CN114708681B - Intelligent padlock device - Google Patents

Intelligent padlock device Download PDF

Info

Publication number
CN114708681B
CN114708681B CN202210434254.9A CN202210434254A CN114708681B CN 114708681 B CN114708681 B CN 114708681B CN 202210434254 A CN202210434254 A CN 202210434254A CN 114708681 B CN114708681 B CN 114708681B
Authority
CN
China
Prior art keywords
module
communication module
unlocking
user
background server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210434254.9A
Other languages
Chinese (zh)
Other versions
CN114708681A (en
Inventor
陈科锦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Fortune Techgroup Co ltd
Original Assignee
Shanghai Fortune Techgroup Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Fortune Techgroup Co ltd filed Critical Shanghai Fortune Techgroup Co ltd
Priority to CN202210434254.9A priority Critical patent/CN114708681B/en
Publication of CN114708681A publication Critical patent/CN114708681A/en
Application granted granted Critical
Publication of CN114708681B publication Critical patent/CN114708681B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present disclosure relates to an intelligent padlock device, the device comprising: the system comprises at least one light energy acquisition board, a power management module, a user communication module, a safety module, a control module, a motor module and an electronic lock. The user communication module encrypts the user authentication information acquired from the terminal equipment through the security module and then sends the encrypted user authentication information to the background server, and receives an encrypted user authentication result returned by the background server. And if the security module determines that the authentication is passed based on the user authentication result, generating authentication passing information. The user communication module encrypts an unlocking request through the security module and then sends the encrypted unlocking request to the background server, and receives a request result returned by the background server. And if the security module determines that the second unlocking password sent by the user communication module from the terminal equipment is the same as the first unlocking password in the request result, an unlocking instruction is generated. The intelligent padlock device provided by the disclosure is green and environment-friendly, low in cost and high in safety and reliability.

Description

Intelligent padlock device
Technical Field
The present disclosure relates to the field of smart locks, and more particularly, to an intelligent padlock device.
Background
As technology advances, padlock applications have become more common. In the related art, padlocks are basically classified into two types, one is a common key padlock and a coded padlock, and the other is an intelligent padlock with a battery. For a key padlock, the unlocking person needs to have a key, and the password padlock needs to know the fixed password in advance. For some application scenarios, such as a metering box, a metering cabinet of a national power grid, a logistics vehicle of the transportation industry and the like, unlocking personnel are not fixed or single, and key padlocks and password padlocks are neither safe nor controllable for management. And once the key is lost or the password is lost, the lockset cannot be opened any more. While for the intelligent padlock, the problems caused by the key fixing of the key padlock and the password fixing of the password padlock are solved, as the intelligent padlock needs battery power supply, the battery needs to be replaced once the battery is out of power, so that the inconvenience is brought to the use and even more serious problems are caused. Moreover, for the application of industries such as electric power, the padlock can be used outdoors far away from a personnel gathering area, and if the intelligent padlock is used, the maintenance of the battery can cause great operation and maintenance cost waste. Meanwhile, the intelligent padlock with the battery is particularly required to be paid attention to the problems of moisture resistance, water resistance and dust resistance because of the existence of a battery bin.
The intelligent padlock in the related art brings convenience, safety and more functional experience to users, but the problems also exist, and how to provide an intelligent padlock device which is effective in power supply design, environment-friendly and does not bring extra burden to users.
Disclosure of Invention
In view of this, the present disclosure proposes a smart padlock device, comprising: the system comprises at least one light energy acquisition board, a power management module, a user communication module, a safety module, a control module, a motor module and an electronic lock;
the light energy collecting plate is used for converting collected light energy into first electric energy;
the power management module is used for supplying power to the device by utilizing the first electric energy;
the user communication module is used for establishing a first channel for communication between the user communication module and a background server through the terminal equipment under the condition of being connected to the terminal equipment, sending the public key stored by the security module to the background server, and acquiring user authentication information from the terminal equipment;
the security module is used for encrypting the user authentication information by utilizing a private key corresponding to the public key to obtain encrypted user authentication information;
the user communication module is further used for sending the encrypted user authentication information to the background server and receiving a user authentication result returned by the background server, wherein the user authentication result is encrypted through the public key;
the security module is further configured to generate authentication passing information and send the authentication passing information to the user communication module when it is determined that the private key can decrypt the user authentication result and the user authentication result is authentication passing;
the user communication module is further configured to receive an unlocking request from the terminal device, send the unlocking request encrypted by the security module with the private key to the background server, and receive a request result returned by the background server when the authentication passing information is received;
the security module is further configured to, when it is determined that the private key can decrypt the request result and the request result includes a first unlocking password, generate an unlocking instruction and control the user communication module to send the unlocking instruction to the control module if it is determined that the second unlocking password sent by the user communication module from the terminal device is the same as the first unlocking password;
and the control module is used for controlling the motor module to open the electronic lockset under the condition of receiving the unlocking instruction.
In one possible implementation, the apparatus further includes:
the monitoring module is used for monitoring the opening and closing state of the electronic lockset in real time and sending the opening and closing state to the management communication module through the control module;
and the management communication module is used for generating state change information and sending the state change information to the background server when the opening and closing states of the electronic lockset are changed.
In one possible implementation manner, the management communication module is further configured to send, when receiving the status query request sent by the background server, the current open/close status of the electronic lock monitored in real time by the monitoring module to the background server.
In one possible implementation manner, the management communication module communicates with the background server through a narrowband internet of things.
In a possible implementation, the monitoring module is further configured to send the open-closed state to the user communication module;
and the user communication module is also used for sending unlocking success information to the terminal equipment under the condition that the unlocking of the electronic lockset is determined according to the opening and closing state.
In a possible implementation manner, the security module is further configured to generate a disconnection instruction and send the disconnection instruction to the user communication module if it is determined that a connection disconnection condition is satisfied;
the user communication module is further used for disconnecting the connection with the terminal equipment under the condition that the disconnection command is received;
wherein the connection disconnection condition includes at least one of:
the private key cannot decrypt the user authentication result;
the user authentication result is that the authentication is not passed;
the private key cannot decrypt the request result;
the request result is that the request does not pass;
the second unlocking password is different from the first unlocking password.
In one possible implementation, the power management module includes: the super capacitor and the power management unit;
the power management unit is used for receiving the first electric energy;
the power management unit is further configured to perform at least one of the following operations:
in the case that the first electric energy is determined to be larger than the total electric energy required by the device, utilizing part of the first electric energy corresponding to the total electric energy after voltage stabilization treatment to supply power for the device, inputting the residual electric energy in the first electric energy into the super capacitor, wherein the super capacitor is further used for storing the received residual electric energy as second electric energy;
under the condition that the first electric energy is determined to be equal to the total electric energy required by the device, supplying power to the device by utilizing the first electric energy after voltage stabilization treatment;
powering the device with a second electrical energy stored in the super-capacitor and inputting the first electrical energy into the super-capacitor, the super-capacitor further being configured to store the received first electrical energy as a second electrical energy, if the first electrical energy is determined to be less than the total electrical energy;
and in the case that the first electric energy is not received, utilizing the second electric energy stored in the super capacitor to supply power for the device.
In one possible implementation, the security module is further configured to regenerate a new public key and a new private key after the unlocking instruction is generated, and replace the stored public key and the private key with the new public key and the new private key.
In one possible implementation, the user communication module is connected to the terminal device using bluetooth low energy.
The intelligent padlock device provided by the embodiment of the disclosure can realize dampproofing, waterproofing and dustproof, avoid battery pollution caused by using battery power supply, avoid the waste of operation cost caused by maintaining the battery, solve the problem that unlocking can not be realized when the battery is in low electric quantity, realize higher power conversion efficiency and lower power consumption, and reduce the number of components so as to adapt to the reduced board-level space, and simultaneously improve the unlocking safety and reliability.
Other features and aspects of the present disclosure will become apparent from the following detailed description of exemplary embodiments, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate exemplary embodiments, features and aspects of the present disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 illustrates a schematic structural view of a smart padlock device according to an embodiment of the present disclosure.
Fig. 2 illustrates a communication process diagram of a smart padlock device according to an embodiment of the present disclosure.
Fig. 3 illustrates a schematic diagram of a smart padlock device according to an embodiment of the present disclosure.
Fig. 4 illustrates a schematic structure of a power management module according to an embodiment of the present disclosure.
Detailed Description
Various exemplary embodiments, features and aspects of the disclosure will be described in detail below with reference to the drawings. In the drawings, like reference numbers indicate identical or functionally similar elements. Although various aspects of the embodiments are illustrated in the accompanying drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The word "exemplary" is used herein to mean "serving as an example, embodiment, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
In addition, numerous specific details are set forth in the following detailed description in order to provide a better understanding of the present disclosure. It will be understood by those skilled in the art that the present disclosure may be practiced without some of these specific details. In some instances, methods, means, elements, and circuits well known to those skilled in the art have not been described in detail in order not to obscure the present disclosure.
Fig. 1 illustrates a schematic structural view of a smart padlock device according to an embodiment of the present disclosure. Fig. 2 illustrates a communication process diagram of a smart padlock device according to an embodiment of the present disclosure. As shown in fig. 1, the smart padlock device provided by the present disclosure includes: at least one light energy harvesting board 11, a power management module 12, a user communication module 13, a security module 14, a control module 15, a motor module 16 and an electronic lock 17. The operation and principle of the device provided in the present disclosure are described below with reference to fig. 2. In fig. 2, steps S101 to S113 are performed by the user communication module 13 in the device, steps S201 to S218 are performed by the security module 14, steps S301 to S305 are performed by the backend server 19, and steps S401 to S405 are performed by the terminal device 18.
The light energy collecting plate 11 is configured to convert collected light energy into first electric energy.
The power management module 12 is configured to use the first power to power the device.
The user communication module 13 is configured to, in a case of being connected to a terminal device 18 (S401), establish a first channel for communication between the user communication module 13 and a backend server 19 through the terminal device 18 (S101), send a public key stored by the security module 14 to the backend server 19 (S102), and acquire user authentication information from the terminal device 18 (S103).
The security module 14 is configured to encrypt the user authentication information by using a private key corresponding to the public key to obtain encrypted user authentication information (S202).
The user communication module 13 is further configured to send the encrypted user authentication information to the background server 19 (S105) and receive a user authentication result returned by the background server 19. The user authentication result has been encrypted by the public key.
The security module 14 is further configured to, in a case where it is determined that the private key is capable of decrypting the user authentication result and the user authentication result is authentication pass, generate authentication pass information (S207) and send the authentication pass information to the user communication module 13 (S209).
The user communication module 13 is further configured to receive an unlock request from the terminal device 18 when the authentication pass information is received (S107). And transmits the unlocking request encrypted with the private key via the security module 14 to the backend server 19 (S109). And receives the request result returned by the background server 19.
The security module 14 is further configured to, if it is determined that the private key is capable of decrypting the request result and the request result includes a first unlock code, generate an unlock instruction if it is determined that the second unlock code from the terminal device 18 sent by the user communication module 13 is the same as the first unlock code (S216) and control the user communication module 13 to send the unlock instruction to the control module 15 (S113).
The control module 15 is configured to control the motor module 16 to open the electronic lock 17 when the unlocking command is received.
In some embodiments, the intelligent padlock device can be applied to an electricity metering box, an electricity metering cabinet and an exchange box in the power grid industry and logistics vehicles, express delivery vehicles, containers and the like in the transportation industry, and the application scene of the intelligent padlock device is not particularly limited.
In some embodiments, the light energy collecting plates 11 may be sheet-shaped structures, the dimensions of the light energy collecting plates 11 may be set according to actual needs, the length of the light energy collecting plates 11 may be 4cm-5cm, and the width of the light energy collecting plates 11 may be 2cm-3cm, for example, the length of each light energy collecting plate 11 may be 4.16cm, and the width may be 2.63. The material of the light energy collecting plate 11 may be a flexible material, and for example, the light energy collecting plate 11 may be made of a PET material having flexibility. One surface of the light energy collection plate 11 faces the inside of the intelligent padlock device, and the other surface is at least partially exposed in the external environment relative to the intelligent padlock device, so that the light energy can be collected for the ambient light. The number of light energy collection plates 11 may be set according to actual needs, for example, if it is determined that the intelligent padlock device may have 3 different faces capable of directly contacting ambient light after installation is completed, at least one, and at most three light energy collection plates 11 may be provided for the intelligent padlock device. The intelligent padlock device adopts a sealing design, so that the intelligent padlock device can realize moisture resistance, water resistance and dust resistance. And the device provides power supply through using the optical energy acquisition board, has avoided the battery pollution that leads to owing to using battery power supply, has also avoided the maintenance battery to bring the waste of running cost to and solved the battery and be in the unable problem of realizing unblanking when low electric quantity.
In one possible implementation, the user communication module 13 is connected to the terminal device 18 using bluetooth low energy. In some embodiments, bluetooth low energy may send a connectible broadcast message once every specified duration (e.g., one second) to enable terminal device 18 to access bluetooth low energy via the connectible broadcast message. After the user communication module 13 establishes a communication connection with the terminal device 18, communication can be performed. At the same time, the user communication module 13 establishes communication connection with only one terminal device 18. If the user communication module 13 has already completed the establishment of the communication connection with a certain terminal device, the connection request of other terminal devices is not received any more. If the user communication module 13 is currently establishing communication connection with a certain terminal device, the connection request of other terminal devices is not received any more until the connection request of any terminal device is continuously received after the communication connection is established.
In some embodiments, the user communication module 13 may obtain user authentication information from the terminal device 18 after establishing a communication connection with the terminal device 18. In addition, the user communication module 13 can establish a first channel with the background server 19 by means of the terminal device 18, the first channel can perform data transmission between the user communication module 13 and the background server 19, and the terminal device 18 does not perform any operation on data transmitted in the communication process, so that the privacy and the safety of communication are ensured. The user communication module 13 may send a user connection request to the security module 14 after establishing a communication connection with the terminal device 18, such that the security module 14 sends a locally stored public key to the user communication module 13 after receiving the user connection request (S201), and sends the public key to the background server 19 through the first channel via the user communication module 13 (S102).
In some embodiments, the user authentication information may be information capable of representing an identity of a user of the terminal device. The user authentication information may include a user name and a password. The terminal device 18 performs user input detection in the case of being connected to the user communication module 13, obtains a user name and a password input by the user, and transmits the user name and the password to the user communication module 13 through the connection established between the terminal device 18 and the user communication module 13 (S402). The user name can be a mobile phone number of the user, or can be other numbers and/or letters set by the user according to habits, and the user names of different users are different. In some embodiments, each user name may correspond to real name information of the corresponding user, which may improve unlocking security of the smart padlock device.
In this embodiment, after the user communication module 13 obtains the user authentication information, the user authentication information is sent to the security module 14 (S104), so that the security module 14 encrypts the user authentication information by using the private key and returns the encrypted user authentication information (S202, S203), and after the user communication module 13 sends the encrypted user authentication information to the backend server 19 through the first channel (S105), the backend server 19 may decrypt the encrypted user authentication information by using the received public key to obtain the user authentication information, and then authenticate the user authentication information according to the recorded information of the user allowed to perform the unlocking operation on the device, determine whether the user authentication information can pass through authentication, obtain the user authentication result, encrypt the user authentication result by using the public key, and send the encrypted user authentication result to the user communication module 13 through the first channel (S301, S302).
The user authentication result may be authentication pass or authentication fail. The authentication pass may refer to that the user described in the user authentication information may unlock, which is a user recorded by the background server 19 and allowed to perform an unlocking operation on the device. The authentication passes include that each piece of information in the user authentication information matches each piece of information of the openable user stored in the background server 19, respectively. For example, the condition for authentication to pass may include: the encrypted user authentication information can be decrypted by using the public key to obtain user authentication information, the user name in the user authentication information is the user name of the unlocking user stored by the background server 19, and the password in the user authentication information is the same as the password of the unlocking user; otherwise, the authentication is not passed. The person skilled in the art can set the condition for passing authentication according to the information contained in the user authentication information, which is not particularly limited in the present disclosure.
In some embodiments, after receiving the user authentication result, the user communication module 13 transmits the user authentication result to the security module 14 (S106) to receive authentication passing information or a disconnection instruction returned by the security module 14 based on the user authentication result.
If the user communication module 13 receives the authentication passing information, it may be determined that the currently connected terminal device 18 may perform an unlocking operation on the apparatus, and continue to maintain the connection with the terminal device 18, so as to receive the request sent by the terminal device 18 to the user communication module 13. Also, after receiving the authentication passing information, the user communication module 13 may transmit an authentication passing report to the terminal device 18. The terminal device 18 may display an unlock icon in the display page in the case of receiving the authentication pass report. The terminal device 18 may generate an unlock request in the case where it is detected that the unlock icon is triggered, or other trigger operation for requesting unlocking, and transmit the unlock request to the user communication module 13 (S403).
In some embodiments, after the user communication module 13 sends the received unlocking request to the security module 14 (S108), the security module 14 may encrypt the unlocking request with the private key and return to the user communication module 13 (S210, S211). The user communication module 13 transmits the encrypted unlocking request to the background server 19 through the first channel (S109). The background server 19 may decrypt the encrypted unlocking request with the received public key to obtain the unlocking request, then determine the unlocking request according to the recorded limiting information allowing the unlocking operation to be performed on the device, determine whether the unlocking request can be allowed, obtain the request result, encrypt the request result with the public key, and send the encrypted request result to the user communication module 13 through the first channel (S303, S304).
Wherein the definition information may indicate an unlocking time interval during which an unlocking operation can be performed on the device. The request result may include both request pass and request fail. The condition of passing request can be that the moment of receiving unlocking request is in unlocking time interval, otherwise, it is not passing. The present disclosure is not particularly limited as to the condition under which the backend server 19 determines that the unlock request passes.
If the request result is that the request passes, the request result further includes a first unlocking password randomly generated by the background server 19. The background server 19 may send the second unlock code to the terminal 18 by sending a short message. The first unlocking password and the second unlocking password are the same password, the password can be composed of a plurality of numbers, symbols and the like, and the password is generated when the background server determines that the request result is that the request passes. For example, there may be a combination of 6 random numbers. When receiving the second unlock code transmitted from the background server 19, the terminal device 18 detects the user input to obtain the second unlock code input by the user (S404), and transmits the second unlock code input by the user to the user communication module 13 (S405), and the user communication module 13 transmits the second unlock code from the terminal device 18 to the security module 14 (S112). In this way, the background server 19 dynamically generates the password (i.e., the first unlocking password and the second unlocking password), so that the unlocking safety can be ensured, and the problem that the unlocking password is cracked is not worry.
In some embodiments, the user communication module 13 forwards the second unlocking password to the security module 14 after receiving the second unlocking password (S112), and the user communication module 13 is further configured to forward the received request result to the security module 14 (S110), and then the user communication module 13 receives an unlocking instruction or a disconnection instruction returned by the security module 14. When the user communication module 13 receives the unlock command, the unlock command is transmitted to the control module 15 (S113).
In the present embodiment, if the user communication module 13 receives a disconnection instruction, it is determined that the currently connected terminal device 18 cannot perform an unlocking operation for the apparatus, and the connection with the terminal device 18 is disconnected. Therefore, the safety of the device can be protected, illegal unlocking of illegal users can be avoided, and unlocking of illegal users in an illegal unlocking time interval can also be avoided.
In this embodiment, the security module 14 may store a public key and a private key, where the public key and the private key may be determined based on an RSA algorithm or the like. After the public key is sent to the background server 19 through the first channel, the background server 19 can encrypt information such as a user authentication result required to be sent to the user communication module 13 through the public key and decrypt information received from the user communication module 13 through the public key in a process of communicating with the user communication module 13. The security module 14 itself may encrypt information such as user authentication information that the device needs to send to the background server 19 via the user communication module 13 using a private key and decrypt information received from the background server 19 via the user communication module 13 using the private key. In this way, the unlocking safety of the device can be ensured by encrypting and decrypting the information transmitted by the communication between the user communication module and the background server by using the private key and the public key. And the terminal equipment only provides a first channel for communication between the user communication module and the background server, and the terminal equipment does not participate in the information interaction process, so that the reliability and the safety of the communication process can be ensured.
In the present embodiment, the security module 14, upon receiving the user authentication result transmitted from the user communication module 13 (S204), determines whether the private key can decrypt the user authentication result (S205), generates a disconnection instruction if the private key cannot decrypt the user authentication result (S208), and transmits the disconnection instruction to the user communication module 13. If the private key can decrypt the user authentication result, it is continued to determine whether the decrypted user authentication result is authentication pass (S206). If the user authentication result is that the authentication is not passed, a disconnection instruction is generated (S208), and the disconnection instruction is transmitted to the user communication module 13. If the user authentication result is authentication pass, authentication pass information is generated (S207), and the authentication pass information is transmitted to the user communication module 13 (S209). In this way, the security module 14 can determine whether the user authentication result can be decrypted or not and the content of the user authentication result, so that the security of the user authentication result can be ensured, and the unlocking security and reliability can be further improved through double determination.
In the present embodiment, the security module 14, upon receiving the request result transmitted by the user communication module 13 (S212), determines whether the private key can decrypt the request result (S213). If the private key cannot decrypt the request result, a disconnection instruction is generated (S217), and the disconnection instruction is transmitted to the user communication module 13. If the private key can decrypt the request result, it is continued to determine whether the decrypted request result is passed (S214). If the request is not passed as a result of the request, a disconnection instruction is generated (S217), and the disconnection instruction is transmitted to the user communication module 13. If the request result is that the request passes, the first unlocking code in the request result is obtained, and then it is determined whether the second unlocking code is identical to the first unlocking code according to the second unlocking code received from the terminal device 18 and forwarded by the user communication module 13 (S215). If the second unlocking password is different from the first unlocking password, a disconnection instruction is generated (S217), and the disconnection instruction is transmitted to the user communication module 13. If the second unlocking code is the same as the first unlocking code, an unlocking instruction is generated (S216), and the unlocking instruction is transmitted to the user communication module 13 (S218). In this way, the security module 14 can determine whether the request result can be decrypted or not and the content of the request result, so that the security of the request result can be ensured, and the security and reliability of unlocking can be further improved through double determination.
In a possible implementation, the security module 14 is further configured to generate a disconnection instruction and send the disconnection instruction to the user communication module 13 in case it is determined that a disconnection condition is met.
Wherein the connection disconnection condition includes at least one of:
the private key cannot decrypt the user authentication result;
the user authentication result is that the authentication is not passed;
the private key cannot decrypt the request result;
the request result is that the request does not pass;
the second unlocking password is different from the first unlocking password.
In a possible implementation, the security module 14 is further configured to regenerate a new public key and a new private key after generating the unlocking instruction, and replace the stored public key and private key with the new public key and the new private key.
In some embodiments, the public and private keys stored by the security module 14 may be dynamically randomly generated, and the security module 14 replaces the stored public and private keys with newly generated public and private keys for use in the next unlock such that the public and private keys are different for each unlock. Therefore, the safety and the reliability of the communication content can be further ensured by using the dynamically updated public key and the dynamically updated private key, and the safety and the reliability of unlocking are realized.
Fig. 3 illustrates a schematic diagram of a smart padlock device according to an embodiment of the present disclosure. As shown in fig. 3, in a possible implementation manner, the apparatus may further include: a monitoring module 21 and a management communication module 22.
The monitoring module 21 is configured to monitor an open/close state of the electronic lock 17 in real time, and send the open/close state to the management communication module 22 through the control module 15.
The management communication module 22 is configured to generate status change information and send the status change information to the background server 19 when the open/close status of the electronic lock 17 is changed.
In some embodiments, the monitoring module 21 monitors the open/close state of the electronic lock 17 in real time, and may send the monitored open/close state to the control module 15 at intervals of a certain period (e.g. one second), and the control module 15 forwards the open/close state to the management communication module 22 after receiving the open/close state. When the management communication module 22 detects that the currently received open/close state of the electronic lock 17 is different from the recorded last received open/close state of the electronic lock 17, it may generate state change information and send the state change information to the background server 19.
The state change information may indicate that the device changes from a locked state to an unlocked state, or that the device changes from an unlocked state to a locked state; the state change information may also indicate a change time at which the open/close state change occurs. When receiving the status change message, the background server 19 can determine whether or not there is an abnormality in the status change based on the status change information and the recorded opening/closing record for the device. If the background server 19 determines that there is an abnormality in the state change, it may send an abnormality alert message to a terminal device such as a mobile phone or a computer having management authority, which is connected to the smart padlock device. If the background server 19 determines that there is no abnormality in the state change, the open/close record is updated.
Wherein the open-close record may be used to record the following information: change time of state change of the device; user authentication information corresponding to the change time, and a user authentication result and/or an unlocking request and a request result thereof; determining the user authentication result and/or the time information of the request result; etc. The background server 19 determining that there is an abnormality in the state change may be: the instructed state change and change time in the state change message do not match any of the open/close records.
The user of the terminal equipment such as the mobile phone and the computer with the management authority can be a worker who manages the background server, a worker who manages the intelligent padlock device, and the like. The staff can respond to the abnormal warning message in time to process in time. Therefore, a worker can timely know whether the opening and closing of the device are abnormal or not, and the abnormal opening and closing state of the device caused by man-made or device faults can be dealt with, for example, if a user uses a violence means to destructively open the electronic lockset, the abnormal warning message can timely inform the worker.
In a possible implementation manner, the management communication module 22 is further configured to send, when receiving the status query request sent by the background server 19, the current open/close status of the electronic lock 17 monitored by the monitoring module 21 in real time to the background server 19. So that the current opening and closing state of the electronic lockset can be queried by directly connecting to the background server.
In one possible implementation, the management communication module 22 communicates with the background server through a narrowband internet of things.
In some embodiments, a narrowband internet of things (Narrow Band Internet of Things, NB-IoT) is built to a cellular network. NB-IoT can be deployed directly on global system for mobile communications network (Global System for Mobile Communications, GSM), universal mobile telecommunications system network (Universal Mobile Telecommunications System, UMTS) or long term evolution network (Long Term Evolution, LTE) to reduce deployment costs. The advantages of NB-IoT are low power consumption, wide range, large connectivity.
In a possible implementation, the monitoring module 21 is further configured to send the open and closed states to the user communication module 13. The user communication module 13 is further configured to send unlocking success information to the terminal device 18 when it is determined that the electronic lock 17 is unlocked according to the open/close state.
In this implementation, the monitoring module 21 is further configured to send the open-closed state to the user communication module 13 after sending the open-closed state to the control module 15, and the control module 15 is further configured to send the open-closed state to the user communication module 13. The user communication module 13 may send unlocking success information to the currently connected terminal device 18 in case it is determined that the open-close state is received and that the electronic lock has been unlocked. The terminal device 18 may send a success alert to the user when receiving the unlocking success information, for example, pop up a prompt box indicating that the unlocking is successful on a display page of the terminal device 18.
Fig. 4 illustrates a schematic structure of a power management module according to an embodiment of the present disclosure. As shown in fig. 4, in one possible implementation, the power management module 12 may include: super capacitor 23, power management unit 24.
The power management unit 24 is configured to receive the first electrical energy.
The power management unit 24 is further configured to perform at least one of the following operations:
and under the condition that the first electric energy is determined to be larger than the total electric energy required by the device, supplying power for the device by utilizing part of the first electric energy corresponding to the total electric energy after voltage stabilization treatment. And inputting the remaining electric energy in the first electric energy into the super capacitor 23, wherein the super capacitor 23 is further used for storing the received remaining electric energy as second electric energy.
And under the condition that the first electric energy is determined to be equal to the total electric energy required by the device, supplying power to the device by using the first electric energy after the voltage stabilization treatment.
In case it is determined that the first power is smaller than the total power, the device is powered with the second power stored in the super capacitor 23. And inputting the first electric energy into the super capacitor 23, wherein the super capacitor 23 is further used for storing the received first electric energy as second electric energy.
In case it is determined that the first power is not received, the device is powered with the second power stored in the super capacitor 23.
In some embodiments, the power management unit 24 may be PMU (Power Management Unit). PMU is a highly integrated power management scheme for portable applications, i.e., integrating conventional discrete power management devices of several types within a single package, which allows for higher power conversion efficiency and lower power consumption, as well as fewer component counts to accommodate reduced board level space.
In some embodiments, the power management unit 24 may select whether to power the smart padlock device with the first power or the second power based on a magnitude relationship of the first power to a total power required by the smart padlock device. The super capacitor 23 may store part (i.e. the remaining electric energy) or all of the first electric energy input by the power management unit 24, so that the power management unit 24 uses the second electric energy stored in the super capacitor 23 to supply power to the intelligent padlock device in the case of insufficient ambient light such as cloudy days or nights.
In some embodiments, since the light energy collecting plates are used for independently absorbing light energy, the first electric energy converted by the collected light energy has a difference in current magnitude, and the like, and therefore, diodes can be arranged between the light energy collecting plates for reverse isolation.
It should be noted that although the above embodiments have been described as examples of smart padlock devices, those skilled in the art will appreciate that the present disclosure should not be limited thereto. In fact, the user can flexibly set each part of the device according to personal preference and/or practical application scene, so long as the technical scheme of the disclosure is met.
The foregoing description of the embodiments of the present disclosure has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the various embodiments described. The terminology used herein was chosen in order to best explain the principles of the embodiments, the practical application, or the technical improvements in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.

Claims (8)

1. An intelligent padlock device for use in at least one of a power grid industry, a power industry, and a transportation industry, the device comprising: the system comprises at least one light energy acquisition board, a power management module, a user communication module, a safety module, a control module, a motor module and an electronic lock;
the light energy collecting plate is used for converting collected light energy into first electric energy;
the power management module is used for supplying power to the device by utilizing the first electric energy;
the user communication module is used for establishing a first channel for communication between the user communication module and a background server through the terminal equipment under the condition of being connected to the terminal equipment, sending a public key stored by the security module to the background server, and acquiring user authentication information from the terminal equipment, wherein the user communication module is connected with the terminal equipment by adopting low-power consumption Bluetooth;
the security module is used for encrypting the user authentication information by utilizing a private key corresponding to the public key to obtain encrypted user authentication information;
the user communication module is further configured to send the encrypted user authentication information to the background server and receive a user authentication result returned by the background server, where the user authentication result is generated by the background server after decrypting and authenticating the encrypted user authentication information by using the public key and returned after encrypting by using the public key;
the security module is further configured to generate authentication passing information and send the authentication passing information to the user communication module when it is determined that the private key can decrypt the user authentication result and the user authentication result is authentication passing;
the user communication module is further configured to receive an unlocking request from the terminal device, send the unlocking request encrypted by the security module with the private key to the background server, and receive a request result returned by the background server, where the request result is generated by the background server after decrypting and verifying the encrypted unlocking request with the public key and returned after encrypting with the public key;
the security module is further configured to, when it is determined that the private key can decrypt the request result and the request result includes a first unlocking password, generate an unlocking instruction and control the user communication module to send the unlocking instruction to the control module if it is determined that the second unlocking password sent by the user communication module from the terminal device is the same as the first unlocking password;
and the control module is used for controlling the motor module to open the electronic lockset under the condition of receiving the unlocking instruction.
2. The apparatus of claim 1, wherein the apparatus further comprises:
the monitoring module is used for monitoring the opening and closing state of the electronic lockset in real time and sending the opening and closing state to the management communication module through the control module;
and the management communication module is used for generating state change information and sending the state change information to the background server when the opening and closing states of the electronic lockset are changed.
3. The apparatus of claim 2, wherein the device comprises a plurality of sensors,
and the management communication module is also used for sending the current opening and closing state of the electronic lockset monitored by the monitoring module in real time to the background server under the condition of receiving the state query request sent by the background server.
4. A device according to claim 2 or 3, wherein,
and the management communication module is communicated with the background server through the narrowband Internet of things.
5. The apparatus of claim 2, wherein the device comprises a plurality of sensors,
the monitoring module is further used for sending the open-close state to the user communication module;
and the user communication module is also used for sending unlocking success information to the terminal equipment under the condition that the unlocking of the electronic lockset is determined according to the opening and closing state.
6. The apparatus of claim 1, wherein the device comprises a plurality of sensors,
the security module is further configured to generate a disconnection instruction and send the disconnection instruction to the user communication module if it is determined that a connection disconnection condition is satisfied;
the user communication module is further used for disconnecting the connection with the terminal equipment under the condition that the disconnection command is received;
wherein the connection disconnection condition includes at least one of:
the private key cannot decrypt the user authentication result;
the user authentication result is that the authentication is not passed;
the private key cannot decrypt the request result;
the request result is that the request does not pass;
the second unlocking password is different from the first unlocking password.
7. The apparatus of claim 1, wherein the power management module comprises: the super capacitor and the power management unit;
the power management unit is used for receiving the first electric energy;
the power management unit is further configured to perform at least one of the following operations:
in the case that the first electric energy is determined to be larger than the total electric energy required by the device, utilizing part of the first electric energy corresponding to the total electric energy after voltage stabilization treatment to supply power for the device, inputting the residual electric energy in the first electric energy into the super capacitor, wherein the super capacitor is further used for storing the received residual electric energy as second electric energy;
under the condition that the first electric energy is determined to be equal to the total electric energy required by the device, supplying power to the device by utilizing the first electric energy after voltage stabilization treatment;
powering the device with a second electrical energy stored in the super-capacitor and inputting the first electrical energy into the super-capacitor, the super-capacitor further being configured to store the received first electrical energy as a second electrical energy, if the first electrical energy is determined to be less than the total electrical energy;
and in the case that the first electric energy is not received, utilizing the second electric energy stored in the super capacitor to supply power for the device.
8. The apparatus of claim 1, wherein the device comprises a plurality of sensors,
and the security module is also used for regenerating a new public key and a new private key after the unlocking instruction is generated, and replacing the stored public key and private key with the new public key and the new private key.
CN202210434254.9A 2022-04-24 2022-04-24 Intelligent padlock device Active CN114708681B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210434254.9A CN114708681B (en) 2022-04-24 2022-04-24 Intelligent padlock device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210434254.9A CN114708681B (en) 2022-04-24 2022-04-24 Intelligent padlock device

Publications (2)

Publication Number Publication Date
CN114708681A CN114708681A (en) 2022-07-05
CN114708681B true CN114708681B (en) 2023-11-21

Family

ID=82173939

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210434254.9A Active CN114708681B (en) 2022-04-24 2022-04-24 Intelligent padlock device

Country Status (1)

Country Link
CN (1) CN114708681B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750785A (en) * 2012-06-19 2012-10-24 中国工商银行股份有限公司 ATM (Automatic Teller Machine) and security authentication system of ATM
CN103971435A (en) * 2014-05-22 2014-08-06 广东欧珀移动通信有限公司 Unlocking method, server, mobile terminal, electronic lock and unlocking system
CN104508713A (en) * 2012-06-05 2015-04-08 塔普基有限公司 Method and device for control of a lock mechanism using a mobile terminal
CN206310672U (en) * 2016-12-01 2017-07-07 湖南耐普恩科技有限公司 A kind of solar airconditioning control system and air-conditioning based on super capacitor
CN108122316A (en) * 2017-12-21 2018-06-05 美的集团股份有限公司 Door lock communication system and method based on safety chip
CN108173822A (en) * 2017-12-18 2018-06-15 惠州Tcl家电集团有限公司 Intelligent door lock management-control method, intelligent door lock and computer readable storage medium
CN207909229U (en) * 2018-03-20 2018-09-25 凯拔(中国)科技有限公司 Intelligent door lock is for electric installation
CN109147103A (en) * 2018-06-29 2019-01-04 江苏恒宝智能系统技术有限公司 dynamic password intelligent unlocking system and method
CN111815815A (en) * 2020-06-22 2020-10-23 北京智辉空间科技有限责任公司 Electronic lock safety system
CN112913204A (en) * 2018-09-14 2021-06-04 品谱股份有限公司 Authentication of internet of things devices including electronic locks

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102009863B1 (en) * 2018-12-05 2019-08-12 주식회사 후본 System for entrance security and method using the same
US11330429B2 (en) * 2019-04-20 2022-05-10 Ksmartech Co., Ltd Vehicle digital key sharing service method and system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104508713A (en) * 2012-06-05 2015-04-08 塔普基有限公司 Method and device for control of a lock mechanism using a mobile terminal
CN102750785A (en) * 2012-06-19 2012-10-24 中国工商银行股份有限公司 ATM (Automatic Teller Machine) and security authentication system of ATM
CN103971435A (en) * 2014-05-22 2014-08-06 广东欧珀移动通信有限公司 Unlocking method, server, mobile terminal, electronic lock and unlocking system
CN206310672U (en) * 2016-12-01 2017-07-07 湖南耐普恩科技有限公司 A kind of solar airconditioning control system and air-conditioning based on super capacitor
CN108173822A (en) * 2017-12-18 2018-06-15 惠州Tcl家电集团有限公司 Intelligent door lock management-control method, intelligent door lock and computer readable storage medium
CN108122316A (en) * 2017-12-21 2018-06-05 美的集团股份有限公司 Door lock communication system and method based on safety chip
CN207909229U (en) * 2018-03-20 2018-09-25 凯拔(中国)科技有限公司 Intelligent door lock is for electric installation
CN109147103A (en) * 2018-06-29 2019-01-04 江苏恒宝智能系统技术有限公司 dynamic password intelligent unlocking system and method
CN112913204A (en) * 2018-09-14 2021-06-04 品谱股份有限公司 Authentication of internet of things devices including electronic locks
CN111815815A (en) * 2020-06-22 2020-10-23 北京智辉空间科技有限责任公司 Electronic lock safety system

Also Published As

Publication number Publication date
CN114708681A (en) 2022-07-05

Similar Documents

Publication Publication Date Title
US11799671B2 (en) Secure locking of physical resources using asymmetric cryptography
CN105184935B (en) It is a kind of can wechat share the blue-tooth intelligence lock system of password
CN104282058B (en) The method for unlocking of the safety intelligent lock system of band video monitoring based on bluetooth
CN104123768B (en) A kind of safe and intelligent lock system and unlocking, shut control method
CN104282062A (en) Locking and unlocking method based on safe and intelligent lock system
CN104601331A (en) System and method for monitoring and controlling charging pile
CN102155121A (en) Method and device for controlling door lock by mobile phone based on GSM
CN104299300B (en) The unblanking and close locking method of safety intelligent lock system based on NFC
CN109905869A (en) Data transmission method between a kind of charging equipment and smart machine
CN212486798U (en) Electric power sensing equipment based on block chain technology
CN211396994U (en) NB-IoT (NB-IoT) safety communication intelligent door control device
CN105957200A (en) Intelligent door
CN104282060B (en) A kind of method for unlocking of safety intelligent lock system
CN109461236A (en) A kind of intelligent lock security control method and system
CN104392525A (en) Intelligent lock system
CN109410397B (en) Unlocking method, unlocking system, intelligent terminal and intelligent terminal storage medium
CN202854931U (en) Entrance guard management system
CN114708681B (en) Intelligent padlock device
CN104282059A (en) Bluetooth-based safety intelligent lock system with video monitoring function and unlocking and locking methods
CN107554481A (en) A kind of long-range locking system of pure electric vehicle and its control method
CN107026870A (en) It is a kind of to encrypt the outdoor public Internet of Things access stack of dynamic group net safely
CN105743640A (en) Key protection module
CN109617899A (en) A kind of data transmission method and system
CN210864848U (en) Bluetooth intelligent lock device and system of electronic box
CN102833067A (en) Trilateral authentication method and system and authentication state management method of terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant