CN110009785A - A kind of smart lock control technology based on ciphering two-dimension code and IPV6 - Google Patents
A kind of smart lock control technology based on ciphering two-dimension code and IPV6 Download PDFInfo
- Publication number
- CN110009785A CN110009785A CN201910281328.8A CN201910281328A CN110009785A CN 110009785 A CN110009785 A CN 110009785A CN 201910281328 A CN201910281328 A CN 201910281328A CN 110009785 A CN110009785 A CN 110009785A
- Authority
- CN
- China
- Prior art keywords
- smart lock
- ciphering
- dimension code
- ipv6
- shell
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/618—Details of network addresses
- H04L2101/659—Internet protocol version 6 [IPv6] addresses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Artificial Intelligence (AREA)
- Toxicology (AREA)
- Electromagnetism (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Lock And Its Accessories (AREA)
Abstract
The smart lock control technology based on ciphering two-dimension code and IPV6 that the invention discloses a kind of, including mainboard operation module, software operation module, IPV6 link block and the two-dimensional code generation module on the inside of smart lock, smart lock, the smart lock includes shell, the shell is surrounded by operation panel, the centre of the shell is fixedly connected with fixed plate, the centre of the fixed plate is fixedly connected with display screen, keyhole is offered among the top of the shell, and keyhole runs through a side surface of shell, is fixedly connected with handle among the top of the shell;The ciphering two-dimension code scanning that the present invention is arranged effectively can prevent fingerprint from stealing, it is consistent with the use habit of user simultaneously, user only need to open app by cell phone intelligent equipment and generate ciphering two-dimension code, the software module of deciphering module and smart lock on the inside of smart machine can be confirmed by symmetry algorithm, smart lock can be opened when algorithm data is consistent, reduce economic loss.
Description
Technical field
The invention belongs to smart lock technical fields, and in particular to a kind of to be controlled based on the smart lock of ciphering two-dimension code and IPV6
Technology.
Background technique
Smart lock, which refers to, is different from tradition machinery lock, in user's identification, safety, the more intelligentized lock of managerial aspect
Tool, smart lock is the execution unit locked a door in access control system, is with safety, convenience, the compound lock of advanced technology.
Existing smart lock there is a problem that when in use it is certain, it is universal due to planar bar code technology, relative to fingerprint
User more likes scanning the two-dimensional code, and fingerprint is easily adhered on scanning board when fingerprint recognition, and fingerprint is easy to pick, there is compared with
Big security risk, and cell phone intelligent equipment operation has certain limitation, needs ability within the scope of a certain distance openable, it is real
It is not comprehensive enough with property, while the problem of increase work difficulty, bring economic loss, it is thus it is proposed that a kind of based on encryption
The smart lock control technology of two dimensional code and IPV6.
Summary of the invention
The smart lock control technology based on ciphering two-dimension code and IPV6 that the purpose of the present invention is to provide a kind of, on solving
State the existing smart lock proposed in background technique there is a problem that when in use it is certain, it is universal due to planar bar code technology,
More like scanning the two-dimensional code relative to fingerprint user, and fingerprint is easily adhered on scanning board when fingerprint recognition, fingerprint is easy to be stained with
It takes, there is biggish security risks, and cell phone intelligent equipment operation has certain limitation, needs within the scope of a certain distance
Just openable, practicability is not comprehensive enough, while the problems such as increase work difficulty, bring economic loss.
To achieve the above object, the invention provides the following technical scheme: a kind of intelligence based on ciphering two-dimension code and IPV6
Lock control technology, including mainboard operation module, software operation module, the IPV6 link block and two on the inside of smart lock, smart lock
Code generation module is tieed up, the smart lock includes shell, and the shell is surrounded by operation panel, the intermediate fixed company of the shell
It is connected to fixed plate, the centre of the fixed plate is fixedly connected with display screen, and keyhole, and key are offered among the top of the shell
A side surface of shell is run through in hole, and handle is fixedly connected among the top of the shell, is corresponded among the side of the shell
It is fixedly connected with limited post at the position of operation panel, the bottom end of the limited post, which corresponds at the position of shell, to be fixedly connected with
Reset post.
Preferably, intelligence of the mainboard operation module on the inside of the smart lock for IPV6 and the scanning confirmation of ciphering two-dimension code
Chip, can received by itself IPV6 and ciphering two-dimension code information material, only initial data need to be inputted into the master on the inside of smart lock
On the inside of plate operation module, that is, produce software locks, it is necessary to which the mainboard on the inside of specified counterpart data information and smart lock operates
Initial data on the inside of module forms counterpart, can just open software locks, and smart lock is opened therewith after software locks are opened.
Preferably, the software operation module can effectively connect outside client, operate mould by client and software
The connection of block can effectively judge whether ciphering two-dimension code is correct two dimensional code, when being scanned reading client and intelligence
In equipment when ciphering two-dimension code, the symmetry algorithm is called, by public key corresponding with the private key to the ciphering two-dimension
Code is decrypted, and identifies whether the ciphering two-dimension code after decryption is correct;If identifying the ciphering two-dimension after decryption
Code is correct, can open smart lock;If identifying, the ciphering two-dimension code after decryption is incorrect, and smart lock can not be beaten
It opens.
Preferably, the IPV6 link block establishes one using IPV6 as the isolated island of prefix by intermediate server, is used for
Overall identification one by one distributed by isolated island information and configure the address pool used, client by prefix of IPV6 by a isolated island, client
IPV4 application request can be initiated to server-side, the destination address of request is the address of Application Launcher publication, client institute
Pass through the realization of IPV6 link and intermediate server intercommunication in the Application Launcher of information island, client is received using IPV6
Application request, source address conversion done to data request message source address, and by IPV6 judge destination address whether this information
The address of isolated island static mappings publication, if so, smart lock then can be opened normally, if it is not, smart lock is still in pass
Closed state.
Preferably, the two-dimensional code generation module generates ciphering two-dimension by encrypted characters for cell phone intelligent device clients
Code, two-dimension code image combine to form signage information with sign data, and are equipped with encrypting module and utilize code key for generating key
Product information is generated into encrypted characters, so that two-dimension code safe is higher, then by the ciphering two-dimension code on mobile phone to quasi intelligent
The display screen of lock, the intelligent terminals such as mobile phone generate ciphering two-dimension code, and smart lock is then identification two dimensional code, and smart lock then can be to adding
Code key and encrypted characters are decomposited in close two dimensional code, is decrypted according to secret key pair encrypted characters, the basis of two dimensional code is restored
Information, when ciphering two-dimension code encryption character data is consistent with data on the inside of smart lock, smart lock can then be opened, and number is worked as
When inconsistent according to data, smart lock is still closed, while can show knot in the display screen and smart machine among smart lock
Fruit.
Compared with prior art, the beneficial effects of the present invention are:
1. the ciphering two-dimension code scanning that the present invention is arranged effectively can prevent fingerprint from stealing, while the use habit with user
Unanimously, user need to only be opened app by cell phone intelligent equipment and generate ciphering two-dimension code, the deciphering module on the inside of smart machine
It can be confirmed by symmetry algorithm with the software module of smart lock, smart lock can be opened when algorithm data is consistent, be increased
Safety and the practicability for having added smart lock, not only reduce security risk, while reducing work difficulty, reduce economic damage
It loses.
2. the IPV6 link block in the present invention is applicable to remotely operate, client and IPV6 link block can establish one
It is a using IPV6 as the isolated island of prefix, by isolated island client can to server-side initiate IPV4 application request, the destination address of request
For Application Launcher publication address, and by IPV6 judge destination address whether this information island static mappings issue
Address, if it is not, smart lock is still in close state, solves smart lock if so, smart lock then can be opened normally
The problem of equipment is limited by distance reduces work difficulty, increases the practicability and convenience of smart lock, reduces work hardly possible
Degree, increases working efficiency and economic benefit.
Detailed description of the invention
Fig. 1 is the structural diagram of the present invention;
Fig. 2 is the principle of the present invention flow diagram;
Fig. 3 uses operational flowchart for of the invention.
In figure: 1, limited post;2, operation panel;3, keyhole;4, handle;5, display screen;6, shell;7, fixed plate;8, it resets
Column.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Embodiment 1
It please refers to Fig.1 to Fig.3, the present invention provides a kind of technical solution: a kind of intelligence based on ciphering two-dimension code and IPV6
Lock control technology, including mainboard operation module, software operation module, the IPV6 link block and two on the inside of smart lock, smart lock
Code generation module is tieed up, smart lock includes shell 6, and shell 6 is surrounded by operation panel 2, and the centre of shell 6 is fixedly connected with fixation
Plate 7, the centre of fixed plate 7 are fixedly connected with display screen 5, keyhole 3 are offered among the top of shell 6, and keyhole 3 runs through shell
6 side surface is fixedly connected with handle 4 among the top of shell 6, the position of operation panel 2 is corresponded among the side of shell 6
Place is fixedly connected with limited post 1, and the bottom end of limited post 1, which corresponds at the position of shell 6, is fixedly connected with reset post 8, the present invention
The ciphering two-dimension code scanning of setting effectively can prevent fingerprint from stealing, while consistent with the use habit of user, and user need to only lead to
It crosses cell phone intelligent equipment and opens app generation ciphering two-dimension code, the software of deciphering module and smart lock on the inside of smart machine
Module can be confirmed by symmetry algorithm, can open smart lock when algorithm data is consistent, increase the peace of smart lock
Full property and practicability, not only reduce security risk, while reducing work difficulty, reduce economic loss.
In order to enable smart lock safety is preferable, in the present embodiment, it is preferred that the mainboard operation module on the inside of smart lock is used
In IPV6 and ciphering two-dimension code scanning confirmation intelligent chip, can received by itself IPV6 and ciphering two-dimension code information material,
Initial data need to be inputted on the inside of the mainboard operation module on the inside of smart lock, that is, produce software locks, it is necessary to specified pair
The initial data on the inside of mainboard operation module on the inside of mouth data information and smart lock forms counterpart, can just open software locks,
Smart lock is opened therewith after software locks are opened, and is solved the problems, such as that intelligent lock device is limited by distance, is reduced work difficulty,
The practicability and convenience for increasing smart lock, reduce work difficulty, increase working efficiency and economic benefit.
In order to preferably operate smart lock, in the present embodiment, it is preferred that software operation module can effectively connect outside visitor
Family end can effectively judge whether ciphering two-dimension code is correct two dimensional code by the connection of client and software operation module,
When being scanned ciphering two-dimension code on reading client and smart machine, symmetry algorithm is called, by corresponding with private key
Ciphering two-dimension code is decrypted in public key, and identifies whether the ciphering two-dimension code after decryption is correct;If identifying adding after decryption
Close two dimensional code is correct, can open smart lock;If identifying, the ciphering two-dimension code after decryption is incorrect, and smart lock can not be beaten
It opens.
In order to increase the functionality of smart lock, in the present embodiment, it is preferred that IPV6 link block is built by intermediate server
Vertical one, using IPV6 as the isolated island of prefix, is used for overall identification a isolated island one by one, and client is distributed by isolated island information with IPV6
The address pool used is configured for prefix, client can initiate IPV4 application request to server-side, and the destination address of request is application
The address that proxy server is issued, the Application Launcher of information island where client are realized and centre by IPV6 link
Interworking server is received the application request of client using IPV6, does source address conversion to data request message source address, and lead to
Cross IPV6 judge destination address whether this information island static mappings publication address, if so, smart lock then can normally be beaten
It opens, if it is not, smart lock is still in close state.
In order to increase the safety of smart lock, in the present embodiment, it is preferred that two-dimensional code generation module is cell phone intelligent equipment
Client generates ciphering two-dimension code by encrypted characters, and two-dimension code image combines to form signage information with sign data, and is equipped with
Product information is generated encrypted characters using code key for generating key by encrypting module, so that two-dimension code safe is higher, so
Afterwards by the display screen 5 of the ciphering two-dimension code alignment smart lock on mobile phone, the intelligent terminals such as mobile phone generate ciphering two-dimension code, and intelligent
Lock is then identification two dimensional code, and smart lock can then be encrypted to code key and encrypted characters is decomposited in ciphering two-dimension code according to secret key pair
Character is decrypted, and restores the basic information of two dimensional code, the data on the inside of ciphering two-dimension code encryption character data and smart lock
When data are consistent, smart lock can then be opened, and when data information is inconsistent, smart lock is still closed, while can be in smart lock
Result is shown in intermediate display screen 5 and smart machine.
Embodiment 2
Initial data is inputted on the inside of the mainboard operation module on the inside of smart lock, that is, produces software locks, it is necessary to refer to
The initial data on the inside of mainboard operation module on the inside of fixed counterpart data information and smart lock forms counterpart, just can be by software locks
It opens, smart lock is opened therewith after software locks are opened, and software operation module can effectively connect outside client, passes through client
The connection at end and software operation module, can effectively judge whether ciphering two-dimension code is correct two dimensional code, read when being scanned
When taking ciphering two-dimension code on client and smart machine, symmetry algorithm is called, by public key corresponding with private key to encryption two
Dimension code is decrypted, and can unlock smart lock if the scanning of ciphering two-dimension code is correct, when ciphering two-dimension code scans mistake
If, smart lock can then enter overtime dormant state, while screen can show whether smart lock picture can be opened, when user again
When secondary click surface sweeping two dimensional code, smart lock then exits dormant state;Smart lock is carried out using IPV6 intermediate server simultaneously
Unlock, user are based on IPV6 login account address by client, and software module judges whether to log in correctly on the inside of smart lock
Location, if so, smart lock then can be opened normally, if it is not, smart lock is still in close state.
The working principle of the invention and process for using: initial data is inputted into the mainboard on the inside of smart lock operate mould first
On the inside of block, so that the information material of mainboard operation module received by itself IPV6 and ciphering two-dimension code, while software locks are produced, it will
The initial data on the inside of mainboard operation module on the inside of specified counterpart data information and smart lock forms counterpart, just can be by software
Lock is opened, and smart lock is opened therewith after software locks are opened, and software operation module can effectively connect outside client, passes through visitor
The connection at family end and software operation module can effectively judge whether ciphering two-dimension code is scanned, and read when being scanned
When current crypto two dimensional code, symmetry algorithm is called, ciphering two-dimension code is decrypted by public key corresponding with private key, and knows
Not Xie Mi after ciphering two-dimension code it is whether correct;If identifying, the ciphering two-dimension code after decryption is correct, can open smart lock;
If identifying, the ciphering two-dimension code after decryption is incorrect, and smart lock can not be opened, and IPV6 link block passes through intermediate server
One is established using IPV6 as the isolated island of prefix, for overall identification a isolated island one by one, client by isolated island information distribute with
IPV6 is that prefix configures the address pool used, and client can initiate IPV4 application request to server-side, and the destination address of request is
The address of Application Launcher publication, the Application Launcher of information island where client by IPV6 link realize with
Intermediate server intercommunication is received the application request of client using IPV6, does source address conversion to data request message source address,
And by IPV6 judge destination address whether this information island static mappings publication address, if so, smart lock then can be just
It often opens, if it is not, smart lock is still in close state, two-dimensional code generation module is that cell phone intelligent device clients pass through
Encrypted characters generate ciphering two-dimension code, and two-dimension code image combines to form signage information with sign data, then by adding on mobile phone
The display screen 5 of close two dimensional code alignment smart lock, the intelligent terminals such as mobile phone generate ciphering two-dimension code, and smart lock is then identification two dimension
Code, when ciphering two-dimension code encryption character data is consistent with data on the inside of smart lock, smart lock can then be opened, and data are worked as
When data is inconsistent, smart lock is still closed, while can show knot in the display screen 5 and smart machine among smart lock
Fruit.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with
A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding
And modification, the scope of the present invention is defined by the appended.
Claims (5)
1. a kind of smart lock control technology based on ciphering two-dimension code and IPV6, including the mainboard behaviour on the inside of smart lock, smart lock
Make module, software operation module, IPV6 link block and two-dimensional code generation module, it is characterised in that: the smart lock includes outer
Shell (6), the shell (6) are surrounded by operation panel (2), and the centre of the shell (6) is fixedly connected with fixed plate (7), institute
The centre for stating fixed plate (7) is fixedly connected with display screen (5), is offered keyhole (3) among the top of the shell (6), and key
A side surface of shell (6) is run through in hole (3), is fixedly connected with handle (4) among the top of the shell (6), the shell (6)
Side among correspond at the position of operation panel (2) and be fixedly connected with limited post (1), the bottom end of the limited post (1) is corresponding
Reset post (8) are fixedly connected at the position of shell (6).
2. a kind of smart lock control technology based on ciphering two-dimension code and IPV6 according to claim 1, it is characterised in that:
Intelligent chip of the mainboard operation module for IPV6 and the scanning confirmation of ciphering two-dimension code on the inside of the smart lock, can received by itself
The information material of IPV6 and ciphering two-dimension code need to only input initial data on the inside of the mainboard operation module on the inside of smart lock,
Produce software locks, it is necessary to the original number on the inside of mainboard operation module on the inside of specified counterpart data information and smart lock
According to counterpart is formed, software locks can just be opened, smart lock is opened therewith after software locks are opened.
3. a kind of smart lock control technology based on ciphering two-dimension code and IPV6 according to claim 1, it is characterised in that:
The software operation module can effectively connect outside client can be effective by the connection of client and software operation module
Judge whether ciphering two-dimension code is correct two dimensional code, when being scanned ciphering two-dimension code on reading client and smart machine
When, the symmetry algorithm is called, the ciphering two-dimension code is decrypted by public key corresponding with the private key, and identifies
Whether the ciphering two-dimension code after decryption is correct;If identifying, the ciphering two-dimension code after decryption is correct, can be by intelligence
Lock is opened;If identifying, the ciphering two-dimension code after decryption is incorrect, and smart lock can not be opened.
4. a kind of smart lock control technology based on ciphering two-dimension code and IPV6 according to claim 1, it is characterised in that:
The IPV6 link block establishes one using IPV6 as the isolated island of prefix by intermediate server, is used for overall identification a orphan one by one
Island, client are distributed by isolated island information and configure the address pool used by prefix of IPV6, and client can be initiated to server-side
IPV4 application request, the destination address of request are the address of Application Launcher publication, and information island answers where client
With proxy server by the realization of IPV6 link and intermediate server intercommunication, the application request of client is received using IPV6, it is right
Request of data message source address does source address conversion, and judges destination address whether send out by this information island static mappings by IPV6
The address of cloth, if so, smart lock then can be opened normally, if it is not, smart lock is still in close state.
5. a kind of smart lock control technology based on ciphering two-dimension code and IPV6 according to claim 1, it is characterised in that:
The two-dimensional code generation module be cell phone intelligent device clients by encrypted characters generate ciphering two-dimension code, two-dimension code image and
Sign data combines to form signage information, and is equipped with encrypting module, for generating key, generates product information using code key and adds
Close character, so that two-dimension code safe is higher, then by the display screen (5) of the ciphering two-dimension code alignment smart lock on mobile phone, hand
The intelligent terminals such as machine generate ciphering two-dimension code, and smart lock is then identification two dimensional code, and smart lock then can be in ciphering two-dimension code points
Code key and encrypted characters are solved, is decrypted according to secret key pair encrypted characters, the basic information of two dimensional code is restored, when encryption two
When dimension code encryption character data is consistent with data on the inside of smart lock, smart lock can then be opened, when data information is inconsistent
When, smart lock is still closed, while can show result in the display screen (5) and smart machine among smart lock.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910281328.8A CN110009785A (en) | 2019-04-09 | 2019-04-09 | A kind of smart lock control technology based on ciphering two-dimension code and IPV6 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910281328.8A CN110009785A (en) | 2019-04-09 | 2019-04-09 | A kind of smart lock control technology based on ciphering two-dimension code and IPV6 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110009785A true CN110009785A (en) | 2019-07-12 |
Family
ID=67170527
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910281328.8A Pending CN110009785A (en) | 2019-04-09 | 2019-04-09 | A kind of smart lock control technology based on ciphering two-dimension code and IPV6 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110009785A (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103646455A (en) * | 2013-12-24 | 2014-03-19 | 杨密凯 | Intelligent lock device and usage method thereof as well as configuration method for electronic keys |
CN204808433U (en) * | 2014-12-18 | 2015-11-25 | 王黎晶 | Intelligence lock system based on two -dimensional code |
CN106572098A (en) * | 2016-11-01 | 2017-04-19 | 雷飏 | Two-dimensional code form virtual key method, corresponding device and user terminal |
CN107105026A (en) * | 2017-04-14 | 2017-08-29 | 中国联合网络通信有限公司沈阳市分公司 | A kind of IPV4/IPV6 exchanges application platform |
CN107172041A (en) * | 2017-05-12 | 2017-09-15 | 刘兴丹 | One kind exempts from registration gate inhibition and smart lock registration, unlocking method, device, system |
CN107492162A (en) * | 2017-06-01 | 2017-12-19 | 景德镇学院 | Intelligent access control system based on ciphering type Quick Response Code and WiFi technology |
US9865104B1 (en) * | 2016-08-16 | 2018-01-09 | Honeywell International Inc. | Gesture encrypted access system based on multidimensional code |
CN207133890U (en) * | 2017-09-04 | 2018-03-23 | 东莞市高谷信息科技有限公司 | The gate control system of multi-functional enabling |
CN108257266A (en) * | 2017-12-22 | 2018-07-06 | 何少海 | A kind of multi-functional smart lock |
CN109243012A (en) * | 2018-07-24 | 2019-01-18 | 上海帝图信息科技有限公司 | Access control system |
-
2019
- 2019-04-09 CN CN201910281328.8A patent/CN110009785A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103646455A (en) * | 2013-12-24 | 2014-03-19 | 杨密凯 | Intelligent lock device and usage method thereof as well as configuration method for electronic keys |
CN204808433U (en) * | 2014-12-18 | 2015-11-25 | 王黎晶 | Intelligence lock system based on two -dimensional code |
US9865104B1 (en) * | 2016-08-16 | 2018-01-09 | Honeywell International Inc. | Gesture encrypted access system based on multidimensional code |
CN106572098A (en) * | 2016-11-01 | 2017-04-19 | 雷飏 | Two-dimensional code form virtual key method, corresponding device and user terminal |
CN107105026A (en) * | 2017-04-14 | 2017-08-29 | 中国联合网络通信有限公司沈阳市分公司 | A kind of IPV4/IPV6 exchanges application platform |
CN107172041A (en) * | 2017-05-12 | 2017-09-15 | 刘兴丹 | One kind exempts from registration gate inhibition and smart lock registration, unlocking method, device, system |
CN107492162A (en) * | 2017-06-01 | 2017-12-19 | 景德镇学院 | Intelligent access control system based on ciphering type Quick Response Code and WiFi technology |
CN207133890U (en) * | 2017-09-04 | 2018-03-23 | 东莞市高谷信息科技有限公司 | The gate control system of multi-functional enabling |
CN108257266A (en) * | 2017-12-22 | 2018-07-06 | 何少海 | A kind of multi-functional smart lock |
CN109243012A (en) * | 2018-07-24 | 2019-01-18 | 上海帝图信息科技有限公司 | Access control system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10182255B2 (en) | Method, terminal, and system for communication pairing of a digital television terminal and a mobile terminal | |
US9760721B2 (en) | Secure transaction method from a non-secure terminal | |
US10437469B2 (en) | Secure interactions involving superimposing image of a virtual keypad over image of a touchscreen keypad | |
CN105007155B (en) | Quick Response Code mask encryption and decryption approaches and system | |
US8868927B1 (en) | Method and apparatus for secure data input and output | |
CN103914901B (en) | A kind of method for unlocking and unlocking system | |
US7480939B1 (en) | Enhancement to authentication protocol that uses a key lease | |
CN106100850B (en) | Intelligent and safe chip signing messages transmission method and system based on two dimensional code | |
CN104239783A (en) | System and method for safely inputting customizing messages | |
CN1608362A (en) | Authentication method | |
CN106060073B (en) | Channel key machinery of consultation | |
CN107111967A (en) | Using the visual cryptography of augmented reality with obscuring | |
CN105592431B (en) | SMS encryption system based on iOS system mobile terminal | |
CN107359983A (en) | The signal encryption transmission covered based on without item chaotic signal and restoration methods | |
CN110932951B (en) | Intelligent household control method and device | |
CN108092772B (en) | Quantum entrustment joint computing method for two clients | |
CN105897722B (en) | Pass through the method, system and mobile terminal of client quick release | |
CN105744294A (en) | Video chaotic secure communication method implemented in cellphone | |
CN110009785A (en) | A kind of smart lock control technology based on ciphering two-dimension code and IPV6 | |
CN106790135B (en) | Data encryption method and system based on cloud and communication equipment | |
CN107493281A (en) | encryption communication method and device | |
CN104104505B (en) | A kind of electronic signature equipment and its implementation and client | |
CN110266483A (en) | Based on unsymmetrical key pond to and the quantum communications service station cryptographic key negotiation method of QKD, system, equipment | |
CN110138544A (en) | A kind of encrypting and decrypting system and method for internet of things equipment | |
CN113965396A (en) | Data security communication system and method based on risk assessment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200826 Address after: 463000, Kaiyuan Road, Yicheng District, Henan, Zhumadian 6 Applicant after: HUANGHUAI University Applicant after: CERNET Co.,Ltd. Address before: 463000 No. 99 Kaiyuan Road, Yicheng District, Zhumadian City, Henan Province, No. 20 Collective Household of Huanghuai College Applicant before: Zhou Peng |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190712 |