CN109741500B - Temporary password setting and verification method for intelligent lock - Google Patents
Temporary password setting and verification method for intelligent lock Download PDFInfo
- Publication number
- CN109741500B CN109741500B CN201811646497.9A CN201811646497A CN109741500B CN 109741500 B CN109741500 B CN 109741500B CN 201811646497 A CN201811646497 A CN 201811646497A CN 109741500 B CN109741500 B CN 109741500B
- Authority
- CN
- China
- Prior art keywords
- temporary password
- current
- password
- temporary
- unlocking
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Lock And Its Accessories (AREA)
Abstract
The invention belongs to the technical field of intelligent lock application, and discloses a temporary password setting and verification method of an intelligent lock. The invention includes a temporary password setting method and a temporary password verification method; the temporary password setting method comprises the steps of receiving a temporary unlocking request from a user side, generating a temporary password, storing the temporary password in a temporary password table and sending the current temporary password to the user side; the temporary password verification method comprises the steps of receiving a password string from a user side and respectively verifying a temporary password and an authorization code; and if the comparison is successful, the current intelligent lock is opened, and if the comparison is failed, unlocking failure information is output. The temporary password is generated by the randomly generated password bit and time together, so that the safety performance is high, and the identity of the visitor can be recorded and traced while the unlocking safety of the intelligent lock is further improved by a mode of double verification of the temporary password and the authorization code, so that the intelligent lock is convenient to effectively manage the visitor, is safe and practical, and is suitable for popularization and use.
Description
Technical Field
The invention belongs to the technical field of intelligent lock application, and particularly relates to a temporary password setting and verification method of an intelligent lock.
Background
The door lock is a tool commonly used by people, a traditional door lock adopts a mechanical key, and then the lock is unlocked by swiping a card or inputting a password, but the mechanical lock needs the key, and the door card is also needed by swiping the card, so that the door lock is easy to lose; with the coming of the mobile internet era, people put higher demands on intelligent life style, so that the intelligent lock adopting various unlocking modes such as fingerprint, digital password, key, biological identification and the like becomes the first choice of more and more people.
However, the existing intelligent lock can only inform the visitor of fixed passwords such as a digital password and the like under the condition that the visitor needs to open the door by oneself, so that the password leakage is very easy to occur, unnecessary manpower and material resources are consumed for password modification after the visitor opens the door every time, and the daily use is very inconvenient; the temporary password authorization function can be realized by a small part of intelligent locks, but in the use occasions of the intelligent locks with fixed invitations such as office buildings, banks, hotels and the like, the identities of current visitors cannot be judged by the existing temporary passwords, the disordered access situation is easily caused, effective visitor management cannot be carried out, and the use is very inconvenient.
Disclosure of Invention
In order to solve the problems in the prior art, the invention aims to provide a temporary password setting and a verification method of the temporary password setting of the intelligent lock.
The technical scheme adopted by the invention is as follows:
a setting and verification method of a temporary password of an intelligent lock comprises a temporary password setting method and a temporary password verification method; the temporary password setting method comprises the following steps:
s101, receiving a temporary unlocking request from a user side, and matching the current time for the current temporary unlocking request in real time;
s102, generating a temporary password according to the current temporary unlocking request and the current time, storing the temporary password in a temporary password table, and sending the current temporary password to a user side;
the temporary password authentication method comprises the following steps:
s201, receiving a password string from a user side, and then judging whether the current password string comprises a temporary password and an authorization code;
s202, if the judgment result in the step S201 is negative, unlocking failure information is output to the user side, and if the judgment result in the step S201 is positive, the temporary password and the authorization code are respectively verified;
s203, comparing the current temporary password with a temporary password table which is valid in the current time period, if the comparison is successful, the current temporary password is valid, and if the comparison is failed, unlocking failure information is output to a user side;
s204, comparing the current authorization code with a preset authorization code table, if the comparison result is consistent, the current authorization code is valid, and if the comparison is failed, unlocking failure information is output to a user side;
s205, if the current authorization code is valid and the current temporary password is valid, outputting unlocking success information to the user side and opening the current intelligent lock.
