CN103793960A - Method for mobile key service - Google Patents

Method for mobile key service Download PDF

Info

Publication number
CN103793960A
CN103793960A CN201210430035.XA CN201210430035A CN103793960A CN 103793960 A CN103793960 A CN 103793960A CN 201210430035 A CN201210430035 A CN 201210430035A CN 103793960 A CN103793960 A CN 103793960A
Authority
CN
China
Prior art keywords
mobile phone
mobile
key
door lock
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201210430035.XA
Other languages
Chinese (zh)
Other versions
CN103793960B (en
Inventor
金锡焕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Irevo Inc
Original Assignee
Irevo Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Irevo Inc filed Critical Irevo Inc
Priority to CN201210430035.XA priority Critical patent/CN103793960B/en
Publication of CN103793960A publication Critical patent/CN103793960A/en
Application granted granted Critical
Publication of CN103793960B publication Critical patent/CN103793960B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a method for mobile key service. In the method, user authentication is carried out by near field communication (NFC) between a safety element and a door lock. In the method, a mobile phone periodically checks the call service area of a mobile radio communication network, and starts the NFC function based on the results of the call service area check operation; if the mobile phone is close to the door lock, a mobile key is sent to the door lock through the NFC function, and thus user authentication can be carried out.

Description

For the method for mobile key service
Technical field
The present invention relates to the method for mobile key (mobile-key) service, more especially, relate to the method for mobile key service is provided by server and mobile phone.This mobile phone is provided with safety element (the Secured Element that can be connected with Combination padlock by near-field communication; SE).
Background technology
Recently, be provided with SE such as usim card and Micro SD card mobile phones such as smart phone, this SE can store information safely, and this mobile phone also has and the communication function of this SE.Further, this mobile phone has RFID communication function as near-field communication (Near Field Communication; NFC) function.
By utilizing NFC function and SE, mobile phone can be used as to transportation card etc.In addition, because Duo Jia bank and public organizations are by utilizing NFC function to support financial service, so also can be by mobile phone as electronic payment instrument.
In addition, by utilizing NFC function that the mobile key being stored in SE is sent to Combination padlock, the mobile phone with NFC function just can be used as the verification tool for opening Combination padlock.
Summary of the invention
[technical matters]
An object of the present invention is to provide a kind of method for mobile key service, the mobile phone that the method makes to have SE and NFC function can be used as the verification tool of Combination padlock, so that user can use this Combination padlock easily.
Another object of the present invention is to provide a kind of method for mobile key service, and the method can be supported needed various services in the time using Combination padlock with mobile phone.
Another object of the present invention is to provide a kind of method for mobile key service, and the method can prevent that disabled user from using SE.
[technical scheme]
In order to realize object of the present invention, the invention provides a kind of method for mobile key service, described mobile key service is used mobile phone, door lock and server, described mobile phone has NFC function and the safety element for storing mobile key is installed, the described mobile key of described door lock based on sending by described NFC function carries out user rs authentication, and described server is by mobile radio communication network and described mobile communication.Described method comprises following each step: periodically check that described mobile phone whether can be by described mobile radio communication network and described server communication to make described mobile phone in call service region; In the time that described mobile phone is in described call service region, enable the described NFC function of described mobile phone; When described mobile phone is during near described door lock, send described mobile key by described NFC function to described door lock from described safety element; And in described door lock, receive described mobile key, and according to the result of the described user rs authentication that utilizes described mobile key to carry out, door is locked or release.
In addition, use mobile key described in the secret key encryption being generated by described door lock.
Method of the present invention also comprises by described mobile telephone registration being the member's of described mobile key service step, described server sends security procedure to described mobile phone, thereby described mobile phone moves described security procedure and makes and described server sync, described server generates unique endpoint id and described endpoint id is sent to described mobile phone, and described mobile phone is stored in the described endpoint id sending in the memory storage and described safety element of described mobile phone simultaneously.
The step of enabling the described NFC function of described mobile phone also comprises: described mobile phone is relatively stored in the endpoint id in described memory storage and is stored in the endpoint id in described safety element; And in the time that these two endpoint ids are different, described mobile phone is forbidden described NFC function.
Method of the present invention also comprises the step of registering main mobile phone, in this step, described door lock and the operation of described mobile phone are for the menu of mutual initial registration, if described mobile phone is near described door lock, described door lock generates key and generated described key and door lock ID is sent to the described safety element of described mobile phone, and described key and described door lock ID are sent to described server by described mobile phone, and key and described door lock ID described in described server stores.
Described server allows only to register a described main mobile phone for a described door lock, and permission is the described main mobile phone for multiple described door locks by a described mobile telephone registration.
Method of the present invention also comprises the step that mobile key is provided, in this step, described main mobile phone sends the phone number of the target mobile phones that will verify in described door lock to described server, described server generates described mobile key and described mobile key is sent to described target mobile phones, and described target mobile phones is stored in described mobile key in described safety element.
With the mobile key of main mobile phone and the mobile key of described target mobile phones described in same described secret key encryption.
Method of the present invention also comprises the step of deleting described mobile key, in this step, described main mobile phone sends the instruction of deleting described mobile key and the phone number of wanting the described target mobile phones of deleted described mobile key to described server, described server indicates described target mobile phones to delete described mobile key, described target mobile phones is deleted the described mobile key being stored in described safety element and is deleted and complete with backward server report, and described server is informed described in described main mobile phone and deleted and complete.
In addition, in the situation that described server does not receive the completed notice of described deletion from described target mobile phones, postpone described delete instruction, and in the time that described target mobile phones is connected with described server by described mobile radio communication network, described server sends described delete instruction again to described target mobile phones.
In addition, checking that described mobile phone is whether in the step in described call service region, if judged that described mobile phone is not in described call service region, the described mobile phone described NFC function of stopping using.
In the step of described NFC function of enabling described mobile phone, described mobile phone inspection is stored in described mobile key in described safety element and whether has the restriction in available time limit, if be preset with the described available time limit, described mobile phone is periodically connected with described server and inquires current time, and if described current time is within the default described available time limit, judge that described mobile key is effective, otherwise delete described mobile key.
Method of the present invention also comprises: the access times of storing described mobile key in the time carrying out described user rs authentication in described safety element.In the method, in the step of described NFC function of enabling described mobile phone, what whether described mobile phone inspection was preset with described mobile key can access times, can access times if be preset with the described of described mobile key, described mobile phone request is stored in the described access times in described safety element, and if described access times be less than described can access times, judge that described mobile key is effective, otherwise delete described mobile key.
Method of the present invention also comprises: that in the time carrying out described user rs authentication, in described safety element, stores described mobile key can access times.In the method, limited mobile phone only can expendable situation in the time carrying out described user rs authentication for described door lock under, described main mobile phone sends the phone number of described mobile phone to described server, described server can be predetermined to be 1 mobile key and subsequently described mobile key is sent to described mobile phone by access times described in generating, described mobile phone is stored in described mobile key in described safety element, and when described mobile phone is during near described door lock, thereby the described safety element of described mobile phone sends described mobile key to described door lock carries out described user rs authentication, so subsequently because describedly can access times become 0 and delete immediately described mobile key.
In addition, if to the input of described door lock be manually input and only can expendable disposal password, described door lock includes for showing that described disposal password is by the counter of used number of times, and for described disposal password is provided, described main mobile phone sends the phone number of the target mobile phones that will be published described disposal password to described server, the counter that described server comprises the issue order for showing described disposal password, and described server generates described disposal password and then described disposal password is sent to described target mobile phones with the form of SMS message, and if the described disposal password from described SMS is inputed to described door lock by user, described door lock only just carries out described user rs authentication in the time that the Counter Value comprising in described disposal password is greater than stored Counter Value.
Method of the present invention also comprises following each step: provide the OTP program relevant to described server to described mobile phone; Described OTP installation, in described mobile phone, and is made to described OTP program and described server sync subsequently; And in the time that described mobile phone is connected with described server, utilize described OTP program to verify.
Method of the present invention also comprises intelligently guiding step, in this step, in the time of described user rs authentication success, described door lock sends the information of the state for showing described door lock to the described safety element of described mobile phone, described safety element is stored described status information, and described mobile phone periodically carries out the poll of described safety element to read the described status information of storage, and demonstrates subsequently described status information.
Method of the present invention also comprises following each step: in described safety element, whether storage is successful for the described user rs authentication of described door lock; And check whether success of described user rs authentication by safety element described in poll periodically, and inform whether success of described user rs authentication with the form of SMS message.
Method of the present invention also comprises following each step: if described user rs authentication is successful, As time goes in described door lock, store at least a portion of the information comprising in described mobile key; Control described safety element, to ask sending the described information of being stored from described door lock; Be stored in the described information in described door lock by described safety element request; And described safety element obtains stored described information from described door lock.
Described server stores has the issue history of described mobile key, thereby described main mobile phone operation mobile key is issued the described issue history that menu request is stored, described server provides described issue historical by mobile radio communication network, issue menu and if described main mobile phone stops described mobile key, in described main mobile phone, delete described issue history.
[technique effect]
According to the present invention, owing to can using the mobile phone that SE is installed as the checking key of Combination padlock, so can improve the convenience that uses mobile phone.In addition, owing to strengthening the security verified of Combination padlock by the server of locating to be manipulated in security centre, so can prevent efficiently that disabled user from using SE wrongly.
In addition can in the display device of mobile phone, demonstrate, the mode of operation of Combination padlock.
Accompanying drawing explanation
According to the explanation of the preferred embodiment hereinafter providing by reference to the accompanying drawings, above-mentioned object, the feature and advantage with other of the present invention will become obvious.In accompanying drawing:
Fig. 1 shows of the present invention for the system of mobile key service is provided.
Fig. 2 shows the structure for the mobile key of mobile key service.
Fig. 3 shows the process flow diagram that uses the step of door lock with mobile phone.
Fig. 4 shows the process flow diagram for the member registration step of mobile key service.
Fig. 5 shows the process flow diagram for register the step of main mobile phone at door lock.
Fig. 6 shows the process flow diagram of the step of the mobile key for issuing main mobile phone.
Fig. 7 A and Fig. 7 B show for limiting the process flow diagram as the step of the use of assistant's machine of mobile key.
Fig. 8 shows the process flow diagram of the step of the validity of the mobile key expanded for checking mobile key service of the present invention.
Fig. 9 shows the process flow diagram for generating, use and delete the step of the disposable mobile key of mobile key service of the present invention.
Figure 10 shows the process flow diagram of the step for generating the disposal password in mobile key service of the present invention.
Figure 11 shows the process flow diagram of the intelligently guiding function in mobile key service of the present invention.
Embodiment
[most preferred embodiment]
Describe with reference to the accompanying drawings embodiments of the invention in detail below.
Fig. 1 shows of the present invention for the system of mobile key service is provided.With reference to this figure, of the present invention for providing the system of mobile key service to comprise mobile phone 10, door lock 20 and server 30.In addition, mobile phone 10 is provided with safety elements (SE) 15 such as usim card and Micro SD card.SE can guarantee the security of stored data.Application program of mobile phone 11 is arranged in mobile phone 10 and is driven.Equally, SE application program 16 is arranged in SE 15 to control the operation of SE 15.
Mobile key service is by open the Combination padlock 20 on the door that is arranged on office or house with mobile phone 10.Mobile phone 10 sends data by radio communication to door lock 20, comprises the content through checking, door lock 20 releases and just door can being opened subsequently and if be sent to the data of door lock 20.
Mobile phone 10 is by utilizing its input media, display device, instantaneous speech power and vibrating device etc., and the data transmission that can communicate by letter with RFID etc. by mobile radio communication network, wire/wireless the Internet, infrared communication, bluetooth provides various practical purposes.For example, the smart mobile phone with operating system is nearest popular tendency, in this smart mobile phone, various programs can be installed, thereby and can optionally move subsequently certain program and realize needed function.
In addition, mobile phone 10 is by communicating by letter to provide voice call function and data-transformation facility by mobile radio communication network and communication network base station.Thereby mobile phone 10 periodically checks and checks that this mobile phone self is whether in call service region being connected of base station, and therefore preparing at any time to provide communication service by mobile radio communication network.
For mobile key service is provided, mobile phone 10 should have NFC functions such as RFID communication function, and SE 15 is also configured to be connected with the NFC function of mobile phone 10.Owing to having NFC function, the SE 15 being built in mobile phone 10 just can for example, send some data being stored in SE 15 by radio communication to external unit (, Combination padlock).
In addition, being installed on application program of mobile phone 11 in mobile phone 10 has played and has enabled or forbidden NFC function to support the effect of mobile key service.In addition, in the time enabling NFC function, not to control by application program of mobile phone 11 but control the data from SE 15 by SE application program 16, thereby can guarantee and the communication security of external unit.
In the process that provides mobile key to serve, application program of mobile phone 11 is freely stored to some data the storer (not shown) of mobile phone 10, and utilizes the data communication function of mobile phone 10 to communicate by mobile radio communication network and server 30.
Because application program of mobile phone 11 can not directly be monitored the Content of Communication that SE communicates by letter with door lock 20 by NFC function, so application program of mobile phone is stored in communications records in SE 15 and is checked the operation history of SE 15 by periodically " poll (polling) ".
SE 15 is built in mobile phone 10 by connecting up.Therefore, SE can directly communicate by letter with application program of mobile phone 11, and can be sent data and/or receive data from door lock 20 to door lock 20 by the NFC function of mobile phone 10.In addition, SE 15 sends the information of stored event back to as the answer of the poll for application program of mobile phone 11.
In mobile key service of the present invention, mobile phone 10 is connected with server 30 by mobile radio communication network or wireless Internet communication network, thereby downloads and move one or more programs (for example, application program).The program being downloaded can be application program of mobile phone 11 and SE application program 16.
Hereinafter, will, not distinguishing " by mobile phone " control or " by application program of mobile phone " control and being referred to as under the prerequisite of " by mobile phone " control, illustrate by the operation that is arranged on the application program of mobile phone control in mobile phone.Equally, will, not distinguishing " by SE application program " control or " by SE " control and being referred to as under the prerequisite of " by SE " control, illustrate by all operations were that is arranged on the SE application program controlling in SE.
Thereby door lock 20 is arranged on a side of door and is locked and unblanked by user's operation.Door lock 20 of the present invention should have the function intercoming mutually such as RFID communication function etc. and the NFC function of mobile phone 10.Therefore, door lock 20 is analyzed the numerical information of inputting by NFC, from this numerical information, extract specific information, by extracted information is compared to carry out user authentication process with previously stored information, and carry out locking and unblanking of control gate according to the result of user authentication process.In addition, door lock 20 be provided with manual input device so that directly input character or symbol of user, and therefore can carry out user authentication process by the password of using the character inputted by user or symbol to form.
In addition, each door lock 20 is also provided with own unique ID, for example, be the sequence number of being specified by manufacturer.If inputted mobile key from SE 15 by NFC, by judging whether consistent with the previously stored information user authentication process of carrying out of some information comprising in the mobile key of inputting.Here, previously stored information can be unique ID of door lock.
In addition, for to data encryption, door lock 20 self can generate and send unique key (for example, key).In the case, door lock 2 also comprises following function: by using described unique key, communicate by letter via the RFID data that receive from SE 15 or the data that are sent to SE 15 are encrypted and are deciphered.
Server 30 is communicated by letter with mobile phone 10 by the radio telecommunication network that has utilized mobile radio communication network or wireless Internet communication network.Door lock ID and the key of server 30 in store registered door locks, and in store of verifying to door lock 20 or the information of plurality of mobile phones.
If certain mobile phone 10 request access server 30, server 30 checks whether there is the remaining operation about this corresponding mobile phone that will carry out, and carries out subsequently this remaining operation.If there is no remaining operation, server 30 is only notified the communication linkage state that activates.
In addition, for example,, if there is the operation (, being used to refer to the operation that the mobile key being stored in mobile phone is deleted) that will carry out this mobile phone, server 30 " pushes (push) " to mobile phone 10 by corresponding instruction immediately.If because the power supply of mobile phone 10 territories, out of reach or this mobile phone 10 has been closed and is caused this instruction cannot be pushed to mobile phone 10 immediately, server 30 postpones the transmission of this instruction, and in the time that connecting upper (, entering coverage), corresponding mobile phone sends again immediately after a while the above-mentioned instruction being delayed.
The mobile key using in the present invention can comprise that the door lock ID(being specified by manufacturer is such as sequence number or Mac address), store the phone number of the mobile phone of this mobile key, available time limit and/or the number of times of user rs authentication, and for the type that shows mobile key (for example, the permanent mobile key that can infinitely use, only can expendable disposable mobile key, when having preset the urgent mobile key that can open from the outside door when (forceful locking) function is locked in the pressure of door lock, available time limit and the mobile key expanded that can access times are preset, etc.) information (with reference to Fig. 2).
In order to encrypt the information that receives and send by NFC, can mobile key as above be encrypted by the key that is applicable to for example 3DES algorithm.In the time of initial registration mobile phone 10 in door lock 20, generate this key from door lock 20.This key can be stored in respectively in door lock 20, mobile phone 10 and server 30.
If needed, can change and form the information that mobile key is used, and can suitably select encryption method.
Comprise the system of above-mentioned structure by use, following mobile key service can be provided.
Fig. 3 shows the process flow diagram that uses the step of door lock in mobile key service of the present invention with mobile phone.Basically, mobile phone is periodically accessed the base station of mobile radio communication network and checks whether can realize communication function (this and mobile key service have nothing to do).The communications status being checked through is temporarily recorded in built-in buffer memory etc.
In addition,, in application program of mobile phone, check whether this mobile phone can be received data or send data (S10) to this server from the server in current call service region by mobile radio communication network.This step can by allow mobile phone periodically directly and server communicate to realize.But, preferably, with reference to checking coverage for showing with the customizing messages of the communications status of base station.In other words, although directly do not check and the communications status of server, can be undertaken in the call service region of voice communication by mobile radio communication network if mobile phone is in, just can judge that this mobile phone can at any time carry out and the communicating by letter of server.
In addition, though mobile phone not in call service region, if but this mobile phone be in specifically can with the available environment of communicating by letter communicating immediately for the server that mobile key service is provided, can be considered as this mobile phone in call service region.
If judged that mobile phone is in call service region, application program of mobile phone is enabled NFC function to make SE to carry out radio communication with external unit.But if judged that mobile phone is not in call service region, application program of mobile phone is forbidden the communication function of NFC function with the SE that stops using immediately.
Followed by step S10 before or with step S10 separatedly, application program of mobile phone is periodically controlled SE application program and is stored in the validity (S30) of the mobile key in SE by poll inspection.
First, the endpoint id being stored in application program of mobile phone is compared with the endpoint id being stored in SE.Endpoint id is to be initially at when mobile phone the information of being distributed to uniquely this mobile phone while registering in server by server.Endpoint id is stored in application program of mobile phone and SE simultaneously.By this information relatively, can determine whether to have installed to there is the new SE of another endpoint id or the SE whether still installing in the time using when mobile telephone registration on mobile phone.
In addition also judge as follows: whether preset the mobile key being stored in SE the available time limit and/or can access times, this mobile key whether as disposable mobile key or this mobile key whether as wanting deleted object.
By above steps, if judged SE and be stored in mobile key in SE effective, application program of mobile phone is just final allows to use NFC function.If they are invalid, the NFC function of stopping using.
Carrying out above-mentioned control (, inspection to call service region and by utilizing the inspection of polling operation to validity) time, if mobile phone near door lock to attempt to open door, the NFC function of mobile phone can respond the electromagnetic energy being generated by this door lock, therefore NFC be activated between door lock and SE (S40).SE sends stored mobile key to door lock, thereby carries out user rs authentication (S50).The mobile key that door lock analysis is sent, and according to whether consistent with previously stored information success or the failure (S60) of judging user rs authentication of this mobile key.If thereby user rs authentication success judges that this mobile phone belongs to validated user, door lock is by door release; If user rs authentication failure, door lock keeps its locking state.
Mobile key at least comprises door lock ID.Be stored in mobile key in mobile phone by secret key encryption.Door lock utilizes the decryption device in it that mobile key of the secret key encryption by this SE oneself of sending from SE is deciphered.And, in the time that the ID of the door lock ID and door lock oneself that comprise in the mobile key after deciphering is consistent, judge that user rs authentication is successfully.
In addition,, in door lock, if judged that the information of sending from SE is by the secret key encryption the same with being stored in key this door lock, regardless of the type/content of the information sending over, can think user rs authentication success.
In addition, in door lock, if by the key of this door lock oneself or the decipherment algorithm of this door lock oneself by by the decrypts information of the inputs such as keyboard, and this information has also shown specifically can validation value, can be considered as user rs authentication success (this that is to say that the user that will illustrate after a while uses keyboard directly to input the situation of disposal password).
Serve according to the mobile key of being realized by above-mentioned these steps, only when having judged that mobile phone is in call service region and while also having judged that the mobile key being stored in mobile phone is effective, just attempt carrying out user rs authentication for door lock.
As mentioned above, owing to using mobile key in call service region, so can guarantee the security of mobile key.For example, when the mobile key in the SE that is stored in mobile phone is when wanting deleted object and sending the instruction of deleting this mobile key by mobile radio communication network from server subsequently, if mobile phone cuts out, this delete instruction may not be sent to this mobile phone.In the case, this mobile key may reside in this mobile phone and want this deleted mobile key to be illegally used.But, according to the present invention, because judge that all the time mobile phone is whether in call service region, and and if only if mobile phone can attempt carrying out user rs authentication in call service region time, so mobile phone is just forced to receive the instruction (, delete instruction) from server, so, just can judge that the mobile key being deposited in mobile phone is not to want deleted object, because this mobile key is still effective.
In the present invention, even when mobile phone is not in call service region and while entering again call service region subsequently, or in the time that mobile phone cuts out and starts shooting again subsequently, mobile phone is forced access for the server of mobile key service is provided immediately, and checks and whether be preset with the operation about stored mobile key that will carry out subsequently.
Then, will illustrate in the member registration step for providing the method for mobile key service to serve for mobile key of the present invention, in this step, in server, register his/her mobile phone and prepare cellular service through the user of checking.Fig. 4 shows the process flow diagram for the member registration step of mobile key service.
First, user is connected to server by mobile phone, and input user ID, connection password and userspersonal information are to be registered as the member (S11) in mobile key service.Here, mobile phone can be informed from trend server phone number and the operating system of himself.
Server receives user ID, connects password and userspersonal information etc., carries out member registration and provides OTP(One Time Programmable with the mobile phone of rear line) program (OTP solution) is (S12).Offer the OTP program of mobile phone and the OTP program of server is synchronizeed.Therefore, in the time that mobile phone is connected to server, just carry out OTP checking by OTP program, thereby connection safety is provided.
Server is to the unique endpoint id of registered handset allocation (S13).The endpoint id of distribution is stored in (S14 and S15) in this mobile phone and SE by mobile phone simultaneously.This endpoint id is used as after a while for judging whether this SE is still arranged on the information of the mobile phone of initial registration.
Wanting to use in every mobile phone of mobile key service of the present invention, all must carry out the member registration step for mobile key service.
Then, will illustrate for registering mobile phone at door lock using the step as main mobile phone (master phone).Fig. 5 shows the process flow diagram for register the step of main mobile phone at door lock.
First, in door lock, move mobile telephone registration menu, and also in mobile phone, move door lock registration menu (S21).In mobile key service of the present invention, in a door lock, can register a mobile phone.Registered mobile phone can be used for controlling the main frame of the various functions of mobile key service.
Then,, in the each registration menu of operation, user makes mobile phone near door lock, sets up NFC(S22 thus between door lock and mobile phone).
Door lock sends the door lock ID being stored in this door lock to SE.In addition, door lock is created on the key that will use while sending any data (or encrypting mobile key) and subsequently key is sent to SE(S23).SE is sent to received door lock ID and key mobile phone (, application program of mobile phone) and they is not stored in this SE.Received information is sent to server by mobile phone.Server is checked the content from the information of corresponding door lock, checks whether in this door lock, registered new main mobile phone, and the information (S24) that storage is sent subsequently.Here, mobile phone can divide together with the title of corresponding door lock and sends by above-mentioned information and with helping user area, and server also can be stored the above-mentioned information of classification by name.Described title for example can be appointed as " my house ", " dormitory " and " office " etc.
A mobile phone can be set to the main mobile phone for multiple door locks.In the time that user registers in multiple door locks, above-mentioned NAPT function makes user can distinguish easily the mobile key of each door lock.
In addition, because a door lock can only be assigned with a main mobile phone, so registered certain main mobile phone, the information that can delete this registered main mobile phone if server has been determined in corresponding door lock.
Then, by explanation for being distributed on the step of the mobile key in the main mobile phone that door lock registers.Only have the main mobile phone by using previous registration can issue mobile key.In addition,, in the time that main mobile phone is registered as the member in server or is registered in door lock, mobile key is not self to be distributed to this main mobile phone by this main mobile phone.Therefore, the mobile key of main mobile phone is also issued from server via mobile key issuing steps.Main mobile phone can indicate server that mobile key is distributed to certain mobile phone.Thereby main mobile phone can select himself as the object that will be published above-mentioned mobile key, thereby above-mentioned mobile key can be distributed to this main mobile phone (with reference to Fig. 6).
Fig. 6 shows the process flow diagram of the step of the mobile key for issuing main mobile phone.First, thereby mobile key is issued in the request of main mobile phone access server, and meanwhile, input will be published the phone number (S31 and S32) of the arbitrary target mobile phone of above-mentioned mobile key.Server generates and comprises various information such as door lock ID at interior mobile key and utilize key that this mobile key is encrypted to (S33).Meanwhile, server sends PUSH message (push message) and inquires whether this mobile phone will receive this mobile key to target mobile phones.This inquiry is used for judging whether user will receive the intention of mobile key, and be used for checking target mobile phones whether be in can with the call service region of server communication in.In addition, when receive from server PUSH message time, target mobile phones operation application program of mobile phone.
If target mobile phones agrees to receive mobile key, server just sends the mobile key (S34) generating.In the above-mentioned application program of mobile phone of operation, target mobile phones can receive mobile key (S35), and received mobile key is stored in (S36) in SE.The storage of this mobile key of target mobile phones announcement server completes, and then server is also notified main mobile phone: mobile key has been released to target mobile phones.
Can use immediately target (or object) mobile phone that stores mobile key to open door lock.
Then, explanation is released to the mobile key of certain mobile phone and prevents that thus this mobile phone is by the step of the checking of door lock for deleting.Be merely able to delete by main mobile phone the operation of mobile key.
Because door lock checks in order to verify the door lock ID being stored in mobile key, so just verify and must delete the mobile key in the SE that is stored in mobile phone for limited subscriber.In addition, because main mobile phone can not be directly and mobile communication to be prohibited, so must carry out the instruction of deleting mobile key by server.
In addition also must consider because the object of specific communication condition or malice makes mobile phone not receive delete instruction, and therefore mobile key does not have deleted immediately situation.
With reference to Fig. 7 A and Fig. 7 B, the step for deleting mobile key is described.Fig. 7 A shows in the time that thereby mobile phone communicates with server in call service region for deleting the conventional steps of mobile key.
Main mobile phone sends the request of deleting mobile key and the phone number (S41 and S42) of wanting the target mobile phones of deleted this mobile key to server.Server sends and deletes immediately the instruction that is stored in the mobile key in SE to target mobile phones.Target mobile phones receives this delete instruction by mobile radio communication network and indicates subsequently SE application program to delete mobile key and the relevant information of storing.SE application response is in the delete instruction of mobile phone and delete the information (comprising mobile key) that is stored in SE (S44).Then, notification server and this deletion action of main mobile phone complete.
In addition, will illustrate target mobile phones due to not in call service region thereby can not with the situation of server communication.For example; the antenna that communication issue, target mobile phones shutdown, target mobile phones has temporarily occurred not in call service region, in target mobile phones when target mobile phones is removed, the communication function of target mobile phones breaks down, SE separates with target mobile phones, target mobile phones in having stopped offline mode or the target mobile phones shutdown etc. of communication function, just there will be target mobile phones cannot with the situation of server communication.
In mobile key of the present invention service, the application program of mobile phone of mobile phone is periodically accessed the operating system of this mobile phone, thereby checks that this mobile phone is whether in call service region, and when mobile phone is not in call service region just inactive NFC function.Therefore, in the time that mobile phone is not in call service region, just cannot carry out user rs authentication.Thereby, can tackle the situation of the communication function of the mobile phone of having stopped using for wrong object.
In addition, when utilize mobile key service of the present invention to attempt to carry out for door lock user rs authentication time, must move application program of mobile phone, and, in the time of initial launch application program of mobile phone, this application program of mobile phone is connected to server to check the event about the mobile key of being stored of not yet carrying out that whether exists.In addition,, when having confirmed mobile phone not in call service region and while entering again call service region subsequently, application program of mobile phone is connected to server immediately to check the event about the mobile key of being stored that whether exists.Therefore, at least, in the time carrying out user rs authentication for door lock, mobile phone must be unlocked to make it possible to confirm by mobile radio communication network the validity of mobile key, and prevents that thus mobile key from maliciously being used.
The mobile key delete step that can support above-mentioned this function is described with reference to Fig. 7 B.In the time that the request that is stored in the mobile key in target mobile phones is deleted in main mobile phone transmission (S41 and S42), server sends the instruction (S43) of deleting mobile key to target mobile phones immediately.
Here, if target mobile phones does not receive delete instruction, and server do not receive and deletes the completed message of mobile key (S45) from target mobile phones, and server is informed the failure of main mobile phone deletion action.Meanwhile, server postpones this delete instruction and prepares to send (S46) again.
Then,, in the time that target mobile phones enters call service region, whether target mobile phones inquiry server there is any instruction being delayed.Server sends above-mentioned delete instruction (S47) immediately again.Target mobile phones is deleted mobile key according to this delete instruction indication SE, and SE deletes mobile key (S48) subsequently.Inform that to server delete instruction completes, and this is reported to main mobile phone by server.
The various functions that hereinafter, explanation mobile key service of the present invention can be provided.According to mobile key service of the present invention, a mobile phone can be stored various types of mobile keys for one or more door locks.Each mobile key can be assigned with the title of being specified by the user of mobile phone, and this user can distinguish multiple mobile keys by these titles.Application program of mobile phone can be by selecting the one in above-mentioned multiple mobile key by these titles.If user has selected the one in above-mentioned multiple mobile key, check the validity of selected mobile key by poll, to make selected mobile key can be used to checking.
Mobile key service of the present invention can provide has preset available dates and time limit and the mobile key expanded that can access times.In the situation that use can be expanded mobile key, only in having confirmed this validity that can expand mobile key, can carry out user rs authentication.Illustrate that below with reference to Fig. 8 inspection can expand the step of the validity of mobile key.
Extendible mobile key comprises available time limit and/or can access times, and comprises the type (with reference to Fig. 2) of this mobile key.
First,, if user has selected to be stored in the mobile key expanded in mobile phone, whether application program of mobile phone checks this available time limit that can expand mobile key and can expire by access times.
Can access times (S51) if preset, what application program of mobile phone can be expanded mobile key to SE inquiry can access times.In addition, SE is by can be stored in required memory storage by access times about whole mobile keys.Application program of mobile phone from SE application program receive can expand mobile key can access times, and subsequently by its with can expand in mobile key, comprise can compare (S52) by access times.
If volume residual that can access times is 0, thereby application program of mobile phone forbidding NFC function stops the trial of carrying out user rs authentication, and forbidding is stored in the mobile key expanded in SE or deletes immediately this and can expand mobile key (S59).
If volume residual that can access times is more than 1, application program of mobile phone is enabled and can be expanded mobile key, to use this can expand mobile key in user rs authentication.
In user rs authentication, use after this can expand mobile key, the access times of corresponding mobile key increase by 1, and are stored in subsequently in SE.
As an alternative, application program of mobile phone can allow and can expand can automatically reducing by access times of comprising in mobile key.Here,, if this can access times be 0, application program of mobile phone can be controlled SE and can expand mobile key automatically to delete this.In the case, due to can access times being 0 moment has been deleted mobile key from SE, so fundamentally stoped the trial of carrying out user rs authentication.
Equally, can preset the available time limit (S55) that can expand mobile key.In the case, if application program of mobile phone periodically checks by poll whether the mobile key being stored in SE is the mobile key expanded of having preset the available time limit, and mobile phone is to server interrogates current time (S56).Certainly, mobile phone can have the precision clock of oneself.But, because user can change the current time in this mobile phone, so mobile phone is preferred to server interrogates current time.
If application program of mobile phone receives current time from server, application program of mobile phone checks that this current time is whether in mobile key in default time limit (S57 and S58).If it is expired that this available time limit does not have, mobile phone judges that this mobile key is effective, makes it possible to carry out user rs authentication (S54).If this available time limit is out of date, application program of mobile phone control SE can expand mobile key (S59) to delete immediately this.
By checking the step of the validity that can expand mobile key, the validity of the mobile key of managed storage in mobile phone more efficiently.For example, main mobile phone can set certain mobile phone make only can to carry out pre-determined number for the user rs authentication of door lock or only can in intended duration, carry out the user rs authentication for door lock, therefore can strengthen the security of mobile key.
Mobile key service of the present invention can provide only can expendable disposable mobile key.With reference to Fig. 9 A and Fig. 9 B, the step for providing, use and delete disposable mobile key is described.
Fig. 9 A shows the step for disposable mobile key is provided.First, main mobile phone sends the request of issuing disposable mobile key and the phone number (S61 and S62) that will be published the target mobile phones of this disposable mobile key to server.Server generates the mobile key including door lock ID, adds the information for showing this disposable mobile key, then uses key that this mobile key is encrypted to (S63).It can access times be mobile keys expanded of 1 that disposable mobile key can be formed.
Disposable mobile key after encryption is sent to target mobile phones (S64).In operation application program of mobile phone, target mobile phones receives this disposable mobile key and is stored in (S65 and S66) in SE.
In addition,, if user has selected this disposable mobile key for use, what the application program of mobile phone of target mobile phones periodically checked stored disposable mobile key by poll SE can access times.
Then, if the target mobile phones with this disposable mobile key, near door lock, is carried out user rs authentication according to the step of Fig. 9 B.What first, application program of mobile phone periodically checked the characteristic of this disposable mobile key and this disposable mobile key by poll SE can access times (S67).If also have can access times for residue, be considered as this disposable mobile key and also do not used, and therefore do not delete but retain this mobile key.If have the target mobile phones of this disposable mobile key near door lock (S68), this disposable mobile key being stored in SE is sent to door lock (S69), and by carrying out user rs authentication (S70) with this disposable mobile key.
In addition, if by periodic poll confirmed this disposable mobile key can access times be that 0(is in step S67), delete immediately corresponding mobile key (S71 and S72).
So, in SE, can not retain used disposable mobile key, even if therefore target mobile phones is near door lock, also can be identified as not existing the mobile key that is used for carrying out user rs authentication.
With reference to Figure 10, will illustrate in mobile key service of the present invention for the step of disposal password is provided.Disposal password only can use once, and disposal password is manually to input by the keyboard of door lock.Under following situations, can use above-mentioned this step: in the time that specific mobile phone does not have NFC function or the program (application program) providing in mobile key service of the present invention is not provided, registered main mobile phone allows specific user only to carry out a user rs authentication by directly inputting this password to door lock.In the case, user must have the mobile phone that can be connected to mobile radio communication network, and preferably issues above-mentioned password by server to target mobile phones.
First, be connected to server through the user (primary user) of checking by main mobile phone, request is issued disposal password and the phone number (S81 and S82) that will be published the target mobile phones of this disposal password is provided.Order (numbering) the Information generation authorization information of server by utilizing door lock ID and the disposal password that will be generated, then utilizes key that this authorization information is encrypted, thereby has completed the generation of disposal password.Because the disposal password generating will be directly inputted into door lock by user, so this disposal password is made up of multiple numerals or symbol.Generated disposal password is sent to target mobile phones (S83) with the form of SMS message.The user of target mobile phones confirms this message, and subsequently by keyboard directly by this Password Input to door lock.
If inputted disposal password, door lock utilizes key by this disposal password deciphering, and if the authorization information that comprises for example, with to be stored in information in door lock consistent (in the information after deciphering, two door lock ID are consistent with each other), just be considered as user rs authentication, and subsequently just by door release.
In addition, the server that generates disposal password maintains the order of issuing order (numbering) information (Counter Value) for showing described disposal password, and door lock also maintains for showing that described disposal password is by the Counter Value of used number of times (or by order information that used disposal password comprised).
Under this state, the disposal password that door lock analysis is inputted by user and extract Counter Value (order information), and only in the time that extracted Counter Value is greater than stored Counter Value (order information), just carry out user rs authentication subsequently.
That is to say, the Counter Value extracting compares stored Counter Value and more greatly just means that the disposal password of being inputted by user utilizes maximum at present Counter Value to regenerate.Thereby, can prevent that disposal password is used again.
With reference to Figure 11, by the intelligently guiding function (smart guide function) providing in explanation mobile key service of the present invention.Intelligently guiding function is for providing the countermeasure in the time that mobile phone detects that unusual condition appears in door lock.
First, if mobile phone utilizes the mobile key of SE to attempt carrying out the user rs authentication (S91) for door lock, and user rs authentication success (S92), door lock sends the information (S93) for showing this door lock oneself state to SE.The status information (S94) that SE storage is sent.
Then, application program of mobile phone periodically carries out the poll of SE, and mobile phone is by the status information output being stored in SE, confirms thus the state (S95) of door lock.Mobile phone demonstrates the countermeasure corresponding with the state of door lock (S96).User can process unusual condition with reference to shown countermeasure out.
For example, the status information of door lock comprises: enforcement, the latch locked (dead bolt) of the detection of the low-voltage of battery, the pressure locking function of door lock abnormal etc.
Realize the condition precedent of mobile key service
Only under the state for the application program of mobile phone of mobile key service, can use mobile key service of the present invention in operation.In addition, only have and in call service region, could use mobile key service of the present invention when mobile phone.If mobile phone not in call service region, mobile key service be prohibited (by stop using NFC function or forbidding mobile key make to carry out user rs authentication).Main mobile phone can be assigned to a user who is registered as member in server, and be merely able to by main mobile phone, mobile key is distributed to certain mobile phone or delete mobile key from certain mobile phone.
The safe class of the each door lock of server admin, and in mobile key service, be created on randomly by door lock the key using in 3DES algorithm when initial registration when door lock, and subsequently this key is stored in door lock and server simultaneously.The expense of mobile key service can pay by the micropayment (micropayment) being undertaken by mobile phone.OTP solution can be used using the white hat instrument as for preventing the log-on message that cracks member (white hat hacking tool).
Could use mobile key service of the present invention owing to only having in the time moving application program of mobile phone and/or SE application program, so can only provide mobile key service to the users that are registered as member.And all users can be connected to server by OTP solution.
If a user separates the SE registering in door lock with mobile phone, and the SE subsequently this being separated is arranged in other mobile phone, be stored in so endpoint id in this SE separating and to be stored in endpoint id in the application program of mobile phone of other mobile phone different, therefore can not use mobile key service.In the situation that SE is reinstalled in other mobile phone, user is connected to server and receives the previously stored endpoint id about door lock, makes the endpoint id of SE and the endpoint id of application program of mobile phone consistent with each other.As an alternative solution, user can delete the information being previously stored in server and the information providing from server can be provided subsequently.
The installation of the solution of mobile key service
In order to carry out mobile key service by certain mobile phone, must install and move the various application programs for mobile key service is provided.Application program of mobile phone has played identification and has been installed on the SE in mobile phone and SE application program is mounted to the effect in SE.
Registration in mobile key service
User is arranged on application program of mobile phone and SE application program in mobile phone, is connected to server by this application program of mobile phone, and in this server, inputs member ID, password and user name subsequently.Here, the application program of mobile phone of mobile phone sends automatically information such as the type of the operating system of phone number and mobile phone, and to complete member registration step, and server is registered this user's mobile phone in mobile key service.
Then, server sends OTP solution so that server is synchronizeed with application program of mobile phone to mobile phone.In addition, server generates about unique endpoint id of mobile phone also provides this endpoint id to mobile phone subsequently.Mobile phone is stored in this endpoint id in the internal memory and SE of this mobile phone.
Carry out mobile key service by application program of mobile phone
If user has moved the application program of mobile phone being arranged in mobile phone, just can carry out mobile key service.For the authority of managing mobile phone application program, can optionally distribute PIN code.
If user is by user ID and Password Input to mobile phone, application program of mobile phone is carried out OTP solution to generate OTP identifying code, and subsequently the OTP identifying code of the ID of input and password and generation is sent to server.
In door lock, register main mobile phone
In door lock, move main mobile telephone registration menu, and also in the application program of mobile phone of the mobile phone that will use as main mobile phone, move door lock registration menu, and subsequently by this mobile phone near door lock.
Door lock generates key randomly, and the key of door lock ID and generation is sent to above-mentioned close mobile phone.Door lock receives for showing that the completed ACK(of above-mentioned reception confirms to reply from mobile phone) information, and store subsequently the key generating, thus complete the registration of main mobile phone.
Application program of mobile phone sends key and door lock ID to server.Whether the door lock ID that server inspection is sent registers, and subsequently check result is informed to application program of mobile phone.If determined that the door lock ID sending is to server registration mistake, an option is selected in application program of mobile phone request: use chartered mobile key or delete existing mobile key in server.
This example also can be applicable to main mobile phone and loses, moves and change the various situations such as door lock.
Issue mobile key by main mobile phone to certain mobile phone
In the application program of mobile phone of main mobile phone, select for issuing the menu of mobile key to certain mobile phone, and input the phone number of above-mentioned certain mobile phone.If needed, after carrying out micropayment, application program of mobile phone sends phone number the request of above-mentioned certain mobile phone and issues mobile key.Here, the application program of mobile phone for mobile key service is provided must also be installed and move to above-mentioned certain mobile phone.
Server sends PUSH message to above-mentioned certain mobile phone, and whether inquiry receives mobile key subsequently.If the user of above-mentioned certain mobile phone agrees to the issue of mobile key, the operating system of above-mentioned certain mobile phone can be moved application program of mobile phone automatically, and this application program of mobile phone is connected to server immediately to receive mobile key.The application program of mobile phone indication of above-mentioned certain mobile phone is stored in the mobile key receiving in SE by SE application program, and this storage of notification server subsequently completes.This is reported to main mobile phone by server.
Delete the mobile key of assistant's machine (sub-mobile phone)
In order to delete the mobile key of the assistant's machine that is released to (its have want deleted mobile key) by main mobile phone, the phone number of assistant's machine and the request of deleting mobile key are sent to server by the application program of mobile phone of main mobile phone.Server sends delete instruction to assistant's machine.According to this delete instruction, the application program of mobile phone control SE application program of assistant's machine is stored in the mobile key in SE with deletion, and informs that with backward server this deletion completes.Server receives completing notice and being informed subsequently main mobile phone of this deletion.
In addition, if server does not receive the above-mentioned notice that completes, the instruction of server delayed deletion from assistant's machine.Then,, if communicated between assistant's machine and server, server just sends delete instruction immediately more again.
Extra function
Table 1
Figure BDA00002340386600221
Permanent mobile key
Permanent mobile key can ad infinitum be used until main mobile phone has changed this mobile key or application program of mobile phone has re-registered door lock.Permanent mobile key only can be published by main mobile phone.In addition, permanent mobile key can be released to main mobile phone and assistant's machine.
Disposable mobile key
Disposable mobile key only can use once for specific door lock.Disposable mobile key only can be published by main mobile phone, and also can be released to main mobile phone and certain mobile phone.
When the mobile phone that has a disposable mobile key when use has carried out user rs authentication, forbidding or delete this disposable mobile key being stored in SE immediately.
In SE, can be provided with the information for representing whether issued disposable mobile key is used, therefore application program of mobile phone can periodically check whether issued disposable mobile key is used.
Extendible mobile key
Can expand mobile key and only can be published by main mobile phone, and also can be released to main mobile phone and certain mobile phone.
Issue can expand mobile key time to server request when main mobile phone, can preset can expand mobile key the available time limit, what day is available and/or can access times.
If judged that the mobile key that will use is to expand mobile key, mobile phone is connected to server and request current time with this current time relatively and default available time limit.If the time limit is out of date, can expand mobile key disabled or deleted immediately.Or, mobile phone utilization be stored in information in SE check remaining can access times.
Urgent mobile key
Urgent mobile key is used in the time that the pressure locking function of door lock is activated from the outside by door release.Urgent mobile key only can be published by main mobile phone, and also can be released to main mobile phone.The same with disposable mobile key, urgent mobile key is also set to only use once.
In addition, urgent mobile key can be set to only have in the time forcing locking function to be activated and just use.
In order to remove the pressure locking function of door lock with urgent mobile key, door lock has identified emergency mobile key and removes from the outside the function that pressure is locked.
In the time that urgent mobile key is published, in SE, be provided with the information for showing whether this mobile key is used, and application program of mobile phone periodically carries out the poll of this information, thereby judge whether urgent mobile key is used.If urgent mobile key is used, application program of mobile phone is deleted this urgent mobile key immediately.
Disposal password
Disposal password only can be published by main mobile phone, and also can be released to main mobile phone.If disposal password is released to main mobile phone, the user of main mobile phone directly informs other user that will use this password this disposal password.
If disposal password is distributed to certain mobile phone by main mobile phone request server, server generates and comprises door lock ID sum counter value at interior mobile key, and uses this mobile key of secret key encryption, thereby generates the password being made up of multiple numerals or symbol.Generated disposal password is sent to mobile phone with the form of SMS message.
If the user of mobile phone directly by Password Input to door lock, door lock utilizes the password that secret key decryption is inputted, and utilizes subsequently door lock ID sum counter value to verify the password after deciphering.
Because the Counter Value keeping in door lock has increased, therefore used disposal password cannot be used again.
Mobile key history
For example, if primary user wants to check the mobile key with desired door lock and serve relevant history (, the issue of mobile key and deleting history), the application program of mobile phone of main mobile phone is to this historical information of server request.Server is searched historical information and is sent it to subsequently main mobile phone.Application program of mobile phone is presented at the historical information of sending on the display of main mobile phone.
If primary user has checked historical and this inspection that is through with, application program of mobile phone is deleted shown information.
Audit in real time
If mobile phone attempts carrying out user rs authentication for door lock, or user rs authentication success or failure, application program of mobile phone for example can be predetermined to be such operation in the mode of SMS message, from trend predetermined hand machine (, main mobile phone) report.
All audits (Entire Audit)
Door lock is provided with RTC, thus the information of storage " when ", " who " and " having carried out which type of operation ".That is to say, because mobile key comprises phone number, carried out user rs authentication so just can know any mobile phone.
The application program of mobile phone of mobile phone is based on compensating when the moment that starts to download while entering history (entrance history) time comprising in historical information, and is presented at subsequently on screen.If selected all audit menus in the application program of mobile phone of main mobile phone, by application program of mobile phone default all audit modes in SE application program.Then, if main mobile phone near door lock, main mobile phone receives the historical information that enters being stored in door lock successively by NFC.Predetermined number and this information that door lock sends this information are recorded in SE.Then, the application program of mobile phone of main mobile phone is exported and is shown the information being recorded in SE.By repeatedly carrying out this operation, mobile phone just can obtain and enter historical information from door lock.
Intelligently guiding
If certain mobile phone has successfully passed through the user rs authentication for door lock, door lock sends the information of the internal state that represents door lock to the SE of this mobile phone, and SE application program is stored in this internal state information in SE.Then, by poll SE application program periodically, application program of mobile phone obtains the internal state information of storing, and demonstrates this internal state information and countermeasure thereof by mobile phone, thus guiding user.
The internal state information of being reported by door lock comprises: fault that enforcement, the latch of the detection of the low-voltage of battery, the pressure locking function of door lock are locked etc.
Lose the situation of main mobile phone
Can only register a main mobile phone for certain door lock.Thereby if main mobile phone is lost, the user of main mobile phone just must directly ask to delete the mobile key in the main mobile phone that is stored in loss to service supplier.Service supplier sends this request to the keeper of server, and keeper can delete the mobile key being stored in server thus.Meanwhile, send the instruction of deleting mobile key to the main mobile phone of losing.Thereby if the main mobile phone of losing in call service region and server communication, main mobile phone is deleted mobile key immediately.Thereby main mobile phone can not carry out the user rs authentication for door lock again.And it can not be re-used as main mobile phone and use.
Primary user installs the application program of mobile phone for mobile key service in new cell-phone, thereby and moves subsequently SE application program and carry out registration step.Therefore, provide new mobile key, and this mobile phone can be used as main mobile phone.In the case, owing to still having retained the existing mobile key being stored in server, so user can receive and use this existing mobile key.
Lose the situation of assistant's machine
Lost his/her passing through mobile phone (assistant's machine) that main mobile phone is published mobile key in the case of user, the phone number of the mobile phone (assistant's machine) of loss is sent to server by main mobile phone.Server sends the instruction of deleting mobile key to the mobile phone of this loss, and if received and completed notice from this mobile phone, this step finishes.But, if the mobile phone of losing not in call service region, or the power-off of mobile phone of losing, the and therefore mobile phone of this loss is not carried out delete instruction, server delayed deletion instruction.When the mobile phone of losing is during by mobile radio and server communication, send again delete instruction to the mobile phone of loss, thereby complete delete step.
Change the situation of door lock
In the situation that door lock is replaced by new door lock, can think that the main PCB of door lock is replaced, this is corresponding to the situation that has changed the door lock ID registering in server and main mobile phone.In the case, form owing to having changed the door lock ID that mobile key is used, so must carry out all upgrading the full detail including mobile key and key in the server of user rs authentication, main mobile phone and all mobile phones at the door lock for having changed.
Remove the situation to new house
Main mobile phone can carry out the step for registering new door lock.
But, because this door lock may previously be registered by previous resident family in server, so the main mobile phone of server interrogates is use existing mobile key or issue new mobile key, and carry out subsequently the request of main mobile phone.
SE is moved to the situation in other mobile phone
In mobile key of the present invention service, only have when the SE of mobile phone and application program of mobile phone are interconnective time, can normally serve.Therefore,, if SE is removed and reinstalls to other mobile phone not using in the time of registration step, the SE that removes is disabled and therefore can not in mobile key service, use.
In other words the endpoint id, distributing in the time of registration step is stored in SE and application program of mobile phone.Therefore,, if this SE is removed and is reinstalled in other mobile phone, be stored in endpoint id in the SE reinstalling different with the endpoint id of application program of mobile phone that is stored in other mobile phone.In the case, NFC function is deactivated, and has therefore stoped the user rs authentication for door lock.Thereby, in the situation that SE is moved to other mobile phone, must again in server, registers and receive new endpoint id, and also upgrade the endpoint id being stored in SE.
The situation that the instruction of deletion mobile key is not done
If server is not receiving the notice that completes of this deletion after target mobile phones sends delete instruction from target mobile phones, mobile key is deposited in target mobile phones, and the mobile key of retaining may be used to bad purposes.
But the application program of mobile phone of target mobile phones periodically checks that whether stored mobile key is effective, and if the validity of mobile key is out of date, application program of mobile phone is deleted mobile key immediately.For example, application program of mobile phone just checks that mobile phone is whether in call service region for every 30 seconds.If mobile phone has entered in call service region, application program of mobile phone is connected with server immediately, and whether inquiry exists the delay instruction about stored mobile key that will carry out.If there is delete instruction, application program of mobile phone is deleted mobile key immediately.
The operation of application program of mobile phone
If operation system, application program of mobile phone is enabled the NFC function of mobile phone.In the time of operation application program of mobile phone, first mobile phone is connected with server, and inquires that whether the mobile key being stored in SE is effective.If judged that this mobile key is invalid, this mobile key is deleted.
In addition, the every poll that carries out a SE for 30 seconds of application program of mobile phone is to check the event that is sent to SE from door lock that whether exists.In addition, the API that every 30 seconds of application program of mobile phone checks a mobile phone is to check that this mobile phone is whether in call service region.
In addition,, if user stops application program of mobile phone by force, NFC function is disabled.In addition, if user deletes application program of mobile phone by force, be stored in mobile key in SE also deleted.
Receive with send information
When register main mobile phone in door lock time, door lock sends door lock ID and key to the SE of main mobile phone.
Form a part for mobile key as the door lock ID of the information for user rs authentication, and door lock ID is specified by manufacturer.
Key is random generation, and is used to 3DES algorithm with coded communication information.Key is stored in door lock and server simultaneously.In addition, key can be stored in the SE of the mobile phone with mobile key.
In addition,, when register main mobile phone in door lock time, do not have information to be sent to door lock from the SE of main mobile phone.
And in the time of registration door lock, application program of mobile phone sends phone number, door lock ID, key and the door lock title of being specified by user etc. of mobile phone (main mobile phone) to server.
In user rs authentication step, door lock sends the status information of this door lock to the SE of mobile phone.The status information of this door lock sends in the time of user rs authentication success.Status information comprises: action that enforcement, the latch of the detection of the low-voltage of battery, the pressure locking function of door lock are locked etc.
In the time registering users as member, server sends for identifying uniquely the endpoint id of this mobile phone and for the synchronous OTP program of OTP to the application program of mobile phone of the mobile phone connecting.
In addition,, in the time being registered as member, application program of mobile phone sends the type of the phone number of login ID, login password, personal information, mobile phone and the operating system of mobile phone to server.
In the time that server is issued mobile key to certain mobile phone, the application program of mobile phone of main mobile phone sends the phone number of this main mobile phone and will be published the phone number of mobile phone of mobile key to server, and server sends generated mobile key and key to this mobile phone.
Although the present invention has been described with specific embodiment, it will be apparent to one skilled in the art that under the prerequisite of the spirit and scope of the invention defined in the claims that do not deviate from as enclosed, can carry out various changes and distortion.
[industrial applicability]
According to the present invention, because the mobile phone that SE is installed can be as the checking key of Combination padlock, so can improve the property easy to use of mobile phone.In addition, owing to can strengthen the security of the checking of Combination padlock by the server of locating to be managed in security centre, so can prevent efficiently that illegal user from malicious from using SE.

Claims (20)

1. the method for mobile key service, described mobile key service is used mobile phone, door lock and server, described mobile phone has near field communication (NFC) function, it is NFC function, and described mobile phone is provided with the safety element for storing mobile key, the described mobile key of described door lock based on sending by described NFC function carries out user rs authentication, and described server is by mobile radio communication network and described mobile communication, and described method comprises following each step:
Periodically check that described mobile phone whether can be by described mobile radio communication network and described server communication to make described mobile phone in call service region;
In the time that described mobile phone is in described call service region, enable the described NFC function of described mobile phone;
When described mobile phone is during near described door lock, send described mobile key by described NFC function to described door lock from described safety element; And
In described door lock, receive described mobile key, and according to the result of the described user rs authentication that utilizes described mobile key to carry out, door is locked or release.
2. method according to claim 1, wherein uses mobile key described in the secret key encryption being generated by described door lock.
3. method according to claim 1, before the Overall Steps described in claim 1, also comprise by described mobile telephone registration being the member's of described mobile key service step, described server sends security procedure to described mobile phone, thereby described mobile phone moves described security procedure and makes and described server sync, described server generates unique endpoint id and described endpoint id is sent to described mobile phone, and described mobile phone is stored in the described endpoint id sending in the memory storage and described safety element of described mobile phone simultaneously.
4. method according to claim 3, the step of wherein enabling the described NFC function of described mobile phone also comprises:
Described mobile phone is relatively stored in the endpoint id in described memory storage and is stored in the endpoint id in described safety element; And
In the time that these two endpoint ids are different, described mobile phone is forbidden described NFC function.
5. method according to claim 1, before the Overall Steps described in claim 1, also comprise the step of registering main mobile phone, in this step, described door lock and the operation of described mobile phone are for the menu of mutual initial registration, if described mobile phone is near described door lock, described door lock generates key and generated described key and door lock ID is sent to the described safety element of described mobile phone, described key and described door lock ID are sent to described server by described mobile phone, and key and described door lock ID described in described server stores.
6. method according to claim 5, wherein said server allows only to register a described main mobile phone for a described door lock, and permission is the described main mobile phone for multiple described door locks by a described mobile telephone registration.
7. method according to claim 5, after the step of the described main mobile phone of registration, also comprise the step that mobile key is provided, in this step, described main mobile phone sends the phone number of the target mobile phones that will verify in described door lock to described server, described server generates described mobile key and described mobile key is sent to described target mobile phones, and described target mobile phones is stored in described mobile key in described safety element.
8. method according to claim 7, wherein uses the mobile key of main mobile phone and the mobile key of described target mobile phones described in same described secret key encryption.
9. method according to claim 7, also comprise the step of deleting described mobile key, in this step, described main mobile phone sends the instruction of deleting described mobile key and the phone number of wanting the described target mobile phones of deleted described mobile key to described server, described server indicates described target mobile phones to delete described mobile key, described target mobile phones is deleted the described mobile key being stored in described safety element and is deleted and complete with backward server report, and described server is informed described in described main mobile phone and deleted and complete.
10. method according to claim 9, wherein, in the situation that described server does not receive the completed notice of described deletion from described target mobile phones, postpone described delete instruction, and in the time that described target mobile phones is connected with described server by described mobile radio communication network, described server sends described delete instruction again to described target mobile phones.
11. methods according to claim 1, wherein, checking that described mobile phone is whether in the step in described call service region, if judged that described mobile phone is not in described call service region, the described mobile phone described NFC function of stopping using.
12. methods according to claim 1, wherein, in the step of described NFC function of enabling described mobile phone, described mobile phone inspection is stored in described mobile key in described safety element and whether has the restriction in available time limit, if be preset with the described available time limit, described mobile phone is periodically connected with described server and inquires current time, and if described current time is within the default described available time limit, judge that described mobile key is effective, otherwise delete described mobile key.
13. methods according to claim 1, also comprise: in the time carrying out described user rs authentication, in described safety element, store the access times of described mobile key,
In the method, in the step of described NFC function of enabling described mobile phone, what whether described mobile phone inspection was preset with described mobile key can access times, can access times if be preset with the described of described mobile key, described mobile phone request is stored in the described access times in described safety element, and if described access times be less than described can access times, judge that described mobile key is effective, otherwise delete described mobile key.
14. methods according to claim 5, also comprise: that in the time carrying out described user rs authentication, in described safety element, stores described mobile key can access times,
In the method, limited mobile phone only can expendable situation in the time carrying out described user rs authentication for described door lock under, described main mobile phone sends the phone number of described mobile phone to described server, described server can be predetermined to be 1 mobile key and subsequently described mobile key is sent to described mobile phone by access times described in generating, described mobile phone is stored in described mobile key in described safety element, and when described mobile phone is during near described door lock, thereby the described safety element of described mobile phone sends described mobile key to described door lock carries out described user rs authentication, so subsequently because describedly can access times become 0 and delete immediately described mobile key.
15. methods according to claim 5, wherein
If to the input of described door lock be manually input and only can expendable disposal password, described door lock includes for showing that described disposal password is by the counter of used number of times; And
For described disposal password is provided, described main mobile phone sends the phone number of the target mobile phones that will be published described disposal password to described server, the counter that described server comprises the issue order for showing described disposal password, and described server generates described disposal password and then described disposal password is sent to described target mobile phones with the form of SMS message, and if the described disposal password from described SMS is inputed to described door lock by user, described door lock only just carries out described user rs authentication in the time that the Counter Value comprising in described disposal password is greater than stored Counter Value.
16. methods according to claim 3, also comprise following each step:
Provide the OTP program relevant to described server to described mobile phone;
Described OTP installation, in described mobile phone, and is made to described OTP program and described server sync subsequently; And
In the time that described mobile phone is connected with described server, utilize described OTP program to verify.
17. methods according to claim 1, also comprise intelligently guiding step, in this step, in the time of described user rs authentication success, described door lock sends the information of the state for showing described door lock to the described safety element of described mobile phone, described safety element is stored described status information, and described mobile phone periodically carries out the described status information that the poll of described safety element is stored to read, and demonstrates subsequently described status information.
18. methods according to claim 1, also comprise following each step:
In described safety element, whether storage is successful for the described user rs authentication of described door lock; And
Check whether success of described user rs authentication by safety element described in poll periodically, and inform whether success of described user rs authentication with the form of SMS message.
19. methods according to claim 1, also comprise following each step:
If described user rs authentication is successful, As time goes in described door lock, store at least a portion of the information comprising in described mobile key;
Control described safety element, to ask sending the described information of being stored from described door lock;
Be stored in the described information in described door lock by described safety element request; And
Described safety element obtains stored described information from described door lock.
20. methods according to claim 7, wherein said server stores has the issue history of described mobile key, thereby described main mobile phone operation mobile key is issued the described issue history that menu request is stored, described server provides described issue historical by mobile radio communication network, issue menu and if described main mobile phone stops described mobile key, in described main mobile phone, delete described issue history.
CN201210430035.XA 2012-10-31 2012-10-31 Method for mobile key service Expired - Fee Related CN103793960B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210430035.XA CN103793960B (en) 2012-10-31 2012-10-31 Method for mobile key service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210430035.XA CN103793960B (en) 2012-10-31 2012-10-31 Method for mobile key service

Publications (2)

Publication Number Publication Date
CN103793960A true CN103793960A (en) 2014-05-14
CN103793960B CN103793960B (en) 2016-12-21

Family

ID=50669580

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210430035.XA Expired - Fee Related CN103793960B (en) 2012-10-31 2012-10-31 Method for mobile key service

Country Status (1)

Country Link
CN (1) CN103793960B (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104778773A (en) * 2015-04-16 2015-07-15 绿锌网络科技(上海)有限公司 System and method for controlling entrance guard by mobile phone
CN104966343A (en) * 2015-07-14 2015-10-07 深圳市亲邻科技有限公司 Entrance guard control method based on Internet
CN104966336A (en) * 2015-05-29 2015-10-07 深圳光启智能光子技术有限公司 Intelligent lock, intelligent lock authorization management method, and intelligent lock authorization management apparatus
CN105261104A (en) * 2015-11-24 2016-01-20 重庆理工大学 Bluetooth door lock system based on intelligent terminal, and control method of Bluetooth door lock system
CN105488870A (en) * 2014-09-18 2016-04-13 腾讯科技(深圳)有限公司 Entrance guard control method, apparatus, terminal and control server
CN105488871A (en) * 2014-09-18 2016-04-13 腾讯科技(深圳)有限公司 Entrance guard control method, apparatus, terminal and control server
CN106022092A (en) * 2016-05-20 2016-10-12 廖建强 Authentication method and device for NFC (Near Field Communication) equipment
CN106537464A (en) * 2014-06-23 2017-03-22 励智识别技术有限公司 Electronic access control device and access control method
CN106663344A (en) * 2014-05-19 2017-05-10 阿克赛思Ip控股公司 Mobile key devices systems and methods for programming and communicating with an electronic programmable key
CN107004314A (en) * 2014-12-02 2017-08-01 开利公司 For the long-range programming of the metering-in control system using virtual card data
CN107248212A (en) * 2017-06-08 2017-10-13 深圳消费物联科技有限公司 A kind of intelligent lock system and its method for unlocking based on NFC
CN107393061A (en) * 2017-06-16 2017-11-24 汪钰涵 Coded lock and communication system with communication capacity
CN107493561A (en) * 2017-08-07 2017-12-19 北京小米移动软件有限公司 Shared equipment unlocking method, apparatus and system
CN107646127A (en) * 2015-06-02 2018-01-30 索尼公司 Lock control control equipment, information processing method, program and communication equipment
CN108090798A (en) * 2017-11-20 2018-05-29 阿里巴巴集团控股有限公司 Article uses control method, server, article, equipment and system
CN108109242A (en) * 2017-12-21 2018-06-01 广东汇泰龙科技有限公司 A kind of hardware encryption method unlocked based on fingerprint, system, intelligent cloud lock
CN109889669A (en) * 2019-03-07 2019-06-14 广东汇泰龙科技有限公司 A kind of unlocked by mobile telephone method and system based on secure cryptographic algorithm
CN109920100A (en) * 2019-02-01 2019-06-21 天地融科技股份有限公司 A kind of smart lock method for unlocking and system
CN110113154A (en) * 2019-04-23 2019-08-09 厦门中锐电力科技有限公司 A method of it is managed online using lockset dual key
CN110462691A (en) * 2017-01-21 2019-11-15 云丁网络技术(北京)有限公司 Method for unlocking, mobile terminal, intelligent door lock and the Cloud Server of intelligent door lock
CN111815815A (en) * 2020-06-22 2020-10-23 北京智辉空间科技有限责任公司 Electronic lock safety system
US11928904B2 (en) 2019-08-02 2024-03-12 Yunding Network Technology (Beijing) Co., Ltd. Methods and systems for controlling a smart lock

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1904948A (en) * 2005-07-28 2007-01-31 因温特奥股份公司 Access control method for an area accessible to persons, in particular for a room closed off by means of a door
CN1904947A (en) * 2005-07-28 2007-01-31 因温特奥股份公司 Method for the exchange of data
CN101162530A (en) * 2006-10-12 2008-04-16 霍尼韦尔国际公司 Method and system for controlling a security system using near field communication
CN101685556A (en) * 2008-08-20 2010-03-31 伊洛克公司 Electromechanical lock
KR20110023218A (en) * 2009-08-31 2011-03-08 최명희 Methods for access controlling to a selected space
CN102103765A (en) * 2009-12-16 2011-06-22 中兴通讯股份有限公司 Access control and information display system, method and terminal
WO2012073265A1 (en) * 2010-12-02 2012-06-07 Cisa S.P.A Method for the control and management of keys for access to spaces delimited by electronic locks and the like, and device that can be enabled as key according to the method
US20120220216A1 (en) * 2011-02-24 2012-08-30 Ontario, Canada) Personnel access system with verification features utilizing near field communication (nfc) and related methods

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1904948A (en) * 2005-07-28 2007-01-31 因温特奥股份公司 Access control method for an area accessible to persons, in particular for a room closed off by means of a door
CN1904947A (en) * 2005-07-28 2007-01-31 因温特奥股份公司 Method for the exchange of data
CN101162530A (en) * 2006-10-12 2008-04-16 霍尼韦尔国际公司 Method and system for controlling a security system using near field communication
CN101685556A (en) * 2008-08-20 2010-03-31 伊洛克公司 Electromechanical lock
KR20110023218A (en) * 2009-08-31 2011-03-08 최명희 Methods for access controlling to a selected space
CN102103765A (en) * 2009-12-16 2011-06-22 中兴通讯股份有限公司 Access control and information display system, method and terminal
WO2012073265A1 (en) * 2010-12-02 2012-06-07 Cisa S.P.A Method for the control and management of keys for access to spaces delimited by electronic locks and the like, and device that can be enabled as key according to the method
US20120220216A1 (en) * 2011-02-24 2012-08-30 Ontario, Canada) Personnel access system with verification features utilizing near field communication (nfc) and related methods

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106663344A (en) * 2014-05-19 2017-05-10 阿克赛思Ip控股公司 Mobile key devices systems and methods for programming and communicating with an electronic programmable key
CN106537464A (en) * 2014-06-23 2017-03-22 励智识别技术有限公司 Electronic access control device and access control method
CN105488870A (en) * 2014-09-18 2016-04-13 腾讯科技(深圳)有限公司 Entrance guard control method, apparatus, terminal and control server
CN105488871A (en) * 2014-09-18 2016-04-13 腾讯科技(深圳)有限公司 Entrance guard control method, apparatus, terminal and control server
CN107004314B (en) * 2014-12-02 2022-05-17 开利公司 Remote programming for access control systems using virtual card data
CN107004314A (en) * 2014-12-02 2017-08-01 开利公司 For the long-range programming of the metering-in control system using virtual card data
CN104778773A (en) * 2015-04-16 2015-07-15 绿锌网络科技(上海)有限公司 System and method for controlling entrance guard by mobile phone
CN104966336A (en) * 2015-05-29 2015-10-07 深圳光启智能光子技术有限公司 Intelligent lock, intelligent lock authorization management method, and intelligent lock authorization management apparatus
CN107646127A (en) * 2015-06-02 2018-01-30 索尼公司 Lock control control equipment, information processing method, program and communication equipment
US11270532B2 (en) 2015-06-02 2022-03-08 Sony Corporation Lock control device, information processing method, program, and communication terminal
CN107646127B (en) * 2015-06-02 2021-10-29 索尼公司 Lock control device, information processing method, program, and communication device
CN104966343A (en) * 2015-07-14 2015-10-07 深圳市亲邻科技有限公司 Entrance guard control method based on Internet
CN105261104B (en) * 2015-11-24 2017-10-10 重庆理工大学 Bluetooth door lock system and its control method based on intelligent terminal
CN105261104A (en) * 2015-11-24 2016-01-20 重庆理工大学 Bluetooth door lock system based on intelligent terminal, and control method of Bluetooth door lock system
CN106022092A (en) * 2016-05-20 2016-10-12 廖建强 Authentication method and device for NFC (Near Field Communication) equipment
CN110462691A (en) * 2017-01-21 2019-11-15 云丁网络技术(北京)有限公司 Method for unlocking, mobile terminal, intelligent door lock and the Cloud Server of intelligent door lock
US11335144B2 (en) 2017-01-21 2022-05-17 Yunding Network Technology (Beijing) Co., Ltd. Method for unlocking intelligent lock, mobile terminal, intelligent lock and server
CN107248212A (en) * 2017-06-08 2017-10-13 深圳消费物联科技有限公司 A kind of intelligent lock system and its method for unlocking based on NFC
CN107393061A (en) * 2017-06-16 2017-11-24 汪钰涵 Coded lock and communication system with communication capacity
CN107493561B (en) * 2017-08-07 2021-04-13 北京小米移动软件有限公司 Shared device unlocking method, device and system and storage medium
CN107493561A (en) * 2017-08-07 2017-12-19 北京小米移动软件有限公司 Shared equipment unlocking method, apparatus and system
CN108090798A (en) * 2017-11-20 2018-05-29 阿里巴巴集团控股有限公司 Article uses control method, server, article, equipment and system
CN108109242B (en) * 2017-12-21 2020-08-14 广东汇泰龙科技股份有限公司 Hardware encryption method and system based on fingerprint unlocking and intelligent cloud lock
CN108109242A (en) * 2017-12-21 2018-06-01 广东汇泰龙科技有限公司 A kind of hardware encryption method unlocked based on fingerprint, system, intelligent cloud lock
CN109920100B (en) * 2019-02-01 2021-02-19 天地融科技股份有限公司 Unlocking method and system of intelligent lock
CN109920100A (en) * 2019-02-01 2019-06-21 天地融科技股份有限公司 A kind of smart lock method for unlocking and system
CN109889669A (en) * 2019-03-07 2019-06-14 广东汇泰龙科技有限公司 A kind of unlocked by mobile telephone method and system based on secure cryptographic algorithm
CN110113154A (en) * 2019-04-23 2019-08-09 厦门中锐电力科技有限公司 A method of it is managed online using lockset dual key
CN110113154B (en) * 2019-04-23 2021-10-08 厦门中锐电力科技有限公司 Method for online control by using double keys of lock
US11928904B2 (en) 2019-08-02 2024-03-12 Yunding Network Technology (Beijing) Co., Ltd. Methods and systems for controlling a smart lock
CN111815815A (en) * 2020-06-22 2020-10-23 北京智辉空间科技有限责任公司 Electronic lock safety system

Also Published As

Publication number Publication date
CN103793960B (en) 2016-12-21

Similar Documents

Publication Publication Date Title
CN103793960A (en) Method for mobile key service
US8787902B2 (en) Method for mobile-key service
KR101211477B1 (en) Method for mobile-key service
KR101259546B1 (en) Method for smart-key service
CN102790674B (en) Auth method, equipment and system
TWI491790B (en) A smart lock structure and an operating method thereof
EP2725823A1 (en) Method for performing user authentication between secured element and door lock through NFC
CN110264182B (en) Electronic certificate management system
US7810146B2 (en) Security device, terminal device, gate device, and device
KR100506432B1 (en) Method for enabling pki functions in a smart card
CN109272606B (en) Intelligent lock supervision equipment and method based on block chain and storage medium
US9106271B2 (en) System for programming a lock comprising contactless NFC communication means
US20130257589A1 (en) Access control using an electronic lock employing short range communication with mobile device
CN101521886B (en) Method and device for authenticating terminal and telecommunication smart card
CN105261104A (en) Bluetooth door lock system based on intelligent terminal, and control method of Bluetooth door lock system
EP3671667A1 (en) Secured parcel locker system with token security
CN110719203B (en) Operation control method, device and equipment of intelligent household equipment and storage medium
CN103493526A (en) Sim locking
WO2008092336A1 (en) System and method for realizing remote control to terminal data
CN102930188A (en) Screen unlocking method and device as well as terminal
CN105610671A (en) Terminal data protection method and device
CN107067516A (en) Method for unlocking and system and door-locking system
CN107516364A (en) Method for unlocking, bluetooth lock and the unlocking terminal of bluetooth lock
CN104364793A (en) Security mode for mobile communications devices
CN104820805A (en) Method and device for burglary prevention of user identity identification card information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20161221

Termination date: 20181031

CF01 Termination of patent right due to non-payment of annual fee