CN110555924B - Method and device for unlocking processing - Google Patents

Method and device for unlocking processing Download PDF

Info

Publication number
CN110555924B
CN110555924B CN201810555813.5A CN201810555813A CN110555924B CN 110555924 B CN110555924 B CN 110555924B CN 201810555813 A CN201810555813 A CN 201810555813A CN 110555924 B CN110555924 B CN 110555924B
Authority
CN
China
Prior art keywords
unlocking
character string
secret key
verification
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810555813.5A
Other languages
Chinese (zh)
Other versions
CN110555924A (en
Inventor
潘亚东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision Digital Technology Co Ltd
Original Assignee
Hangzhou Hikvision Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision Digital Technology Co Ltd filed Critical Hangzhou Hikvision Digital Technology Co Ltd
Priority to CN201810555813.5A priority Critical patent/CN110555924B/en
Publication of CN110555924A publication Critical patent/CN110555924A/en
Application granted granted Critical
Publication of CN110555924B publication Critical patent/CN110555924B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/0042Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
    • G07C2009/00476Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically
    • G07C2009/005Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically whereby the code is a random code

Abstract

The invention discloses a method and a device for unlocking, and belongs to the technical field of intelligence. The method comprises the following steps: sending a verification request message carrying a random character string; when a first unlocking verification character string sent by the terminal is received, comparing a second unlocking verification character string generated based on a locally stored unlocking secret key and the random character string with the first unlocking verification character string; and if the first unlocking verification character string is the same as the second unlocking verification character string, unlocking. By adopting the invention, the unlocking efficiency can be improved.