Preferably, in step S101, the current time is a network time of a time zone in which the current smart lock is located.
Preferably, when the temporary password is generated in step S102, the specific steps are as follows:
s102a, randomly generating and outputting a password bit with a fixed word length by a temporary password generator, and immediately acquiring the network time of a time zone where the current intelligent lock is located as the current time output by a clock unit after receiving a current temporary unlocking request;
s102b, sequentially arranging the password bits and the current time to generate a current temporary password, wherein the current temporary password is valid within the current time plus the preset time;
s102c, recording all temporary passwords generated in a preset time into the same temporary password table.
Preferably, in step 102a and step S102b, the generated password bit and the current temporary password are both generated by using a one-way hash function.
Preferably, in step S201, the authorization code is set when the current smart lock is used for the first time; the authorization codes are more than 1 and are generated by a fixed password and a role code together.
Preferably, in step S204, the specific steps of comparing the authorization codes are as follows:
s204a, arranging the initially input fixed password and the role codes in sequence to obtain a private key, and then processing the private key through an SECP256K1 elliptic curve algorithm to obtain a public key;
s204b, processing the public key through SHA256 and RIPEMD160 hash algorithms in sequence to obtain public key hash;
s204c, processing the public key hash through two SHA256 hash algorithms to obtain the first 4 bytes of a result as a check value, and adding the public key hash and the check value to the prefix of 1 byte of the address to obtain an intermediate password;
and S204d, coding conversion is realized on the intermediate address through BASE58 coding, and an authorization code is obtained.
Preferably, the method for verifying the temporary password further comprises the following steps:
s206, after the unlocking failure information of the preset times is output within the preset time, the current intelligent lock is locked, and the unlocking abnormal information is output.
Preferably, in step S206, after the current smart lock is locked, the current smart lock cannot be opened by using the temporary password before activation.
Preferably, after the unlocking success information is output each time, the used temporary password is cleared from the temporary password table immediately, that is, the temporary password is invalid.
Preferably, each time the unlocking abnormal information, the unlocking success information or the unlocking failure information is output, the clock unit acquires the network time of the current time zone in which the intelligent lock is located in real time, and then the current unlocking abnormal information, the unlocking success information or the unlocking failure information and the network time corresponding to the current unlocking abnormal information, the unlocking success information or the unlocking failure information are recorded into the time flow log.
The invention has the beneficial effects that:
1) the temporary password is generated by randomly generated password bits and time together, so that potential safety hazards caused by leakage of fixed passwords are avoided, any temporary password has timeliness due to an effective temporary password setting mode within preset time, the safety problem caused by abuse of the temporary password is avoided, meanwhile, a one-way encryption mode is used for preventing a visitor from cracking the password after knowing the password generation rule of the current password lock, and the safety performance is further improved;
2) according to the invention, through a mode of double verification of the temporary password and the authorization code, the identity of each visitor unlocked by using the temporary password can be recorded, and each authorization code uniquely corresponds to an administrator role with the current intelligent lock use permission, so that the identity of the visitor can be recorded and traced while the unlocking safety of the intelligent lock is further improved, and the effective visitor management is facilitated;
3) the invention adopts the time flow log mode to record the operation of opening the door every time and the operation of trying to open the door of the current intelligent lock, so that any unlocking abnormal information, unlocking success information or unlocking failure information is recorded based on the time flow, and the time can not flow backwards, therefore, the record stored every time can not be modified, thereby avoiding lawbreakers from injecting forged door opening record information or forged temporary passwords to open the door control, being safe and practical, and being suitable for popularization and use.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a block diagram of the present invention.
Detailed Description
The setting of a temporary password of an intelligent lock and the authentication method thereof according to the present invention will be described in detail by way of embodiments with reference to the accompanying drawings. It should be noted that the description of the embodiments is provided to help understanding of the present invention, but the present invention is not limited thereto.
The term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, B exists alone, and A and B exist at the same time, and the term "/and" is used herein to describe another association object relationship, which means that two relationships may exist, for example, A/and B, may mean: a alone, and both a and B alone, and further, the character "/" in this document generally means that the former and latter associated objects are in an "or" relationship.
Example 1:
as shown in fig. 1, the present embodiment provides a method for setting a temporary password of an intelligent lock and verifying the temporary password, including a temporary password setting method and a temporary password verifying method; the temporary password authentication method is operated based on a temporary password setting method, thereby forming a complete temporary password use process.
The temporary password setting method comprises the following steps:
s101, receiving a temporary unlocking request from a user side, and matching the current time for the current temporary unlocking request in real time; the current time is the network time of the time zone in which the current intelligent lock is located, the network time is obtained in real time through a communication network and has the property of non-reversibility, so that repeated temporary passwords are prevented from being generated at the later stage, and the network time can be but is not limited to public dates and time division moments based on a 24-hour system.
S102, generating a temporary password according to the current temporary unlocking request and the current time, storing the temporary password in a temporary password table, and sending the current temporary password to a user side; when the temporary password is generated, the specific steps are as follows:
s102a, randomly generating and outputting a password bit with a fixed word length by a temporary password generator, and immediately acquiring the network time of a time zone where the current intelligent lock is located as the current time output by a clock unit after receiving a current temporary unlocking request; therefore, data confusion caused by repeated temporary passwords is avoided, and the practicability is higher.
S102b, sequentially arranging the password bits and the current time to generate a current temporary password, wherein the current temporary password is valid within the current time plus the preset time; the preset time can be any time, the administrator can set according to actual needs, the setting of the preset time enables that the temporary password is invalid after the appointed use date is over, anyone can not use the temporary password to open the coded lock, and therefore on the premise of ensuring safety, the work that the password needs to be reset after the visitor uses the coded lock is avoided, and management and use of the intelligent lock are facilitated.
S102c, recording all temporary passwords generated in a preset time into the same temporary password table; therefore, after a plurality of administrator roles with current intelligent lock use permission generate temporary passwords within preset time, visitors can still orderly open the intelligent lock, and the intelligent lock is convenient and efficient to use.
In the embodiment, the generated password bit and the current temporary password are generated by adopting a one-way hash function, so that the problem that a visitor decrypts the password after knowing the password generation rule of the current password lock is avoided.
The temporary password authentication method comprises the following steps:
s201, receiving a password string from a user side, and then judging whether the current password string comprises a temporary password and an authorization code; the authorization code is set when the current intelligent lock is used for the first time; the number of the authorization codes is more than 1, the authorization codes are generated by a fixed password and role codes together, each administrator role with the current intelligent lock use authority has a unique corresponding role code, and therefore visitor management is facilitated.
S202, if the judgment result in the step S201 is negative, unlocking failure information is output to the user side, and if the judgment result in the step S201 is positive, the temporary password and the authorization code are respectively verified; the unlocking failure information comprises the reason of the unlocking failure, and the verification of the temporary password and the verification of the authorization code are two independent steps which are carried out simultaneously, so that the reason of the unlocking failure is conveniently recorded and output.
S203, comparing the current temporary password with a temporary password table which is valid in the current time period, if the comparison is successful, the current temporary password is valid, and if the comparison is failed, unlocking failure information is output to a user side; therefore, guest confusion caused by the overdue or repeated use of the temporary password is avoided.
S204, comparing the current authorization code with a preset authorization code table, if the comparison result is consistent, the current authorization code is valid, and if the comparison is failed, unlocking failure information is output to a user side; the specific steps for generating the authorization code are as follows:
s204a, arranging the initially input fixed password and the role codes in sequence to obtain a private key, and then processing the private key through an SECP256K1 elliptic curve algorithm to obtain a public key;
s204b, processing the public key through SHA256 and RIPEMD160 hash algorithms in sequence to obtain public key hash; a256-bit private key is obtained by hashing a public key and the public key by using an SHA256 hashing algorithm, the same data input is used for obtaining the same result, the input data is changed slightly to obtain a different result, the result cannot be known in advance, forward calculation (namely calculating the corresponding private key by using a fixed password and a role code) is very easy, reverse calculation (namely calculating the fixed password and the role code by using the private key) is very difficult, and the reverse calculation is regarded as impossible under the current technological conditions, so that the authorization code obtained by initial registration is unique and cannot be stolen, and the security of the data is further improved.
S204c, processing the public key hash through two SHA256 hash algorithms to obtain the first 4 bytes of a result as a check value, and adding the public key hash and the check value to the prefix of 1 byte of the address to obtain an intermediate password; the check code is obtained from the hash value of the data to be encoded, and can be used for detecting and avoiding errors generated in transcription and input; in this embodiment, the prefix of address 1 byte is 128 (0 × 80 in hexadecimal).
And S204d, coding conversion is realized on the intermediate address through BASE58 coding, and an authorization code is obtained.
S205, if the current authorization code is valid and the current temporary password is valid, outputting unlocking success information to a user side and opening the current intelligent lock; in this embodiment, after the unlocking success information is output each time, the used temporary password is immediately cleared from the temporary password table, that is, the temporary password is invalid.
In this embodiment, the method for verifying the temporary password further includes the following steps:
s206, after unlocking failure information of preset times is output within preset time, the current intelligent lock is locked, unlocking abnormal information is output, and the unlocking abnormal information can enable an administrator to quickly detect abnormal conditions such as lock theft, repeated unlocking after the expiration of a temporary password, repeated use of the temporary password and the like, so that the administrator can quickly and effectively deal with the abnormal conditions; after the current intelligent lock is locked, the current intelligent lock cannot be opened by using the temporary password before activation, and the activation can be but not limited to the modes of fixed password activation, biological feature activation and the like.
In the embodiment, each time the unlocking abnormal information, the unlocking success information or the unlocking failure information is output, the clock unit acquires the network time of the time zone where the current intelligent lock is located in real time, and then the current unlocking abnormal information, the unlocking success information or the unlocking failure information and the network time corresponding to the current unlocking abnormal information, the unlocking success information or the unlocking failure information are recorded into the time flow log; therefore, any unlocking abnormal information, unlocking success information or unlocking failure information is recorded based on time flow, and the time can not flow backwards, so that the record stored every time can not be modified, and illegal persons are prevented from injecting forged door opening record information or forged temporary passwords to open the door control.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other similar elements in a process, method, article, or apparatus that comprises the element.
Those of ordinary skill in the art will understand that: all or part of the steps of implementing the above method embodiments may be implemented by hardware associated with program instructions, and the program may be stored in a computer-readable storage medium, and when executed, performs the steps including the above method embodiments.
Finally, it is to be noted that: the above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes performed by the present specification and drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (8)
1. A temporary password setting and verification method of an intelligent lock is characterized in that: the method comprises a temporary password setting method and a temporary password verification method; the temporary password setting method comprises the following steps:
s101, receiving a temporary unlocking request from a user side, and matching the current time for the current temporary unlocking request in real time;
s102, generating a temporary password according to the current temporary unlocking request and the current time, storing the temporary password in a temporary password table, and sending the current temporary password to a user side;
the temporary password authentication method comprises the following steps:
s201, receiving a password string from a user side, and then judging whether the current password string comprises a temporary password and an authorization code; the authorization code is generated by a fixed password and role codes together, and each administrator role with the current intelligent lock use authority has a unique corresponding role code;
s202, if the judgment result in the step S201 is negative, unlocking failure information is output to the user side, and if the judgment result in the step S201 is positive, the temporary password and the authorization code are respectively verified;
s203, comparing the current temporary password with a temporary password table which is valid in the current time period, if the comparison is successful, the current temporary password is valid, and if the comparison is failed, unlocking failure information is output to a user side;
s204, comparing the current authorization code with a preset authorization code table, if the comparison result is consistent, the current authorization code is valid, and if the comparison is failed, unlocking failure information is output to a user side;
s205, if the current authorization code is valid and the current temporary password is valid, outputting unlocking success information to a user side and opening the current intelligent lock;
in the step S101, the current time is the network time of the time zone in which the current intelligent lock is located;
in step S102, when the temporary password is generated, the specific steps are as follows:
s102a, randomly generating and outputting a password bit with a fixed word length by a temporary password generator, and immediately acquiring the network time of a time zone where the current intelligent lock is located as the current time output by a clock unit after receiving a current temporary unlocking request;
s102b, sequentially arranging the password bits and the current time to generate a current temporary password, wherein the current temporary password is valid within the current time plus the preset time;
s102c, recording all temporary passwords generated in a preset time into the same temporary password table.
2. The method for setting the temporary password of the intelligent lock and the authentication method thereof according to claim 1, wherein: in step 102a and step S102b, the generated password bit and the current temporary password are both generated by using a one-way hash function.
3. The method for setting the temporary password of the smart lock and the authentication method thereof according to claim 1, wherein: in step S201, the authorization code is set when the current smart lock is used for the first time; the authorization codes are more than 1.
4. The setting of temporary password of intelligent lock and its verification method according to claim 3, characterized in that: the specific steps for generating the authorization code are as follows:
s204a, arranging the initially input fixed password and the role codes in sequence to obtain a private key, and then processing the private key through an SECP256K1 elliptic curve algorithm to obtain a public key;
s204b, processing the public key through SHA256 and RIPEMD160 hash algorithms in sequence to obtain public key hash;
s204c, processing the public key hash through two SHA256 hash algorithms to obtain the first 4 bytes of a result as a check value, and adding the public key hash and the check value to the prefix of 1 byte of the address to obtain an intermediate password;
and S204d, coding conversion is realized on the intermediate address through BASE58 coding, and an authorization code is obtained.
5. The setting of the temporary password of the intelligent lock and the verification method thereof according to any one of claims 1 to 4, characterized in that: the temporary password authentication method further comprises the following steps:
s206, after the unlocking failure information of the preset times is output within the preset time, the current intelligent lock is locked, and the unlocking abnormal information is output.
6. The method for setting the temporary password of the smart lock and the authentication method thereof according to claim 5, wherein: in step S206, after the current smart lock is locked, the current smart lock cannot be opened by using the temporary password before activation.
7. The method for setting the temporary password of the intelligent lock and the authentication method thereof according to claim 5, wherein: after unlocking success information is output every time, the used temporary password is immediately cleared from the temporary password table, namely the temporary password is invalid.
8. The setting of temporary password of intelligent lock and its verification method according to claim 7, characterized in that: and each time when the unlocking abnormal information, the unlocking success information or the unlocking failure information is output, the clock unit acquires the network time of the time zone where the current intelligent lock is located in real time, and then the current unlocking abnormal information, the unlocking success information or the unlocking failure information and the network time corresponding to the current unlocking abnormal information, the unlocking success information or the unlocking failure information are recorded into a time flow log.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811646497.9A CN109741500B (en) | 2018-12-29 | 2018-12-29 | Temporary password setting and verification method for intelligent lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811646497.9A CN109741500B (en) | 2018-12-29 | 2018-12-29 | Temporary password setting and verification method for intelligent lock |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109741500A CN109741500A (en) | 2019-05-10 |
CN109741500B true CN109741500B (en) | 2022-05-10 |
Family
ID=66362822
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811646497.9A Active CN109741500B (en) | 2018-12-29 | 2018-12-29 | Temporary password setting and verification method for intelligent lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109741500B (en) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110111468A (en) * | 2019-05-15 | 2019-08-09 | 深圳市驿住科技有限公司 | Non- online door lock long-distance method for unlocking and system based on internet numerical ciphers |
CN110164013A (en) * | 2019-05-31 | 2019-08-23 | 广州软盈科技有限公司 | A kind of retrospective caller management method |
CN110164012A (en) * | 2019-05-31 | 2019-08-23 | 广州软盈科技有限公司 | A kind of community's access control system and working method thereof |
CN110189448A (en) * | 2019-05-31 | 2019-08-30 | 广州软盈科技有限公司 | A kind of access control system control method |
CN111179476B (en) * | 2020-01-12 | 2021-08-31 | 杭州复杂美科技有限公司 | Configuration method and control method of intelligent lock, equipment and storage medium |
CN112333133A (en) * | 2020-07-08 | 2021-02-05 | 深圳Tcl新技术有限公司 | Data security transmission method, device, equipment and computer readable storage medium |
CN112260821A (en) * | 2020-09-15 | 2021-01-22 | 合肥寰芯微电子科技有限公司 | Method, system and equipment for generating temporary password of off-line electronic lock |
CN112200941A (en) * | 2020-10-09 | 2021-01-08 | 广东科徕尼智能科技有限公司 | Method, equipment and storage medium for generating temporary password by intelligent door lock |
CN114973483A (en) * | 2021-02-25 | 2022-08-30 | 星络社区云物联科技有限公司 | Entrance guard password verification method, entrance guard equipment and computer readable storage medium |
CN113593095B (en) * | 2021-08-19 | 2023-12-29 | 广东好太太智能家居有限公司 | Temporary password offline verification method and system of intelligent lock and intelligent lock |
CN113656775A (en) * | 2021-08-19 | 2021-11-16 | 广东好太太智能家居有限公司 | Offline password verification method and system with expiration date and intelligent lock |
CN114495330B (en) * | 2022-01-24 | 2024-02-02 | 吴昌景 | Method for setting temporary fingerprint in authorization manner |
CN116055036B (en) * | 2022-12-08 | 2024-03-12 | 江苏拓米洛高端装备股份有限公司 | Dynamic password generation method of non-networking system and identity authentication method of non-networking system |
CN116110153A (en) * | 2023-01-04 | 2023-05-12 | 北京飞利信信息安全技术有限公司 | Intelligent lock anti-theft and early warning method, intelligent lock, electronic equipment and medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1855810A (en) * | 2005-04-26 | 2006-11-01 | 上海盛大网络发展有限公司 | Dynamic code verificating system, method and use |
CN101626291A (en) * | 2008-07-07 | 2010-01-13 | 谈剑锋 | ECC algorithm-based identity authentication system and identity authentication method |
CN105471903A (en) * | 2015-12-31 | 2016-04-06 | 中国建设银行股份有限公司 | Method for generating electronic lock activation information and related system, device and unlocking method |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102168509B (en) * | 2011-03-23 | 2013-12-25 | 袁磊 | Dynamic password lock system capable of changing password with date |
CN104424676A (en) * | 2013-08-28 | 2015-03-18 | 北京数码视讯科技股份有限公司 | Identity information sending method, identity information sending device, access control card reader and access control system |
CN105678871A (en) * | 2015-12-28 | 2016-06-15 | 美的集团股份有限公司 | Temporary unlocking method, temporary unlocking system and mobile terminal |
WO2018006341A1 (en) * | 2016-07-07 | 2018-01-11 | 深圳企管加企业服务有限公司 | Optical communications-based authentication method and system |
CN106101159B (en) * | 2016-08-27 | 2019-08-23 | 谢志豪 | Dynamic cipher generating method, dynamic cipher authentication method and device |
CN108734812A (en) * | 2017-04-18 | 2018-11-02 | 美的智慧家居科技有限公司 | Remote unlocking method, apparatus based on ZigBee and system |
CN107146303A (en) * | 2017-04-25 | 2017-09-08 | 深圳市万睿智能科技有限公司 | Device, method and the gate control system opened the door using dynamic password |
CN108806025A (en) * | 2017-05-03 | 2018-11-13 | 腾讯科技(深圳)有限公司 | Realize the entrance guard authorization method and device of visitor's temporary visit |
CN207409010U (en) * | 2017-07-11 | 2018-05-25 | 广东能兴科技发展有限公司 | The newer temporary password access control system of encryption parameter dynamic |
CN107492168B (en) * | 2017-07-21 | 2018-06-22 | 厦门狄耐克智能科技股份有限公司 | A kind of access control system of residential community and door opening method based on cloud service |
CN107564142A (en) * | 2017-08-14 | 2018-01-09 | 成都法线网络科技有限公司 | A kind of verification method of intelligent entrance guard |
CN108122314B (en) * | 2017-12-14 | 2020-12-22 | 深圳市天和荣科技有限公司 | Doorbell call processing method, cloud server, medium and system |
CN108492412A (en) * | 2018-03-14 | 2018-09-04 | 郑州工程技术学院 | A kind of management method of intelligent building, apparatus and system |
CN108830983B (en) * | 2018-05-29 | 2021-03-02 | 广州足迹体育文化发展有限公司 | Access control system based on block chain and working method thereof |
-
2018
- 2018-12-29 CN CN201811646497.9A patent/CN109741500B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1855810A (en) * | 2005-04-26 | 2006-11-01 | 上海盛大网络发展有限公司 | Dynamic code verificating system, method and use |
CN101626291A (en) * | 2008-07-07 | 2010-01-13 | 谈剑锋 | ECC algorithm-based identity authentication system and identity authentication method |
CN105471903A (en) * | 2015-12-31 | 2016-04-06 | 中国建设银行股份有限公司 | Method for generating electronic lock activation information and related system, device and unlocking method |
Also Published As
Publication number | Publication date |
---|---|
CN109741500A (en) | 2019-05-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109741500B (en) | Temporary password setting and verification method for intelligent lock | |
US20200252203A1 (en) | Biometric verification of a blockchain database transaction contributor | |
CN106971441B (en) | Unlocking method, door lock, key and lockset | |
CN107742339B (en) | Platform-based passive electronic lock management method | |
KR101250132B1 (en) | Biometric authentication system and method therefor | |
CN110706379B (en) | Access control method and device based on block chain | |
CN108830983B (en) | Access control system based on block chain and working method thereof | |
CN103530924B (en) | A kind of dynamic puzzle-lock system for Possum network management and method | |
CN108965222B (en) | Identity authentication method, system and computer readable storage medium | |
CN100495421C (en) | Authentication protection method based on USB device | |
CN107492161A (en) | A kind of lock management scheme of time-based dynamic token and low-power consumption bluetooth technology | |
CN101588352B (en) | Method and system for ensuring security of operating environment | |
US20210099304A1 (en) | Composite identity authentication method and composite identity authentication system using same | |
CN101298817B (en) | Lock body control device and method thereof | |
JP2013084034A (en) | Template distribution type cancelable biometric authentication system and method therefor | |
CN104321776A (en) | Offline authentication with embedded authorization attributes | |
CN112863017A (en) | Smart community building intercom system dynamic password unlocking device, method, equipment and storage medium | |
CN109285256A (en) | Computer room based on block chain authentication enter permission give method | |
CN113205628A (en) | Intelligent door lock control method and system based on biological feature recognition | |
CN104282059A (en) | Bluetooth-based safety intelligent lock system with video monitoring function and unlocking and locking methods | |
CN1953366A (en) | Password management method and system for intelligent secret key device | |
Cavoukian et al. | Keynote paper: Biometric encryption: Technology for strong authentication, security and privacy | |
CN102413148B (en) | Biological characteristic remote authentication method based on visual codes | |
CN111262867A (en) | Key management method based on block chain | |
CN101465011B (en) | Lock control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |