CN110009785A - A kind of smart lock control technology based on ciphering two-dimension code and IPV6 - Google Patents

A kind of smart lock control technology based on ciphering two-dimension code and IPV6 Download PDF

Info

Publication number
CN110009785A
CN110009785A CN201910281328.8A CN201910281328A CN110009785A CN 110009785 A CN110009785 A CN 110009785A CN 201910281328 A CN201910281328 A CN 201910281328A CN 110009785 A CN110009785 A CN 110009785A
Authority
CN
China
Prior art keywords
smart lock
ciphering
dimension code
ipv6
shell
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910281328.8A
Other languages
Chinese (zh)
Inventor
周鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huanghuai University
CERNET Corp
Original Assignee
周鹏
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 周鹏 filed Critical 周鹏
Priority to CN201910281328.8A priority Critical patent/CN110009785A/en
Publication of CN110009785A publication Critical patent/CN110009785A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/659Internet protocol version 6 [IPv6] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Artificial Intelligence (AREA)
  • Toxicology (AREA)
  • Electromagnetism (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The smart lock control technology based on ciphering two-dimension code and IPV6 that the invention discloses a kind of, including mainboard operation module, software operation module, IPV6 link block and the two-dimensional code generation module on the inside of smart lock, smart lock, the smart lock includes shell, the shell is surrounded by operation panel, the centre of the shell is fixedly connected with fixed plate, the centre of the fixed plate is fixedly connected with display screen, keyhole is offered among the top of the shell, and keyhole runs through a side surface of shell, is fixedly connected with handle among the top of the shell;The ciphering two-dimension code scanning that the present invention is arranged effectively can prevent fingerprint from stealing, it is consistent with the use habit of user simultaneously, user only need to open app by cell phone intelligent equipment and generate ciphering two-dimension code, the software module of deciphering module and smart lock on the inside of smart machine can be confirmed by symmetry algorithm, smart lock can be opened when algorithm data is consistent, reduce economic loss.

Description

A kind of smart lock control technology based on ciphering two-dimension code and IPV6
Technical field
The invention belongs to smart lock technical fields, and in particular to a kind of to be controlled based on the smart lock of ciphering two-dimension code and IPV6 Technology.
Background technique
Smart lock, which refers to, is different from tradition machinery lock, in user's identification, safety, the more intelligentized lock of managerial aspect Tool, smart lock is the execution unit locked a door in access control system, is with safety, convenience, the compound lock of advanced technology.
Existing smart lock there is a problem that when in use it is certain, it is universal due to planar bar code technology, relative to fingerprint User more likes scanning the two-dimensional code, and fingerprint is easily adhered on scanning board when fingerprint recognition, and fingerprint is easy to pick, there is compared with Big security risk, and cell phone intelligent equipment operation has certain limitation, needs ability within the scope of a certain distance openable, it is real It is not comprehensive enough with property, while the problem of increase work difficulty, bring economic loss, it is thus it is proposed that a kind of based on encryption The smart lock control technology of two dimensional code and IPV6.
Summary of the invention
The smart lock control technology based on ciphering two-dimension code and IPV6 that the purpose of the present invention is to provide a kind of, on solving State the existing smart lock proposed in background technique there is a problem that when in use it is certain, it is universal due to planar bar code technology, More like scanning the two-dimensional code relative to fingerprint user, and fingerprint is easily adhered on scanning board when fingerprint recognition, fingerprint is easy to be stained with It takes, there is biggish security risks, and cell phone intelligent equipment operation has certain limitation, needs within the scope of a certain distance Just openable, practicability is not comprehensive enough, while the problems such as increase work difficulty, bring economic loss.
To achieve the above object, the invention provides the following technical scheme: a kind of intelligence based on ciphering two-dimension code and IPV6 Lock control technology, including mainboard operation module, software operation module, the IPV6 link block and two on the inside of smart lock, smart lock Code generation module is tieed up, the smart lock includes shell, and the shell is surrounded by operation panel, the intermediate fixed company of the shell It is connected to fixed plate, the centre of the fixed plate is fixedly connected with display screen, and keyhole, and key are offered among the top of the shell A side surface of shell is run through in hole, and handle is fixedly connected among the top of the shell, is corresponded among the side of the shell It is fixedly connected with limited post at the position of operation panel, the bottom end of the limited post, which corresponds at the position of shell, to be fixedly connected with Reset post.
Preferably, intelligence of the mainboard operation module on the inside of the smart lock for IPV6 and the scanning confirmation of ciphering two-dimension code Chip, can received by itself IPV6 and ciphering two-dimension code information material, only initial data need to be inputted into the master on the inside of smart lock On the inside of plate operation module, that is, produce software locks, it is necessary to which the mainboard on the inside of specified counterpart data information and smart lock operates Initial data on the inside of module forms counterpart, can just open software locks, and smart lock is opened therewith after software locks are opened.
Preferably, the software operation module can effectively connect outside client, operate mould by client and software The connection of block can effectively judge whether ciphering two-dimension code is correct two dimensional code, when being scanned reading client and intelligence In equipment when ciphering two-dimension code, the symmetry algorithm is called, by public key corresponding with the private key to the ciphering two-dimension Code is decrypted, and identifies whether the ciphering two-dimension code after decryption is correct;If identifying the ciphering two-dimension after decryption Code is correct, can open smart lock;If identifying, the ciphering two-dimension code after decryption is incorrect, and smart lock can not be beaten It opens.
Preferably, the IPV6 link block establishes one using IPV6 as the isolated island of prefix by intermediate server, is used for Overall identification one by one distributed by isolated island information and configure the address pool used, client by prefix of IPV6 by a isolated island, client IPV4 application request can be initiated to server-side, the destination address of request is the address of Application Launcher publication, client institute Pass through the realization of IPV6 link and intermediate server intercommunication in the Application Launcher of information island, client is received using IPV6 Application request, source address conversion done to data request message source address, and by IPV6 judge destination address whether this information The address of isolated island static mappings publication, if so, smart lock then can be opened normally, if it is not, smart lock is still in pass Closed state.
Preferably, the two-dimensional code generation module generates ciphering two-dimension by encrypted characters for cell phone intelligent device clients Code, two-dimension code image combine to form signage information with sign data, and are equipped with encrypting module and utilize code key for generating key Product information is generated into encrypted characters, so that two-dimension code safe is higher, then by the ciphering two-dimension code on mobile phone to quasi intelligent The display screen of lock, the intelligent terminals such as mobile phone generate ciphering two-dimension code, and smart lock is then identification two dimensional code, and smart lock then can be to adding Code key and encrypted characters are decomposited in close two dimensional code, is decrypted according to secret key pair encrypted characters, the basis of two dimensional code is restored Information, when ciphering two-dimension code encryption character data is consistent with data on the inside of smart lock, smart lock can then be opened, and number is worked as When inconsistent according to data, smart lock is still closed, while can show knot in the display screen and smart machine among smart lock Fruit.
Compared with prior art, the beneficial effects of the present invention are:
1. the ciphering two-dimension code scanning that the present invention is arranged effectively can prevent fingerprint from stealing, while the use habit with user Unanimously, user need to only be opened app by cell phone intelligent equipment and generate ciphering two-dimension code, the deciphering module on the inside of smart machine It can be confirmed by symmetry algorithm with the software module of smart lock, smart lock can be opened when algorithm data is consistent, be increased Safety and the practicability for having added smart lock, not only reduce security risk, while reducing work difficulty, reduce economic damage It loses.
2. the IPV6 link block in the present invention is applicable to remotely operate, client and IPV6 link block can establish one It is a using IPV6 as the isolated island of prefix, by isolated island client can to server-side initiate IPV4 application request, the destination address of request For Application Launcher publication address, and by IPV6 judge destination address whether this information island static mappings issue Address, if it is not, smart lock is still in close state, solves smart lock if so, smart lock then can be opened normally The problem of equipment is limited by distance reduces work difficulty, increases the practicability and convenience of smart lock, reduces work hardly possible Degree, increases working efficiency and economic benefit.
Detailed description of the invention
Fig. 1 is the structural diagram of the present invention;
Fig. 2 is the principle of the present invention flow diagram;
Fig. 3 uses operational flowchart for of the invention.
In figure: 1, limited post;2, operation panel;3, keyhole;4, handle;5, display screen;6, shell;7, fixed plate;8, it resets Column.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Embodiment 1
It please refers to Fig.1 to Fig.3, the present invention provides a kind of technical solution: a kind of intelligence based on ciphering two-dimension code and IPV6 Lock control technology, including mainboard operation module, software operation module, the IPV6 link block and two on the inside of smart lock, smart lock Code generation module is tieed up, smart lock includes shell 6, and shell 6 is surrounded by operation panel 2, and the centre of shell 6 is fixedly connected with fixation Plate 7, the centre of fixed plate 7 are fixedly connected with display screen 5, keyhole 3 are offered among the top of shell 6, and keyhole 3 runs through shell 6 side surface is fixedly connected with handle 4 among the top of shell 6, the position of operation panel 2 is corresponded among the side of shell 6 Place is fixedly connected with limited post 1, and the bottom end of limited post 1, which corresponds at the position of shell 6, is fixedly connected with reset post 8, the present invention The ciphering two-dimension code scanning of setting effectively can prevent fingerprint from stealing, while consistent with the use habit of user, and user need to only lead to It crosses cell phone intelligent equipment and opens app generation ciphering two-dimension code, the software of deciphering module and smart lock on the inside of smart machine Module can be confirmed by symmetry algorithm, can open smart lock when algorithm data is consistent, increase the peace of smart lock Full property and practicability, not only reduce security risk, while reducing work difficulty, reduce economic loss.
In order to enable smart lock safety is preferable, in the present embodiment, it is preferred that the mainboard operation module on the inside of smart lock is used In IPV6 and ciphering two-dimension code scanning confirmation intelligent chip, can received by itself IPV6 and ciphering two-dimension code information material, Initial data need to be inputted on the inside of the mainboard operation module on the inside of smart lock, that is, produce software locks, it is necessary to specified pair The initial data on the inside of mainboard operation module on the inside of mouth data information and smart lock forms counterpart, can just open software locks, Smart lock is opened therewith after software locks are opened, and is solved the problems, such as that intelligent lock device is limited by distance, is reduced work difficulty, The practicability and convenience for increasing smart lock, reduce work difficulty, increase working efficiency and economic benefit.
In order to preferably operate smart lock, in the present embodiment, it is preferred that software operation module can effectively connect outside visitor Family end can effectively judge whether ciphering two-dimension code is correct two dimensional code by the connection of client and software operation module, When being scanned ciphering two-dimension code on reading client and smart machine, symmetry algorithm is called, by corresponding with private key Ciphering two-dimension code is decrypted in public key, and identifies whether the ciphering two-dimension code after decryption is correct;If identifying adding after decryption Close two dimensional code is correct, can open smart lock;If identifying, the ciphering two-dimension code after decryption is incorrect, and smart lock can not be beaten It opens.
In order to increase the functionality of smart lock, in the present embodiment, it is preferred that IPV6 link block is built by intermediate server Vertical one, using IPV6 as the isolated island of prefix, is used for overall identification a isolated island one by one, and client is distributed by isolated island information with IPV6 The address pool used is configured for prefix, client can initiate IPV4 application request to server-side, and the destination address of request is application The address that proxy server is issued, the Application Launcher of information island where client are realized and centre by IPV6 link Interworking server is received the application request of client using IPV6, does source address conversion to data request message source address, and lead to Cross IPV6 judge destination address whether this information island static mappings publication address, if so, smart lock then can normally be beaten It opens, if it is not, smart lock is still in close state.
In order to increase the safety of smart lock, in the present embodiment, it is preferred that two-dimensional code generation module is cell phone intelligent equipment Client generates ciphering two-dimension code by encrypted characters, and two-dimension code image combines to form signage information with sign data, and is equipped with Product information is generated encrypted characters using code key for generating key by encrypting module, so that two-dimension code safe is higher, so Afterwards by the display screen 5 of the ciphering two-dimension code alignment smart lock on mobile phone, the intelligent terminals such as mobile phone generate ciphering two-dimension code, and intelligent Lock is then identification two dimensional code, and smart lock can then be encrypted to code key and encrypted characters is decomposited in ciphering two-dimension code according to secret key pair Character is decrypted, and restores the basic information of two dimensional code, the data on the inside of ciphering two-dimension code encryption character data and smart lock When data are consistent, smart lock can then be opened, and when data information is inconsistent, smart lock is still closed, while can be in smart lock Result is shown in intermediate display screen 5 and smart machine.
Embodiment 2
Initial data is inputted on the inside of the mainboard operation module on the inside of smart lock, that is, produces software locks, it is necessary to refer to The initial data on the inside of mainboard operation module on the inside of fixed counterpart data information and smart lock forms counterpart, just can be by software locks It opens, smart lock is opened therewith after software locks are opened, and software operation module can effectively connect outside client, passes through client The connection at end and software operation module, can effectively judge whether ciphering two-dimension code is correct two dimensional code, read when being scanned When taking ciphering two-dimension code on client and smart machine, symmetry algorithm is called, by public key corresponding with private key to encryption two Dimension code is decrypted, and can unlock smart lock if the scanning of ciphering two-dimension code is correct, when ciphering two-dimension code scans mistake If, smart lock can then enter overtime dormant state, while screen can show whether smart lock picture can be opened, when user again When secondary click surface sweeping two dimensional code, smart lock then exits dormant state;Smart lock is carried out using IPV6 intermediate server simultaneously Unlock, user are based on IPV6 login account address by client, and software module judges whether to log in correctly on the inside of smart lock Location, if so, smart lock then can be opened normally, if it is not, smart lock is still in close state.
The working principle of the invention and process for using: initial data is inputted into the mainboard on the inside of smart lock operate mould first On the inside of block, so that the information material of mainboard operation module received by itself IPV6 and ciphering two-dimension code, while software locks are produced, it will The initial data on the inside of mainboard operation module on the inside of specified counterpart data information and smart lock forms counterpart, just can be by software Lock is opened, and smart lock is opened therewith after software locks are opened, and software operation module can effectively connect outside client, passes through visitor The connection at family end and software operation module can effectively judge whether ciphering two-dimension code is scanned, and read when being scanned When current crypto two dimensional code, symmetry algorithm is called, ciphering two-dimension code is decrypted by public key corresponding with private key, and knows Not Xie Mi after ciphering two-dimension code it is whether correct;If identifying, the ciphering two-dimension code after decryption is correct, can open smart lock; If identifying, the ciphering two-dimension code after decryption is incorrect, and smart lock can not be opened, and IPV6 link block passes through intermediate server One is established using IPV6 as the isolated island of prefix, for overall identification a isolated island one by one, client by isolated island information distribute with IPV6 is that prefix configures the address pool used, and client can initiate IPV4 application request to server-side, and the destination address of request is The address of Application Launcher publication, the Application Launcher of information island where client by IPV6 link realize with Intermediate server intercommunication is received the application request of client using IPV6, does source address conversion to data request message source address, And by IPV6 judge destination address whether this information island static mappings publication address, if so, smart lock then can be just It often opens, if it is not, smart lock is still in close state, two-dimensional code generation module is that cell phone intelligent device clients pass through Encrypted characters generate ciphering two-dimension code, and two-dimension code image combines to form signage information with sign data, then by adding on mobile phone The display screen 5 of close two dimensional code alignment smart lock, the intelligent terminals such as mobile phone generate ciphering two-dimension code, and smart lock is then identification two dimension Code, when ciphering two-dimension code encryption character data is consistent with data on the inside of smart lock, smart lock can then be opened, and data are worked as When data is inconsistent, smart lock is still closed, while can show knot in the display screen 5 and smart machine among smart lock Fruit.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding And modification, the scope of the present invention is defined by the appended.

Claims (5)

1. a kind of smart lock control technology based on ciphering two-dimension code and IPV6, including the mainboard behaviour on the inside of smart lock, smart lock Make module, software operation module, IPV6 link block and two-dimensional code generation module, it is characterised in that: the smart lock includes outer Shell (6), the shell (6) are surrounded by operation panel (2), and the centre of the shell (6) is fixedly connected with fixed plate (7), institute The centre for stating fixed plate (7) is fixedly connected with display screen (5), is offered keyhole (3) among the top of the shell (6), and key A side surface of shell (6) is run through in hole (3), is fixedly connected with handle (4) among the top of the shell (6), the shell (6) Side among correspond at the position of operation panel (2) and be fixedly connected with limited post (1), the bottom end of the limited post (1) is corresponding Reset post (8) are fixedly connected at the position of shell (6).
2. a kind of smart lock control technology based on ciphering two-dimension code and IPV6 according to claim 1, it is characterised in that: Intelligent chip of the mainboard operation module for IPV6 and the scanning confirmation of ciphering two-dimension code on the inside of the smart lock, can received by itself The information material of IPV6 and ciphering two-dimension code need to only input initial data on the inside of the mainboard operation module on the inside of smart lock, Produce software locks, it is necessary to the original number on the inside of mainboard operation module on the inside of specified counterpart data information and smart lock According to counterpart is formed, software locks can just be opened, smart lock is opened therewith after software locks are opened.
3. a kind of smart lock control technology based on ciphering two-dimension code and IPV6 according to claim 1, it is characterised in that: The software operation module can effectively connect outside client can be effective by the connection of client and software operation module Judge whether ciphering two-dimension code is correct two dimensional code, when being scanned ciphering two-dimension code on reading client and smart machine When, the symmetry algorithm is called, the ciphering two-dimension code is decrypted by public key corresponding with the private key, and identifies Whether the ciphering two-dimension code after decryption is correct;If identifying, the ciphering two-dimension code after decryption is correct, can be by intelligence Lock is opened;If identifying, the ciphering two-dimension code after decryption is incorrect, and smart lock can not be opened.
4. a kind of smart lock control technology based on ciphering two-dimension code and IPV6 according to claim 1, it is characterised in that: The IPV6 link block establishes one using IPV6 as the isolated island of prefix by intermediate server, is used for overall identification a orphan one by one Island, client are distributed by isolated island information and configure the address pool used by prefix of IPV6, and client can be initiated to server-side IPV4 application request, the destination address of request are the address of Application Launcher publication, and information island answers where client With proxy server by the realization of IPV6 link and intermediate server intercommunication, the application request of client is received using IPV6, it is right Request of data message source address does source address conversion, and judges destination address whether send out by this information island static mappings by IPV6 The address of cloth, if so, smart lock then can be opened normally, if it is not, smart lock is still in close state.
5. a kind of smart lock control technology based on ciphering two-dimension code and IPV6 according to claim 1, it is characterised in that: The two-dimensional code generation module be cell phone intelligent device clients by encrypted characters generate ciphering two-dimension code, two-dimension code image and Sign data combines to form signage information, and is equipped with encrypting module, for generating key, generates product information using code key and adds Close character, so that two-dimension code safe is higher, then by the display screen (5) of the ciphering two-dimension code alignment smart lock on mobile phone, hand The intelligent terminals such as machine generate ciphering two-dimension code, and smart lock is then identification two dimensional code, and smart lock then can be in ciphering two-dimension code points Code key and encrypted characters are solved, is decrypted according to secret key pair encrypted characters, the basic information of two dimensional code is restored, when encryption two When dimension code encryption character data is consistent with data on the inside of smart lock, smart lock can then be opened, when data information is inconsistent When, smart lock is still closed, while can show result in the display screen (5) and smart machine among smart lock.
CN201910281328.8A 2019-04-09 2019-04-09 A kind of smart lock control technology based on ciphering two-dimension code and IPV6 Pending CN110009785A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910281328.8A CN110009785A (en) 2019-04-09 2019-04-09 A kind of smart lock control technology based on ciphering two-dimension code and IPV6

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910281328.8A CN110009785A (en) 2019-04-09 2019-04-09 A kind of smart lock control technology based on ciphering two-dimension code and IPV6

Publications (1)

Publication Number Publication Date
CN110009785A true CN110009785A (en) 2019-07-12

Family

ID=67170527

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910281328.8A Pending CN110009785A (en) 2019-04-09 2019-04-09 A kind of smart lock control technology based on ciphering two-dimension code and IPV6

Country Status (1)

Country Link
CN (1) CN110009785A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103646455A (en) * 2013-12-24 2014-03-19 杨密凯 Intelligent lock device and usage method thereof as well as configuration method for electronic keys
CN204808433U (en) * 2014-12-18 2015-11-25 王黎晶 Intelligence lock system based on two -dimensional code
CN106572098A (en) * 2016-11-01 2017-04-19 雷飏 Two-dimensional code form virtual key method, corresponding device and user terminal
CN107105026A (en) * 2017-04-14 2017-08-29 中国联合网络通信有限公司沈阳市分公司 A kind of IPV4/IPV6 exchanges application platform
CN107172041A (en) * 2017-05-12 2017-09-15 刘兴丹 One kind exempts from registration gate inhibition and smart lock registration, unlocking method, device, system
CN107492162A (en) * 2017-06-01 2017-12-19 景德镇学院 Intelligent access control system based on ciphering type Quick Response Code and WiFi technology
US9865104B1 (en) * 2016-08-16 2018-01-09 Honeywell International Inc. Gesture encrypted access system based on multidimensional code
CN207133890U (en) * 2017-09-04 2018-03-23 东莞市高谷信息科技有限公司 The gate control system of multi-functional enabling
CN108257266A (en) * 2017-12-22 2018-07-06 何少海 A kind of multi-functional smart lock
CN109243012A (en) * 2018-07-24 2019-01-18 上海帝图信息科技有限公司 Access control system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103646455A (en) * 2013-12-24 2014-03-19 杨密凯 Intelligent lock device and usage method thereof as well as configuration method for electronic keys
CN204808433U (en) * 2014-12-18 2015-11-25 王黎晶 Intelligence lock system based on two -dimensional code
US9865104B1 (en) * 2016-08-16 2018-01-09 Honeywell International Inc. Gesture encrypted access system based on multidimensional code
CN106572098A (en) * 2016-11-01 2017-04-19 雷飏 Two-dimensional code form virtual key method, corresponding device and user terminal
CN107105026A (en) * 2017-04-14 2017-08-29 中国联合网络通信有限公司沈阳市分公司 A kind of IPV4/IPV6 exchanges application platform
CN107172041A (en) * 2017-05-12 2017-09-15 刘兴丹 One kind exempts from registration gate inhibition and smart lock registration, unlocking method, device, system
CN107492162A (en) * 2017-06-01 2017-12-19 景德镇学院 Intelligent access control system based on ciphering type Quick Response Code and WiFi technology
CN207133890U (en) * 2017-09-04 2018-03-23 东莞市高谷信息科技有限公司 The gate control system of multi-functional enabling
CN108257266A (en) * 2017-12-22 2018-07-06 何少海 A kind of multi-functional smart lock
CN109243012A (en) * 2018-07-24 2019-01-18 上海帝图信息科技有限公司 Access control system

Similar Documents

Publication Publication Date Title
US10182255B2 (en) Method, terminal, and system for communication pairing of a digital television terminal and a mobile terminal
US9760721B2 (en) Secure transaction method from a non-secure terminal
US10437469B2 (en) Secure interactions involving superimposing image of a virtual keypad over image of a touchscreen keypad
CN105007155B (en) Quick Response Code mask encryption and decryption approaches and system
US8868927B1 (en) Method and apparatus for secure data input and output
CN103914901B (en) A kind of method for unlocking and unlocking system
US7480939B1 (en) Enhancement to authentication protocol that uses a key lease
CN106100850B (en) Intelligent and safe chip signing messages transmission method and system based on two dimensional code
CN104239783A (en) System and method for safely inputting customizing messages
CN1608362A (en) Authentication method
CN106060073B (en) Channel key machinery of consultation
CN107111967A (en) Using the visual cryptography of augmented reality with obscuring
CN105592431B (en) SMS encryption system based on iOS system mobile terminal
CN107359983A (en) The signal encryption transmission covered based on without item chaotic signal and restoration methods
CN110932951B (en) Intelligent household control method and device
CN108092772B (en) Quantum entrustment joint computing method for two clients
CN105897722B (en) Pass through the method, system and mobile terminal of client quick release
CN105744294A (en) Video chaotic secure communication method implemented in cellphone
CN110009785A (en) A kind of smart lock control technology based on ciphering two-dimension code and IPV6
CN106790135B (en) Data encryption method and system based on cloud and communication equipment
CN107493281A (en) encryption communication method and device
CN104104505B (en) A kind of electronic signature equipment and its implementation and client
CN110266483A (en) Based on unsymmetrical key pond to and the quantum communications service station cryptographic key negotiation method of QKD, system, equipment
CN110138544A (en) A kind of encrypting and decrypting system and method for internet of things equipment
CN113965396A (en) Data security communication system and method based on risk assessment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200826

Address after: 463000, Kaiyuan Road, Yicheng District, Henan, Zhumadian 6

Applicant after: HUANGHUAI University

Applicant after: CERNET Co.,Ltd.

Address before: 463000 No. 99 Kaiyuan Road, Yicheng District, Zhumadian City, Henan Province, No. 20 Collective Household of Huanghuai College

Applicant before: Zhou Peng

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190712