CN106060002A - Data sharing method and system based on intelligent traffic device unlocking - Google Patents
Data sharing method and system based on intelligent traffic device unlocking Download PDFInfo
- Publication number
- CN106060002A CN106060002A CN201610302701.XA CN201610302701A CN106060002A CN 106060002 A CN106060002 A CN 106060002A CN 201610302701 A CN201610302701 A CN 201610302701A CN 106060002 A CN106060002 A CN 106060002A
- Authority
- CN
- China
- Prior art keywords
- electronic key
- bluetooth electronic
- app bluetooth
- key
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B5/00—Near-field transmission systems, e.g. inductive loop type
Abstract
The present invention provides a data sharing method and system based on intelligent traffic device unlocking, wherein the method comprises the steps of using a first App Bluetooth electronic key to acquire the to-be-shared data, and sending the to-be-shared data to a background; using the background to bind the to-be-shared data with the MAC address of an intelligent traffic device; using a second App Bluetooth electronic key to generate a door opening request and sending the request to the background, wherein the door opening request at least comprises an authorization secret key request; after the background verifies the authority of the door opening request, and the request passes the verification, obtaining the feedback data according to the authorization secret key request, wherein the feedback data at least comprises the authorization secret key data and the to-be-shared data, and the authorization secret key data is the authorization secret key data of the second App Bluetooth electronic key bound with the MAC address of the intelligent traffic device; using the second App Bluetooth electronic key to receive the feedback data, and verifying the authorization secret key data; after the second App Bluetooth electronic key verifies an authorization secret key, sending the unlocking data to the intelligent traffic device, and outputting the to-be-shared data.
Description
Technical field
The present invention relates to electronic device field, particularly relate to a kind of data sharing method unblanked based on the intelligence equipment of passing through
And system.
Background technology
Along with the development of technology of Internet of things, the field such as household networking, electrical equipment networking, car networking is technically and application scenarios
On had the development advanced by leaps and bounds.Current equipment I OT (Internet Of Things, Internet of Things) is changed, along with Bluetooth technology, people
Face identification technology, the continuous maturation of fingerprint identification technology, intelligent entrance guard, intelligent door lock, intelligent barrier gate, intelligent car position ground lock, intelligence
The current device intelligence of the intelligence such as can argue for the sake of arguing controls and networking, allows current control become more convenient, safer, more intelligent.
Bluetooth 3.0, to bluetooth 4.0, allows Bluetooth protocol have become as a low-power consumption, high efficiency near field agreement, compared with
Wifi and NFC protocol, safety that Bluetooth protocol more has both and the feature of convenience.By Bluetooth protocol, and dynamically add
The encapsulation of the methods such as close algorithm, AES, allows Bluetooth protocol become the one intelligent door lock solution more easily of opening door lock,
The epoch of the key of traditional mechanical for many years allowing human history can draw perfect fullstop, changes the tradition such as mechanical key, card
Physics mode, allows current digitized.
But existing Intelligent unlocking solution is the most loaded down with trivial details and complicated, data sharing, therefore, wound can not be realized
Make a kind of intelligence Portable safety and to have the solution of unblanking of data sharing ability be problem demanding prompt solution.
Summary of the invention
It is contemplated that at least overcome one of drawbacks described above to provide a kind of data sharing unblanked based on the intelligence equipment of passing through
Method and system so that unblank to become the convenient and safety of intelligence, it is possible to complete data sharing.
For reaching above-mentioned purpose, technical scheme is specifically achieved in that
One aspect of the present invention provides a kind of data sharing method unblanked based on the intelligence equipment of passing through, including: the
Sharing data is treated in one App Bluetooth electronic key collection, and treats that sharing data sends to backstage by described;Described backstage receives described
Treat sharing data, and treat that the pass through MAC Address of equipment of sharing data and intelligence is bound by described;2nd App Bluetooth electronic
Key generates the request of enabling, and sends the described request of opening the door to described backstage, and wherein, described request of opening the door at least includes authorizing
Key request;Described backstage receives described request of opening the door, and described enabling request is carried out Authority Verification;Described backstage is to described
Enabling request carries out after Authority Verification passes through, according to described authorization key acquisition request feedback data, and by described feedback data
Sending to the 2nd App Bluetooth electronic key, wherein, described feedback data at least includes authorization key data and number to be shared
It is to pass through the awarding of the 2nd App Bluetooth electronic key of MAC Address binding of equipment with described intelligence according to, described authorization key data
Power key data;Described 2nd App Bluetooth electronic key receives described feedback data, and tests described authorization key data
Card;Described 2nd App Bluetooth electronic key, after verifying that described authorization key passes through, sends, to the intelligence equipment that passes through, number of unblanking
According to, and treat sharing data described in output.
It addition, described 2nd App Bluetooth electronic key generates the request of enabling, and the described request of opening the door is sent to after the most described
Before platform, method also includes: described 2nd App Bluetooth electronic key generates encryption authorization request, and please by described encryption authorization
Ask transmission to backstage, wherein, the request of described encryption authorization at least includes encryption authorization key data;Described backstage receives described
Encryption authorization is asked, and the request of described encryption authorization is carried out Authority Verification;The request of described encryption authorization is being carried out by described backstage
After Authority Verification passes through, obtain described encryption authorization key data, and store described encryption authorization key data;Described backstage will
Key storage state sends to described 2nd App Bluetooth electronic key;Described 2nd App Bluetooth electronic key receives described key
Storage state.
It addition, generate encryption authorization request at described 2nd App Bluetooth electronic key, and the request of described encryption authorization is sent out
Before delivering to backstage, method also includes: described backstage carries out the scanning of App Bluetooth electronic key, and arranges time-out duration;If it is described
Backstage judges time-out, then judge whether to search effective App Bluetooth electronic key, searching effective App Bluetooth electronic key
Time, it may be judged whether there are at least two effective App Bluetooth electronic keys, judging there are at least two effective App Bluetooth electronic keys
During spoon, prompting user selects effective App Bluetooth electronic key, and obtains determination effective App Bluetooth electronic key that user selects,
When judging only one effective App Bluetooth electronic key, obtain and described determine effective App Bluetooth electronic key;If it is described
Backstage judges to be not timed-out, then obtain a described effective App Bluetooth electronic key, and judge a described effective App bluetooth
Whether the signal intensity of electron key is less than preset value and is not belonging to preset lock type, if being less than preset value and being not belonging to pre-
If lock type, then obtain described in take and determine effective App Bluetooth electronic key, otherwise perform described in judge whether to search effective App
The step of Bluetooth electronic key;Described backstage obtain described determine effective App Bluetooth electronic key after, stop to described App
The operation that Bluetooth electronic key is scanned.
Search effective App Bluetooth electronic key described in it addition, to include: the App Bluetooth electronic key searched described in judgement
Spoon, if belong to effective App Bluetooth electronic key list, if judging to belong to effective App Bluetooth electronic key list, then searches
Effectively App Bluetooth electronic key.
It addition, before described backstage carries out the scanning of App Bluetooth electronic key, method also includes: described background query is local
App Bluetooth electronic key list;Described backstage judges that whether described local App Bluetooth electronic key is more than one;If after described
Platform judges that described local App Bluetooth electronic key only has one, then add described local App Bluetooth electronic key to effectively
App Bluetooth electronic key list;If described backstage judges described local App Bluetooth electronic key at least two, then start indigo plant
Tooth scans effective App Bluetooth electronic key, and according to described local App Bluetooth electronic key list, scans described in interpolation
Effectively App Bluetooth electronic key is to described effective App Bluetooth electronic key list.
Another aspect of the invention provides a kind of data sharing system unblanked based on the intelligence equipment of passing through, including: the
One App Bluetooth electronic key, treats sharing data for collection, and treats that sharing data sends to backstage by described;Described backstage, uses
Described in receiving, treat sharing data, and treat that the pass through MAC Address of equipment of sharing data and intelligence is bound by described;Second
App Bluetooth electronic key, is used for generating enabling request, and sends the described request of opening the door to described backstage, wherein, and described enabling
Request at least includes that authorization key is asked;Described backstage, is additionally operable to receive described request of opening the door, weighs described enabling request
Limit checking;Described enabling request is being carried out after Authority Verification passes through, according to described authorization key acquisition request feedback data, and
Sending described feedback data to the 2nd App Bluetooth electronic key, wherein, described feedback data at least includes authorization key data
And treat sharing data, described authorization key data be with described intelligence pass through equipment MAC Address binding the 2nd App bluetooth
The authorization key data of electron key;Described 2nd App Bluetooth electronic key, is additionally operable to receive described feedback data, and to institute
State authorization key data to verify;After verifying that described authorization key passes through, send, to the intelligence equipment that passes through, data of unblanking, and
Sharing data is treated described in output.
It addition, described 2nd App Bluetooth electronic key generates the request of enabling, and the described request of opening the door is sent to after the most described
Before platform, described 2nd App Bluetooth electronic key, it is additionally operable to generate encryption authorization request, and the request of described encryption authorization is sent out
Deliver to backstage, wherein, the request of described encryption authorization at least includes encryption authorization key data;Described backstage, is additionally operable to receive
Described encryption authorization is asked, and the request of described encryption authorization is carried out Authority Verification;The request of described encryption authorization is being carried out authority
After being verified, obtain described encryption authorization key data, and store described encryption authorization key data;By key storage state
Send to described 2nd App Bluetooth electronic key;Described 2nd App Bluetooth electronic key, is additionally operable to receive described key storage
State.
It addition, generate encryption authorization request at described 2nd App Bluetooth electronic key, and the request of described encryption authorization is sent out
Before delivering to backstage, described backstage, it is additionally operable to carry out the scanning of App Bluetooth electronic key, and time-out duration is set;If judging super
Time, then judge whether to search effective App Bluetooth electronic key, when searching effective App Bluetooth electronic key, it may be judged whether
Having at least two effective App Bluetooth electronic keys, when judging to have at least two effective App Bluetooth electronic keys, prompting is used
Family selects effective App Bluetooth electronic key, and obtains determination effective App Bluetooth electronic key that user selects, and is judging only
When having an effective App Bluetooth electronic key, obtain and described determine effective App Bluetooth electronic key;If judging to be not timed-out, then
Obtain a described effective App Bluetooth electronic key, and judge that the signal intensity of a described effective App Bluetooth electronic key is
No less than preset value and be not belonging to preset lock type, if be less than preset value and be not belonging to preset lock type, then obtain described in take
Determine effective App Bluetooth electronic key, otherwise judge whether to search the step of effective App Bluetooth electronic key described in execution;
Obtain described determine effective App Bluetooth electronic key after, stop operation that described App Bluetooth electronic key is scanned.
Include it addition, described backstage searches effective App Bluetooth electronic key in the following way: described backstage, be used for
The App Bluetooth electronic key searched described in judgement, if belong to effective App Bluetooth electronic key list, if judging to belong to has
Effect App Bluetooth electronic key list, then search effective App Bluetooth electronic key.
It addition, before described backstage carries out the scanning of App Bluetooth electronic key, described backstage, it is additionally operable to inquire about local App blue
Tooth electron key list;Judge that whether described local App Bluetooth electronic key is more than one;If judging described local App bluetooth
Electron key only has one, then add described local App Bluetooth electronic key to effective App Bluetooth electronic key list;If
Judge described local App Bluetooth electronic key at least two, then start bluetooth and scan effective App Bluetooth electronic key, and root
According to described local App Bluetooth electronic key list, the effective App Bluetooth electronic key scanned described in interpolation to the most described effectively
App Bluetooth electronic key list.
As seen from the above technical solution provided by the invention, what the present invention provided unblanks based on the intelligence equipment of passing through
Data sharing method and system, by Bluetooth communication protocol, set up what connection-Data Encryption Transmission-authentication-result returned
Communication mechanism, the effectiveness of checking App Bluetooth electronic key, after being verified, door lock is opened so that unblank to become intelligence convenient
And safety, it is possible to realize data sharing.
Accompanying drawing explanation
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, required use in embodiment being described below
Accompanying drawing be briefly described, it should be apparent that, below describe in accompanying drawing be only some embodiments of the present invention, for this
From the point of view of the those of ordinary skill in field, on the premise of not paying creative work, it is also possible to obtain other according to these accompanying drawings
Accompanying drawing.
The flow chart of the data sharing method unblanked based on the intelligence equipment of passing through that Fig. 1 provides for the embodiment of the present invention;
The structural representation of the data sharing system unblanked based on the intelligence equipment of passing through that Fig. 2 provides for the embodiment of the present invention
Figure;
A kind of concrete reality of the data sharing method unblanked based on the intelligence equipment of passing through that Fig. 3 provides for the embodiment of the present invention
The flow chart of existing mode.
Detailed description of the invention
Below in conjunction with the accompanying drawings embodiments of the present invention are described in detail.
Fig. 1 shows the flow process of the data sharing method unblanked based on the intelligence equipment of passing through that the embodiment of the present invention provides
Figure, sees Fig. 1, the data sharing method unblanked based on the intelligence equipment of passing through that the embodiment of the present invention provides, including:
S101, an App Bluetooth electronic key collection is treated sharing data, and will be treated that sharing data sends to backstage;
Specifically, in the present invention, pass through equipment for same intelligence, can have N number of App Bluetooth electronic key, N
>=2, N number of App Bluetooth electronic key is managed collectively by backstage, and can pass through MAC Address and each App of equipment by intelligence on backstage
Bluetooth electronic key is bound, such as can be by the MAC Address of equipment of intelligence being gone together and each App Bluetooth electronic key
MAC Address bind, or bind with the ID of each App Bluetooth electronic key, this does not the most limit
System.It addition, the form of each App Bluetooth electronic key can be the same or different, such as can utilize smart mobile phone or
It is separately configured to autonomous device, such as, can have android intelligent machine system and IOS intelligent machine system, due to android intelligence
Energy machine system and IOS intelligent machine system can carry bluetooth module, and therefore App Bluetooth electronic key can be assisted by bluetooth 3.0
View and bluetooth 4.0 agreement (according to Bluetooth of mobile phone version, support bimodulus agreement) communicate.
It addition, the present invention treats sharing data, can be message data, it is also possible to for speech data, it is also possible to for language
Sound message data, certainly, the present invention does not limit to the composition form treating sharing data, as long as the data shared can be carried out, all
Protection scope of the present invention should be belonged to.
Below to treat that sharing data, for tone information data instance, schematically illustrates: an App Bluetooth electronic key
Gathering tone information, row format of going forward side by side conversion generates tone information data;And tone information data are sent to backstage.Specifically
Ground, the function that an App Bluetooth electronic key can have a voice collecting and data are uploaded, such as: App Bluetooth electronic key
Receiving voice recorded speech message, gather form and be automatically converted into amr form before uploading, compression is uploaded by Http agreement
In the TFS file system of backstage, tone information data and intelligence are gone together after the binding of equipment Mac address (and account), set effectively
Time is 30 days, and speech data preserves after 30 days deletion etc..
S102, backstage receives and treats sharing data, and will treat that the pass through MAC Address of equipment of sharing data and intelligence is tied up
Fixed;
Specifically, backstage receives and treats sharing data (such as tone information data), and will treat that sharing data passes through with intelligence
The MAC Address of equipment is bound.
Wherein, backstage can have phonetic storage service, such as: backstage storage uses TFS data storage architecture, uses flat
The data organizational structure of graduation, uses HA framework, it is possible to smooth expansion, supports that large and small file stores, and can be that outside offer height can
Access by the storage concurrent with height.Thus can get voice in the lump stay when App Bluetooth electronic key request authorization key
Speech data.
S103, the 2nd App Bluetooth electronic key generates the request of enabling, and sends enabling request to backstage, wherein, opens the door
Request at least includes that authorization key is asked;
Specifically, the 2nd App Bluetooth electronic key can be identical App bluetooth electricity with an App Bluetooth electronic key
Sub-key, it is also possible to for different App Bluetooth electronic keys, the most different App Bluetooth electronic keys, so can protect
That demonstrate,proves an App Bluetooth electronic key collection treats that sharing data can be shared to the 2nd App Bluetooth electronic key.
Owing to App Bluetooth electronic key does not store authorization key, but stored this authorization key by backstage, therefore, often
When secondary needs are unblanked, needing to background request authorization key, now, the 2nd App Bluetooth electronic key please by authorization key
Ask to carry and send to backstage in the request of opening the door, in order to it is close that backstage knows that the 2nd App Bluetooth electronic key needs request to authorize
Key.
S104, backstage receives the request of enabling, and clamshell doors request carries out Authority Verification;
Specifically, after backstage receives enabling request, this enabling request is carried out Authority Verification, to verify that this enabling is asked
The request the most legal, that send of the identity of sender's (the i.e. the 2nd App Bluetooth electronic key) the most legal etc., thus ensure the
The verity of two App Bluetooth electronic keys and legitimacy.
S105, backstage carries out after Authority Verification passes through in clamshell doors request, according to authorization key acquisition request feedback data,
And feedback data is sent to the 2nd App Bluetooth electronic key, wherein, feedback data at least includes authorization key data and treats
Sharing data, authorization key data are to pass through the mandate of the 2nd App Bluetooth electronic key of MAC Address binding of equipment with intelligence
Key data;
Specifically, backstage, after clamshell doors requests verification is passed through, obtains authorization key request, according to this from the request of opening the door
Authorization key request at least obtains close with the intelligence mandate of the 2nd App Bluetooth electronic key that the MAC Address of equipment binds of passing through
Key data, in order to sending and unblank to the 2nd App Bluetooth electronic key, meanwhile, also acquisition and intelligence are with passing through the MAC of equipment
What location was bound treats sharing data, sends in the lump to the 2nd App Bluetooth electronic key.
S106, the 2nd App Bluetooth electronic key receives feedback data, and verifies authorization key data;
Specifically, after the 2nd App Bluetooth electronic key receives feedback data, authorization key is verified, thus completes
The 2nd App bluetooth equipment checking to this authorization key data validation, in order to the legal authorization key of follow-up use is opened
Lock.
S107, the 2nd App Bluetooth electronic key is after in checking, authorization key passes through, and sends, to the intelligence equipment that passes through, number of unblanking
According to, and export treat sharing data.
Specifically, the 2nd App Bluetooth electronic key, after checking authorization key passes through, generates data of unblanking, and to intelligence
Current equipment sends data of unblanking so that the current equipment of intelligence is unblanked, and completes flow process of unblanking, and can export simultaneously and wait to share
Data, in order to the holder of the 2nd App Bluetooth electronic key obtains the number to be shared of the holder of an App Bluetooth electronic key
According to.
In use, such as A tone information gathers from party A-subscriber to B, tone information data, after transcoding compression, uploads to
Backstage, leaves a message in list under the account of party B-subscriber.These tone information data can maintain up to 1 month, deletes after broadcasting.Language
After the Mac address of sound message data and intelligent equipment of going together is bound, can be obtained by Mac address when party B-subscriber opens the door
To the tone information needing broadcasting.
As can be seen here, the data sharing method unblanked based on the intelligence equipment of passing through provided by the embodiment of the present invention is logical
Cross Bluetooth communication protocol, set up the communication mechanism that connection-Data Encryption Transmission-authentication-result returns, verify App bluetooth
The effectiveness of electron key, after being verified, door lock is opened so that unblank to become the convenient and safety of intelligence, it is possible to realize number
According to sharing.
In the present invention, App Bluetooth electronic key passes through remote key authentication mechanism, whether goes backstage inquiry by the authentication factor
Can be by the current equipment of this intelligence, backstage returns rights objects to App Bluetooth electronic key, if can pass through, then returns
The data of unblanking of the Mac address binding of equipment current with this intelligence, obtain simultaneously and treat sharing data (such as tone information data),
Improve user's experience.
Along with the arrival in mobile Internet+Internet of Things epoch, cloud service+mobile terminal+Intelligent hardware, three unifies, public
Cloud and privately owned cloud is had to be obtained for concrete application on a large scale in each field.The technology such as cloud propelling movement, cloud storage, voice are at Internet of Things
The tone information allowing everyone in application the most just can be play when what kinsfolk went home.
When specifically used, the analysis of kinsfolk is a difficult problem of the most difficult analysis of all internet products, but
From the point of view of intelligent door lock and community intelligent gate inhibition, being to have natural data supporting, for community gate inhibition user, house type is energy
Enough judging whether is the important evidence of kinsfolk, according to the remote key granting on property management backstage, the acquiescence of same house type
For kinsfolk.For family door lock user by App Bluetooth electronic key and the user of the same Mac address device of pairing, sentence
It is set to the same family user.Simultaneously for tone information data, the definitiveness of meeting unceasing study kinsfolk.Kinsfolk returns
Family's moment plays tone information function, allows the message message obtaining household after going home in time become the another great of Internet of Things epoch
Break through.Solve the important breakthrough that traditional mechanical door lock can not complete.
As an optional embodiment of the present invention, carry out data communication process on App Bluetooth electronic key and backstage
In, cryptographic means all can be used to realize the data interaction between App Bluetooth electronic key and backstage, it is ensured that App Bluetooth electronic
The safety of data transmission between key and backstage.
As an optional embodiment of the embodiment of the present invention, at S103, the 2nd App Bluetooth electronic key generates and opens the door
Request, and enabling request was sent before backstage, the data sharing method unblanked based on the intelligence equipment of passing through also includes:
S1031, the 2nd App Bluetooth electronic key generates encryption authorization request, and sends encryption authorization request to backstage,
Wherein, encryption authorization request at least includes encryption authorization key data;
Specifically, the 2nd App Bluetooth electronic key generate encryption authorization request, and encryption authorization key data will be carried
Encryption authorization request send to backstage, to facilitate backstage to obtain the authorization key of the 2nd App Bluetooth electronic key, convenient after
Continuous 2nd App Bluetooth electronic key is carried out checking unblank.
S1032, backstage receives encryption authorization request, and encryption authorization request is carried out Authority Verification;
Specifically, after backstage receives encryption authorization request, the request of this encryption authorization is carried out Authority Verification, should with checking
The request the most legal, that send of the identity of sender's (the i.e. the 2nd App Bluetooth electronic key) of encryption authorization request is the most legal
Deng, thus ensure verity and the legitimacy of the 2nd App Bluetooth electronic key.
S1033, encryption authorization request is being carried out after Authority Verification passes through, is obtaining encryption authorization key data by backstage, and
Storage encryption authorization key data;
Specifically, backstage, after passing through encryption authorization requests verification, stores encryption authorization key data, after thus facilitating
Continuous 2nd App Bluetooth electronic key is carried out checking unblank.
S1034, key storage state is sent to the 2nd App Bluetooth electronic key by backstage;
Specifically, key storage state is sent to the 2nd App Bluetooth electronic key by backstage, in order to the 2nd App bluetooth electricity
Sub-key knows key storage state, facilitates follow-up use.
S1035, the 2nd App Bluetooth electronic key receives key storage state.
Specifically, after the 2nd App Bluetooth electronic key obtains key storage state, can use according to key storage state
This key.
Thus, backstage can get the authorization key of the 2nd App Bluetooth electronic key, in order to follow-up by this authorization key
It is back to the 2nd App Bluetooth electronic key unblank, it is ensured that the safety unblanked.
As an optional embodiment of the embodiment of the present invention, generate encryption authorization at the 2nd App Bluetooth electronic key
Request, and encryption authorization request was sent before backstage, the data sharing method unblanked based on the intelligence equipment of passing through also includes:
Backstage carries out the scanning of App Bluetooth electronic key, and arranges time-out duration (such as 4s);
If backstage judges time-out, then judge whether to search effective App Bluetooth electronic key, blue searching effective App
During tooth electron key, it may be judged whether have at least two effective App Bluetooth electronic keys, judging there are at least two effective App
During Bluetooth electronic key, prompting user selects effective App Bluetooth electronic key, and obtains determination effective App indigo plant that user selects
Tooth electron key, when judging only one effective App Bluetooth electronic key, obtains and determines effective App Bluetooth electronic key;
If backstage judges to be not timed-out, then obtain an effective App Bluetooth electronic key, and judge that an effective App is blue
Whether the signal intensity of tooth electron key is less than preset value (such as 85) and be not belonging to preset lock type and (such as lock and door
Lock), if being less than preset value and being not belonging to preset lock type, then obtain and determine effective App Bluetooth electronic key, otherwise perform to sentence
The disconnected step whether searching effective App Bluetooth electronic key;
Backstage, after acquisition determines effective App Bluetooth electronic key, stops the behaviour being scanned App Bluetooth electronic key
Make.
Thus can ensure that backstage, when determining that App Bluetooth electronic key is effective, just performs follow-up flow process of unblanking, raising is opened
The safety of lock.
As an optional embodiment of the embodiment of the present invention, search effective App Bluetooth electronic key and include:
Judge the App Bluetooth electronic key searched, if belong to effective App Bluetooth electronic key list, if judging to belong to
In effective App Bluetooth electronic key list, then search effective App Bluetooth electronic key.
Thus can improve the efficiency of backstage search App Bluetooth electronic key, it is ensured that the efficiency unblanked.
As an optional embodiment of the embodiment of the present invention, before backstage carries out the scanning of App Bluetooth electronic key, base
The data sharing method unblanked in the intelligence equipment of passing through also includes:
Background query this locality App Bluetooth electronic key list;
Backstage judges that whether local App Bluetooth electronic key is more than one;
If backstage judges that local App Bluetooth electronic key only has one, then this locality App Bluetooth electronic key is added to having
Effect App Bluetooth electronic key list;
If backstage judges local App Bluetooth electronic key at least two, then start bluetooth and scan effective App Bluetooth electronic
Key, and according to local App Bluetooth electronic key list, add the effective App Bluetooth electronic key scanned blue to effective App
Tooth electron key list.
Thus can ensure that the accuracy of App Bluetooth electronic key list, so the efficiency of the flow performing that ensures to unblank and
Safety.
The structure of the data sharing system unblanked based on the intelligence equipment of passing through that Fig. 2 shows that the embodiment of the present invention provides is shown
Being intended to, should use said method based on the data sharing system that the intelligence equipment of passing through is unblanked, and not repeat them here, other do not use up thing
Preferably, it is referred to said method, sees Fig. 2, the data sharing unblanked based on the intelligence equipment of passing through that the embodiment of the present invention provides
System, including: an App Bluetooth electronic key 1010, backstage 2020 and the 2nd App Bluetooth electronic key 3020;
Oneth App Bluetooth electronic key 10, treats sharing data for collection, and will treat that sharing data sends to backstage 20;
Backstage 20, treats sharing data for reception, and will treat that the pass through MAC Address of equipment of sharing data and intelligence is tied up
Fixed;
2nd App Bluetooth electronic key 30, is used for generating enabling request, and sends enabling request to backstage 20, wherein,
The request of enabling at least includes that authorization key is asked;
Backstage 20, is additionally operable to receive the request of enabling, and clamshell doors request carries out Authority Verification;Authority is carried out in clamshell doors request
After being verified, according to authorization key acquisition request feedback data, and feedback data is sent to the 2nd App Bluetooth electronic key
30, wherein, feedback data at least includes authorization key data and treats sharing data, and authorization key data set for current with intelligence
The authorization key data of the 2nd App Bluetooth electronic key 30 of standby MAC Address binding;
2nd App Bluetooth electronic key 30, is additionally operable to receive feedback data, and verifies authorization key data;?
Checking is after authorization key passes through, and sends, to the intelligence equipment that passes through, data of unblanking, and exports and treat sharing data.
As can be seen here, by the system of the data sharing unblanked based on the intelligence equipment of passing through that the embodiment of the present invention provides,
By Bluetooth communication protocol, setting up the communication mechanism that connection-Data Encryption Transmission-authentication-result returns, checking App is blue
The effectiveness of tooth electron key, after being verified, door lock is opened so that unblank to become the convenient and safety of intelligence, it is possible to realize
Data sharing.
In use, such as A tone information gathers from party A-subscriber to B, tone information data, after transcoding compression, uploads to
Backstage, leaves a message in list under the account of party B-subscriber.These tone information data can maintain up to 1 month, deletes after broadcasting.Language
After the Mac address of sound message data and intelligent equipment of going together is bound, can be obtained by Mac address when party B-subscriber opens the door
To the tone information needing broadcasting.
In the present invention, App Bluetooth electronic key passes through remote key authentication mechanism, whether goes backstage inquiry by the authentication factor
Can be by the current equipment of this intelligence, backstage returns rights objects to App Bluetooth electronic key, if can pass through, then returns
The data of unblanking of the Mac address binding of equipment current with this intelligence, obtain simultaneously and treat sharing data (such as tone information data),
Improve user's experience.
Along with the arrival in mobile Internet+Internet of Things epoch, cloud service+mobile terminal+Intelligent hardware, three unifies, public
Cloud and privately owned cloud is had to be obtained for concrete application on a large scale in each field.The technology such as cloud propelling movement, cloud storage, voice are at Internet of Things
The tone information allowing everyone in application the most just can be play when what kinsfolk went home.
When specifically used, the analysis of kinsfolk is a difficult problem of the most difficult analysis of all internet products, but
From the point of view of intelligent door lock and community intelligent gate inhibition, being to have natural data supporting, for community gate inhibition user, house type is energy
Enough judging whether is the important evidence of kinsfolk, according to the remote key granting on property management backstage, the acquiescence of same house type
For kinsfolk.For family door lock user by App Bluetooth electronic key and the user of the same Mac address device of pairing, sentence
It is set to the same family user.Simultaneously for tone information data, the definitiveness of meeting unceasing study kinsfolk.Kinsfolk returns
Family's moment plays tone information function, allows the message message obtaining household after going home in time become the another great of Internet of Things epoch
Break through.Solve the important breakthrough that traditional mechanical door lock can not complete.
As an optional embodiment of the present invention, carry out data communication process on App Bluetooth electronic key and backstage
In, cryptographic means all can be used to realize the data interaction between App Bluetooth electronic key and backstage, it is ensured that App Bluetooth electronic
The safety of data transmission between key and backstage.
As an optional embodiment of the present invention, the 2nd App Bluetooth electronic key 30 generates the request of enabling, and will open
Door request sent before backstage 20, the 2nd App Bluetooth electronic key 30, was additionally operable to generate encryption authorization request, and will encryption
Authorization requests sends to backstage 20, wherein, at least includes encryption authorization key data in encryption authorization request;Backstage 20, also uses
In receiving encryption authorization request, encryption authorization request is carried out Authority Verification;Lead to encryption authorization request is carried out Authority Verification
Later, obtain encryption authorization key data, and store encryption authorization key data;Key storage state is sent to the 2nd App
Bluetooth electronic key 30;2nd App Bluetooth electronic key 30, is additionally operable to receive key storage state.
Thus, backstage 20 can get the authorization key of the 2nd App Bluetooth electronic key 30, in order to follow-up by this mandate
Key is back to the 2nd App Bluetooth electronic key 30 and unblanks, it is ensured that the safety unblanked.
As an optional embodiment of the embodiment of the present invention, generate encryption at the 2nd App Bluetooth electronic key 30 and award
Power request, and encryption authorization request was sent before backstage 20, backstage 20, it is additionally operable to carry out the scanning of App Bluetooth electronic key,
And time-out duration is set;If judging time-out, then judge whether to search effective App Bluetooth electronic key, searching effective App
During Bluetooth electronic key, it may be judged whether have at least two effective App Bluetooth electronic keys, judging there are at least two effectively
During App Bluetooth electronic key, prompting user selects effective App Bluetooth electronic key, and obtains the effective App of determination that user selects
Bluetooth electronic key, when judging only one effective App Bluetooth electronic key, obtains and determines effective App Bluetooth electronic key
Spoon;If judging to be not timed-out, then obtain an effective App Bluetooth electronic key, and judge an effective App Bluetooth electronic key
Signal intensity whether less than preset value and be not belonging to preset lock type, if being less than preset value and being not belonging to preset lock class
Type, then obtain and determine effective App Bluetooth electronic key, otherwise performs to judge whether to search effective App Bluetooth electronic key
Step;After acquisition determines effective App Bluetooth electronic key, stop the operation that App Bluetooth electronic key is scanned.Thus
Can ensure that backstage, when determining that App Bluetooth electronic key is effective, just performs follow-up flow process of unblanking, improve the safety unblanked.
As an optional embodiment of the embodiment of the present invention, it is blue that backstage 20 searches effective App in the following way
Tooth electron key includes: backstage 20, for judging the App Bluetooth electronic key searched, if belong to effective App Bluetooth electronic
Key list, if judging to belong to effective App Bluetooth electronic key list, then searches effective App Bluetooth electronic key.Thus may be used
To improve the efficiency of backstage search App Bluetooth electronic key, it is ensured that the efficiency unblanked.
As an optional embodiment of the embodiment of the present invention, before backstage 20 carries out the scanning of App Bluetooth electronic key,
Backstage 20, is additionally operable to inquire about local App Bluetooth electronic key list;Judge that whether local App Bluetooth electronic key is more than one;
If judging, local App Bluetooth electronic key only has one, then add this locality App Bluetooth electronic key to effective App bluetooth electricity
Sub-key list;If judging local App Bluetooth electronic key at least two, then start bluetooth and scan effective App Bluetooth electronic
Key, and according to local App Bluetooth electronic key list, add the effective App Bluetooth electronic key scanned blue to effective App
Tooth electron key list.Thus can ensure that the accuracy of App Bluetooth electronic key list, and then the flow performing that ensures to unblank
Efficiency and safety.
Below, it is provided that a kind of specific implementation is to realize the data sharing unblanked based on the intelligence equipment of passing through of the present invention
Method, but the invention is not limited in this.Seeing Fig. 3, the data sharing method unblanked based on the intelligence equipment of passing through is applied visitor
Under family end and server architecture, wherein client includes customer end A pp and lock SDK (Lock SDK), service
Device includes App server and lock module (Lock module), including:
Customer end A pp sends authorization requests to Lock SDK;
Lock SDK returns the encryption authorization key data generated to App;
App sends encryption authorization request to App server;
App server carries out Authority Verification to encryption authorization request, and after being verified, sends encryption to Lock module
Authorization key data;
Lock module stores encryption authorization key data also returns App server;
App server stores state to App " return " key";
App sends, to App server, the request of enabling;
The request of App server clamshell doors carries out Authority Verification, and after being verified, sends authorization key to Lock module
Request;
Lock module returns authorization key data and tone information data to App server;
App server returns encryption authorization key data and tone information data to App;
App sends, to Lock SDK, the request of enabling;
Lock SDK checking authorization key generation data of unblanking are back to App;
App returns data of unblanking to open the current equipment of intelligence to the intelligence equipment that passes through.
Thus, by the data sharing method unblanked based on the intelligence equipment of passing through that this is concrete, by Bluetooth communication protocol,
Set up the communication mechanism that connection-Data Encryption Transmission-authentication-result returns, verify the effective of App Bluetooth electronic key
Property, after being verified, door lock is opened so that unblank to become the convenient and safety of intelligence, it is possible to realize data sharing.
Claims (10)
1. the data sharing method unblanked based on the intelligence equipment of passing through, it is characterised in that including:
Sharing data is treated in oneth App Bluetooth electronic key collection, and treats that sharing data sends to backstage by described;
Sharing data is treated described in receiving in described backstage, and treats that the pass through MAC Address of equipment of sharing data and intelligence is carried out by described
Binding;
2nd App Bluetooth electronic key generates the request of enabling, and sends the described request of opening the door to described backstage, wherein, described
The request of enabling at least includes that authorization key is asked;
Described backstage receives described request of opening the door, and described enabling request is carried out Authority Verification;
Described enabling request is being carried out after Authority Verification passes through, according to described authorization key acquisition request feedback coefficient by described backstage
According to, and described feedback data is sent to the 2nd App Bluetooth electronic key, wherein, described feedback data at least includes authorizing close
Key data and treat sharing data, described authorization key data be with described intelligence pass through equipment MAC Address binding second
The authorization key data of App Bluetooth electronic key;
Described 2nd App Bluetooth electronic key receives described feedback data, and verifies described authorization key data;
Described 2nd App Bluetooth electronic key, after verifying that described authorization key passes through, sends, to the intelligence equipment that passes through, number of unblanking
According to, and treat sharing data described in output.
Method the most according to claim 1, it is characterised in that described 2nd App Bluetooth electronic key generates the request of enabling,
And the described request of opening the door was sent before described backstage, also include:
Described 2nd App Bluetooth electronic key generates encryption authorization request, and sends the request of described encryption authorization to backstage, its
In, the request of described encryption authorization at least includes encryption authorization key data;
Described backstage receives the request of described encryption authorization, and the request of described encryption authorization is carried out Authority Verification;
The request of described encryption authorization is being carried out after Authority Verification passes through by described backstage, obtains described encryption authorization key data,
And store described encryption authorization key data;
Key storage state is sent to described 2nd App Bluetooth electronic key by described backstage;
Described 2nd App Bluetooth electronic key receives described key storage state.
Method the most according to claim 2, it is characterised in that generating encryption authorization at described App Bluetooth electronic key please
Ask, and the request of described encryption authorization sent before backstage, also include:
Described backstage carries out the scanning of App Bluetooth electronic key, and arranges time-out duration;
If described backstage judges time-out, then judge whether to search effective App Bluetooth electronic key, blue searching effective App
During tooth electron key, it may be judged whether have at least two effective App Bluetooth electronic keys, judging there are at least two effective App
During Bluetooth electronic key, prompting user selects effective App Bluetooth electronic key, and obtains determination effective App indigo plant that user selects
Tooth electron key, when judging only one effective App Bluetooth electronic key, obtains and described determines effective App Bluetooth electronic
Key;
If described backstage judges to be not timed-out, then obtain a described effective App Bluetooth electronic key, and judge that described one has
Whether the signal intensity of effect App Bluetooth electronic key is less than preset value and is not belonging to preset lock type, if less than preset value also
And be not belonging to preset lock type, then obtain described in take and determine effective App Bluetooth electronic key, otherwise perform described in judge whether search
Step to effective App Bluetooth electronic key;
Described backstage obtain described determine effective App Bluetooth electronic key after, stop described App Bluetooth electronic key is carried out
The operation of scanning.
Method the most according to claim 3, it is characterised in that described in search effective App Bluetooth electronic key and include:
The App Bluetooth electronic key searched described in judgement, if belong to effective App Bluetooth electronic key list, if judging to belong to
In effective App Bluetooth electronic key list, then search effective App Bluetooth electronic key.
Method the most according to claim 4, it is characterised in that before described backstage carries out the scanning of App Bluetooth electronic key,
Also include:
Described background query this locality App Bluetooth electronic key list;
Described backstage judges that whether described local App Bluetooth electronic key is more than one;
If described backstage judges that described local App Bluetooth electronic key only has one, then by described local App Bluetooth electronic key
Add to effective App Bluetooth electronic key list;
If described backstage judges described local App Bluetooth electronic key at least two, then start bluetooth and scan effective App bluetooth
Electron key, and according to described local App Bluetooth electronic key list, the effective App Bluetooth electronic key scanned described in interpolation
Spoon is to described effective App Bluetooth electronic key list.
6. the data sharing system unblanked based on the intelligence equipment of passing through, it is characterised in that including:
Oneth App Bluetooth electronic key, treats sharing data for collection, and treats that sharing data sends to backstage by described;
Described backstage, be used for receiving described in treat sharing data, and treat that sharing data and intelligence are passed through the MAC Address of equipment by described
Bind;
2nd App Bluetooth electronic key, is used for generating enabling request, and sends the described request of opening the door to described backstage, wherein,
The described request of opening the door at least includes that authorization key is asked;
Described backstage, is additionally operable to receive described request of opening the door, described enabling request is carried out Authority Verification;Described enabling is being asked
Ask and carry out after Authority Verification passes through, according to described authorization key acquisition request feedback data, and described feedback data being sent extremely
2nd App Bluetooth electronic key, wherein, described feedback data at least includes authorization key data and treats sharing data, described
Authorization key data are to pass through the authorization key of the 2nd App Bluetooth electronic key of MAC Address binding of equipment with described intelligence
Data;
Described 2nd App Bluetooth electronic key, is additionally operable to receive described feedback data, and tests described authorization key data
Card;After verifying that described authorization key passes through, send, to the intelligence equipment that passes through, data of unblanking, and treat sharing data described in exporting.
System the most according to claim 6, it is characterised in that described 2nd App Bluetooth electronic key generates the request of enabling,
And the described request of opening the door was sent before described backstage,
Described 2nd App Bluetooth electronic key, is additionally operable to generate encryption authorization request, and the request of described encryption authorization is sent extremely
Backstage, wherein, at least includes encryption authorization key data in the request of described encryption authorization;
Described backstage, is additionally operable to receive the request of described encryption authorization, the request of described encryption authorization is carried out Authority Verification;To institute
State encryption authorization request to carry out after Authority Verification passes through, obtaining described encryption authorization key data, and storing described encryption authorization
Key data;Key storage state is sent to described 2nd App Bluetooth electronic key;
Described 2nd App Bluetooth electronic key, is additionally operable to receive described key storage state.
System the most according to claim 7, it is characterised in that generate encryption at described 2nd App Bluetooth electronic key and award
Power request, and the request of described encryption authorization was sent before backstage,
Described backstage, is additionally operable to carry out the scanning of App Bluetooth electronic key, and arranges time-out duration;If judging time-out, then judgement is
No search effective App Bluetooth electronic key, when searching effective App Bluetooth electronic key, it may be judged whether have at least two
Effectively App Bluetooth electronic key, when judging to have at least two effective App Bluetooth electronic keys, prompting user selects effectively
App Bluetooth electronic key, and obtain determination effective App Bluetooth electronic key that user selects, judging only one effectively
During App Bluetooth electronic key, obtain and described determine effective App Bluetooth electronic key;If judging to be not timed-out, then obtain described one
Effective App Bluetooth electronic key, and judge that whether the signal intensity of a described effective App Bluetooth electronic key is less than presetting
Value and be not belonging to preset lock type, if being less than preset value and being not belonging to preset lock type, then obtain described in take and determine effective App
Bluetooth electronic key, otherwise judges whether to search the step of effective App Bluetooth electronic key described in execution;Described really in acquisition
After fixed effective App Bluetooth electronic key, stop the operation that described App Bluetooth electronic key is scanned.
System the most according to claim 8, it is characterised in that it is blue that described backstage searches effective App in the following way
Tooth electron key includes:
Described backstage, is used for the App Bluetooth electronic key searched described in judging, if belong to effective App Bluetooth electronic key
List, if judging to belong to effective App Bluetooth electronic key list, then searches effective App Bluetooth electronic key.
System the most according to claim 9, it is characterised in that described backstage carries out App Bluetooth electronic key and scans it
Before, described backstage, it is additionally operable to inquire about local App Bluetooth electronic key list;Whether judge described local App Bluetooth electronic key
More than one;If judging, described local App Bluetooth electronic key only has one, then added by described local App Bluetooth electronic key
Add to effective App Bluetooth electronic key list;If judging described local App Bluetooth electronic key at least two, then start indigo plant
Tooth scans effective App Bluetooth electronic key, and according to described local App Bluetooth electronic key list, scans described in interpolation
Effectively App Bluetooth electronic key is to described effective App Bluetooth electronic key list.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610302701.XA CN106060002B (en) | 2016-05-09 | 2016-05-09 | A kind of data sharing method and system based on the current equipment unlocking of intelligence |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610302701.XA CN106060002B (en) | 2016-05-09 | 2016-05-09 | A kind of data sharing method and system based on the current equipment unlocking of intelligence |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106060002A true CN106060002A (en) | 2016-10-26 |
CN106060002B CN106060002B (en) | 2019-07-02 |
Family
ID=57176804
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610302701.XA Active CN106060002B (en) | 2016-05-09 | 2016-05-09 | A kind of data sharing method and system based on the current equipment unlocking of intelligence |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106060002B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109598574A (en) * | 2018-10-11 | 2019-04-09 | 上海酷信息科技有限公司 | A kind of APP remotely shares the method for equipment |
CN114258013A (en) * | 2020-09-11 | 2022-03-29 | 中国联合网络通信集团有限公司 | Data encryption method, device and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020023215A1 (en) * | 1996-12-04 | 2002-02-21 | Wang Ynjiun P. | Electronic transaction systems and methods therefor |
US20030014372A1 (en) * | 2000-08-04 | 2003-01-16 | Wheeler Lynn Henry | Trusted authentication digital signature (tads) system |
CN102568068A (en) * | 2012-03-22 | 2012-07-11 | 章晋涛 | Embedded access control management system |
CN103856629A (en) * | 2012-12-03 | 2014-06-11 | 三星电子株式会社 | Information providing method and mobile terminal therefor |
CN204204069U (en) * | 2014-11-19 | 2015-03-11 | 马健 | Gate inhibition's intelligent controller and gate inhibition's intelligent control system |
CN105046796A (en) * | 2015-08-31 | 2015-11-11 | 芝麻智能科技(北京)有限公司 | Unlocking control method, device and system for electronic lock |
CN105447949A (en) * | 2015-12-30 | 2016-03-30 | 深圳市多度科技有限公司 | Intelligent access control system |
-
2016
- 2016-05-09 CN CN201610302701.XA patent/CN106060002B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020023215A1 (en) * | 1996-12-04 | 2002-02-21 | Wang Ynjiun P. | Electronic transaction systems and methods therefor |
US20030014372A1 (en) * | 2000-08-04 | 2003-01-16 | Wheeler Lynn Henry | Trusted authentication digital signature (tads) system |
CN102568068A (en) * | 2012-03-22 | 2012-07-11 | 章晋涛 | Embedded access control management system |
CN103856629A (en) * | 2012-12-03 | 2014-06-11 | 三星电子株式会社 | Information providing method and mobile terminal therefor |
CN204204069U (en) * | 2014-11-19 | 2015-03-11 | 马健 | Gate inhibition's intelligent controller and gate inhibition's intelligent control system |
CN105046796A (en) * | 2015-08-31 | 2015-11-11 | 芝麻智能科技(北京)有限公司 | Unlocking control method, device and system for electronic lock |
CN105447949A (en) * | 2015-12-30 | 2016-03-30 | 深圳市多度科技有限公司 | Intelligent access control system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109598574A (en) * | 2018-10-11 | 2019-04-09 | 上海酷信息科技有限公司 | A kind of APP remotely shares the method for equipment |
CN114258013A (en) * | 2020-09-11 | 2022-03-29 | 中国联合网络通信集团有限公司 | Data encryption method, device and storage medium |
CN114258013B (en) * | 2020-09-11 | 2023-10-31 | 中国联合网络通信集团有限公司 | Data encryption method, device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN106060002B (en) | 2019-07-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106652135B (en) | Access control method and its system based on cloud and planar bar code technology | |
CN107403491B (en) | A kind of automatic access control system and door opening method based on real-time geographic coordinate | |
Santoso et al. | Securing IoT for smart home system | |
CN105261104B (en) | Bluetooth door lock system and its control method based on intelligent terminal | |
CN104994504B (en) | With the safety of wireless network and automatically it connect | |
CN105099984B (en) | The method and apparatus of account intercommunication between a kind of APP | |
CN105741395A (en) | Entrance guard access method and system based on two-dimension code and face identification | |
CN105099673A (en) | Authorization method, authorization requesting method and devices | |
CN104778773A (en) | System and method for controlling entrance guard by mobile phone | |
CN107578511A (en) | A kind of smart lock and its Intelligent key | |
CN107672469A (en) | Electrical bicycle charging method and system based on credential management | |
CN105144670A (en) | Wireless networking-enabled personal identification system | |
CN105551120A (en) | Building intercommunication method, near field communication (NFC) unlocking device and building intercommunication system | |
CN106600775A (en) | Non-networking dynamic password generation method used for intelligent access control system | |
CN107067576A (en) | Intelligent cabinet tenant remote authorization other people use method, apparatus and system | |
CN109300208A (en) | Method for unlocking, unlocking apparatus, lock system, lock device and storage medium | |
CN109992949A (en) | A kind of equipment authentication method, air card-writing method and apparatus authentication device | |
CN107231019A (en) | A kind of method and apparatus charged by charging device to user equipment | |
CN105656627A (en) | Identity verification method, device and system | |
CN109949461A (en) | Method for unlocking and device | |
CN112978526B (en) | Access control method, equipment and system and elevator control method, equipment and system | |
CN104660405A (en) | Business equipment authentication method and equipment | |
CN110021087A (en) | Method based on the quick binding room that wechat is opened the door | |
CN104506527A (en) | Multidimensional information pointer platform and data access method thereof | |
CN106027249B (en) | Identity card card reading method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |