described temporary key is invalid; When the test results is yes, by described temporary key described mandate enciphered message is decrypted and obtains described mandate decryption information, and judge whether described mandate decryption information mates with preset authorization authorization information; And when being judged to be coupling, open described safety cabinet to described active user's Family administration authority, otherwise, forbid opening described safety cabinet.
In this technical scheme, if safety cabinet does not receive the mandate enciphered message from unauthorized user in the first Preset Time, then can judge that temporary key is invalid, namely cannot pass through this mandate enciphered message opening safety cabinet again after unauthorized user, guarantee the safety in utilization of safety cabinet, and when detect in the first Preset Time, to receive this mandate enciphered message time, then be decrypted authorized decryption information by this temporary key, and judge that this mandate decryption information preset authorization authorization information whether safety cabinet stores matches, and the administration authority of active user's safety cabinet authorized by opening safety cabinet when judging coupling, otherwise forbid opening this safety cabinet, so, confirm that active user is temporary Authorization user in authorizes user terminal, and at the appointed time in receive the mandate enciphered message from this active user and decipher a laggard step and demonstrate,prove its legitimacy, open safety cabinet for safety to provide and ensure further, thus improve the experience of user further.
In addition, when by communications link reception mandate enciphered message between active user's terminal, obviously, the subscriber identity information simultaneously again obtaining active user is needed to carry out identity verify, to determine whether as same user.
In above-mentioned arbitrary technical scheme, preferably, described mandate enciphered message, described mandate decryption information and described preset authorization authorization information comprise: finger print information and iris information.
In this technical scheme, authorize enciphered message, authorize decryption information and preset authorization authorization information to include but not limited to: finger print information and iris information, also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
In above-mentioned arbitrary technical scheme, preferably, the communication link between described active user's terminal is set up by NFC or bluetooth.
In this technical scheme, the mode setting up the communication link between safety cabinet and active user's terminal includes but not limited to: NFC (NearFieldCommunication, near-field communication/the short distance wireless communication technology) or bluetooth, the mode of communication smoothly therebetween also can be realized by other.
According to a second aspect of the invention, propose a kind of safe verification method, comprising: receive the subscriber identity information from the unauthorized user of safety cabinet and temporary key; Judge that whether described unauthorized user is the temporary Authorization user of described safety cabinet according to described subscriber identity information; When judging that described unauthorized user is not described temporary Authorization user, termination of security proving program; When judging described unauthorized user as described temporary Authorization user, obtaining the identity identification information of authorized user, and through described temporary key, authorized enciphered message being encrypted to described identity identification information; Described mandate enciphered message is sent to described unauthorized user in the second Preset Time, opens according to described mandate enciphered message the administration authority that described safety cabinet obtains described safety cabinet for described unauthorized user.
In this technical scheme, judge whether it is the temporary Authorization user needing temporarily to open safety cabinet according to the subscriber identity information of the unauthorized user from safety cabinet received, and the safety verification program opening safety cabinet is stopped when being judged to be no, otherwise, the identity identification information of the authorized user got is encrypted authorized enciphered message through temporary key, and unauthorized user is sent in the second Preset Time, for unauthorized user according to this mandate enciphered message opening safety cabinet, wherein, second Preset Time should be less than the effective time of temporary key, to guarantee that unauthorized user can opening safety cabinet smoothly, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, with effectively solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, improve the security that ease of use guarantees safety cabinet simultaneously, thus lifting Consumer's Experience.
In technique scheme, preferably, described mandate enciphered message, described identity identification information comprise: finger print information and iris information.
In this technical scheme, mandate enciphered message, identity identification information include but not limited to: finger print information and iris information, also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
According to a third aspect of the invention we, propose a kind of safe verification method, comprise: by the communication link between safety cabinet, the subscriber identity information of pre-stored is sent to described safety cabinet, judge whether active user is authorized user or temporary Authorization user for safety cabinet and authorizes user terminal respectively according to described subscriber identity information; Receive the mandate enciphered message through encrypting from the temporary key of described safety cabinet that described authorizes user terminal sends; In the 3rd Preset Time, by described communication link, described mandate enciphered message is sent to described safety cabinet, determines whether according to described mandate enciphered message and described temporary key the administration authority opening described safety cabinet to described active user for described safety cabinet.
In this technical scheme, by the communication link between active user's terminal and safety cabinet, the subscriber identity information of pre-stored in unauthorized user terminal is sent to safety cabinet, and then determine whether it is authorized user or temporary Authorization user for safety cabinet and authorizes user terminal according to this subscriber identity information (such as, address name, contact method, head portrait, finger print information and iris information etc.), and be also included in the 3rd Preset Time and will be sent to safety cabinet through the mandate enciphered message from the temporary key encryption of safety cabinet by this communication link from authorizes user terminal, with the administration authority making safety cabinet determine whether to open to this unauthorized user safety cabinet according to this mandate enciphered message and temporary key after reaffirming current user identities, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, with effectively solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, improve the security that ease of use guarantees safety cabinet simultaneously, thus lifting Consumer's Experience.
In technique scheme, preferably, described mandate enciphered message comprises: finger print information and iris information.
In this technical scheme, enciphered message is authorized to comprise but be not limited to: finger print information and iris information also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
In technique scheme, preferably, the communication link between described safety cabinet is set up by NFC or bluetooth.
In this technical scheme, the mode setting up the communication link between active user's terminal and safety cabinet includes but not limited to: NFC (NearFieldCommunication, near-field communication/the short distance wireless communication technology) or bluetooth, the mode of communication smoothly therebetween also can be realized by other.
According to a forth aspect of the invention, propose a kind of safety verification device, comprising: first communication module, for being obtained the subscriber identity information stored in described active user's terminal by the communication link between active user's terminal; Generation module, for when judging the unauthorized user of active user as safety cabinet according to described subscriber identity information, generates temporary key; First sending module, for described subscriber identity information and described temporary key being sent to the authorizes user terminal of described safety cabinet, judge that whether described active user is the temporary Authorization user of described safety cabinet for described authorizes user terminal according to described subscriber identity information, and determine whether to send to described active user's terminal to open described safety cabinet and the mandate enciphered message of encrypting through described temporary key according to judged result.
In this technical scheme, when unauthorized user wants to open the safety cabinet needing to carry out authentication, first temporary key is generated, this temporary key can be stochastic generation, and by be used for judging active user as unauthorized user subscriber identity information (such as, address name, contact method, head portrait, finger print information and iris information etc.) and temporary key be together sent to the authorizes user terminal of safety cabinet, thus make authorizes user terminal judge whether this unauthorized user is the temporary Authorization user needing temporarily to open safety cabinet according to this subscriber identity information, and further according to judged result determine whether to this current user terminal send for opening safety cabinet and the mandate enciphered message using this temporary key to be encrypted, so, can solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, also the security of safety cabinet fully can be guaranteed while improving the ease of use of safety cabinet, thus improve Consumer's Experience.
In technique scheme, preferably, also comprise: detection module, for detect in the first Preset Time whether by described communications link reception to the described mandate enciphered message from described active user's terminal; Deciphering module, is decrypted process, with authorized decryption information by described temporary key to described mandate enciphered message for determining whether according to testing result.
In this technical scheme, preferably also comprise to detect in the first Preset Time whether by described communications link reception to the mandate enciphered message from active user's terminal, with the mandate decryption information determining whether to use this temporary key to decipher according to testing result this mandate enciphered message obtains opening safety cabinet, wherein, first Preset Time can be the effective time of this temporary key, such as 2 minutes, certainly, also can be other times value, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, the safety in utilization of safety cabinet can be improved further while guaranteeing the smooth opening safety cabinet of unauthorized user.
In above-mentioned arbitrary technical scheme, preferably, described deciphering module specifically for: when testing result is no, judge that described temporary key is invalid, otherwise, by described temporary key described mandate enciphered message is decrypted and obtains described mandate decryption information; And described safety verification device also comprises: authentication module, for judging whether described mandate decryption information mates with preset authorization authorization information; First control module, for when being judged to be coupling, controls to open described safety cabinet to described active user's Family administration authority, otherwise, control to forbid opening described safety cabinet.
In this technical scheme, if safety cabinet does not receive the mandate enciphered message from unauthorized user in the first Preset Time, then can judge that temporary key is invalid, namely cannot pass through this mandate enciphered message opening safety cabinet again after unauthorized user, guarantee the safety in utilization of safety cabinet, and when detect in the first Preset Time, to receive this mandate enciphered message time, then be decrypted authorized decryption information by this temporary key, and judge that this mandate decryption information preset authorization authorization information whether safety cabinet stores matches, and the administration authority of active user's safety cabinet authorized by opening safety cabinet when judging coupling, otherwise forbid opening this safety cabinet, so, confirm that active user is temporary Authorization user in authorizes user terminal, and at the appointed time in receive the mandate enciphered message from this active user and decipher a laggard step and demonstrate,prove its legitimacy, open safety cabinet for safety to provide and ensure further, thus improve the experience of user further.
In addition, when by communications link reception mandate enciphered message between active user's terminal, obviously, the subscriber identity information simultaneously again obtaining active user is needed to carry out identity verify, to determine whether as same user.
In above-mentioned arbitrary technical scheme, preferably, described mandate enciphered message, described mandate decryption information and described preset authorization authorization information comprise: finger print information and iris information.
In this technical scheme, authorize enciphered message, authorize decryption information and preset authorization authorization information to include but not limited to: finger print information and iris information, also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
In above-mentioned arbitrary technical scheme, preferably, described first communication module is by NFC or the communication link between bluetooth foundation with described active user's terminal.
In this technical scheme, the mode setting up the communication link between safety cabinet and active user's terminal includes but not limited to: NFC (NearFieldCommunication, near-field communication/the short distance wireless communication technology) or bluetooth, the mode of communication smoothly therebetween also can be realized by other.
According to a fifth aspect of the invention, propose a kind of safety cabinet, comprise the safety verification device according to any one of technique scheme, therefore, this safety cabinet has the technique effect identical with the safety verification device according to any one of technique scheme, does not repeat them here.
According to a sixth aspect of the invention, propose a kind of safety verification device, comprising: the first receiver module, for receiving subscriber identity information from the unauthorized user of safety cabinet and temporary key; Judge module, for judging that according to described subscriber identity information whether described unauthorized user is the temporary Authorization user of described safety cabinet; Second control module, for when judging that described unauthorized user is not described temporary Authorization user, controls termination of security proving program; Acquisition module, for when judging described unauthorized user as described temporary Authorization user, obtains the identity identification information of authorized user; Encrypting module, for being encrypted authorized enciphered message through described temporary key to described identity identification information; Second sending module, for described mandate enciphered message is sent to described unauthorized user in the second Preset Time, opens according to described mandate enciphered message the administration authority that described safety cabinet obtains described safety cabinet for described unauthorized user.
In this technical scheme, judge whether it is the temporary Authorization user needing temporarily to open safety cabinet according to the subscriber identity information of the unauthorized user from safety cabinet received, and the safety verification program opening safety cabinet is stopped when being judged to be no, otherwise, the identity identification information of the authorized user got is encrypted authorized enciphered message through temporary key, and unauthorized user is sent in the second Preset Time, for unauthorized user according to this mandate enciphered message opening safety cabinet, wherein, second Preset Time should be less than the effective time of temporary key, to guarantee that unauthorized user can opening safety cabinet smoothly, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, with effectively solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, improve the security that ease of use guarantees safety cabinet simultaneously, thus lifting Consumer's Experience.
In technique scheme, preferably, described mandate enciphered message, described identity identification information comprise: finger print information and iris information.
In this technical scheme, mandate enciphered message, identity identification information include but not limited to: finger print information and iris information, also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
According to a seventh aspect of the invention, propose a kind of terminal, comprise the safety verification device according to any one of technique scheme, therefore, this terminal has the technique effect identical with the safety verification device according to any one of technique scheme, does not repeat them here.
According to an eighth aspect of the invention, propose a kind of safety verification device, comprise: second communication module, for the subscriber identity information of pre-stored being sent to described safety cabinet by the communication link between safety cabinet, judge whether active user is authorized user or temporary Authorization user for safety cabinet and authorizes user terminal respectively according to described subscriber identity information; Second receiver module, for receiving the mandate enciphered message through encrypting from the temporary key of described safety cabinet that described authorizes user terminal sends; And described second communication module also for: in the 3rd Preset Time, by described communication link, described mandate enciphered message is sent to described safety cabinet, determines whether according to described mandate enciphered message and described temporary key the administration authority opening described safety cabinet to described active user for described safety cabinet.
In this technical scheme, by the communication link between active user's terminal and safety cabinet, the subscriber identity information of pre-stored in unauthorized user terminal is sent to safety cabinet, and then determine whether it is authorized user or temporary Authorization user for safety cabinet and authorizes user terminal according to this subscriber identity information (such as, address name, contact method, head portrait, finger print information and iris information etc.), and be also included in the 3rd Preset Time and will be sent to safety cabinet through the mandate enciphered message from the temporary key encryption of safety cabinet by this communication link from authorizes user terminal, with the administration authority making safety cabinet determine whether to open to this unauthorized user safety cabinet according to this mandate enciphered message and temporary key after reaffirming current user identities, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, with effectively solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, improve the security that ease of use guarantees safety cabinet simultaneously, thus lifting Consumer's Experience.
In technique scheme, preferably, described mandate enciphered message comprises: finger print information and iris information.
In this technical scheme, enciphered message is authorized to comprise but be not limited to: finger print information and iris information also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
In technique scheme, preferably, described second communication module is by NFC or the communication link between bluetooth foundation with described safety cabinet.
In this technical scheme, the mode setting up the communication link between active user's terminal and safety cabinet includes but not limited to: NFC (NearFieldCommunication, near-field communication/the short distance wireless communication technology) or bluetooth, the mode of communication smoothly therebetween also can be realized by other.
According to a ninth aspect of the invention, propose a kind of terminal, comprise the safety verification device according to any one of technique scheme, therefore, this terminal has the technique effect identical with the safety verification device according to any one of technique scheme, does not repeat them here.
By above technical scheme, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, with effectively solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, improve the security that ease of use guarantees safety cabinet simultaneously, thus promote Consumer's Experience.
Accompanying drawing explanation
Fig. 1 shows the schematic flow sheet of safe verification method according to an embodiment of the invention;
Fig. 2 shows the schematic flow sheet of safe verification method according to another embodiment of the invention;
Fig. 3 shows the schematic flow sheet of safe verification method according to still another embodiment of the invention;
Fig. 4 shows the block diagram of safety verification device according to an embodiment of the invention;
Fig. 5 shows the block diagram of safety verification device according to another embodiment of the invention;
Fig. 6 shows the block diagram of safety verification device according to still another embodiment of the invention;
Fig. 7 shows the block diagram of security authentication systems according to an embodiment of the invention.
Embodiment
In order to more clearly understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that, when not conflicting, the feature in the embodiment of the application and embodiment can combine mutually.
Set forth a lot of detail in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not by the restriction of following public specific embodiment.
Fig. 1 shows the schematic flow sheet of safe verification method according to an embodiment of the invention.
As shown in Figure 1, safe verification method according to an embodiment of the invention, comprising: step 102, is obtained the subscriber identity information stored in described active user's terminal by the communication link between active user's terminal; Step 104, when judging the unauthorized user of active user as safety cabinet according to described subscriber identity information, generates temporary key; Step 106, described subscriber identity information and described temporary key are sent to the authorizes user terminal of described safety cabinet, judge that whether described active user is the temporary Authorization user of described safety cabinet for described authorizes user terminal according to described subscriber identity information, and determine whether to send to described active user's terminal to open described safety cabinet and the mandate enciphered message of encrypting through described temporary key according to judged result.
In this technical scheme, when unauthorized user wants to open the safety cabinet needing to carry out authentication, first temporary key is generated, this temporary key can be stochastic generation, and by be used for judging active user as unauthorized user subscriber identity information (such as, address name, contact method, head portrait, finger print information and iris information etc.) and temporary key be together sent to the authorizes user terminal of safety cabinet, thus make authorizes user terminal judge whether this unauthorized user is the temporary Authorization user needing temporarily to open safety cabinet according to this subscriber identity information, and further according to judged result determine whether to this current user terminal send for opening safety cabinet and the mandate enciphered message using this temporary key to be encrypted, so, can solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, also the security of safety cabinet fully can be guaranteed while improving the ease of use of safety cabinet, thus improve Consumer's Experience.
In technique scheme, preferably, also comprise: detect the described mandate enciphered message whether received in the first Preset Time from described active user's terminal; Determine whether to be decrypted process, with authorized decryption information by described temporary key to described mandate enciphered message according to testing result.
In this technical scheme, preferably also comprise to detect in the first Preset Time whether by described communications link reception to the mandate enciphered message from active user's terminal, with the mandate decryption information determining whether to use this temporary key to decipher according to testing result this mandate enciphered message obtains opening safety cabinet, wherein, first Preset Time can be the effective time of this temporary key, such as 2 minutes, certainly, also can be other times value, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, the safety in utilization of safety cabinet can be improved further while guaranteeing the smooth opening safety cabinet of unauthorized user.
In above-mentioned arbitrary technical scheme, preferably, describedly determine whether to be decrypted described mandate enciphered message by described temporary key according to testing result, specifically comprise with authorized decryption information: when testing result is no, judge that described temporary key is invalid; When the test results is yes, by described temporary key described mandate enciphered message is decrypted and obtains described mandate decryption information, and judge whether described mandate decryption information mates with preset authorization authorization information; And when being judged to be coupling, open described safety cabinet to described active user's Family administration authority, otherwise, forbid opening described safety cabinet.
In this technical scheme, if safety cabinet does not receive the mandate enciphered message from unauthorized user in the first Preset Time, then can judge that temporary key is invalid, namely cannot pass through this mandate enciphered message opening safety cabinet again after unauthorized user, guarantee the safety in utilization of safety cabinet, and when detect in the first Preset Time, to receive this mandate enciphered message time, then be decrypted authorized decryption information by this temporary key, and judge that this mandate decryption information preset authorization authorization information whether safety cabinet stores matches, and the administration authority of active user's safety cabinet authorized by opening safety cabinet when judging coupling, otherwise forbid opening this safety cabinet, so, confirm that active user is temporary Authorization user in authorizes user terminal, and at the appointed time in receive the mandate enciphered message from this active user and decipher a laggard step and demonstrate,prove its legitimacy, open safety cabinet for safety to provide and ensure further, thus improve the experience of user further.
In addition, when by communications link reception mandate enciphered message between active user's terminal, obviously, the subscriber identity information simultaneously again obtaining active user is needed to carry out identity verify, to determine whether as same user.
In above-mentioned arbitrary technical scheme, preferably, described mandate enciphered message, described mandate decryption information and described preset authorization authorization information comprise: finger print information and iris information.
In this technical scheme, authorize enciphered message, authorize decryption information and preset authorization authorization information to include but not limited to: finger print information and iris information, also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
In above-mentioned arbitrary technical scheme, preferably, the communication link between described active user's terminal is set up by NFC or bluetooth.
In this technical scheme, the mode setting up the communication link between safety cabinet and active user's terminal includes but not limited to: NFC (NearFieldCommunication, near-field communication/the short distance wireless communication technology) or bluetooth, the mode of communication smoothly therebetween also can be realized by other.
Fig. 2 shows the schematic flow sheet of safe verification method according to another embodiment of the invention.
As shown in Figure 2, safe verification method according to another embodiment of the invention, comprising: step 202, receives the subscriber identity information from the unauthorized user of safety cabinet and temporary key; According to described subscriber identity information, step 204, judges that whether described unauthorized user is the temporary Authorization user of described safety cabinet, when being judged to be no, and termination of security proving program, otherwise perform step 206; Step 206, obtains the identity identification information of authorized user, and is encrypted authorized enciphered message through described temporary key to described identity identification information; Step 208, is sent to described unauthorized user by described mandate enciphered message in the second Preset Time, opens the administration authority that described safety cabinet obtains described safety cabinet for described unauthorized user according to described mandate enciphered message.
In this technical scheme, judge whether it is the temporary Authorization user needing temporarily to open safety cabinet according to the subscriber identity information of the unauthorized user from safety cabinet received, and the safety verification program opening safety cabinet is stopped when being judged to be no, otherwise, the identity identification information of the authorized user got is encrypted authorized enciphered message through temporary key, and unauthorized user is sent in the second Preset Time, for unauthorized user according to this mandate enciphered message opening safety cabinet, wherein, second Preset Time should be less than the effective time of temporary key, to guarantee that unauthorized user can opening safety cabinet smoothly, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, with effectively solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, improve the security that ease of use guarantees safety cabinet simultaneously, thus lifting Consumer's Experience.
In technique scheme, preferably, described mandate enciphered message, described identity identification information comprise: finger print information and iris information.
In this technical scheme, mandate enciphered message, identity identification information include but not limited to: finger print information and iris information, also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
Fig. 3 shows the schematic flow sheet of safe verification method according to still another embodiment of the invention.
As shown in Figure 3, safe verification method according to still another embodiment of the invention, comprise: step 302, by the communication link between safety cabinet, the subscriber identity information of pre-stored is sent to described safety cabinet, judges whether active user is authorized user or temporary Authorization user for safety cabinet and authorizes user terminal respectively according to described subscriber identity information; Step 304, receives the mandate enciphered message through encrypting from the temporary key of described safety cabinet that described authorizes user terminal sends; Step 306, in the 3rd Preset Time, by described communication link, described mandate enciphered message is sent to described safety cabinet, determines whether according to described mandate enciphered message and described temporary key the administration authority opening described safety cabinet to described active user for described safety cabinet.
In this technical scheme, by the communication link between active user's terminal and safety cabinet, the subscriber identity information of pre-stored in unauthorized user terminal is sent to safety cabinet, and then determine whether it is authorized user or temporary Authorization user for safety cabinet and authorizes user terminal according to this subscriber identity information (such as, address name, contact method, head portrait, finger print information and iris information etc.), and be also included in the 3rd Preset Time and will be sent to safety cabinet through the mandate enciphered message from the temporary key encryption of safety cabinet by this communication link from authorizes user terminal, with the administration authority making safety cabinet determine whether to open to this unauthorized user safety cabinet according to this mandate enciphered message and temporary key after reaffirming current user identities, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, with effectively solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, improve the security that ease of use guarantees safety cabinet simultaneously, thus lifting Consumer's Experience.
In technique scheme, preferably, described mandate enciphered message comprises: finger print information and iris information.
In this technical scheme, enciphered message is authorized to comprise but be not limited to: finger print information and iris information also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
In technique scheme, preferably, the communication link between described safety cabinet is set up by NFC or bluetooth.
In this technical scheme, the mode setting up the communication link between active user's terminal and safety cabinet includes but not limited to: NFC (NearFieldCommunication, near-field communication/the short distance wireless communication technology) or bluetooth, the mode of communication smoothly therebetween also can be realized by other.
Fig. 4 shows the block diagram of safety verification device according to an embodiment of the invention.
As shown in Figure 4, safety verification device 400 according to an embodiment of the invention, first communication module 402, generation module 404 and the first sending module 406.Wherein, described first communication module 402 is for obtaining the subscriber identity information stored in described active user's terminal by the communication link between active user's terminal; Described generation module 404, for when judging the unauthorized user of active user as safety cabinet according to described subscriber identity information, generates temporary key; Described first sending module 406 is for being sent to the authorizes user terminal of described safety cabinet by described subscriber identity information and described temporary key, judge that whether described active user is the temporary Authorization user of described safety cabinet for described authorizes user terminal according to described subscriber identity information, and determine whether to send to described active user's terminal to open described safety cabinet and the mandate enciphered message of encrypting through described temporary key according to judged result.
In this technical scheme, when unauthorized user wants to open the safety cabinet needing to carry out authentication, first temporary key is generated, this temporary key can be stochastic generation, and by be used for judging active user as unauthorized user subscriber identity information (such as, address name, contact method, head portrait, finger print information and iris information etc.) and temporary key be together sent to the authorizes user terminal of safety cabinet, thus make authorizes user terminal judge whether this unauthorized user is the temporary Authorization user needing temporarily to open safety cabinet according to this subscriber identity information, and further according to judged result determine whether to this current user terminal send for opening safety cabinet and the mandate enciphered message using this temporary key to be encrypted, so, can solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, also the security of safety cabinet fully can be guaranteed while improving the ease of use of safety cabinet, thus improve Consumer's Experience.
In technique scheme, preferably, also comprise: detection module 408 and deciphering module 410.Wherein, described detection module 408 for detect in the first Preset Time whether by described communications link reception to the described mandate enciphered message from described active user's terminal; Described deciphering module 410 is decrypted process, with authorized decryption information by described temporary key to described mandate enciphered message for determining whether according to testing result.
In this technical scheme, preferably also comprise to detect in the first Preset Time whether by described communications link reception to the mandate enciphered message from active user's terminal, with the mandate decryption information determining whether to use this temporary key to decipher according to testing result this mandate enciphered message obtains opening safety cabinet, wherein, first Preset Time can be the effective time of this temporary key, such as 2 minutes, certainly, also can be other times value, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, the safety in utilization of safety cabinet can be improved further while guaranteeing the smooth opening safety cabinet of unauthorized user.
In above-mentioned arbitrary technical scheme, preferably, described deciphering module 410 specifically for: when testing result is no, judge that described temporary key is invalid, otherwise, by described temporary key described mandate enciphered message is decrypted and obtains described mandate decryption information; And described safety verification device 400 also comprises: authentication module 412 and the first control module 414; Wherein, described authentication module 412 is for judging whether described mandate decryption information mates with preset authorization authorization information; Described first control module 414, for when being judged to be coupling, controls to open described safety cabinet to described active user's Family administration authority, otherwise, control to forbid opening described safety cabinet.
In this technical scheme, if safety cabinet does not receive the mandate enciphered message from unauthorized user in the first Preset Time, then can judge that temporary key is invalid, namely cannot pass through this mandate enciphered message opening safety cabinet again after unauthorized user, guarantee the safety in utilization of safety cabinet, and when detect in the first Preset Time, to receive this mandate enciphered message time, then be decrypted authorized decryption information by this temporary key, and judge that this mandate decryption information preset authorization authorization information whether safety cabinet stores matches, and the administration authority of active user's safety cabinet authorized by opening safety cabinet when judging coupling, otherwise forbid opening this safety cabinet, so, confirm that active user is temporary Authorization user in authorizes user terminal, and at the appointed time in receive the mandate enciphered message from this active user and decipher a laggard step and demonstrate,prove its legitimacy, open safety cabinet for safety to provide and ensure further, thus improve the experience of user further.
In addition, when by communications link reception mandate enciphered message between active user's terminal, obviously, the subscriber identity information simultaneously again obtaining active user is needed to carry out identity verify, to determine whether as same user.
In above-mentioned arbitrary technical scheme, preferably, described mandate enciphered message, described mandate decryption information and described preset authorization authorization information comprise: finger print information and iris information.
In this technical scheme, authorize enciphered message, authorize decryption information and preset authorization authorization information to include but not limited to: finger print information and iris information, also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
In above-mentioned arbitrary technical scheme, preferably, described first communication module 402 is by NFC or the communication link between bluetooth foundation with described active user's terminal.
In this technical scheme, the mode setting up the communication link between safety cabinet and active user's terminal includes but not limited to: NFC (NearFieldCommunication, near-field communication/the short distance wireless communication technology) or bluetooth, the mode of communication smoothly therebetween also can be realized by other.
The invention allows for a kind of safety cabinet, comprise the safety verification device 400 according to any one of technique scheme, therefore, this safety cabinet has the technique effect identical with the safety verification device 400 according to any one of technique scheme, does not repeat them here.
Fig. 5 shows the block diagram of safety verification device according to another embodiment of the invention.
As shown in Figure 5, safety verification device 500 according to another embodiment of the invention, comprising: the first receiver module 502, judge module 504, second control module 506, acquisition module 508, encrypting module 510 and the second sending module 512.Wherein, described first receiver module 502 is for receiving subscriber identity information from the unauthorized user of safety cabinet and temporary key; Described judge module 504 is for judging that according to described subscriber identity information whether described unauthorized user is the temporary Authorization user of described safety cabinet; Described second control module 506, for when judging that described unauthorized user is not described temporary Authorization user, controls termination of security proving program; Described acquisition module 508, for when judging described unauthorized user as described temporary Authorization user, obtains the identity identification information of authorized user; Described encrypting module 510 is for being encrypted authorized enciphered message through described temporary key to described identity identification information; Described second sending module 512, for described mandate enciphered message is sent to described unauthorized user in the second Preset Time, opens according to described mandate enciphered message the administration authority that described safety cabinet obtains described safety cabinet for described unauthorized user.
In this technical scheme, judge whether it is the temporary Authorization user needing temporarily to open safety cabinet according to the subscriber identity information of the unauthorized user from safety cabinet received, and the safety verification program opening safety cabinet is stopped when being judged to be no, otherwise, the identity identification information of the authorized user got is encrypted authorized enciphered message through temporary key, and unauthorized user is sent in the second Preset Time, for unauthorized user according to this mandate enciphered message opening safety cabinet, wherein, second Preset Time should be less than the effective time of temporary key, to guarantee that unauthorized user can opening safety cabinet smoothly, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, with effectively solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, improve the security that ease of use guarantees safety cabinet simultaneously, thus lifting Consumer's Experience.
In technique scheme, preferably, described mandate enciphered message, described identity identification information comprise: finger print information and iris information.
In this technical scheme, mandate enciphered message, identity identification information include but not limited to: finger print information and iris information, also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
The invention allows for a kind of terminal, comprise the safety verification device 500 according to any one of technique scheme, therefore, this terminal has the technique effect identical with the safety verification device 500 according to any one of technique scheme, does not repeat them here.
Fig. 6 shows the block diagram of safety verification device according to still another embodiment of the invention.
As shown in Figure 6, safety verification device 600 according to still another embodiment of the invention, comprising: second communication module 602 and the second receiver module 604.Wherein, according to described subscriber identity information, described second communication module 602, for the subscriber identity information of pre-stored being sent to described safety cabinet by the communication link between safety cabinet, judges whether active user is authorized user or temporary Authorization user for safety cabinet and authorizes user terminal respectively; The mandate enciphered message through encrypting from the temporary key of described safety cabinet that described second receiver module 604 sends for receiving described authorizes user terminal; And described second communication module 602 also for: in the 3rd Preset Time, by described communication link, described mandate enciphered message is sent to described safety cabinet, determines whether according to described mandate enciphered message and described temporary key the administration authority opening described safety cabinet to described active user for described safety cabinet.
In this technical scheme, by the communication link between active user's terminal and safety cabinet, the subscriber identity information of pre-stored in unauthorized user terminal is sent to safety cabinet, and then determine whether it is authorized user or temporary Authorization user for safety cabinet and authorizes user terminal according to this subscriber identity information (such as, address name, contact method, head portrait, finger print information and iris information etc.), and be also included in the 3rd Preset Time and will be sent to safety cabinet through the mandate enciphered message from the temporary key encryption of safety cabinet by this communication link from authorizes user terminal, with the administration authority making safety cabinet determine whether to open to this unauthorized user safety cabinet according to this mandate enciphered message and temporary key after reaffirming current user identities, so, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, with effectively solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, improve the security that ease of use guarantees safety cabinet simultaneously, thus lifting Consumer's Experience.
In technique scheme, preferably, described mandate enciphered message comprises: finger print information and iris information.
In this technical scheme, enciphered message is authorized to comprise but be not limited to: finger print information and iris information also can be that other have the high userspersonal information of uniqueness safety verification grade, to guarantee unique validity and the security of authentication.
In technique scheme, preferably, described second communication module 602 is by NFC or the communication link between bluetooth foundation with described safety cabinet.
In this technical scheme, the mode setting up the communication link between active user's terminal and safety cabinet includes but not limited to: NFC (NearFieldCommunication, near-field communication/the short distance wireless communication technology) or bluetooth, the mode of communication smoothly therebetween also can be realized by other.
The invention allows for a kind of terminal, comprise the safety verification device 600 according to any one of technique scheme, therefore, this terminal has the technique effect identical with the safety verification device 600 according to any one of technique scheme, does not repeat them here.
Fig. 7 shows the block diagram of security authentication systems according to an embodiment of the invention.
As shown in Figure 7, security authentication systems 700 according to an embodiment of the invention, comprising: safety cabinet 702, authorizes user terminal 704 and unauthorized user terminal 706.Wherein, described safety cabinet 702 comprises: NFC functional module 7022 (being equivalent to first communication module 402), identity verify module 7024 (being equivalent to generation module 404 and authentication module 412), built-in SIM card module 7026 (being equivalent to the first sending module 406) and fingerprint module 7028, wherein, NFC functional module 7022 is used for collecting unauthorized user information, identity verify module 7024 is used for prestoring the finger print information of authorized user, generate temporary encryption keys (i.e. temporary key, have ageing) and finger print information checking, built-in SIM card module 7026 is used for communicating with authorized user, and fingerprint module 7028 is used for gathering authorized user finger print information and process finger print information, described authorizes user terminal 704 comprises: finger print acquisition module (being equivalent to acquisition module 508), is used for gathering the finger print information (i.e. identity identification information) of authorized user, described unauthorized user terminal 706 is with NFC functional module (being namely equivalent to comprise second communication module 602), SE (the SecureElement of the NFC module of this unauthorized user terminal 706, safety element) the corresponding safety cabinet application of middle download, this application records unauthorized user personal information (i.e. subscriber identity information) simultaneously: telephone number, name etc.
Particularly, the workflow step of security authentication systems 700 is as follows:
Step 1: when unauthorized user (i.e. active user) is wanted to open the safety cabinet 702 based on fingerprint authentication, first in unauthorized user terminal 706 NFC module SE in install corresponding safety cabinet application, and fill in userspersonal information's (comprising name, cell-phone number etc.), then unauthorized user terminal 706 contacts with NFC functional module 7022 region of safety cabinet 702.
Step 2: the NFC functional module 7022 of safety cabinet 702 is collected and resolved the userspersonal information of the unauthorized user collected, and sends to identity verify module 7024.
Step 3: after identity verify module 7024 receives userspersonal information, verify with the user profile in database, if unauthorized user, then generate a temporary encryption keys (having ageing), userspersonal information and temporary encryption keys are sent to SIM card module 7026 simultaneously.
The information (comprising userspersonal information and the temporary encryption keys of unauthorized user) that identity verify module 7024 is sent by step 4:SIM card module 7026 sends to authorizes user terminal 704.
Step 5: (comprise userspersonal information and the temporary encryption keys of unauthorized user) after the information that the SIM card module 7026 that authorizes user terminal 704 collects safety cabinet 702 is sent, first temporary Authorization user is determined whether according to userspersonal information, if, it is then the finger print information gathering user by authorizes user terminal 704, and use the finger print information of temporary encryption keys to authorized user to be encrypted, then the finger print information (mandate enciphered message) after encryption is sent to unauthorized user terminal 706.
Step 6: the finger print information after the encryption received is written in the SEApplet (applet) of NFC module by unauthorized user terminal 706, unauthorized user carries out identity verify by NFC module again, NFC functional module 7022 region namely again in safety cabinet 702.
Step 7: the NFC functional module 7022 of safety cabinet 702 is by the information collected (comprising the finger print information after the userspersonal information of unauthorized user and the encryption of authorized user), and send to identity verify module 7024, the identity of identity verify module 7024 pairs of unauthorized users judges, if need the casual user of authentication (needing to judge whether to exceed the ageing of temporary encryption keys) before being judged as simultaneously, corresponding temporary encryption keys is then used to be decrypted the finger print information after encryption, finger print information after deciphering is verified in fingerprint database (collecting and process fingerprint by fingerprint module 7028 to obtain) simultaneously, if be verified, then open safety cabinet.
So, also Consumer's Experience is improved while offering convenience property.
More than be described with reference to the accompanying drawings technical scheme of the present invention, by what open safety cabinet to unauthorized user, there is ageing temporary Authorization authority, with effectively solve when authorized user not aside time unauthorized user cannot open the problem of safety cabinet safely, improve the security that ease of use guarantees safety cabinet simultaneously, thus promote Consumer's Experience.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a safe verification method, is characterized in that, comprising:
The subscriber identity information stored in described active user's terminal is obtained by the communication link between active user's terminal;
When judging the unauthorized user of active user as safety cabinet according to described subscriber identity information, generate temporary key;
Described subscriber identity information and described temporary key are sent to the authorizes user terminal of described safety cabinet, judge that whether described active user is the temporary Authorization user of described safety cabinet for described authorizes user terminal according to described subscriber identity information, and determine whether to send to described active user's terminal to open described safety cabinet and the mandate enciphered message of encrypting through described temporary key according to judged result.
2. safe verification method according to claim 1, is characterized in that, also comprises:
To detect in the first Preset Time whether by described communications link reception to the described mandate enciphered message from described active user's terminal;
Determine whether to be decrypted process, with authorized decryption information by described temporary key to described mandate enciphered message according to testing result.
3. safe verification method according to claim 2, is characterized in that, describedly determines whether to be decrypted described mandate enciphered message by described temporary key according to testing result, specifically comprises with authorized decryption information:
When testing result is no, judge that described temporary key is invalid;
When the test results is yes, by described temporary key described mandate enciphered message is decrypted and obtains described mandate decryption information, and judge whether described mandate decryption information mates with preset authorization authorization information; And
When being judged to be coupling, open described safety cabinet to described active user's Family administration authority, otherwise, forbid opening described safety cabinet.
4. a safe verification method, is characterized in that, comprising:
Receive the subscriber identity information from the unauthorized user of safety cabinet and temporary key;
Judge that whether described unauthorized user is the temporary Authorization user of described safety cabinet according to described subscriber identity information;
When judging that described unauthorized user is not described temporary Authorization user, termination of security proving program;
When judging described unauthorized user as described temporary Authorization user, obtaining the identity identification information of authorized user, and through described temporary key, authorized enciphered message being encrypted to described identity identification information;
Described mandate enciphered message is sent to described unauthorized user in the second Preset Time, opens according to described mandate enciphered message the administration authority that described safety cabinet obtains described safety cabinet for described unauthorized user.
5. a safe verification method, is characterized in that, comprising:
By the communication link between safety cabinet, the subscriber identity information of pre-stored is sent to described safety cabinet, judges whether active user is authorized user or temporary Authorization user for safety cabinet and authorizes user terminal respectively according to described subscriber identity information;
Receive the mandate enciphered message through encrypting from the temporary key of described safety cabinet that described authorizes user terminal sends;
In the 3rd Preset Time, by described communication link, described mandate enciphered message is sent to described safety cabinet, determines whether according to described mandate enciphered message and described temporary key the administration authority opening described safety cabinet to described active user for described safety cabinet.
6. a safety verification device, is characterized in that, comprising:
First communication module, for obtaining the subscriber identity information stored in described active user's terminal by the communication link between active user's terminal;
Generation module, for when judging the unauthorized user of active user as safety cabinet according to described subscriber identity information, generates temporary key;
First sending module, for described subscriber identity information and described temporary key being sent to the authorizes user terminal of described safety cabinet, judge that whether described active user is the temporary Authorization user of described safety cabinet for described authorizes user terminal according to described subscriber identity information, and determine whether to send to described active user's terminal to open described safety cabinet and the mandate enciphered message of encrypting through described temporary key according to judged result.
7. safety verification device according to claim 6, is characterized in that, also comprise:
Detection module, for detect in the first Preset Time whether by described communications link reception to the described mandate enciphered message from described active user's terminal;
Deciphering module, is decrypted process, with authorized decryption information by described temporary key to described mandate enciphered message for determining whether according to testing result.
8. safety verification device according to claim 7, it is characterized in that, described deciphering module specifically for: when testing result is no, judge that described temporary key is invalid, otherwise, by described temporary key described mandate enciphered message is decrypted and obtains described mandate decryption information; And
Described safety verification device also comprises:
Authentication module, for judging whether described mandate decryption information mates with preset authorization authorization information;
First control module, for when being judged to be coupling, controls to open described safety cabinet to described active user's Family administration authority, otherwise, control to forbid opening described safety cabinet.
9. a safety verification device, is characterized in that, comprising:
First receiver module, for receiving subscriber identity information from the unauthorized user of safety cabinet and temporary key;
Judge module, for judging that according to described subscriber identity information whether described unauthorized user is the temporary Authorization user of described safety cabinet;
Second control module, for when judging that described unauthorized user is not described temporary Authorization user, controls termination of security proving program;
Acquisition module, for when judging described unauthorized user as described temporary Authorization user, obtains the identity identification information of authorized user;
Encrypting module, for being encrypted authorized enciphered message through described temporary key to described identity identification information;
Second sending module, for described mandate enciphered message is sent to described unauthorized user in the second Preset Time, opens according to described mandate enciphered message the administration authority that described safety cabinet obtains described safety cabinet for described unauthorized user.
10. a safety verification device, is characterized in that, comprising:
Second communication module, for the subscriber identity information of pre-stored being sent to described safety cabinet by the communication link between safety cabinet, judge whether active user is authorized user and temporary Authorization user for safety cabinet and authorizes user terminal respectively according to described subscriber identity information;
Second receiver module, for receiving the mandate enciphered message through encrypting from the temporary key of described safety cabinet that described authorizes user terminal sends; And
Described second communication module also for: in the 3rd Preset Time, by described communication link, described mandate enciphered message is sent to described safety cabinet, determines whether according to described mandate enciphered message and described temporary key the administration authority opening described safety cabinet to described active user for described safety cabinet.
CN201510703624.4A 2015-10-23 2015-10-23 Safe verification method and device Active CN105405185B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510703624.4A CN105405185B (en) 2015-10-23 2015-10-23 Safe verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510703624.4A CN105405185B (en) 2015-10-23 2015-10-23 Safe verification method and device

Publications (2)

Publication Number Publication Date
CN105405185A true CN105405185A (en) 2016-03-16
CN105405185B CN105405185B (en) 2018-10-26

Family

ID=55470650

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510703624.4A Active CN105405185B (en) 2015-10-23 2015-10-23 Safe verification method and device

Country Status (1)

Country Link
CN (1) CN105405185B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105550553A (en) * 2015-06-30 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Permission management method, terminal, device and system
CN106056713A (en) * 2016-06-08 2016-10-26 珠海明居智能科技有限公司 Remote authorization method for combination locks
CN106127888A (en) * 2016-06-14 2016-11-16 天津宅美智能科技有限公司 Smart lock operational approach and smart lock operating system
CN106778178A (en) * 2016-12-28 2017-05-31 广东虹勤通讯技术有限公司 The call method and device of fingerprint business card
CN108320355A (en) * 2017-12-29 2018-07-24 中国船舶重工集团公司第七八研究所 A kind of the emergency cryptosystem open system and its open method of intelligent door lock
CN108734818A (en) * 2017-04-25 2018-11-02 北京猎户星空科技有限公司 Gate inhibition's operating method, device, terminal device and server
CN109255211A (en) * 2017-07-12 2019-01-22 波音公司 Mobile security countermeasure
CN110443936A (en) * 2019-09-09 2019-11-12 珠海格力电器股份有限公司 Control method, device, equipment, locker and the storage medium of cabinet door
CN115664865A (en) * 2022-12-27 2023-01-31 安徽国审信息科技有限公司 Verification data transmission method, system, computer equipment and storage medium

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101551920A (en) * 2009-05-04 2009-10-07 中兴通讯股份有限公司 Entrance guard system and validated user remote unlocking method
CN101833804A (en) * 2010-04-30 2010-09-15 中山大学 Access control system with remote identity authentication
CN103366434A (en) * 2013-07-28 2013-10-23 桂林理工大学 Control method for electronic lock
CN103729926A (en) * 2014-01-20 2014-04-16 陈万兴 Bluetooth access control system based on remote authorization of intelligent terminal and control method thereof
WO2014081223A1 (en) * 2012-11-26 2014-05-30 Kim Sun Wook Home door-lock system allowing remote opening and closing control, and method therefor
CN104123777A (en) * 2014-08-05 2014-10-29 上海众人科技有限公司 Access control remote authorization method
CN104167040A (en) * 2014-09-02 2014-11-26 深圳攀多物联科技有限公司 Remote control method and system of electronic lock
CN104219058A (en) * 2014-09-28 2014-12-17 小米科技有限责任公司 Identity authentication and authorization method and device
CN104484929A (en) * 2014-12-22 2015-04-01 唐玉勇 Novel community safety application system and implementing method
CN104599349A (en) * 2013-10-30 2015-05-06 海尔集团公司 Management method for access control system
CN104732626A (en) * 2015-01-22 2015-06-24 西安酷派软件科技有限公司 Entrance guard authorization management method and entrance guard authorization management system
CN104809773A (en) * 2014-01-23 2015-07-29 中国移动通信集团公司 Entrance guard control method, entrance guard control apparatus, and entrance guard system
CN104952130A (en) * 2015-06-16 2015-09-30 广州杰赛科技股份有限公司 Intelligent lock control method and device as well as system

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101551920A (en) * 2009-05-04 2009-10-07 中兴通讯股份有限公司 Entrance guard system and validated user remote unlocking method
CN101833804A (en) * 2010-04-30 2010-09-15 中山大学 Access control system with remote identity authentication
WO2014081223A1 (en) * 2012-11-26 2014-05-30 Kim Sun Wook Home door-lock system allowing remote opening and closing control, and method therefor
CN103366434A (en) * 2013-07-28 2013-10-23 桂林理工大学 Control method for electronic lock
CN104599349A (en) * 2013-10-30 2015-05-06 海尔集团公司 Management method for access control system
CN103729926A (en) * 2014-01-20 2014-04-16 陈万兴 Bluetooth access control system based on remote authorization of intelligent terminal and control method thereof
CN104809773A (en) * 2014-01-23 2015-07-29 中国移动通信集团公司 Entrance guard control method, entrance guard control apparatus, and entrance guard system
CN104123777A (en) * 2014-08-05 2014-10-29 上海众人科技有限公司 Access control remote authorization method
CN104167040A (en) * 2014-09-02 2014-11-26 深圳攀多物联科技有限公司 Remote control method and system of electronic lock
CN104219058A (en) * 2014-09-28 2014-12-17 小米科技有限责任公司 Identity authentication and authorization method and device
CN104484929A (en) * 2014-12-22 2015-04-01 唐玉勇 Novel community safety application system and implementing method
CN104732626A (en) * 2015-01-22 2015-06-24 西安酷派软件科技有限公司 Entrance guard authorization management method and entrance guard authorization management system
CN104952130A (en) * 2015-06-16 2015-09-30 广州杰赛科技股份有限公司 Intelligent lock control method and device as well as system

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105550553B (en) * 2015-06-30 2019-11-12 宇龙计算机通信科技(深圳)有限公司 A kind of right management method, terminal, equipment and system
CN105550553A (en) * 2015-06-30 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Permission management method, terminal, device and system
CN106056713A (en) * 2016-06-08 2016-10-26 珠海明居智能科技有限公司 Remote authorization method for combination locks
CN106056713B (en) * 2016-06-08 2019-02-15 珠海明居智能科技有限公司 A kind of remote-authorization method of coded lock
CN106127888B (en) * 2016-06-14 2019-06-11 天津宅美智能科技有限公司 Intelligent lock operation method and smart lock operating system
CN106127888A (en) * 2016-06-14 2016-11-16 天津宅美智能科技有限公司 Smart lock operational approach and smart lock operating system
CN106778178A (en) * 2016-12-28 2017-05-31 广东虹勤通讯技术有限公司 The call method and device of fingerprint business card
CN108734818A (en) * 2017-04-25 2018-11-02 北京猎户星空科技有限公司 Gate inhibition's operating method, device, terminal device and server
CN109255211A (en) * 2017-07-12 2019-01-22 波音公司 Mobile security countermeasure
CN109255211B (en) * 2017-07-12 2023-09-15 波音公司 Mobile security countermeasure
CN108320355A (en) * 2017-12-29 2018-07-24 中国船舶重工集团公司第七八研究所 A kind of the emergency cryptosystem open system and its open method of intelligent door lock
CN110443936A (en) * 2019-09-09 2019-11-12 珠海格力电器股份有限公司 Control method, device, equipment, locker and the storage medium of cabinet door
CN115664865A (en) * 2022-12-27 2023-01-31 安徽国审信息科技有限公司 Verification data transmission method, system, computer equipment and storage medium

Also Published As

Publication number Publication date
CN105405185B (en) 2018-10-26

Similar Documents

Publication Publication Date Title
CN105405185A (en) Safety verifying method and apparatus thereof
CN108551455B (en) Configuration method and device of smart card
CN105654580B (en) Access control method and system, electronic lock, management and visitor's terminal
CN105516103B (en) Method, device and system for binding intelligent household electrical appliance
EP2579220A1 (en) Entrance guard control method and system thereof
CN108471610B (en) Bluetooth connection control system
CN105847247A (en) Authentication system and working method thereof
CN107454035B (en) Identity authentication method and device
WO2007027290A2 (en) Method and apparatus for user authentication
JP2005196776A (en) Safe data communication method and its system between communication terminal and communication equipment
CN103297403A (en) Method and system for achieving dynamic password authentication
CN101621794A (en) Method for realizing safe authentication of wireless application service system
KR101716067B1 (en) Method for mutual authentication between a terminal and a remote server by means of a third-party portal
CN110738776B (en) Method and system for opening Bluetooth access control, Bluetooth device and working method thereof
CN104144411B (en) Encryption, decryption terminal and the encryption and decryption approaches applied to terminal
CN104424676A (en) Identity information sending method, identity information sending device, access control card reader and access control system
CN106850540A (en) A kind of terminal control method, terminal and system
CN112672342B (en) Data transmission method, device, equipment, system and storage medium
CN106792700A (en) The method for building up and system of a kind of secure communication environment of wearable device
CN105631271A (en) Unlocking method, unlocking device, wearable intelligent equipment and terminal
CN114765534A (en) Private key distribution system based on national password identification cryptographic algorithm
CN105868975A (en) Electronic finance account management method and system, and mobile terminal
CN112020716A (en) Remote biometric identification
CN109151823A (en) The method and system of eSIM card authentication
CN109451504B (en) Internet of things module authentication method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20231213

Address after: 518000 floor 21, block a, Kupai building, intersection of Keyuan Avenue and Baoshen Road, north high tech Zone, songpingshan community, Xili street, Nanshan District, Shenzhen, Guangdong

Patentee after: YULONG COMPUTER TELECOMMUNICATION SCIENTIFIC (SHENZHEN) Co.,Ltd.

Address before: 523000 Dongguan Songshan Lake Hi-tech Industrial Development Zone, Guangdong Province

Patentee before: DONGGUAN COOLPAD SOFTWARE TECH Co.,Ltd.

TR01 Transfer of patent right