Description

Method and device for unlocking processing
Technical Field
The invention relates to the technical field of intelligence, in particular to a method and a device for unlocking.
Background
With the development of the intelligent field, the intelligent lock with the anti-theft function gradually replaces the traditional mechanical lock, overcomes the defect of poor safety performance of the mechanical lock, and greatly improves the intelligent lock in one step both technically and in performance.
Most of the current intelligent locks are fingerprint locks. When unlocking, a user places a finger with fingerprint information input in advance on a fingerprint sensor of the fingerprint lock, the fingerprint sensor collects fingerprints of the user and compares the fingerprints with all the fingerprint information input in advance one by one, if at least one similarity is greater than a preset similarity threshold value in the obtained similarities, the user is determined to have unlocking authority, and unlocking operation is executed.
In the process of implementing the invention, the inventor finds that the prior art has at least the following problems:
when the fingerprint of logging in at present with the user compares with the fingerprint of prestore, there may be the condition such as water, dust or injury on the finger for there is great error in the fingerprint that fingerprint sensor gathered and the fingerprint that the user is actual, leads to fingerprint identification's rate of accuracy to reduce, consequently, the user can appear and carry out the condition that fingerprint identification could open the intelligence lock many times, makes the efficiency of unblanking reduce.
Disclosure of Invention
In order to solve the problems in the prior art, embodiments of the present invention provide a method and an apparatus for performing an unlocking process. The technical scheme is as follows:
in a first aspect, a method for performing an unlocking process is provided, where the method includes:
receiving an authentication request message which is sent by an intelligent lock and carries a random character string;
generating an unlocking verification character string based on the random character string and a first unlocking secret key stored in advance;
and sending the unlocking verification character string to the intelligent lock.
Optionally, the method further comprises:
when an unlocking secret key adding instruction is detected, a secret key obtaining request is sent to the intelligent lock;
and receiving a first unlocking secret key sent by the intelligent lock, wherein the first unlocking secret key is the unlocking secret key which is sent to a terminal after the intelligent lock detects fingerprint data and determines that the fingerprint data is matched with pre-stored reference fingerprint data when receiving the secret key acquisition request.
Optionally, before receiving the verification request message carrying the random character string sent by the smart lock, the method further includes:
when an unlocking instruction is detected, starting a Bluetooth function;
detecting a connection message broadcasted by the intelligent lock through a Bluetooth function;
and when the connection message is detected, sending a pairing request to the intelligent lock.
Optionally, after the sending the unlocking verification character string to the smart lock, the method further includes:
when a notification that the character string verification sent by the intelligent lock is successful is received, generating a third unlocking secret key based on a pre-stored second unlocking secret key and the random character string;
encrypting pre-stored unlocking indication information according to the third unlocking secret key, wherein the unlocking indication information is used for indicating unlocking processing;
and sending an unlocking request carrying encrypted unlocking indication information to the intelligent lock.
In a second aspect, a method for performing an unlocking process is provided, the method including:
sending a verification request message carrying a random character string;
when a first unlocking verification character string sent by a terminal is received, comparing a second unlocking verification character string generated based on a locally stored first unlocking secret key and the random character string with the first unlocking verification character string;
and if the first unlocking verification character string is the same as the second unlocking verification character string, unlocking.
Optionally, the method further comprises
Detecting fingerprint data when a secret key acquisition request sent by the terminal is received;
if the detected fingerprint data is matched with pre-stored reference fingerprint data, acquiring the first unlocking secret key;
and sending the first unlocking secret key to the terminal.
Optionally, the sending the verification request message carrying the random character string includes:
broadcasting a connection message according to a preset period;
and when a pairing request sent by the terminal is received, sending a verification request message carrying a random character string to the terminal.
Optionally, if the first unlocking verification character string is the same as the second unlocking verification character string, performing unlocking processing, including:
if the first unlocking verification character string is the same as the second unlocking verification character string, sending a character string verification success notification to the terminal;
when an unlocking request which is sent by the terminal and carries encrypted unlocking indication information is received, decrypting the encrypted unlocking indication information by using a third unlocking secret key which is generated based on a second unlocking secret key stored in advance and the random character string to obtain unencrypted unlocking indication information, wherein the unlocking indication information is used for indicating unlocking processing;
and executing unlocking processing corresponding to the unlocking indication information.
In a third aspect, there is provided a device for performing an unlocking process, the device including:
the first receiving module is used for receiving a verification request message which is sent by the intelligent lock and carries a random character string;
the first generation module is used for generating an unlocking verification character string based on the random character string and a first unlocking secret key stored in advance;
and the first sending module is used for sending the unlocking verification character string to the intelligent lock.
Optionally, the apparatus further comprises:
the second sending module is used for sending a secret key obtaining request to the intelligent lock when an unlocking secret key adding instruction is detected;
the second receiving module is configured to receive a first unlocking key sent by the smart lock, where the first unlocking key is an unlocking key sent to the terminal after the smart lock detects fingerprint data and determines that the fingerprint data matches pre-stored reference fingerprint data when receiving the key acquisition request.
Optionally, the apparatus further comprises:
the unlocking module is used for unlocking the Bluetooth function when an unlocking instruction is detected before receiving a verification request message which is sent by the intelligent lock and carries a random character string;
the detection module is used for detecting the connection message broadcasted by the intelligent lock through the Bluetooth function;
and the third sending module is used for sending a pairing request to the intelligent lock when the connection message is detected.
Optionally, the apparatus further comprises:
the second generation module is used for generating a third unlocking secret key based on a second unlocking secret key stored in advance and the random character string when a character string verification success notice sent by the intelligent lock is received;
the encryption module is used for encrypting pre-stored unlocking indication information according to the third unlocking secret key, wherein the unlocking indication information is used for indicating unlocking processing;
and the fourth sending module is used for sending the unlocking request carrying the encrypted unlocking indication information to the intelligent lock.
In a fourth aspect, there is provided a device for performing an unlocking process, the device including:
the first sending module is used for sending a verification request message carrying a random character string;
the comparison module is used for comparing a second unlocking verification character string generated based on a locally stored first unlocking secret key and the random character string with a first unlocking verification character string when the first unlocking verification character string sent by the terminal is received;
and the processing module is used for unlocking if the first unlocking verification character string is the same as the second unlocking verification character string.
Optionally, the apparatus further comprises:
the detection module is used for detecting fingerprint data when receiving a secret key acquisition request sent by the terminal;
the acquisition module is used for acquiring the first unlocking secret key if the detected fingerprint data is matched with pre-stored reference fingerprint data;
and the second sending module is used for sending the first unlocking secret key to the terminal.
Optionally, the first sending module is configured to:
broadcasting a connection message according to a preset period;
and when a pairing request sent by the terminal is received, sending a verification request message carrying a random character string to the terminal.
Optionally, the processing module is configured to:
if the first unlocking verification character string is the same as the second unlocking verification character string, sending a character string verification success notification to the terminal;
when an unlocking request which is sent by the terminal and carries encrypted unlocking indication information is received, decrypting the encrypted unlocking indication information by using a third unlocking secret key which is generated based on a second unlocking secret key stored in advance and the random character string to obtain unencrypted unlocking indication information, wherein the unlocking indication information is used for indicating unlocking processing;
and executing unlocking processing corresponding to the unlocking indication information.
In a fifth aspect, a system for unlocking is provided, where the system includes a terminal and an intelligent lock, and where:
the terminal is configured to perform the method of the first aspect;
the smart lock is configured to execute the method of the second aspect.
In a sixth aspect, a computer device is provided, which includes a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory complete communication with each other through the bus; a memory for storing a computer program; a processor for executing a program stored in the memory to perform the method steps as described in the first aspect above.
In a seventh aspect, a computer device is provided, where the computer device includes a processor, a communication interface, a memory, and a communication bus, where the processor, the communication interface, and the memory complete communication with each other through the bus; a memory for storing a computer program; a processor for executing the program stored in the memory to implement the method steps according to the second aspect.
In an eighth aspect, a computer-readable storage medium is provided, in which at least one instruction, at least one program, a set of codes, or a set of instructions is stored, and the at least one instruction, the at least one program, the set of codes, or the set of instructions is loaded and executed by the processor to implement the method for unlocking processing according to the first aspect or the second aspect.
The technical scheme provided by the embodiment of the invention has the beneficial effects that at least:
in the embodiment of the invention, a verification request message carrying a random character string is sent; when a first unlocking verification character string sent by the terminal is received, comparing a second unlocking verification character string generated based on a locally stored unlocking secret key and the random character string with the first unlocking verification character string; and if the first unlocking verification character string is the same as the second unlocking verification character string, unlocking. Like this, need not to carry out fingerprint verification when unblanking, can not have the problem that the fingerprint identification rate of accuracy is low, consequently, can avoid appearing the condition that fingerprint identification could open the intelligence lock many times, consequently, can improve the efficiency of unblanking.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of a method for performing an unlocking process according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for performing an unlocking process according to an embodiment of the present invention;
fig. 3 is a flowchart of a method for performing an unlocking process according to an embodiment of the present invention;
fig. 4 is a flowchart of a method for performing an unlocking process according to an embodiment of the present invention;
fig. 5 is a flowchart of a method for performing an unlocking process according to an embodiment of the present invention;
fig. 6 is a schematic physical diagram of a method for performing unlocking processing according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of an unlocking device according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of an unlocking apparatus according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of an unlocking apparatus according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of an apparatus for performing an unlocking process according to an embodiment of the present invention;
fig. 11 is a schematic structural diagram of an unlocking apparatus according to an embodiment of the present invention;
fig. 12 is a schematic structural diagram of an apparatus for performing an unlocking process according to an embodiment of the present invention;
fig. 13 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 14 is a schematic structural diagram of an intelligent lock according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
The embodiment of the invention provides a method for unlocking, which can be realized by a terminal and an intelligent lock together. The terminal can be a terminal with an unlocking application program, and can be a smart phone or a tablet computer.
The terminal may include a processor, memory, screen, transceiver, etc. The processor may be a CPU (Central Processing Unit) or the like, and may be used for Processing such as generating an unlocking verification string. The Memory may be a Random Access Memory (RAM), a Flash Memory, and the like, and may be configured to store received data, data required by the processing procedure, data generated in the processing procedure, and the like, such as a Random character string, an authentication request message, a first unlocking secret key, a first unlocking authentication character string, and the like. The screen may be used to display an unlock application page, etc. The transceiver may be configured to perform data transmission with other devices, for example, receive an authentication request message carrying a random string sent by the smart lock, send an unlocking authentication string to the smart lock, and the like, and may include an antenna, a matching circuit, a modem, and the like. The terminal may further include a transceiver, an image detection part, an audio output part, an audio input part, and the like. The image detection means may be a camera or the like. The audio output component may be a speaker, headphones, or the like. The audio input means may be a microphone or the like.
The smart lock may include a processor, memory, transceiver, etc. The processor, which may be a Central Processing Unit (CPU) or the like, may be configured to generate a random string, generate a second unlocking verification string, compare the first unlocking verification string with the second unlocking verification string, and perform unlocking Processing. The Memory may be a Random Access Memory (RAM), a Flash Memory, or the like, and may be configured to store received data, data required by the processing procedure, data generated in the processing procedure, or the like, such as a Random character string, a first unlocking verification character string, an unlocking key, a second unlocking verification character string, or the like. The transceiver may be configured to perform data transmission with the terminal or a server thereof, for example, send an authentication request message carrying a random string, and receive a first unlocking authentication string sent by the terminal, where the transceiver may include an antenna, a matching circuit, a modem, and the like.
The embodiment of the invention provides a method for unlocking, which is applied to a terminal, and as shown in fig. 1, the processing flow of the method can comprise the following steps:
in step 101, an authentication request message carrying a random character string sent by the smart lock is received.
In step 102, an unlocking verification string is generated based on the random string and a first unlocking key stored in advance.
In step 103, the unlocking verification character string is sent to the smart lock.
In the embodiment of the invention, a verification request message which is sent by the intelligent lock and carries a random character string is received, an unlocking verification character string is generated based on the random character string and a first unlocking secret key which is stored in advance, and the unlocking verification character string is sent to the intelligent lock to be verified so as to trigger unlocking processing. Like this, unblank through the terminal, need not to carry out fingerprint verification, can not have the problem that the fingerprint identification rate of accuracy is low, consequently, can avoid appearing the condition that fingerprint identification could open the intelligence lock many times, consequently, can improve the efficiency of unblanking.
The embodiment of the invention provides a method for unlocking, which is applied to an intelligent lock, and as shown in fig. 2, the processing flow of the method can comprise the following steps:
in step 201, an authentication request message carrying a random string is sent.
In step 202, when a first unlocking verification character string sent by the terminal is received, a second unlocking verification character string generated based on a locally stored first unlocking secret key and a random character string is compared with the first unlocking verification character string.
In step 203, if the first unlocking verification character string is the same as the second unlocking verification character string, the unlocking process is performed.
In the embodiment of the invention, a verification request message carrying a random character string is sent; when a first unlocking verification character string sent by a terminal is received, comparing a second unlocking verification character string generated based on a locally stored unlocking secret key and a random character string with the first unlocking verification character string; and if the first unlocking verification character string is the same as the second unlocking verification character string, unlocking. Like this, need not to carry out fingerprint verification when unblanking, can not have the problem that the fingerprint identification rate of accuracy is low, consequently, can avoid appearing the condition that fingerprint identification could open the intelligence lock many times, consequently, can improve the efficiency of unblanking.
An embodiment of the present invention provides a method for performing unlocking processing, and as shown in fig. 3, a processing flow of the method may include the following steps:
in step 301, the smart lock sends an authentication request message carrying a random string.
The random character string is generated by the intelligent lock according to a random algorithm and is used for generating an unlocking secret key in the subsequent steps.
In one possible embodiment, when a user wants to unlock the intelligent lock through the terminal, the user can be in a range where the intelligent lock and the terminal can perform data interaction, then the unlocking application program on the terminal is opened, and the intelligent lock is correspondingly operated through the unlocking application program on the terminal.
The intelligent lock sends an authentication request message carrying the random character string, and the mode for sending the authentication request message by the intelligent lock can be that the intelligent lock is always in a state of broadcasting the authentication request message carrying the random character string; or the intelligent lock is provided with an opening button, when a user wants to unlock the intelligent lock through the terminal, the user presses the opening button, and the intelligent lock starts to broadcast an authentication request message carrying a random character string outwards; or the intelligent lock is firstly paired with the terminal, and then the intelligent lock sends an authentication request message carrying the random character string to the terminal. The invention is not limited in this regard.
Optionally, the interaction between the smart lock and the terminal may be performed through bluetooth for connection and data interaction, the process of pairing the terminal and the smart lock through bluetooth may be as shown in fig. 4, and the corresponding processing steps may be as follows:
in step 401, the smart lock broadcasts a connection message according to a preset period; in step 402, when an unlocking instruction is detected, the terminal starts a Bluetooth function; in step 403, detecting a connection message broadcasted by the smart lock through the bluetooth function terminal; in step 404, when the connection message is detected, the terminal sends a pairing request to the intelligent lock; in step 405, when the smart lock receives the pairing request sent by the terminal, an authentication request message carrying a random character string is sent to the terminal.
The intelligent lock and the terminal can be paired through bluetooth in a simple bluetooth pairing manner, such as Just Works (a pairing manner in which no input device is displayed for pairing, and pairing can be performed by actively initiating connection, and a user cannot see the pairing process).
In a possible embodiment, the smart lock may always maintain the bluetooth function open state in the open state, so that the smart lock may broadcast the connection according to a preset period, and the connection message may carry the device identifier of the smart lock. When a user wants to unlock the intelligent lock through the terminal, the user can select an unlocking option in an unlocking application program on the terminal, and after the terminal detects an unlocking instruction triggered by the user, the terminal starts a Bluetooth function, so that the Bluetooth function can detect a message broadcasted through Bluetooth in a preset distance range. When the terminal detects the connection message broadcasted by the intelligent lock through the Bluetooth function, the terminal stores the equipment identification of the intelligent lock in the connection message, and then the terminal sends a pairing request to the intelligent lock according to the equipment identification, wherein the pairing request carries the terminal identification of the terminal. When the intelligent lock receives a pairing request sent by a terminal, the terminal identification in the terminal is obtained, the terminal corresponding to the terminal identification is confirmed to finish pairing, and the terminal identification is stored.
And after the intelligent lock is confirmed to be matched with the terminal, the intelligent lock sends a verification request message carrying the random character string to the terminal.
Optionally, before the user unlocks the smart lock through the terminal, the terminal may obtain an unlocking qualification first, that is, the terminal obtains an unlocking key through the smart lock in advance, the processing flow may be as shown in fig. 5, and corresponding processing steps may be as follows:
in step 501, when an unlocking key adding instruction is detected, the terminal sends a key obtaining request to the intelligent lock; in step 502, when a key acquisition request sent by a terminal is received, the smart lock detects fingerprint data; in step 503, if the detected fingerprint data matches the pre-stored reference fingerprint data, the smart lock obtains a first unlocking key; in step 504, the smart lock sends the first unlocking key to the terminal; in step 505, the terminal receives a first unlocking key sent by the smart lock.
The first unlocking secret key is a character string generated by the terminal according to the first unlocking secret key sent by the intelligent lock and the random character string, and is used for enabling the intelligent lock to verify whether the terminal has unlocking qualification.
In one possible embodiment, when a user wants to enable a certain terminal to obtain unlocking qualification, an unlocking application installed on the terminal can be opened, and an option of adding an unlocking secret key is selected, at this time, the terminal detects an unlocking secret key adding instruction, and triggers the terminal to send a secret key obtaining request to the intelligent lock.
The intelligent lock receives a secret key acquisition request sent by the terminal, and triggers the intelligent lock to open the fingerprint verification module. The fingerprint verification module comprises a fingerprint sensor and a fingerprint acquisition panel corresponding to the fingerprint sensor, as shown in fig. 6, when the fingerprint verification module is unlocked by the intelligent lock, the intelligent lock can prompt a user to enter fingerprint data, and for example, the intelligent lock can adopt a light emitting mode or a sound emitting mode and the like. The user places the finger, into which the fingerprint data has been previously entered, on the fingerprint collection panel, and the fingerprint sensor collects the fingerprint data of the user. Then, reference fingerprint data stored in a fingerprint database in advance are obtained, the acquired fingerprint data are compared with the reference fingerprint data one by one to obtain the similarity between the acquired fingerprint data and each piece of reference fingerprint data, when at least one similarity is larger than a preset similarity threshold value, the fingerprint data of the user can be determined to be matched with the prestored reference fingerprint data, and the user is proved to have unlocking qualification, namely the terminal of the user can obtain the unlocking qualification, so that the intelligent lock sends a first unlocking secret key to the terminal. After the terminal receives the first unlocking secret key sent by the intelligent lock, the first unlocking secret key is stored to be used for unlocking.
It should be noted that when a plurality of terminals obtain the first unlocking key of the same intelligent lock, the first unlocking keys obtained by the plurality of terminals may be the same, that is, the intelligent lock generates or stores a first unlocking key in advance, and when a key obtaining request sent by the terminal is received and the fingerprint verification is successful, the intelligent lock obtains the first unlocking key and sends the first unlocking key to the terminal; the first unlocking keys acquired by the plurality of terminals may also be different, that is, the intelligent lock includes an algorithm for generating the first unlocking key, and when the key acquisition request sent by the terminal is received and the fingerprint verification is successful, the intelligent lock executes the algorithm for generating the first unlocking key, generates and stores a first unlocking key, and then sends the first unlocking key to the terminal.
It should be noted that, when the smart lock receives the key acquisition request sent by the terminal, in addition to the above-mentioned manner of performing authentication through the fingerprint data, the smart lock may further be configured with other authentication manners, for example, a numeric keypad is provided on the smart lock, as shown in fig. 6, the user may set a reference numeric password for the smart lock in advance, when the smart lock receives the key acquisition request sent by the terminal, the user may be prompted to input the numeric password through the numeric keypad, and when the numeric password input by the user is the same as the preset reference numeric password, the smart lock sends the first unlocking password to the terminal. The invention is not limited in this regard.
In step 302, the terminal receives an authentication request message carrying a random character string sent by the smart lock.
In step 303, the terminal generates a first unlocking verification string based on the random string and a first unlocking key stored in advance.
In one possible embodiment, after receiving a verification request message carrying a random character string sent by an intelligent lock, a terminal obtains the random character string and a first pre-stored unlocking secret key, and generates an unlocking verification character string (namely, the first unlocking verification character string) according to the random character string and the first unlocking secret key through an unlocking verification character string generation algorithm. The unlocking verification string generation Algorithm may be a SHA256 Algorithm (Secure Hash Algorithm), and the Hash operation is performed on the random string and the first unlocking secret key to generate a 256-bit Hash value, where the Hash value is the first unlocking verification string.
In step 304, the terminal sends the first unlocking verification character string to the smart lock.
In step 305, when a first unlocking verification character string sent by the terminal is received, the smart lock compares a second unlocking verification character string generated based on the locally stored first unlocking secret key and the random character string with the first unlocking verification character string.
The second unlocking verification character string is a character string generated by the intelligent lock according to the locally stored first unlocking secret key and the random character string, and is used for verifying whether the first unlocking verification character string sent by the terminal is correct or not, and further determining whether the terminal has unlocking qualification or not.
In one possible embodiment, when the smart lock receives the first unlocking verification character string sent by the terminal, the smart lock obtains the locally stored first unlocking secret key and the random character string, and generates the unlocking verification character string (i.e., the second unlocking verification character string) through an unlocking verification character string generation algorithm. And then, comparing the first unlocking verification character string with the second unlocking verification character string. The unlocking verification string generation algorithm in this step is the same as the unlocking verification string generation algorithm in step 303 described above.
Or, in the foregoing process, the smart lock may generate a second unlocking verification character string by using an unlocking verification character string generation algorithm according to the locally stored first unlocking secret key and the random character string in advance, and store the second unlocking verification character string. Then, when the intelligent lock receives the first unlocking verification character string, a second unlocking verification character string stored in advance is obtained, and the first unlocking verification character string is compared with the second unlocking verification character string.
In step 306, if the first unlocking verification character string is the same as the second unlocking verification character string, the smart lock performs unlocking processing.
In a possible embodiment, the locally stored first unlocking key in the step 305 is the same as the first unlocking key sent to the terminal with unlocking qualification, the locally stored random string is the same as the random string sent to the terminal with unlocking qualification, and after the operation is performed by the same unlocking verification string generation algorithm, if the terminal has unlocking qualification, the first unlocking verification string sent by the terminal is the same as the second unlocking verification string generated by the smart lock.
Further, it can be deduced that if the first unlocking verification character string is the same as the second unlocking verification character string, the terminal is qualified for unlocking, and therefore, the intelligent lock is triggered to perform unlocking processing.
Optionally, in order to further improve the security, some encryption processing may be performed in the process of triggering the smart lock to perform the unlocking processing, and the corresponding processing may be as follows: if the first unlocking verification character string is the same as the second unlocking verification character string, the intelligent lock sends a character string verification success notification to the terminal; when a successful character string verification notice sent by the intelligent lock is received, the terminal generates a third unlocking secret key based on a pre-stored second unlocking secret key and a random character string; according to the third unlocking secret key, the terminal encrypts the unlocking indication information stored in advance; the terminal sends an unlocking request carrying encrypted unlocking indication information to the intelligent lock; when an unlocking request which is sent by a terminal and carries encrypted unlocking indication information is received, the intelligent lock decrypts the encrypted unlocking indication information by using a third unlocking secret key which is generated based on a prestored second unlocking secret key and a random character string to obtain unencrypted unlocking indication information; and the intelligent lock executes unlocking processing corresponding to the unlocking indication information.
The unlocking indication information is used for indicating unlocking processing; the second unlocking secret key is the unlocking secret key sent by the intelligent lock to the terminal, the second unlocking secret key can be the same as the first unlocking secret key and can also be different from the first unlocking secret key, the second unlocking secret key is used for generating a third unlocking secret key, and the third unlocking secret key is used for encrypting the unlocking indication information, so that the unlocking safety is further improved.
In one possible embodiment, if the smart lock determines that the first unlocking verification string is the same as the second unlocking verification string, a string verification success notification is sent to the terminal. And after the terminal receives the notification that the character string verification is successful, the terminal acquires a second unlocking secret key and a random character string which are stored in advance, and generates a third unlocking secret key according to the second unlocking secret key and the random character string through a preset generation algorithm. The preset generation algorithm may be the same as the unlocking verification string generation algorithm or may be a different algorithm, which is not limited in the present invention.
And the terminal encrypts the pre-stored unlocking indication information according to the generated third unlocking secret key, wherein the Encryption mode can adopt an Advanced Encryption Standard (AES) Encryption algorithm. And packaging the encrypted unlocking indication information to generate an unlocking request carrying the encrypted unlocking indication information, and then sending the unlocking request to the intelligent lock.
The intelligent lock obtains the encrypted unlocking indication information carried in the intelligent lock after receiving the unlocking request, then obtains a second unlocking secret key and a random character string which are stored in advance, and generates the unlocking secret key aiming at the encrypted unlocking indication information through a preset generation algorithm, wherein the generation algorithm used by the intelligent lock and the generation algorithm used by the terminal for generating the third unlocking secret key are the same algorithm.
The unlocking key, the random character string and the generation algorithm used in the process of generating the encryption key of the unlocking indication information (namely, the third unlocking key generated by the terminal) by the terminal with unlocking qualification are the same as the unlocking key, the random character string and the generation algorithm used in the process of generating the decryption key of the unlocking indication information (namely, the unlocking key generated by the intelligent lock and aiming at the encrypted unlocking indication information) by the intelligent lock. Therefore, the decryption key generated by the smart lock is the same as the encryption key generated by the terminal with the unlocking qualification. Therefore, the intelligent lock can decrypt the encrypted unlocking instruction information according to the unlocking secret key aiming at the encrypted unlocking instruction information. If the decryption is successful, the intelligent lock obtains the unlocking indication information which is not encrypted, then the intelligent lock operates the unlocking indication information, and the unlocking processing corresponding to the unlocking indication information is executed.
In the embodiment of the invention, the intelligent lock sends a verification request message carrying a random character string; the terminal receives an authentication request message which is sent by the intelligent lock and carries a random character string; based on the random character string and a first unlocking secret key stored in advance, the terminal generates a first unlocking verification character string; the terminal sends the first unlocking verification character string to the intelligent lock; when a first unlocking verification character string sent by a terminal is received, the intelligent lock compares a second unlocking verification character string generated based on a locally stored first unlocking secret key and a random character string with the first unlocking verification character string; and if the first unlocking verification character string is the same as the second unlocking verification character string, the intelligent lock is unlocked. Like this, need not to carry out fingerprint verification when unblanking, can not have the problem that the fingerprint identification rate of accuracy is low, consequently, can avoid appearing the condition that fingerprint identification could open the intelligence lock many times, consequently, can improve the efficiency of unblanking.
Based on the same technical concept, an embodiment of the present invention further provides a device for performing an unlocking process, where the device may be a terminal in the foregoing embodiment, as shown in fig. 7, and the device includes: a first receiving module 710, a first generating module 720 and a first transmitting module 730.
A first receiving module 710 configured to receive an authentication request message carrying a random character string sent by the smart lock;
a first generating module 720, configured to generate an unlocking verification string based on the random string and a first unlocking key stored in advance;
a first sending module 730 configured to send the unlocking verification string to the smart lock.
Optionally, as shown in fig. 8, the apparatus further includes:
a second sending module 810 configured to send a key obtaining request to the smart lock when an unlocking key adding instruction is detected;
a second receiving module 820, configured to receive a first unlocking key sent by the smart lock, where the first unlocking key is an unlocking key sent to the terminal after the smart lock detects fingerprint data when receiving the key obtaining request and determines that the fingerprint data matches pre-stored reference fingerprint data.
Optionally, as shown in fig. 9, the apparatus further includes:
the unlocking module 910 is configured to unlock a bluetooth function when an unlocking instruction is detected before receiving a verification request message which is sent by the smart lock and carries a random character string;
a detection module 920 configured to detect a connection message broadcasted by the smart lock through a bluetooth function;
a third sending module 930 configured to send a pairing request to the smart lock when the connection message is detected.
Optionally, as shown in fig. 10, the apparatus further includes:
the second generating module 1010 is configured to generate a third unlocking key based on a pre-stored second unlocking key and the random character string when a successful character string verification notification sent by the smart lock is received;
an encryption module 1020 configured to encrypt pre-stored unlocking instruction information according to the third unlocking key, wherein the unlocking instruction information is configured to instruct to perform unlocking processing;
a fourth sending module 1030 configured to send an unlocking request carrying the encrypted unlocking indication information to the smart lock.
In the embodiment of the invention, a verification request message which is sent by the intelligent lock and carries a random character string is received, an unlocking verification character string is generated based on the random character string and a first unlocking secret key which is stored in advance, and the unlocking verification character string is sent to the intelligent lock to be verified so as to trigger unlocking processing. Like this, unblank through the terminal, need not to carry out fingerprint verification, can not have the problem that the fingerprint identification rate of accuracy is low, consequently, can avoid appearing the condition that fingerprint identification could open the intelligence lock many times, consequently, can improve the efficiency of unblanking.
Based on the same technical concept, an embodiment of the present invention further provides a device for performing unlocking processing, which may be an intelligent lock in the foregoing embodiment, as shown in fig. 11, and the device includes: a first sending module 1110, a comparing module 1120 and a processing module 1130.
A first sending module 1110 configured to send an authentication request message carrying a random string;
the comparison module 1120 is configured to compare a second unlocking verification character string generated based on a locally stored first unlocking secret key and the random character string with a first unlocking verification character string when the first unlocking verification character string sent by the terminal is received;
a processing module 1130 configured to perform an unlocking process if the first unlocking verification string is the same as the second unlocking verification string.
Optionally, as shown in fig. 12, the apparatus further includes:
a detection module 1140 configured to detect fingerprint data when receiving a key acquisition request transmitted by the terminal;
an obtaining module 1150 configured to obtain the first unlocking key if the detected fingerprint data matches pre-stored reference fingerprint data;
a second sending module 1160 configured to send the first unlocking key to the terminal.
Optionally, the first sending module 1110 is configured to:
broadcasting a connection message according to a preset period;
and when a pairing request sent by the terminal is received, sending a verification request message carrying a random character string to the terminal.
Optionally, the processing module 1130 is configured to:
if the first unlocking verification character string is the same as the second unlocking verification character string, sending a character string verification success notification to the terminal;
when an unlocking request which is sent by the terminal and carries encrypted unlocking indication information is received, decrypting the encrypted unlocking indication information by using a third unlocking secret key which is generated based on a second unlocking secret key stored in advance and the random character string to obtain unencrypted unlocking indication information, wherein the unlocking indication information is configured to indicate unlocking processing;
and executing unlocking processing corresponding to the unlocking indication information.
In the embodiment of the invention, a verification request message carrying a random character string is sent; when a first unlocking verification character string sent by a terminal is received, comparing a second unlocking verification character string generated based on a locally stored unlocking secret key and a random character string with the first unlocking verification character string; and if the first unlocking verification character string is the same as the second unlocking verification character string, unlocking. Like this, need not to carry out fingerprint verification when unblanking, can not have the problem that the fingerprint identification rate of accuracy is low, consequently, can avoid appearing the condition that fingerprint identification could open the intelligence lock many times, consequently, can improve the efficiency of unblanking.
Based on the same technical concept, the embodiment of the invention also provides a system for unlocking, which comprises a terminal and an intelligent lock, wherein:
the terminal is used for receiving a verification request message which is sent by the intelligent lock and carries a random character string; generating an unlocking verification character string based on the random character string and a first unlocking secret key stored in advance; and sending the unlocking verification character string to the intelligent lock.
The intelligent lock is used for sending an authentication request message carrying a random character string; when a first unlocking verification character string sent by the terminal is received, comparing a second unlocking verification character string generated based on a locally stored first unlocking secret key and the random character string with the first unlocking verification character string; and if the first unlocking verification character string is the same as the second unlocking verification character string, unlocking.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
It should be noted that: in the device for performing the unlocking process according to the above embodiment, only the division of the functional modules is illustrated when performing the unlocking process, and in practical applications, the functions may be distributed by different functional modules as needed, that is, the internal structure of the electronic device may be divided into different functional modules to complete all or part of the functions described above. In addition, the device for performing unlocking processing and the method for performing unlocking processing provided by the above embodiment belong to the same concept, and the specific implementation process is detailed in the method embodiment and is not described herein again.
Fig. 13 is a block diagram of a terminal according to an embodiment of the present invention. The terminal 1300 may be a portable mobile terminal such as: smart phones, tablet computers. Terminal 1300 may also be referred to by other names such as user equipment, portable terminal, etc.
In general, terminal 1300 includes: a processor 1301 and a memory 1302.
Processor 1301 may include one or more processing cores, such as a 4-core processor, a 13-core processor, and the like. The processor 1301 may be implemented in at least one hardware form of a DSP (Digital Signal Processing), an FPGA (Field-Programmable Gate Array), and a PLA (Programmable Logic Array). The processor 1301 may also include a main processor and a coprocessor, where the main processor is a processor for Processing data in an awake state, and is also referred to as a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 1301 may be integrated with a GPU (Graphics Processing Unit), which is responsible for rendering and drawing content that the display screen needs to display. In some embodiments, processor 1301 may further include an AI (Artificial Intelligence) processor for processing computational operations related to machine learning.
The memory 1302 may include one or more computer-readable storage media, which may be tangible and non-transitory. The memory 1302 may also include high speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in the memory 1302 is used to store at least one instruction for execution by the processor 1301 to implement the method for unlocking processing provided herein.
In some embodiments, terminal 1300 may further optionally include: a peripheral interface 1303 and at least one peripheral. Specifically, the peripheral device includes: at least one of radio frequency circuitry 1304, touch display 1305, camera 1306, audio circuitry 1307, positioning component 1308, and power supply 1309.
Peripheral interface 1303 may be used to connect at least one peripheral associated with I/O (Input/Output) to processor 1301 and memory 1302. In some embodiments, processor 1301, memory 1302, and peripheral interface 1303 are integrated on the same chip or circuit board; in some other embodiments, any one or two of the processor 1301, the memory 1302, and the peripheral device interface 1303 may be implemented on a separate chip or circuit board, which is not limited in this embodiment.
The Radio Frequency circuit 1304 is used to receive and transmit RF (Radio Frequency) signals, also called electromagnetic signals. The radio frequency circuitry 1304 communicates with communication networks and other communication devices via electromagnetic signals. The radio frequency circuit 1304 converts an electrical signal into an electromagnetic signal to transmit, or converts a received electromagnetic signal into an electrical signal. Optionally, the radio frequency circuit 1304 includes: an antenna system, an RF transceiver, one or more amplifiers, a tuner, an oscillator, a digital signal processor, a codec chipset, a subscriber identity module card, and so forth. The radio frequency circuitry 1304 may communicate with other terminals via at least one wireless communication protocol. The wireless communication protocols include, but are not limited to: the world wide web, metropolitan area networks, intranets, generations of mobile communication networks (2G, 3G, 4G, and 5G), Wireless local area networks, and/or WiFi (Wireless Fidelity) networks. In some embodiments, the radio frequency circuit 1304 may also include NFC (Near Field Communication) related circuits, which are not limited in this application.
The touch display 1305 is used to display a UI (User Interface). The UI may include graphics, text, icons, video, and any combination thereof. The touch display 1305 also has the capability to collect touch signals on or over the surface of the touch display 1305. The touch signal may be input to the processor 1301 as a control signal for processing. The touch display 1305 is used to provide virtual buttons and/or a virtual keyboard, also referred to as soft buttons and/or a soft keyboard. In some embodiments, touch display 1305 may be one, providing the front panel of terminal 1300; in other embodiments, touch display 1305 may be at least two, either on different surfaces of terminal 1300 or in a folded design; in still other embodiments, touch display 1305 may be a flexible display disposed on a curved surface or on a folded surface of terminal 1300. Even more, the touch screen 1305 may be arranged in a non-rectangular irregular pattern, i.e., a shaped screen. The touch Display 1305 may be made of LCD (Liquid Crystal Display), OLED (Organic Light-Emitting Diode), or the like.
The camera assembly 1306 is used to capture images or video. Optionally, camera assembly 1306 includes a front camera and a rear camera. Generally, a front camera is used for realizing video call or self-shooting, and a rear camera is used for realizing shooting of pictures or videos. In some embodiments, the number of the rear cameras is at least two, and each of the rear cameras is any one of a main camera, a depth-of-field camera and a wide-angle camera, so that the main camera and the depth-of-field camera are fused to realize a background blurring function, and the main camera and the wide-angle camera are fused to realize a panoramic shooting function and a VR (Virtual Reality) shooting function. In some embodiments, camera assembly 1306 may also include a flash. The flash lamp can be a monochrome temperature flash lamp or a bicolor temperature flash lamp. The double-color-temperature flash lamp is a combination of a warm-light flash lamp and a cold-light flash lamp, and can be used for light compensation at different color temperatures.
The audio circuit 1307 is used to provide an audio interface between the user and the terminal 1300. The audio circuit 1307 may include a microphone and a speaker. The microphone is used for collecting sound waves of a user and the environment, converting the sound waves into electric signals, and inputting the electric signals to the processor 1301 for processing, or inputting the electric signals to the radio frequency circuit 1304 for realizing voice communication. For stereo capture or noise reduction purposes, multiple microphones may be provided, each at a different location of terminal 1300. The microphone may also be an array microphone or an omni-directional pick-up microphone. The speaker is used to convert electrical signals from the processor 1301 or the radio frequency circuitry 1304 into sound waves. The loudspeaker can be a traditional film loudspeaker or a piezoelectric ceramic loudspeaker. When the speaker is a piezoelectric ceramic speaker, the speaker can be used for purposes such as converting an electric signal into a sound wave audible to a human being, or converting an electric signal into a sound wave inaudible to a human being to measure a distance. In some embodiments, audio circuitry 1307 may also include a headphone jack.
The positioning component 1308 is used for positioning the current geographic position of the terminal 1300 for implementing navigation or LBS (Location Based Service). The Positioning component 1308 can be a Positioning component based on the Global Positioning System (GPS) in the united states, the beidou System in china, or the galileo System in russia.
Power supply 1309 is used to provide power to various components in terminal 1300. The power source 1309 may be alternating current, direct current, disposable or rechargeable. When the power source 1309 comprises a rechargeable battery, the rechargeable battery may be a wired rechargeable battery or a wireless rechargeable battery. The wired rechargeable battery is a battery charged through a wired line, and the wireless rechargeable battery is a battery charged through a wireless coil. The rechargeable battery may also be used to support fast charge technology.
In some embodiments, terminal 1300 also includes one or more sensors 1310. The one or more sensors 1310 include, but are not limited to: acceleration sensor 1311, gyro sensor 1312, pressure sensor 1313, fingerprint sensor 1314, optical sensor 1315, and proximity sensor 1316.
The acceleration sensor 1311 can detect the magnitude of acceleration on three coordinate axes of the coordinate system established with the terminal 1300. For example, the acceleration sensor 1311 may be used to detect components of gravitational acceleration in three coordinate axes. The processor 1301 may control the touch display screen 135 to display the user interface in a landscape view or a portrait view according to the gravitational acceleration signal collected by the acceleration sensor 1311. The acceleration sensor 1311 may also be used for acquisition 0 of motion data of a game or a user.
The gyro sensor 1312 may detect the body direction and the rotation angle of the terminal 1300, and the gyro sensor 1312 may cooperate with the acceleration sensor 1311 to acquire a 3D motion of the user with respect to the terminal 1300. Processor 1301, based on the data collected by gyroscope sensor 1312, may perform the following functions: motion sensing (such as changing the UI according to a user's tilting operation), image stabilization at the time of photographing, game control, and inertial navigation.
Pressure sensor 1313 may be disposed on a side bezel of terminal 1300 and/or underlying touch display 1305. When the pressure sensor 1313 is provided on the side frame of the terminal 1300, a user's grip signal on the terminal 1300 can be detected, and left-right hand recognition or shortcut operation can be performed based on the grip signal. When the pressure sensor 1313 is disposed on the lower layer of the touch display 1305, it is possible to control an operability control on the UI interface according to a pressure operation of the user on the touch display 1305. The operability control comprises at least one of a button control, a scroll bar control, an icon control and a menu control.
The fingerprint sensor 1314 is used for collecting the fingerprint of the user to identify the identity of the user according to the collected fingerprint. When the identity of the user is identified as a trusted identity, the processor 1301 authorizes the user to perform relevant sensitive operations, including unlocking a screen, viewing encrypted information, downloading software, paying, changing settings, and the like. The fingerprint sensor 1314 may be disposed on the front, back, or side of the terminal 1300. When a physical button or vendor Logo is provided on the terminal 1300, the fingerprint sensor 1314 may be integrated with the physical button or vendor Logo.
The optical sensor 1315 is used to collect the ambient light intensity. In one embodiment, the processor 1301 can control the display brightness of the touch display screen 1305 according to the intensity of the ambient light collected by the optical sensor 1315. Specifically, when the ambient light intensity is high, the display brightness of the touch display screen 1305 is increased; when the ambient light intensity is low, the display brightness of the touch display 1305 is turned down. In another embodiment, the processor 1301 can also dynamically adjust the shooting parameters of the camera assembly 1306 according to the ambient light intensity collected by the optical sensor 1315.
Proximity sensor 1316, also known as a distance sensor, is typically disposed on a front face of terminal 1300. Proximity sensor 1316 is used to gather the distance between the user and the front face of terminal 1300. In one embodiment, the processor 1301 controls the touch display 1305 to switch from the bright screen state to the dark screen state when the proximity sensor 1316 detects that the distance between the user and the front face of the terminal 1300 gradually decreases; the touch display 1305 is controlled by the processor 1301 to switch from the rest state to the bright state when the proximity sensor 1316 detects that the distance between the user and the front face of the terminal 1300 gradually becomes larger.
Those skilled in the art will appreciate that the configuration shown in fig. 13 is not intended to be limiting with respect to terminal 1300 and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components may be employed.
In the embodiment of the invention, a verification request message which is sent by the intelligent lock and carries a random character string is received, an unlocking verification character string is generated based on the random character string and a first unlocking secret key which is stored in advance, and the unlocking verification character string is sent to the intelligent lock to be verified so as to trigger unlocking processing. Like this, unblank through the terminal, need not to carry out fingerprint verification, can not have the problem that the fingerprint identification rate of accuracy is low, consequently, can avoid appearing the condition that fingerprint identification could open the intelligence lock many times, consequently, can improve the efficiency of unblanking.
Fig. 14 is a block diagram of an intelligent lock according to an embodiment of the present invention. In general, smart lock 1400 includes: a processor 1401, and a memory 1402.
Processor 1401 may include one or more processing cores, such as a 4-core processor, a 14-core processor, and the like. The processor 1401 may be implemented in at least one hardware form of DSP (Digital Signal Processing), FPGA (Field-Programmable Gate Array), and PLA (Programmable Logic Array). Processor 1401 may also include a main processor and a coprocessor, where the main processor is a processor for Processing data in an awake state, and is also referred to as a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state.
Memory 1402 may include one or more computer-readable storage media, which may be tangible and non-transitory. Memory 1402 may also include high speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in memory 1402 is used to store at least one instruction for execution by processor 1401 to implement the method of unlocking processing provided herein.
In some embodiments, the smart lock 1400 may further optionally include: a peripheral device interface 1403 and at least one peripheral device. Specifically, the peripheral device includes: at least one of radio frequency circuit 1404, touch display 1405, and power source 1406.
The peripheral device interface 1403 can be used to connect at least one peripheral device related to I/O (Input/Output) to the processor 1401 and the memory 1402. In some embodiments, the processor 1401, memory 1402, and peripheral interface 1403 are integrated on the same chip or circuit board; in some other embodiments, any one or both of the processor 1401, the memory 1402, and the peripheral device interface 1403 may be implemented on a separate chip or circuit board, which is not limited in this embodiment.
The Radio Frequency circuit 1404 is used for receiving and transmitting RF (Radio Frequency) signals, also called electromagnetic signals. The radio frequency circuitry 1404 communicates with communication networks and other communication devices via electromagnetic signals. The rf circuit 1404 converts an electrical signal into an electromagnetic signal to transmit, or converts a received electromagnetic signal into an electrical signal. Optionally, the radio frequency circuit 1404 includes: an antenna system, an RF transceiver, one or more amplifiers, a tuner, an oscillator, a digital signal processor, a codec chipset, a subscriber identity module card, and so forth. The radio frequency circuit 1404 may communicate with other smart locks via at least one wireless communication protocol. The wireless communication protocols include, but are not limited to: the world wide web, metropolitan area networks, intranets, generations of mobile communication networks (2G, 3G, 4G, and 5G), Wireless local area networks, and/or WiFi (Wireless Fidelity) networks. In some embodiments, the radio frequency circuit 1404 may further include NFC (Near Field Communication) related circuits, which are not limited in this application.
The touch display 1405 is used to display a UI (User Interface). The UI may include graphics, text, icons, video, and any combination thereof. The touch display 1405 also has the ability to capture touch signals at or above the surface of the touch display 1405. The touch signal may be input to the processor 1401 for processing as a control signal. The touch display 1405 is used to provide virtual buttons and/or virtual keyboards, also referred to as soft buttons and/or soft keyboards. In some embodiments, the touch display 1405 may be one, providing the front panel of the smart lock 1400; in other embodiments, the number of the touch display screens 1405 may be at least two, and the at least two touch display screens are respectively disposed on different surfaces of the smart lock 1400 or in a folding design; in still other embodiments, touch display 1405 may be a flexible display disposed on a curved surface or on a folded surface of smart lock 1400. Even the touch display 1405 can be arranged in a non-rectangular irregular figure, i.e., a shaped screen. The touch Display 1405 can be made of LCD (Liquid Crystal Display), OLED (Organic Light-Emitting Diode), and the like.
Power supply 1406 is used to power the various components of smart lock 1400. The power source 1406 may be alternating current, direct current, disposable or rechargeable. When power source 1406 comprises a rechargeable battery, the rechargeable battery may be a wired rechargeable battery or a wireless rechargeable battery. The wired rechargeable battery is a battery charged through a wired line, and the wireless rechargeable battery is a battery charged through a wireless coil. The rechargeable battery may also be used to support fast charge technology.
In some embodiments, smart lock 1400 further includes one or more sensors 1407. The one or more sensors 1407 include, but are not limited to: a pressure sensor 1408 and a fingerprint sensor 1409.
Pressure sensor 1408 may be disposed on a side bezel of smart lock 1400 and/or underneath touch display 1405. When the pressure sensor 1408 is disposed on the side frame of the smart lock 1400, a user's holding signal to the smart lock 1400 may be detected, and left-right hand recognition or shortcut operation may be performed according to the holding signal. When the pressure sensor 1408 is disposed at the lower layer of the touch display 1405, it is possible to control the operability control on the UI interface according to the pressure operation of the user on the touch display 1405. The operability control comprises at least one of a button control, a scroll bar control, an icon control and a menu control.
The fingerprint sensor 1409 is used for collecting the fingerprint of the user to identify the identity of the user according to the collected fingerprint. Upon recognizing that the user's identity is a trusted identity, processor 1401 authorizes the user to perform relevant sensitive operations including unlocking the screen, viewing encrypted information, downloading software, paying for, and changing settings, etc. The fingerprint sensor 1409 may be disposed on the front, back, or side of the smart lock 1400. When a physical key or vendor Logo is provided on the smart lock 1400, the fingerprint sensor 1409 may be integrated with the physical key or vendor Logo.
In the embodiment of the invention, a verification request message carrying a random character string is sent; when a first unlocking verification character string sent by a terminal is received, comparing a second unlocking verification character string generated based on a locally stored unlocking secret key and a random character string with the first unlocking verification character string; and if the first unlocking verification character string is the same as the second unlocking verification character string, unlocking. Like this, need not to carry out fingerprint verification when unblanking, can not have the problem that the fingerprint identification rate of accuracy is low, consequently, can avoid appearing the condition that fingerprint identification could open the intelligence lock many times, consequently, can improve the efficiency of unblanking.
In an exemplary embodiment, a computer readable storage medium is also provided, in which at least one instruction, at least one program, code set, or instruction set is stored, and the at least one instruction, the at least one program, the code set, or the instruction set is loaded and executed by a processor to implement the method for identifying an action category in the above embodiments. For example, the computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (16)

1. A method of performing an unlocking process, the method comprising:
when an unlocking secret key adding instruction is detected, a secret key obtaining request is sent to the intelligent lock;
receiving a first unlocking key sent by the intelligent lock, wherein the first unlocking key is generated by an algorithm for generating the first unlocking key and sending the first unlocking key to a terminal after detecting fingerprint data and determining that the fingerprint data are matched with prestored reference fingerprint data when the intelligent lock receives the key acquisition request, and the first unlocking key sent to different terminals is different;
receiving an authentication request message which is sent by the intelligent lock and carries a random character string;
generating an unlocking verification character string based on the random character string and the first unlocking secret key stored in advance;
and sending the unlocking verification character string to the intelligent lock.
2. The method according to claim 1, wherein before receiving the authentication request message carrying the random string sent by the smart lock, the method further comprises:
when an unlocking instruction is detected, starting a Bluetooth function;
detecting a connection message broadcasted by the intelligent lock through a Bluetooth function;
and when the connection message is detected, sending a pairing request to the intelligent lock.
3. The method of claim 1, wherein after sending the unlock verification string to the smart lock, further comprising:
when a notification that the character string verification sent by the intelligent lock is successful is received, generating a third unlocking secret key based on a pre-stored second unlocking secret key and the random character string;
encrypting pre-stored unlocking indication information according to the third unlocking secret key, wherein the unlocking indication information is used for indicating unlocking processing;
and sending an unlocking request carrying encrypted unlocking indication information to the intelligent lock.
4. A method of performing an unlocking process, the method comprising:
detecting fingerprint data when a secret key acquisition request sent by a terminal is received;
if the detected fingerprint data is matched with the prestored reference fingerprint data, executing an algorithm for generating a first unlocking secret key, generating the first unlocking secret key, and sending the first unlocking secret key to the terminal, wherein the first unlocking secret keys sent to different terminals are different;
sending a verification request message carrying a random character string;
when a first unlocking verification character string sent by a terminal is received, comparing a second unlocking verification character string generated based on a locally stored first unlocking secret key and the random character string with the first unlocking verification character string;
and if the first unlocking verification character string is the same as the second unlocking verification character string, unlocking.
5. The method of claim 4, wherein sending the authentication request message carrying the random string comprises:
broadcasting a connection message according to a preset period;
and when a pairing request sent by the terminal is received, sending a verification request message carrying a random character string to the terminal.
6. The method of claim 4, wherein performing an unlocking process if the first unlocking verification string is the same as the second unlocking verification string comprises:
if the first unlocking verification character string is the same as the second unlocking verification character string, sending a character string verification success notification to the terminal;
when an unlocking request which is sent by the terminal and carries encrypted unlocking indication information is received, decrypting the encrypted unlocking indication information by using a third unlocking secret key which is generated based on a second unlocking secret key stored in advance and the random character string to obtain unencrypted unlocking indication information, wherein the unlocking indication information is used for indicating unlocking processing;
and executing unlocking processing corresponding to the unlocking indication information.
7. An apparatus for performing an unlocking process, the apparatus comprising:
the second sending module is used for sending a secret key obtaining request to the intelligent lock when an unlocking secret key adding instruction is detected;
the second receiving module is used for receiving a first unlocking secret key sent by the intelligent lock, wherein the first unlocking secret key is generated by an algorithm for generating the first unlocking secret key and sending the first unlocking secret key to the terminal after the intelligent lock detects fingerprint data and determines that the fingerprint data is matched with pre-stored reference fingerprint data when receiving the secret key obtaining request, and the first unlocking secret keys sent to different terminals are different;
the first receiving module is used for receiving a verification request message which is sent by the intelligent lock and carries a random character string;
the first generation module is used for generating an unlocking verification character string based on the random character string and a first unlocking secret key stored in advance;
and the first sending module is used for sending the unlocking verification character string to the intelligent lock.
8. The apparatus of claim 7, further comprising:
the unlocking module is used for unlocking the Bluetooth function when an unlocking instruction is detected before receiving a verification request message which is sent by the intelligent lock and carries a random character string;
the detection module is used for detecting the connection message broadcasted by the intelligent lock through the Bluetooth function;
and the third sending module is used for sending a pairing request to the intelligent lock when the connection message is detected.
9. The apparatus of claim 7, further comprising:
the second generation module is used for generating a third unlocking secret key based on a second unlocking secret key and the random character string which are stored in advance when a successful verification notice of the character string sent by the intelligent lock is received after the unlocking verification character string is sent to the intelligent lock;
the encryption module is used for encrypting pre-stored unlocking indication information according to the third unlocking secret key, wherein the unlocking indication information is used for indicating unlocking processing;
and the fourth sending module is used for sending the unlocking request carrying the encrypted unlocking indication information to the intelligent lock.
10. An apparatus for performing an unlocking process, the apparatus comprising:
the detection module is used for detecting fingerprint data when receiving a key acquisition request sent by a terminal;
the acquisition module is used for executing an algorithm for generating a first unlocking secret key if the detected fingerprint data is matched with pre-stored reference fingerprint data, and generating the first unlocking secret key;
the second sending module is used for sending the first unlocking secret key to the terminal, wherein the first unlocking secret keys sent to different terminals are different;
the first sending module is used for sending a verification request message carrying a random character string;
the comparison module is used for comparing a second unlocking verification character string generated based on a locally stored first unlocking secret key and the random character string with a first unlocking verification character string when the first unlocking verification character string sent by the terminal is received;
and the processing module is used for unlocking if the first unlocking verification character string is the same as the second unlocking verification character string.
11. The apparatus of claim 10, wherein the first sending module is configured to:
broadcasting a connection message according to a preset period;
and when a pairing request sent by the terminal is received, sending a verification request message carrying a random character string to the terminal.
12. The apparatus of claim 10, wherein the processing module is configured to:
if the first unlocking verification character string is the same as the second unlocking verification character string, sending a character string verification success notification to the terminal;
when an unlocking request which is sent by the terminal and carries encrypted unlocking indication information is received, decrypting the encrypted unlocking indication information by using a third unlocking secret key which is generated based on a second unlocking secret key stored in advance and the random character string to obtain unencrypted unlocking indication information, wherein the unlocking indication information is used for indicating unlocking processing;
and executing unlocking processing corresponding to the unlocking indication information.
13. The utility model provides a system of unblanking processing which characterized in that, the system includes terminal and intelligent lock, wherein:
the terminal is used for sending a secret key acquisition request to the intelligent lock when an unlocking secret key adding instruction is detected; receiving a first unlocking secret key sent by the intelligent lock; receiving an authentication request message which is sent by the intelligent lock and carries a random character string; generating a first unlocking verification character string based on the random character string and a first unlocking secret key stored in advance; sending the first unlocking verification character string to the intelligent lock;
the intelligent lock is used for detecting fingerprint data when receiving a secret key acquisition request sent by the terminal; if the detected fingerprint data is matched with the prestored reference fingerprint data, executing an algorithm for generating a first unlocking secret key, generating the first unlocking secret key, and sending the first unlocking secret key to the terminal, wherein the first unlocking secret keys sent to different terminals are different; sending a verification request message carrying a random character string; when a first unlocking verification character string sent by the terminal is received, comparing a second unlocking verification character string generated based on a locally stored first unlocking secret key and the random character string with the first unlocking verification character string; and if the first unlocking verification character string is the same as the second unlocking verification character string, unlocking.
14. The computer equipment is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory are communicated with each other through the bus; a memory for storing a computer program; a processor for executing a program stored in the memory to perform the method steps of any of claims 1-3.
15. The computer equipment is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory are communicated with each other through the bus; a memory for storing a computer program; a processor for executing a program stored in the memory to perform the method steps of any of claims 4 to 6.
16. A computer-readable storage medium, having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, which is loaded and executed by a processor to implement the method of unlocking processing according to any one of claims 1 to 6.
CN201810555813.5A 2018-06-01 2018-06-01 Method and device for unlocking processing Active CN110555924B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810555813.5A CN110555924B (en) 2018-06-01 2018-06-01 Method and device for unlocking processing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810555813.5A CN110555924B (en) 2018-06-01 2018-06-01 Method and device for unlocking processing

Publications (2)

Publication Number Publication Date
CN110555924A CN110555924A (en) 2019-12-10
CN110555924B true CN110555924B (en) 2021-09-17

Family

ID=68734847

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810555813.5A Active CN110555924B (en) 2018-06-01 2018-06-01 Method and device for unlocking processing

Country Status (1)

Country Link
CN (1) CN110555924B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111080853B (en) * 2019-12-20 2021-02-05 珠海格力电器股份有限公司 Intelligent door lock system, unlocking method, device, equipment and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105184931A (en) * 2015-09-30 2015-12-23 上海艾迅士建筑科技有限公司 Bluetooth-based unlocking method, system and hand-held terminal and Bluetooth-based electronic lock
CN105469489A (en) * 2015-11-29 2016-04-06 林海航 Electronic locking system based on random key
CN106097494A (en) * 2016-06-03 2016-11-09 北京小米移动软件有限公司 The method for unlocking of smart lock and device
CN106548548A (en) * 2016-08-16 2017-03-29 中山微宇电器科技有限公司 A kind of method for unlocking and intelligent lock system of smart lock
CN107833317A (en) * 2017-10-20 2018-03-23 珠海华发新科技投资控股有限公司 Control of bluetooth access control system and method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100353422B1 (en) * 1999-07-07 2002-09-18 주식회사 보고테크 Method of driving control for fingerprint identification door-lock system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105184931A (en) * 2015-09-30 2015-12-23 上海艾迅士建筑科技有限公司 Bluetooth-based unlocking method, system and hand-held terminal and Bluetooth-based electronic lock
CN105469489A (en) * 2015-11-29 2016-04-06 林海航 Electronic locking system based on random key
CN106097494A (en) * 2016-06-03 2016-11-09 北京小米移动软件有限公司 The method for unlocking of smart lock and device
CN106548548A (en) * 2016-08-16 2017-03-29 中山微宇电器科技有限公司 A kind of method for unlocking and intelligent lock system of smart lock
CN107833317A (en) * 2017-10-20 2018-03-23 珠海华发新科技投资控股有限公司 Control of bluetooth access control system and method

Also Published As

Publication number Publication date
CN110555924A (en) 2019-12-10

Similar Documents

Publication Publication Date Title
CN111444528B (en) Data security protection method, device and storage medium
CN108964903B (en) Password storage method and device
CN110290146B (en) Method and device for generating shared password, server and storage medium
CN109547495B (en) Sensitive operation processing method, device, server, terminal and storage medium
CN108769992B (en) User authentication method, device, terminal and storage medium
US10601817B2 (en) Method and apparatus for providing securities to electronic devices
CN111404991A (en) Method, device, electronic equipment and medium for acquiring cloud service
CN111193702B (en) Method and device for data encryption transmission
CN110365501B (en) Method and device for group joining processing based on graphic code
CN110677262B (en) Information notarization method, device and system based on blockchain
CN111881423B (en) Method, device and system for authorizing restricted function use
CN111191227A (en) Method and device for preventing malicious code from executing
EP3933835A1 (en) Watermark information addition method and extraction method, and device
CN110555924B (en) Method and device for unlocking processing
CN111128115A (en) Information verification method and device, electronic equipment and storage medium
CN115329309A (en) Verification method, verification device, electronic equipment and storage medium
CN108683684B (en) Method, device and system for logging in target instant messaging application
CN113556734B (en) Authentication method and device
CN110968549B (en) File storage method, device, electronic equipment and medium
CN111131619B (en) Account switching processing method, device and system
CN115033864A (en) Identity verification method and system and electronic equipment
CN112564908B (en) Device registration method and device, electronic device, server and readable storage medium
CN112764824A (en) Method, device, equipment and storage medium for triggering identity authentication in application program
CN112905986B (en) Authority authentication method, device and system and computer readable storage medium
CN112528311B (en) Data management method, device and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant