CN106060002A - Data sharing method and system based on intelligent traffic device unlocking - Google Patents

Data sharing method and system based on intelligent traffic device unlocking Download PDF

Info

Publication number
CN106060002A
CN106060002A CN201610302701.XA CN201610302701A CN106060002A CN 106060002 A CN106060002 A CN 106060002A CN 201610302701 A CN201610302701 A CN 201610302701A CN 106060002 A CN106060002 A CN 106060002A
Authority
CN
China
Prior art keywords
electronic key
bluetooth electronic
app bluetooth
key
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610302701.XA
Other languages
Chinese (zh)
Other versions
CN106060002B (en
Inventor
李杨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Terminus Beijing Technology Co Ltd
Original Assignee
Terminus Beijing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Terminus Beijing Technology Co Ltd filed Critical Terminus Beijing Technology Co Ltd
Priority to CN201610302701.XA priority Critical patent/CN106060002B/en
Publication of CN106060002A publication Critical patent/CN106060002A/en
Application granted granted Critical
Publication of CN106060002B publication Critical patent/CN106060002B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B5/00Near-field transmission systems, e.g. inductive loop type

Abstract

The present invention provides a data sharing method and system based on intelligent traffic device unlocking, wherein the method comprises the steps of using a first App Bluetooth electronic key to acquire the to-be-shared data, and sending the to-be-shared data to a background; using the background to bind the to-be-shared data with the MAC address of an intelligent traffic device; using a second App Bluetooth electronic key to generate a door opening request and sending the request to the background, wherein the door opening request at least comprises an authorization secret key request; after the background verifies the authority of the door opening request, and the request passes the verification, obtaining the feedback data according to the authorization secret key request, wherein the feedback data at least comprises the authorization secret key data and the to-be-shared data, and the authorization secret key data is the authorization secret key data of the second App Bluetooth electronic key bound with the MAC address of the intelligent traffic device; using the second App Bluetooth electronic key to receive the feedback data, and verifying the authorization secret key data; after the second App Bluetooth electronic key verifies an authorization secret key, sending the unlocking data to the intelligent traffic device, and outputting the to-be-shared data.

Description

A kind of data sharing method unblanked based on the intelligence equipment of passing through and system
Technical field
The present invention relates to electronic device field, particularly relate to a kind of data sharing method unblanked based on the intelligence equipment of passing through And system.
Background technology
Along with the development of technology of Internet of things, the field such as household networking, electrical equipment networking, car networking is technically and application scenarios On had the development advanced by leaps and bounds.Current equipment I OT (Internet Of Things, Internet of Things) is changed, along with Bluetooth technology, people Face identification technology, the continuous maturation of fingerprint identification technology, intelligent entrance guard, intelligent door lock, intelligent barrier gate, intelligent car position ground lock, intelligence The current device intelligence of the intelligence such as can argue for the sake of arguing controls and networking, allows current control become more convenient, safer, more intelligent.
Bluetooth 3.0, to bluetooth 4.0, allows Bluetooth protocol have become as a low-power consumption, high efficiency near field agreement, compared with Wifi and NFC protocol, safety that Bluetooth protocol more has both and the feature of convenience.By Bluetooth protocol, and dynamically add The encapsulation of the methods such as close algorithm, AES, allows Bluetooth protocol become the one intelligent door lock solution more easily of opening door lock, The epoch of the key of traditional mechanical for many years allowing human history can draw perfect fullstop, changes the tradition such as mechanical key, card Physics mode, allows current digitized.
But existing Intelligent unlocking solution is the most loaded down with trivial details and complicated, data sharing, therefore, wound can not be realized Make a kind of intelligence Portable safety and to have the solution of unblanking of data sharing ability be problem demanding prompt solution.
Summary of the invention
It is contemplated that at least overcome one of drawbacks described above to provide a kind of data sharing unblanked based on the intelligence equipment of passing through Method and system so that unblank to become the convenient and safety of intelligence, it is possible to complete data sharing.
For reaching above-mentioned purpose, technical scheme is specifically achieved in that
One aspect of the present invention provides a kind of data sharing method unblanked based on the intelligence equipment of passing through, including: the Sharing data is treated in one App Bluetooth electronic key collection, and treats that sharing data sends to backstage by described;Described backstage receives described Treat sharing data, and treat that the pass through MAC Address of equipment of sharing data and intelligence is bound by described;2nd App Bluetooth electronic Key generates the request of enabling, and sends the described request of opening the door to described backstage, and wherein, described request of opening the door at least includes authorizing Key request;Described backstage receives described request of opening the door, and described enabling request is carried out Authority Verification;Described backstage is to described Enabling request carries out after Authority Verification passes through, according to described authorization key acquisition request feedback data, and by described feedback data Sending to the 2nd App Bluetooth electronic key, wherein, described feedback data at least includes authorization key data and number to be shared It is to pass through the awarding of the 2nd App Bluetooth electronic key of MAC Address binding of equipment with described intelligence according to, described authorization key data Power key data;Described 2nd App Bluetooth electronic key receives described feedback data, and tests described authorization key data Card;Described 2nd App Bluetooth electronic key, after verifying that described authorization key passes through, sends, to the intelligence equipment that passes through, number of unblanking According to, and treat sharing data described in output.
It addition, described 2nd App Bluetooth electronic key generates the request of enabling, and the described request of opening the door is sent to after the most described Before platform, method also includes: described 2nd App Bluetooth electronic key generates encryption authorization request, and please by described encryption authorization Ask transmission to backstage, wherein, the request of described encryption authorization at least includes encryption authorization key data;Described backstage receives described Encryption authorization is asked, and the request of described encryption authorization is carried out Authority Verification;The request of described encryption authorization is being carried out by described backstage After Authority Verification passes through, obtain described encryption authorization key data, and store described encryption authorization key data;Described backstage will Key storage state sends to described 2nd App Bluetooth electronic key;Described 2nd App Bluetooth electronic key receives described key Storage state.
It addition, generate encryption authorization request at described 2nd App Bluetooth electronic key, and the request of described encryption authorization is sent out Before delivering to backstage, method also includes: described backstage carries out the scanning of App Bluetooth electronic key, and arranges time-out duration;If it is described Backstage judges time-out, then judge whether to search effective App Bluetooth electronic key, searching effective App Bluetooth electronic key Time, it may be judged whether there are at least two effective App Bluetooth electronic keys, judging there are at least two effective App Bluetooth electronic keys During spoon, prompting user selects effective App Bluetooth electronic key, and obtains determination effective App Bluetooth electronic key that user selects, When judging only one effective App Bluetooth electronic key, obtain and described determine effective App Bluetooth electronic key;If it is described Backstage judges to be not timed-out, then obtain a described effective App Bluetooth electronic key, and judge a described effective App bluetooth Whether the signal intensity of electron key is less than preset value and is not belonging to preset lock type, if being less than preset value and being not belonging to pre- If lock type, then obtain described in take and determine effective App Bluetooth electronic key, otherwise perform described in judge whether to search effective App The step of Bluetooth electronic key;Described backstage obtain described determine effective App Bluetooth electronic key after, stop to described App The operation that Bluetooth electronic key is scanned.
Search effective App Bluetooth electronic key described in it addition, to include: the App Bluetooth electronic key searched described in judgement Spoon, if belong to effective App Bluetooth electronic key list, if judging to belong to effective App Bluetooth electronic key list, then searches Effectively App Bluetooth electronic key.
It addition, before described backstage carries out the scanning of App Bluetooth electronic key, method also includes: described background query is local App Bluetooth electronic key list;Described backstage judges that whether described local App Bluetooth electronic key is more than one;If after described Platform judges that described local App Bluetooth electronic key only has one, then add described local App Bluetooth electronic key to effectively App Bluetooth electronic key list;If described backstage judges described local App Bluetooth electronic key at least two, then start indigo plant Tooth scans effective App Bluetooth electronic key, and according to described local App Bluetooth electronic key list, scans described in interpolation Effectively App Bluetooth electronic key is to described effective App Bluetooth electronic key list.
Another aspect of the invention provides a kind of data sharing system unblanked based on the intelligence equipment of passing through, including: the One App Bluetooth electronic key, treats sharing data for collection, and treats that sharing data sends to backstage by described;Described backstage, uses Described in receiving, treat sharing data, and treat that the pass through MAC Address of equipment of sharing data and intelligence is bound by described;Second App Bluetooth electronic key, is used for generating enabling request, and sends the described request of opening the door to described backstage, wherein, and described enabling Request at least includes that authorization key is asked;Described backstage, is additionally operable to receive described request of opening the door, weighs described enabling request Limit checking;Described enabling request is being carried out after Authority Verification passes through, according to described authorization key acquisition request feedback data, and Sending described feedback data to the 2nd App Bluetooth electronic key, wherein, described feedback data at least includes authorization key data And treat sharing data, described authorization key data be with described intelligence pass through equipment MAC Address binding the 2nd App bluetooth The authorization key data of electron key;Described 2nd App Bluetooth electronic key, is additionally operable to receive described feedback data, and to institute State authorization key data to verify;After verifying that described authorization key passes through, send, to the intelligence equipment that passes through, data of unblanking, and Sharing data is treated described in output.
It addition, described 2nd App Bluetooth electronic key generates the request of enabling, and the described request of opening the door is sent to after the most described Before platform, described 2nd App Bluetooth electronic key, it is additionally operable to generate encryption authorization request, and the request of described encryption authorization is sent out Deliver to backstage, wherein, the request of described encryption authorization at least includes encryption authorization key data;Described backstage, is additionally operable to receive Described encryption authorization is asked, and the request of described encryption authorization is carried out Authority Verification;The request of described encryption authorization is being carried out authority After being verified, obtain described encryption authorization key data, and store described encryption authorization key data;By key storage state Send to described 2nd App Bluetooth electronic key;Described 2nd App Bluetooth electronic key, is additionally operable to receive described key storage State.
It addition, generate encryption authorization request at described 2nd App Bluetooth electronic key, and the request of described encryption authorization is sent out Before delivering to backstage, described backstage, it is additionally operable to carry out the scanning of App Bluetooth electronic key, and time-out duration is set;If judging super Time, then judge whether to search effective App Bluetooth electronic key, when searching effective App Bluetooth electronic key, it may be judged whether Having at least two effective App Bluetooth electronic keys, when judging to have at least two effective App Bluetooth electronic keys, prompting is used Family selects effective App Bluetooth electronic key, and obtains determination effective App Bluetooth electronic key that user selects, and is judging only When having an effective App Bluetooth electronic key, obtain and described determine effective App Bluetooth electronic key;If judging to be not timed-out, then Obtain a described effective App Bluetooth electronic key, and judge that the signal intensity of a described effective App Bluetooth electronic key is No less than preset value and be not belonging to preset lock type, if be less than preset value and be not belonging to preset lock type, then obtain described in take Determine effective App Bluetooth electronic key, otherwise judge whether to search the step of effective App Bluetooth electronic key described in execution; Obtain described determine effective App Bluetooth electronic key after, stop operation that described App Bluetooth electronic key is scanned.
Include it addition, described backstage searches effective App Bluetooth electronic key in the following way: described backstage, be used for The App Bluetooth electronic key searched described in judgement, if belong to effective App Bluetooth electronic key list, if judging to belong to has Effect App Bluetooth electronic key list, then search effective App Bluetooth electronic key.
It addition, before described backstage carries out the scanning of App Bluetooth electronic key, described backstage, it is additionally operable to inquire about local App blue Tooth electron key list;Judge that whether described local App Bluetooth electronic key is more than one;If judging described local App bluetooth Electron key only has one, then add described local App Bluetooth electronic key to effective App Bluetooth electronic key list;If Judge described local App Bluetooth electronic key at least two, then start bluetooth and scan effective App Bluetooth electronic key, and root According to described local App Bluetooth electronic key list, the effective App Bluetooth electronic key scanned described in interpolation to the most described effectively App Bluetooth electronic key list.
As seen from the above technical solution provided by the invention, what the present invention provided unblanks based on the intelligence equipment of passing through Data sharing method and system, by Bluetooth communication protocol, set up what connection-Data Encryption Transmission-authentication-result returned Communication mechanism, the effectiveness of checking App Bluetooth electronic key, after being verified, door lock is opened so that unblank to become intelligence convenient And safety, it is possible to realize data sharing.
Accompanying drawing explanation
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, required use in embodiment being described below Accompanying drawing be briefly described, it should be apparent that, below describe in accompanying drawing be only some embodiments of the present invention, for this From the point of view of the those of ordinary skill in field, on the premise of not paying creative work, it is also possible to obtain other according to these accompanying drawings Accompanying drawing.
The flow chart of the data sharing method unblanked based on the intelligence equipment of passing through that Fig. 1 provides for the embodiment of the present invention;
The structural representation of the data sharing system unblanked based on the intelligence equipment of passing through that Fig. 2 provides for the embodiment of the present invention Figure;
A kind of concrete reality of the data sharing method unblanked based on the intelligence equipment of passing through that Fig. 3 provides for the embodiment of the present invention The flow chart of existing mode.
Detailed description of the invention
Below in conjunction with the accompanying drawings embodiments of the present invention are described in detail.
Fig. 1 shows the flow process of the data sharing method unblanked based on the intelligence equipment of passing through that the embodiment of the present invention provides Figure, sees Fig. 1, the data sharing method unblanked based on the intelligence equipment of passing through that the embodiment of the present invention provides, including:
S101, an App Bluetooth electronic key collection is treated sharing data, and will be treated that sharing data sends to backstage;
Specifically, in the present invention, pass through equipment for same intelligence, can have N number of App Bluetooth electronic key, N >=2, N number of App Bluetooth electronic key is managed collectively by backstage, and can pass through MAC Address and each App of equipment by intelligence on backstage Bluetooth electronic key is bound, such as can be by the MAC Address of equipment of intelligence being gone together and each App Bluetooth electronic key MAC Address bind, or bind with the ID of each App Bluetooth electronic key, this does not the most limit System.It addition, the form of each App Bluetooth electronic key can be the same or different, such as can utilize smart mobile phone or It is separately configured to autonomous device, such as, can have android intelligent machine system and IOS intelligent machine system, due to android intelligence Energy machine system and IOS intelligent machine system can carry bluetooth module, and therefore App Bluetooth electronic key can be assisted by bluetooth 3.0 View and bluetooth 4.0 agreement (according to Bluetooth of mobile phone version, support bimodulus agreement) communicate.
It addition, the present invention treats sharing data, can be message data, it is also possible to for speech data, it is also possible to for language Sound message data, certainly, the present invention does not limit to the composition form treating sharing data, as long as the data shared can be carried out, all Protection scope of the present invention should be belonged to.
Below to treat that sharing data, for tone information data instance, schematically illustrates: an App Bluetooth electronic key Gathering tone information, row format of going forward side by side conversion generates tone information data;And tone information data are sent to backstage.Specifically Ground, the function that an App Bluetooth electronic key can have a voice collecting and data are uploaded, such as: App Bluetooth electronic key Receiving voice recorded speech message, gather form and be automatically converted into amr form before uploading, compression is uploaded by Http agreement In the TFS file system of backstage, tone information data and intelligence are gone together after the binding of equipment Mac address (and account), set effectively Time is 30 days, and speech data preserves after 30 days deletion etc..
S102, backstage receives and treats sharing data, and will treat that the pass through MAC Address of equipment of sharing data and intelligence is tied up Fixed;
Specifically, backstage receives and treats sharing data (such as tone information data), and will treat that sharing data passes through with intelligence The MAC Address of equipment is bound.
Wherein, backstage can have phonetic storage service, such as: backstage storage uses TFS data storage architecture, uses flat The data organizational structure of graduation, uses HA framework, it is possible to smooth expansion, supports that large and small file stores, and can be that outside offer height can Access by the storage concurrent with height.Thus can get voice in the lump stay when App Bluetooth electronic key request authorization key Speech data.
S103, the 2nd App Bluetooth electronic key generates the request of enabling, and sends enabling request to backstage, wherein, opens the door Request at least includes that authorization key is asked;
Specifically, the 2nd App Bluetooth electronic key can be identical App bluetooth electricity with an App Bluetooth electronic key Sub-key, it is also possible to for different App Bluetooth electronic keys, the most different App Bluetooth electronic keys, so can protect That demonstrate,proves an App Bluetooth electronic key collection treats that sharing data can be shared to the 2nd App Bluetooth electronic key.
Owing to App Bluetooth electronic key does not store authorization key, but stored this authorization key by backstage, therefore, often When secondary needs are unblanked, needing to background request authorization key, now, the 2nd App Bluetooth electronic key please by authorization key Ask to carry and send to backstage in the request of opening the door, in order to it is close that backstage knows that the 2nd App Bluetooth electronic key needs request to authorize Key.
S104, backstage receives the request of enabling, and clamshell doors request carries out Authority Verification;
Specifically, after backstage receives enabling request, this enabling request is carried out Authority Verification, to verify that this enabling is asked The request the most legal, that send of the identity of sender's (the i.e. the 2nd App Bluetooth electronic key) the most legal etc., thus ensure the The verity of two App Bluetooth electronic keys and legitimacy.
S105, backstage carries out after Authority Verification passes through in clamshell doors request, according to authorization key acquisition request feedback data, And feedback data is sent to the 2nd App Bluetooth electronic key, wherein, feedback data at least includes authorization key data and treats Sharing data, authorization key data are to pass through the mandate of the 2nd App Bluetooth electronic key of MAC Address binding of equipment with intelligence Key data;
Specifically, backstage, after clamshell doors requests verification is passed through, obtains authorization key request, according to this from the request of opening the door Authorization key request at least obtains close with the intelligence mandate of the 2nd App Bluetooth electronic key that the MAC Address of equipment binds of passing through Key data, in order to sending and unblank to the 2nd App Bluetooth electronic key, meanwhile, also acquisition and intelligence are with passing through the MAC of equipment What location was bound treats sharing data, sends in the lump to the 2nd App Bluetooth electronic key.
S106, the 2nd App Bluetooth electronic key receives feedback data, and verifies authorization key data;
Specifically, after the 2nd App Bluetooth electronic key receives feedback data, authorization key is verified, thus completes The 2nd App bluetooth equipment checking to this authorization key data validation, in order to the legal authorization key of follow-up use is opened Lock.
S107, the 2nd App Bluetooth electronic key is after in checking, authorization key passes through, and sends, to the intelligence equipment that passes through, number of unblanking According to, and export treat sharing data.
Specifically, the 2nd App Bluetooth electronic key, after checking authorization key passes through, generates data of unblanking, and to intelligence Current equipment sends data of unblanking so that the current equipment of intelligence is unblanked, and completes flow process of unblanking, and can export simultaneously and wait to share Data, in order to the holder of the 2nd App Bluetooth electronic key obtains the number to be shared of the holder of an App Bluetooth electronic key According to.
In use, such as A tone information gathers from party A-subscriber to B, tone information data, after transcoding compression, uploads to Backstage, leaves a message in list under the account of party B-subscriber.These tone information data can maintain up to 1 month, deletes after broadcasting.Language After the Mac address of sound message data and intelligent equipment of going together is bound, can be obtained by Mac address when party B-subscriber opens the door To the tone information needing broadcasting.
As can be seen here, the data sharing method unblanked based on the intelligence equipment of passing through provided by the embodiment of the present invention is logical Cross Bluetooth communication protocol, set up the communication mechanism that connection-Data Encryption Transmission-authentication-result returns, verify App bluetooth The effectiveness of electron key, after being verified, door lock is opened so that unblank to become the convenient and safety of intelligence, it is possible to realize number According to sharing.
In the present invention, App Bluetooth electronic key passes through remote key authentication mechanism, whether goes backstage inquiry by the authentication factor Can be by the current equipment of this intelligence, backstage returns rights objects to App Bluetooth electronic key, if can pass through, then returns The data of unblanking of the Mac address binding of equipment current with this intelligence, obtain simultaneously and treat sharing data (such as tone information data), Improve user's experience.
Along with the arrival in mobile Internet+Internet of Things epoch, cloud service+mobile terminal+Intelligent hardware, three unifies, public Cloud and privately owned cloud is had to be obtained for concrete application on a large scale in each field.The technology such as cloud propelling movement, cloud storage, voice are at Internet of Things The tone information allowing everyone in application the most just can be play when what kinsfolk went home.
When specifically used, the analysis of kinsfolk is a difficult problem of the most difficult analysis of all internet products, but From the point of view of intelligent door lock and community intelligent gate inhibition, being to have natural data supporting, for community gate inhibition user, house type is energy Enough judging whether is the important evidence of kinsfolk, according to the remote key granting on property management backstage, the acquiescence of same house type For kinsfolk.For family door lock user by App Bluetooth electronic key and the user of the same Mac address device of pairing, sentence It is set to the same family user.Simultaneously for tone information data, the definitiveness of meeting unceasing study kinsfolk.Kinsfolk returns Family's moment plays tone information function, allows the message message obtaining household after going home in time become the another great of Internet of Things epoch Break through.Solve the important breakthrough that traditional mechanical door lock can not complete.
As an optional embodiment of the present invention, carry out data communication process on App Bluetooth electronic key and backstage In, cryptographic means all can be used to realize the data interaction between App Bluetooth electronic key and backstage, it is ensured that App Bluetooth electronic The safety of data transmission between key and backstage.
As an optional embodiment of the embodiment of the present invention, at S103, the 2nd App Bluetooth electronic key generates and opens the door Request, and enabling request was sent before backstage, the data sharing method unblanked based on the intelligence equipment of passing through also includes:
S1031, the 2nd App Bluetooth electronic key generates encryption authorization request, and sends encryption authorization request to backstage, Wherein, encryption authorization request at least includes encryption authorization key data;
Specifically, the 2nd App Bluetooth electronic key generate encryption authorization request, and encryption authorization key data will be carried Encryption authorization request send to backstage, to facilitate backstage to obtain the authorization key of the 2nd App Bluetooth electronic key, convenient after Continuous 2nd App Bluetooth electronic key is carried out checking unblank.
S1032, backstage receives encryption authorization request, and encryption authorization request is carried out Authority Verification;
Specifically, after backstage receives encryption authorization request, the request of this encryption authorization is carried out Authority Verification, should with checking The request the most legal, that send of the identity of sender's (the i.e. the 2nd App Bluetooth electronic key) of encryption authorization request is the most legal Deng, thus ensure verity and the legitimacy of the 2nd App Bluetooth electronic key.
S1033, encryption authorization request is being carried out after Authority Verification passes through, is obtaining encryption authorization key data by backstage, and Storage encryption authorization key data;
Specifically, backstage, after passing through encryption authorization requests verification, stores encryption authorization key data, after thus facilitating Continuous 2nd App Bluetooth electronic key is carried out checking unblank.
S1034, key storage state is sent to the 2nd App Bluetooth electronic key by backstage;
Specifically, key storage state is sent to the 2nd App Bluetooth electronic key by backstage, in order to the 2nd App bluetooth electricity Sub-key knows key storage state, facilitates follow-up use.
S1035, the 2nd App Bluetooth electronic key receives key storage state.
Specifically, after the 2nd App Bluetooth electronic key obtains key storage state, can use according to key storage state This key.
Thus, backstage can get the authorization key of the 2nd App Bluetooth electronic key, in order to follow-up by this authorization key It is back to the 2nd App Bluetooth electronic key unblank, it is ensured that the safety unblanked.
As an optional embodiment of the embodiment of the present invention, generate encryption authorization at the 2nd App Bluetooth electronic key Request, and encryption authorization request was sent before backstage, the data sharing method unblanked based on the intelligence equipment of passing through also includes:
Backstage carries out the scanning of App Bluetooth electronic key, and arranges time-out duration (such as 4s);
If backstage judges time-out, then judge whether to search effective App Bluetooth electronic key, blue searching effective App During tooth electron key, it may be judged whether have at least two effective App Bluetooth electronic keys, judging there are at least two effective App During Bluetooth electronic key, prompting user selects effective App Bluetooth electronic key, and obtains determination effective App indigo plant that user selects Tooth electron key, when judging only one effective App Bluetooth electronic key, obtains and determines effective App Bluetooth electronic key;
If backstage judges to be not timed-out, then obtain an effective App Bluetooth electronic key, and judge that an effective App is blue Whether the signal intensity of tooth electron key is less than preset value (such as 85) and be not belonging to preset lock type and (such as lock and door Lock), if being less than preset value and being not belonging to preset lock type, then obtain and determine effective App Bluetooth electronic key, otherwise perform to sentence The disconnected step whether searching effective App Bluetooth electronic key;
Backstage, after acquisition determines effective App Bluetooth electronic key, stops the behaviour being scanned App Bluetooth electronic key Make.
Thus can ensure that backstage, when determining that App Bluetooth electronic key is effective, just performs follow-up flow process of unblanking, raising is opened The safety of lock.
As an optional embodiment of the embodiment of the present invention, search effective App Bluetooth electronic key and include:
Judge the App Bluetooth electronic key searched, if belong to effective App Bluetooth electronic key list, if judging to belong to In effective App Bluetooth electronic key list, then search effective App Bluetooth electronic key.
Thus can improve the efficiency of backstage search App Bluetooth electronic key, it is ensured that the efficiency unblanked.
As an optional embodiment of the embodiment of the present invention, before backstage carries out the scanning of App Bluetooth electronic key, base The data sharing method unblanked in the intelligence equipment of passing through also includes:
Background query this locality App Bluetooth electronic key list;
Backstage judges that whether local App Bluetooth electronic key is more than one;
If backstage judges that local App Bluetooth electronic key only has one, then this locality App Bluetooth electronic key is added to having Effect App Bluetooth electronic key list;
If backstage judges local App Bluetooth electronic key at least two, then start bluetooth and scan effective App Bluetooth electronic Key, and according to local App Bluetooth electronic key list, add the effective App Bluetooth electronic key scanned blue to effective App Tooth electron key list.
Thus can ensure that the accuracy of App Bluetooth electronic key list, so the efficiency of the flow performing that ensures to unblank and Safety.
The structure of the data sharing system unblanked based on the intelligence equipment of passing through that Fig. 2 shows that the embodiment of the present invention provides is shown Being intended to, should use said method based on the data sharing system that the intelligence equipment of passing through is unblanked, and not repeat them here, other do not use up thing Preferably, it is referred to said method, sees Fig. 2, the data sharing unblanked based on the intelligence equipment of passing through that the embodiment of the present invention provides System, including: an App Bluetooth electronic key 1010, backstage 2020 and the 2nd App Bluetooth electronic key 3020;
Oneth App Bluetooth electronic key 10, treats sharing data for collection, and will treat that sharing data sends to backstage 20;
Backstage 20, treats sharing data for reception, and will treat that the pass through MAC Address of equipment of sharing data and intelligence is tied up Fixed;
2nd App Bluetooth electronic key 30, is used for generating enabling request, and sends enabling request to backstage 20, wherein, The request of enabling at least includes that authorization key is asked;
Backstage 20, is additionally operable to receive the request of enabling, and clamshell doors request carries out Authority Verification;Authority is carried out in clamshell doors request After being verified, according to authorization key acquisition request feedback data, and feedback data is sent to the 2nd App Bluetooth electronic key 30, wherein, feedback data at least includes authorization key data and treats sharing data, and authorization key data set for current with intelligence The authorization key data of the 2nd App Bluetooth electronic key 30 of standby MAC Address binding;
2nd App Bluetooth electronic key 30, is additionally operable to receive feedback data, and verifies authorization key data;? Checking is after authorization key passes through, and sends, to the intelligence equipment that passes through, data of unblanking, and exports and treat sharing data.
As can be seen here, by the system of the data sharing unblanked based on the intelligence equipment of passing through that the embodiment of the present invention provides, By Bluetooth communication protocol, setting up the communication mechanism that connection-Data Encryption Transmission-authentication-result returns, checking App is blue The effectiveness of tooth electron key, after being verified, door lock is opened so that unblank to become the convenient and safety of intelligence, it is possible to realize Data sharing.
In use, such as A tone information gathers from party A-subscriber to B, tone information data, after transcoding compression, uploads to Backstage, leaves a message in list under the account of party B-subscriber.These tone information data can maintain up to 1 month, deletes after broadcasting.Language After the Mac address of sound message data and intelligent equipment of going together is bound, can be obtained by Mac address when party B-subscriber opens the door To the tone information needing broadcasting.
In the present invention, App Bluetooth electronic key passes through remote key authentication mechanism, whether goes backstage inquiry by the authentication factor Can be by the current equipment of this intelligence, backstage returns rights objects to App Bluetooth electronic key, if can pass through, then returns The data of unblanking of the Mac address binding of equipment current with this intelligence, obtain simultaneously and treat sharing data (such as tone information data), Improve user's experience.
Along with the arrival in mobile Internet+Internet of Things epoch, cloud service+mobile terminal+Intelligent hardware, three unifies, public Cloud and privately owned cloud is had to be obtained for concrete application on a large scale in each field.The technology such as cloud propelling movement, cloud storage, voice are at Internet of Things The tone information allowing everyone in application the most just can be play when what kinsfolk went home.
When specifically used, the analysis of kinsfolk is a difficult problem of the most difficult analysis of all internet products, but From the point of view of intelligent door lock and community intelligent gate inhibition, being to have natural data supporting, for community gate inhibition user, house type is energy Enough judging whether is the important evidence of kinsfolk, according to the remote key granting on property management backstage, the acquiescence of same house type For kinsfolk.For family door lock user by App Bluetooth electronic key and the user of the same Mac address device of pairing, sentence It is set to the same family user.Simultaneously for tone information data, the definitiveness of meeting unceasing study kinsfolk.Kinsfolk returns Family's moment plays tone information function, allows the message message obtaining household after going home in time become the another great of Internet of Things epoch Break through.Solve the important breakthrough that traditional mechanical door lock can not complete.
As an optional embodiment of the present invention, carry out data communication process on App Bluetooth electronic key and backstage In, cryptographic means all can be used to realize the data interaction between App Bluetooth electronic key and backstage, it is ensured that App Bluetooth electronic The safety of data transmission between key and backstage.
As an optional embodiment of the present invention, the 2nd App Bluetooth electronic key 30 generates the request of enabling, and will open Door request sent before backstage 20, the 2nd App Bluetooth electronic key 30, was additionally operable to generate encryption authorization request, and will encryption Authorization requests sends to backstage 20, wherein, at least includes encryption authorization key data in encryption authorization request;Backstage 20, also uses In receiving encryption authorization request, encryption authorization request is carried out Authority Verification;Lead to encryption authorization request is carried out Authority Verification Later, obtain encryption authorization key data, and store encryption authorization key data;Key storage state is sent to the 2nd App Bluetooth electronic key 30;2nd App Bluetooth electronic key 30, is additionally operable to receive key storage state.
Thus, backstage 20 can get the authorization key of the 2nd App Bluetooth electronic key 30, in order to follow-up by this mandate Key is back to the 2nd App Bluetooth electronic key 30 and unblanks, it is ensured that the safety unblanked.
As an optional embodiment of the embodiment of the present invention, generate encryption at the 2nd App Bluetooth electronic key 30 and award Power request, and encryption authorization request was sent before backstage 20, backstage 20, it is additionally operable to carry out the scanning of App Bluetooth electronic key, And time-out duration is set;If judging time-out, then judge whether to search effective App Bluetooth electronic key, searching effective App During Bluetooth electronic key, it may be judged whether have at least two effective App Bluetooth electronic keys, judging there are at least two effectively During App Bluetooth electronic key, prompting user selects effective App Bluetooth electronic key, and obtains the effective App of determination that user selects Bluetooth electronic key, when judging only one effective App Bluetooth electronic key, obtains and determines effective App Bluetooth electronic key Spoon;If judging to be not timed-out, then obtain an effective App Bluetooth electronic key, and judge an effective App Bluetooth electronic key Signal intensity whether less than preset value and be not belonging to preset lock type, if being less than preset value and being not belonging to preset lock class Type, then obtain and determine effective App Bluetooth electronic key, otherwise performs to judge whether to search effective App Bluetooth electronic key Step;After acquisition determines effective App Bluetooth electronic key, stop the operation that App Bluetooth electronic key is scanned.Thus Can ensure that backstage, when determining that App Bluetooth electronic key is effective, just performs follow-up flow process of unblanking, improve the safety unblanked.
As an optional embodiment of the embodiment of the present invention, it is blue that backstage 20 searches effective App in the following way Tooth electron key includes: backstage 20, for judging the App Bluetooth electronic key searched, if belong to effective App Bluetooth electronic Key list, if judging to belong to effective App Bluetooth electronic key list, then searches effective App Bluetooth electronic key.Thus may be used To improve the efficiency of backstage search App Bluetooth electronic key, it is ensured that the efficiency unblanked.
As an optional embodiment of the embodiment of the present invention, before backstage 20 carries out the scanning of App Bluetooth electronic key, Backstage 20, is additionally operable to inquire about local App Bluetooth electronic key list;Judge that whether local App Bluetooth electronic key is more than one; If judging, local App Bluetooth electronic key only has one, then add this locality App Bluetooth electronic key to effective App bluetooth electricity Sub-key list;If judging local App Bluetooth electronic key at least two, then start bluetooth and scan effective App Bluetooth electronic Key, and according to local App Bluetooth electronic key list, add the effective App Bluetooth electronic key scanned blue to effective App Tooth electron key list.Thus can ensure that the accuracy of App Bluetooth electronic key list, and then the flow performing that ensures to unblank Efficiency and safety.
Below, it is provided that a kind of specific implementation is to realize the data sharing unblanked based on the intelligence equipment of passing through of the present invention Method, but the invention is not limited in this.Seeing Fig. 3, the data sharing method unblanked based on the intelligence equipment of passing through is applied visitor Under family end and server architecture, wherein client includes customer end A pp and lock SDK (Lock SDK), service Device includes App server and lock module (Lock module), including:
Customer end A pp sends authorization requests to Lock SDK;
Lock SDK returns the encryption authorization key data generated to App;
App sends encryption authorization request to App server;
App server carries out Authority Verification to encryption authorization request, and after being verified, sends encryption to Lock module Authorization key data;
Lock module stores encryption authorization key data also returns App server;
App server stores state to App " return " key";
App sends, to App server, the request of enabling;
The request of App server clamshell doors carries out Authority Verification, and after being verified, sends authorization key to Lock module Request;
Lock module returns authorization key data and tone information data to App server;
App server returns encryption authorization key data and tone information data to App;
App sends, to Lock SDK, the request of enabling;
Lock SDK checking authorization key generation data of unblanking are back to App;
App returns data of unblanking to open the current equipment of intelligence to the intelligence equipment that passes through.
Thus, by the data sharing method unblanked based on the intelligence equipment of passing through that this is concrete, by Bluetooth communication protocol, Set up the communication mechanism that connection-Data Encryption Transmission-authentication-result returns, verify the effective of App Bluetooth electronic key Property, after being verified, door lock is opened so that unblank to become the convenient and safety of intelligence, it is possible to realize data sharing.

Claims (10)

1. the data sharing method unblanked based on the intelligence equipment of passing through, it is characterised in that including:
Sharing data is treated in oneth App Bluetooth electronic key collection, and treats that sharing data sends to backstage by described;
Sharing data is treated described in receiving in described backstage, and treats that the pass through MAC Address of equipment of sharing data and intelligence is carried out by described Binding;
2nd App Bluetooth electronic key generates the request of enabling, and sends the described request of opening the door to described backstage, wherein, described The request of enabling at least includes that authorization key is asked;
Described backstage receives described request of opening the door, and described enabling request is carried out Authority Verification;
Described enabling request is being carried out after Authority Verification passes through, according to described authorization key acquisition request feedback coefficient by described backstage According to, and described feedback data is sent to the 2nd App Bluetooth electronic key, wherein, described feedback data at least includes authorizing close Key data and treat sharing data, described authorization key data be with described intelligence pass through equipment MAC Address binding second The authorization key data of App Bluetooth electronic key;
Described 2nd App Bluetooth electronic key receives described feedback data, and verifies described authorization key data;
Described 2nd App Bluetooth electronic key, after verifying that described authorization key passes through, sends, to the intelligence equipment that passes through, number of unblanking According to, and treat sharing data described in output.
Method the most according to claim 1, it is characterised in that described 2nd App Bluetooth electronic key generates the request of enabling, And the described request of opening the door was sent before described backstage, also include:
Described 2nd App Bluetooth electronic key generates encryption authorization request, and sends the request of described encryption authorization to backstage, its In, the request of described encryption authorization at least includes encryption authorization key data;
Described backstage receives the request of described encryption authorization, and the request of described encryption authorization is carried out Authority Verification;
The request of described encryption authorization is being carried out after Authority Verification passes through by described backstage, obtains described encryption authorization key data, And store described encryption authorization key data;
Key storage state is sent to described 2nd App Bluetooth electronic key by described backstage;
Described 2nd App Bluetooth electronic key receives described key storage state.
Method the most according to claim 2, it is characterised in that generating encryption authorization at described App Bluetooth electronic key please Ask, and the request of described encryption authorization sent before backstage, also include:
Described backstage carries out the scanning of App Bluetooth electronic key, and arranges time-out duration;
If described backstage judges time-out, then judge whether to search effective App Bluetooth electronic key, blue searching effective App During tooth electron key, it may be judged whether have at least two effective App Bluetooth electronic keys, judging there are at least two effective App During Bluetooth electronic key, prompting user selects effective App Bluetooth electronic key, and obtains determination effective App indigo plant that user selects Tooth electron key, when judging only one effective App Bluetooth electronic key, obtains and described determines effective App Bluetooth electronic Key;
If described backstage judges to be not timed-out, then obtain a described effective App Bluetooth electronic key, and judge that described one has Whether the signal intensity of effect App Bluetooth electronic key is less than preset value and is not belonging to preset lock type, if less than preset value also And be not belonging to preset lock type, then obtain described in take and determine effective App Bluetooth electronic key, otherwise perform described in judge whether search Step to effective App Bluetooth electronic key;
Described backstage obtain described determine effective App Bluetooth electronic key after, stop described App Bluetooth electronic key is carried out The operation of scanning.
Method the most according to claim 3, it is characterised in that described in search effective App Bluetooth electronic key and include:
The App Bluetooth electronic key searched described in judgement, if belong to effective App Bluetooth electronic key list, if judging to belong to In effective App Bluetooth electronic key list, then search effective App Bluetooth electronic key.
Method the most according to claim 4, it is characterised in that before described backstage carries out the scanning of App Bluetooth electronic key, Also include:
Described background query this locality App Bluetooth electronic key list;
Described backstage judges that whether described local App Bluetooth electronic key is more than one;
If described backstage judges that described local App Bluetooth electronic key only has one, then by described local App Bluetooth electronic key Add to effective App Bluetooth electronic key list;
If described backstage judges described local App Bluetooth electronic key at least two, then start bluetooth and scan effective App bluetooth Electron key, and according to described local App Bluetooth electronic key list, the effective App Bluetooth electronic key scanned described in interpolation Spoon is to described effective App Bluetooth electronic key list.
6. the data sharing system unblanked based on the intelligence equipment of passing through, it is characterised in that including:
Oneth App Bluetooth electronic key, treats sharing data for collection, and treats that sharing data sends to backstage by described;
Described backstage, be used for receiving described in treat sharing data, and treat that sharing data and intelligence are passed through the MAC Address of equipment by described Bind;
2nd App Bluetooth electronic key, is used for generating enabling request, and sends the described request of opening the door to described backstage, wherein, The described request of opening the door at least includes that authorization key is asked;
Described backstage, is additionally operable to receive described request of opening the door, described enabling request is carried out Authority Verification;Described enabling is being asked Ask and carry out after Authority Verification passes through, according to described authorization key acquisition request feedback data, and described feedback data being sent extremely 2nd App Bluetooth electronic key, wherein, described feedback data at least includes authorization key data and treats sharing data, described Authorization key data are to pass through the authorization key of the 2nd App Bluetooth electronic key of MAC Address binding of equipment with described intelligence Data;
Described 2nd App Bluetooth electronic key, is additionally operable to receive described feedback data, and tests described authorization key data Card;After verifying that described authorization key passes through, send, to the intelligence equipment that passes through, data of unblanking, and treat sharing data described in exporting.
System the most according to claim 6, it is characterised in that described 2nd App Bluetooth electronic key generates the request of enabling, And the described request of opening the door was sent before described backstage,
Described 2nd App Bluetooth electronic key, is additionally operable to generate encryption authorization request, and the request of described encryption authorization is sent extremely Backstage, wherein, at least includes encryption authorization key data in the request of described encryption authorization;
Described backstage, is additionally operable to receive the request of described encryption authorization, the request of described encryption authorization is carried out Authority Verification;To institute State encryption authorization request to carry out after Authority Verification passes through, obtaining described encryption authorization key data, and storing described encryption authorization Key data;Key storage state is sent to described 2nd App Bluetooth electronic key;
Described 2nd App Bluetooth electronic key, is additionally operable to receive described key storage state.
System the most according to claim 7, it is characterised in that generate encryption at described 2nd App Bluetooth electronic key and award Power request, and the request of described encryption authorization was sent before backstage,
Described backstage, is additionally operable to carry out the scanning of App Bluetooth electronic key, and arranges time-out duration;If judging time-out, then judgement is No search effective App Bluetooth electronic key, when searching effective App Bluetooth electronic key, it may be judged whether have at least two Effectively App Bluetooth electronic key, when judging to have at least two effective App Bluetooth electronic keys, prompting user selects effectively App Bluetooth electronic key, and obtain determination effective App Bluetooth electronic key that user selects, judging only one effectively During App Bluetooth electronic key, obtain and described determine effective App Bluetooth electronic key;If judging to be not timed-out, then obtain described one Effective App Bluetooth electronic key, and judge that whether the signal intensity of a described effective App Bluetooth electronic key is less than presetting Value and be not belonging to preset lock type, if being less than preset value and being not belonging to preset lock type, then obtain described in take and determine effective App Bluetooth electronic key, otherwise judges whether to search the step of effective App Bluetooth electronic key described in execution;Described really in acquisition After fixed effective App Bluetooth electronic key, stop the operation that described App Bluetooth electronic key is scanned.
System the most according to claim 8, it is characterised in that it is blue that described backstage searches effective App in the following way Tooth electron key includes:
Described backstage, is used for the App Bluetooth electronic key searched described in judging, if belong to effective App Bluetooth electronic key List, if judging to belong to effective App Bluetooth electronic key list, then searches effective App Bluetooth electronic key.
System the most according to claim 9, it is characterised in that described backstage carries out App Bluetooth electronic key and scans it Before, described backstage, it is additionally operable to inquire about local App Bluetooth electronic key list;Whether judge described local App Bluetooth electronic key More than one;If judging, described local App Bluetooth electronic key only has one, then added by described local App Bluetooth electronic key Add to effective App Bluetooth electronic key list;If judging described local App Bluetooth electronic key at least two, then start indigo plant Tooth scans effective App Bluetooth electronic key, and according to described local App Bluetooth electronic key list, scans described in interpolation Effectively App Bluetooth electronic key is to described effective App Bluetooth electronic key list.
CN201610302701.XA 2016-05-09 2016-05-09 A kind of data sharing method and system based on the current equipment unlocking of intelligence Active CN106060002B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610302701.XA CN106060002B (en) 2016-05-09 2016-05-09 A kind of data sharing method and system based on the current equipment unlocking of intelligence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610302701.XA CN106060002B (en) 2016-05-09 2016-05-09 A kind of data sharing method and system based on the current equipment unlocking of intelligence

Publications (2)

Publication Number Publication Date
CN106060002A true CN106060002A (en) 2016-10-26
CN106060002B CN106060002B (en) 2019-07-02

Family

ID=57176804

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610302701.XA Active CN106060002B (en) 2016-05-09 2016-05-09 A kind of data sharing method and system based on the current equipment unlocking of intelligence

Country Status (1)

Country Link
CN (1) CN106060002B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109598574A (en) * 2018-10-11 2019-04-09 上海酷信息科技有限公司 A kind of APP remotely shares the method for equipment
CN114258013A (en) * 2020-09-11 2022-03-29 中国联合网络通信集团有限公司 Data encryption method, device and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020023215A1 (en) * 1996-12-04 2002-02-21 Wang Ynjiun P. Electronic transaction systems and methods therefor
US20030014372A1 (en) * 2000-08-04 2003-01-16 Wheeler Lynn Henry Trusted authentication digital signature (tads) system
CN102568068A (en) * 2012-03-22 2012-07-11 章晋涛 Embedded access control management system
CN103856629A (en) * 2012-12-03 2014-06-11 三星电子株式会社 Information providing method and mobile terminal therefor
CN204204069U (en) * 2014-11-19 2015-03-11 马健 Gate inhibition's intelligent controller and gate inhibition's intelligent control system
CN105046796A (en) * 2015-08-31 2015-11-11 芝麻智能科技(北京)有限公司 Unlocking control method, device and system for electronic lock
CN105447949A (en) * 2015-12-30 2016-03-30 深圳市多度科技有限公司 Intelligent access control system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020023215A1 (en) * 1996-12-04 2002-02-21 Wang Ynjiun P. Electronic transaction systems and methods therefor
US20030014372A1 (en) * 2000-08-04 2003-01-16 Wheeler Lynn Henry Trusted authentication digital signature (tads) system
CN102568068A (en) * 2012-03-22 2012-07-11 章晋涛 Embedded access control management system
CN103856629A (en) * 2012-12-03 2014-06-11 三星电子株式会社 Information providing method and mobile terminal therefor
CN204204069U (en) * 2014-11-19 2015-03-11 马健 Gate inhibition's intelligent controller and gate inhibition's intelligent control system
CN105046796A (en) * 2015-08-31 2015-11-11 芝麻智能科技(北京)有限公司 Unlocking control method, device and system for electronic lock
CN105447949A (en) * 2015-12-30 2016-03-30 深圳市多度科技有限公司 Intelligent access control system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109598574A (en) * 2018-10-11 2019-04-09 上海酷信息科技有限公司 A kind of APP remotely shares the method for equipment
CN114258013A (en) * 2020-09-11 2022-03-29 中国联合网络通信集团有限公司 Data encryption method, device and storage medium
CN114258013B (en) * 2020-09-11 2023-10-31 中国联合网络通信集团有限公司 Data encryption method, device and storage medium

Also Published As

Publication number Publication date
CN106060002B (en) 2019-07-02

Similar Documents

Publication Publication Date Title
CN106652135B (en) Access control method and its system based on cloud and planar bar code technology
CN107403491B (en) A kind of automatic access control system and door opening method based on real-time geographic coordinate
Santoso et al. Securing IoT for smart home system
CN105261104B (en) Bluetooth door lock system and its control method based on intelligent terminal
CN104994504B (en) With the safety of wireless network and automatically it connect
CN105099984B (en) The method and apparatus of account intercommunication between a kind of APP
CN105741395A (en) Entrance guard access method and system based on two-dimension code and face identification
CN105099673A (en) Authorization method, authorization requesting method and devices
CN104778773A (en) System and method for controlling entrance guard by mobile phone
CN107578511A (en) A kind of smart lock and its Intelligent key
CN107672469A (en) Electrical bicycle charging method and system based on credential management
CN105144670A (en) Wireless networking-enabled personal identification system
CN105551120A (en) Building intercommunication method, near field communication (NFC) unlocking device and building intercommunication system
CN106600775A (en) Non-networking dynamic password generation method used for intelligent access control system
CN107067576A (en) Intelligent cabinet tenant remote authorization other people use method, apparatus and system
CN109300208A (en) Method for unlocking, unlocking apparatus, lock system, lock device and storage medium
CN109992949A (en) A kind of equipment authentication method, air card-writing method and apparatus authentication device
CN107231019A (en) A kind of method and apparatus charged by charging device to user equipment
CN105656627A (en) Identity verification method, device and system
CN109949461A (en) Method for unlocking and device
CN112978526B (en) Access control method, equipment and system and elevator control method, equipment and system
CN104660405A (en) Business equipment authentication method and equipment
CN110021087A (en) Method based on the quick binding room that wechat is opened the door
CN104506527A (en) Multidimensional information pointer platform and data access method thereof
CN106027249B (en) Identity card card reading method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant