CN105788047A - Bluetooth access control device, Bluetooth access control management system and Bluetooth access control management method - Google Patents

Bluetooth access control device, Bluetooth access control management system and Bluetooth access control management method Download PDF

Info

Publication number
CN105788047A
CN105788047A CN201610194559.1A CN201610194559A CN105788047A CN 105788047 A CN105788047 A CN 105788047A CN 201610194559 A CN201610194559 A CN 201610194559A CN 105788047 A CN105788047 A CN 105788047A
Authority
CN
China
Prior art keywords
control
bluetooth access
user
information
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610194559.1A
Other languages
Chinese (zh)
Other versions
CN105788047B (en
Inventor
宋政斌
仝海燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qding Interconnection Technology Co ltd
Original Assignee
Beijing Qding Interconnection Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qding Interconnection Technology Co ltd filed Critical Beijing Qding Interconnection Technology Co ltd
Priority to CN201610194559.1A priority Critical patent/CN105788047B/en
Publication of CN105788047A publication Critical patent/CN105788047A/en
Application granted granted Critical
Publication of CN105788047B publication Critical patent/CN105788047B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/33Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B5/00Near-field transmission systems, e.g. inductive or capacitive transmission systems
    • H04B5/70Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes
    • H04B5/72Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes for local intradevice communication

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)
  • Small-Scale Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a Bluetooth access control device, a Bluetooth access control management system and a Bluetooth access control management method. The Bluetooth access control management method comprises the following steps: sending a Bluetooth broadcast message by the Bluetooth access control device; scanning the Bluetooth broadcast message and broadcasting unlocking control information after receiving a trigger request of a user by a Bluetooth intelligent terminal; scanning the unlocking control information by the Bluetooth access control device and verifying the legality of the user according to the scanned unlocking control information; controlling a door to open by the Bluetooth access control device when passing the verification. The invention also provides the Bluetooth access control management system and the Bluetooth access control device thereof. According to the technical scheme provided by the invention, the time of opening the door is greatly shortened and the door can be opened by multiple people at the same time.

Description

A kind of control of bluetooth access equipment, control of bluetooth access management system and method
Technical field
The present invention relates to field, Intelligent Community, particularly relate to a kind of control of bluetooth access equipment, control of bluetooth access management system and method.
Background technology
In today that digitizing technique and network technology develop rapidly, gate inhibition's technology have also been obtained fast development, it has surmounted simple gateway and key management already, it is developing progressively the access management system for complete set, become solution important department gateway and realize the effective measures of safety precaution management, it is suitable for various confidential departments, such as intellectual communityintellectualized village, bank, hotel, machine room, armory, factory etc..
Reading owing to Bluetooth transmission can realize equipment short distance, therefore access control system is increasingly using bluetooth equipment to substitute contact card reader to realize automatic authorization enabling.At present, control of bluetooth access management system is all develop at APP layer, such as, enabling flow process is: user arrive gate inhibition place want open the door time, need first between blue-tooth intelligence terminal and control of bluetooth access equipment, to set up a Bluetooth data channel, by this Bluetooth data channel, blue-tooth intelligence terminal could send door opening command to control of bluetooth access equipment, and control of bluetooth access equipment opens the door when verifying legal.But, there is following defect in this bluetooth door opening method:
1. when setting up Bluetooth data channel, scan and connect consuming time longer, thus causing that enabling speed is slow;
2. Bluetooth protocol only allows to set up a bluetooth connection, thus cause that many people cannot open the door simultaneously.
Summary of the invention
The technical problem to be solved in the present invention is in that, for the drawbacks described above of prior art, it is provided that a kind of control of bluetooth access equipment, control of bluetooth access management system and method, can shorten opening time, and can many people open the door simultaneously.
The technical solution adopted for the present invention to solve the technical problems is: a kind of control of bluetooth access management method of structure, including:
S10. control of bluetooth access equipment sends Bluetooth broadcast message;
S20. blue-tooth intelligence terminal is after the triggering receiving user is asked, and scans Bluetooth broadcast message, and broadcasts control message of unblanking;
S30. control of bluetooth access device scan unblanks to control message, and according to the control message of unblanking scanned, the legitimacy of user is verified;
S40. control of bluetooth access equipment is when being verified, and controls to open the door.
Preferably, also include:
S00. when user registers before first use, what blue-tooth intelligence terminal received that background server sends first adds confidential information, and use PKI to add confidential information to receive first to be decrypted, to obtain user cipher, wherein, described first add confidential information be background server use private key user totem information, room number information, user cipher are encrypted the information generated;
And, described control message of unblanking includes: first adds confidential information and second adds confidential information, wherein, described second to add confidential information be that blue-tooth intelligence terminal uses the user cipher MAC Address of control of bluetooth access equipment to scanning, door opening command to be encrypted the information generated;
In described step S30, what described basis scanned unblank controls the step that the legitimacy of user is verified by message and includes:
S31. control of bluetooth access equipment uses PKI to add confidential information to receive first and be decrypted, to obtain user totem information, room number information, user cipher;
S32. according to acquired room number information, control of bluetooth access equipment judges whether user has enabling authority;
S33. control of bluetooth access equipment is when user has enabling authority, uses acquired user cipher to add confidential information to receive second and is decrypted, to obtain the MAC Address of control of bluetooth access equipment, door opening command;
S34. control of bluetooth access equipment judges that whether the MAC Address of acquired control of bluetooth access equipment is consistent with own MAC address.
Preferably, described first add confidential information be background server use private key user totem information, room number information, user cipher, effective deadline are encrypted the information generated;
Described step S31 is:
Control of bluetooth access equipment uses PKI to add confidential information to receive first and is decrypted, to obtain user totem information, room number information, user cipher, effective deadline;
Between described step S31 and described step S32, also include:
S35. control of bluetooth access equipment judges that current date is whether before acquired effective deadline, and when being, performs step S32.
Preferably, described second to add confidential information be that blue-tooth intelligence terminal uses the user cipher MAC Address of control of bluetooth access equipment to scanning, current time, door opening command to be encrypted the information generated;And,
Described step S33 is:
Control of bluetooth access equipment, when user has enabling authority, uses acquired user cipher to add confidential information to receive second and is decrypted, to obtain the MAC Address of control of bluetooth access equipment, current time, door opening command;
After described step S34, also include:
S36. control of bluetooth access equipment is when the MAC Address judging acquired control of bluetooth access equipment is consistent with own MAC address, judges whether to occur to cut bag according to acquired current time.
Preferably, described step S20 includes:
S21. blue-tooth intelligence terminal is after the triggering receiving user is asked, and scans Bluetooth broadcast message, and broadcasts gate inhibition and detect message, and described broadcast gate inhibition detects message and includes user totem information;
S22. control of bluetooth access device scan gate inhibition detects message, calculates the signal strength values of the blue-tooth intelligence terminal scanned broadcast signal strength message, and described signal intensity message includes the MAC Address of self, user totem information and signal strength values;
S23. the signal strength values of self in the signal intensity message that the inspection of blue-tooth intelligence terminal scans, according to checking that result determines the MAC Address of target Bluetooth access control equipment, and broadcast control message of unblanking, and, described in unblank to control second in message to add confidential information be that blue-tooth intelligence terminal uses user cipher that the MAC Address of determined target Bluetooth access control equipment, door opening command are encrypted the information generated.
The present invention also constructs a kind of control of bluetooth access equipment, including:
Bluetooth module, is used for sending Bluetooth broadcast message, and scan blue-tooth intelligence terminal sent out broadcast unblank control message;
Authentication module, for being verified the legitimacy of user according to the control message of unblanking scanned;
Open door control module, for when being verified, controlling to open the door.
Preferably, described control message of unblanking includes: first adds confidential information and second adds confidential information, wherein, described first add confidential information be background server use private key user totem information, room number information, user cipher are sent the information to blue-tooth intelligence terminal after being encrypted;Described second to add confidential information be that blue-tooth intelligence terminal uses the user cipher MAC Address of control of bluetooth access equipment to scanning, door opening command to be encrypted the information generated;
Described authentication module includes:
First decryption unit, is decrypted for using PKI to add confidential information to receive first, to obtain user totem information, room number information, user cipher;
According to acquired room number information, authority judging unit, for judging whether user has enabling authority;
Second decryption unit, for when user has enabling authority, using acquired user cipher to add confidential information to receive second and be decrypted, to obtain the MAC Address of control of bluetooth access equipment, door opening command;
MAC judging unit, for judging that whether the MAC Address of acquired control of bluetooth access equipment is consistent with own MAC address.
Preferably,
Described first add confidential information be background server use private key user totem information, room number information, user cipher, effective deadline are encrypted after send the information to blue-tooth intelligence terminal;
Described authentication module also includes date judging unit, and,
Described first decryption unit, is decrypted for using PKI to add confidential information to receive first, to obtain user totem information, room number information, user cipher, effective deadline;
Described date judging unit, for judging that current date is whether before acquired effective deadline;
According to acquired room number information, described authority judging unit, for when judging that current date is before acquired effective deadline, judging whether user has enabling authority.
Preferably, described second to add confidential information be that blue-tooth intelligence terminal uses the user cipher MAC Address of control of bluetooth access equipment to scanning, current time, door opening command to be encrypted the information generated;
Described authentication module also includes cutting bag judging unit, and,
Described second decryption unit, for when user has enabling authority, using acquired user cipher to add confidential information to receive second and be decrypted, to obtain the MAC Address of control of bluetooth access equipment, current time, door opening command;
Described section of bag judging unit, for when the MAC Address judging acquired control of bluetooth access equipment is consistent with own MAC address, judging whether to occur to cut bag according to acquired current time.
Preferably, also include Strength co-mputation module, and,
Described bluetooth module, is additionally operable to the scanning gate inhibition that broadcasts of blue-tooth intelligence terminal and detects message and broadcast signal strength message;Described broadcast gate inhibition detects message and includes user totem information, and described signal intensity message includes the MAC Address of self, user totem information and signal strength values;
Described Strength co-mputation module, calculates the signal strength values of blue-tooth intelligence terminal for detecting message according to the gate inhibition scanned;
And, described in unblank to control second in message to add confidential information be that blue-tooth intelligence terminal uses user cipher that the MAC Address of determined target Bluetooth access control equipment, door opening command are encrypted the information generated.
The present invention also constructs a kind of control of bluetooth access management system, including blue-tooth intelligence terminal and above-described control of bluetooth access equipment.
Implement technical scheme, without setting up Bluetooth data channel between control of bluetooth access equipment and blue-tooth intelligence terminal, the time of scanning and connection establishment can be saved, substantially increase enabling speed, make opening time can foreshorten to 500ms, it is additionally, since when opening the door without setting up bluetooth connection, so can many people open the door simultaneously.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, the accompanying drawing used required in embodiment or description of the prior art will be briefly described below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the premise not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.In accompanying drawing:
Fig. 1 is the flow chart of control of bluetooth access management method embodiment one of the present invention;
Fig. 2 is the flow chart of step S30 embodiment two in Fig. 1;
Fig. 3 is the building-block of logic of control of bluetooth access of the present invention management system embodiment one;
Fig. 4 is the building-block of logic of control of bluetooth access apparatus embodiments one in Fig. 3;
Fig. 5 is the building-block of logic of authentication module embodiment one in Fig. 4.
Detailed description of the invention
Fig. 1 is the flow chart of control of bluetooth access management method embodiment one of the present invention, and the control of bluetooth access management method of this embodiment comprises the following steps:
Step S10. control of bluetooth access equipment sends Bluetooth broadcast message.In this step, control of bluetooth access equipment, as Bluetooth slave devices, continuously sends out Bluetooth broadcast message.
Step S20. blue-tooth intelligence terminal, after the triggering receiving user is asked, scans Bluetooth broadcast message, and broadcasts control message of unblanking.In this step, arrive near control of bluetooth access equipment when user carries blue-tooth intelligence terminal, and when needing enabling to enter, user can button on the APP of trigger Bluetooth intelligent terminal, blue-tooth intelligence terminal is after the triggering receiving user is asked, start to scan Bluetooth broadcast message, and, this blue-tooth intelligence terminal starts persistently broadcast enabling as Bluetooth slave devices equally and controls message.
Step S30. control of bluetooth access device scan unblanks to control message, and according to the control message of unblanking scanned, the legitimacy of user is verified, if being verified, then illustrates that this user is for validated user, performs step S40;If checking is not passed through, then illustrate that this user is disabled user, it is not necessary to open the door.S40. control of bluetooth access equipment is when being verified, and controls to open the door.
Implement the technical scheme of this embodiment, without setting up Bluetooth data channel between control of bluetooth access equipment and blue-tooth intelligence terminal, the time of scanning and connection establishment can be saved, substantially increase enabling speed, make opening time can foreshorten to 500ms, it is additionally, since when opening the door without setting up bluetooth connection, so can many people open the door simultaneously.
Preferably, in step s 30, based on public key infrastructure, user validation can be verified.First illustrating, background server manages multiple communities, distributes a public private key pair for each community, the PKI of each control of bluetooth access equipment this community all built-in in community.And, when user is when moving in community, register (APP that can use intelligent terminal registers) room number information (such as, * * * room of * * community *), phone number to background server, to open gate inhibition.The phone number that background server is reserved according to user, the phone number registered is verified (such as short-message verification), after being proved to be successful, a character string is generated for this user, wherein comprise " user totem information (AppID)+room number information+user cipher+effective deadline etc. ", the encrypted private key that Qie Yonggai community is corresponding.
So, in the preferred embodiment, before step S10, also include:
When step S00. user registers before first use, what blue-tooth intelligence terminal received that background server sends first adds confidential information (i.e. character string after above-mentioned encryption), and use PKI to add confidential information to receive first to be decrypted, to obtain user cipher, wherein, described first add confidential information be background server use private key user totem information, room number information, user cipher, effective deadline are encrypted the information generated;
In step S20, what blue-tooth intelligence terminal was broadcasted unblank controls message and includes: first adds confidential information and second adds confidential information, wherein, described second to add confidential information be that blue-tooth intelligence terminal uses the user cipher MAC Address of control of bluetooth access equipment to scanning, current time, door opening command to be encrypted the information generated;
And, in conjunction with Fig. 2, in step s 30, may particularly include according to the step that the legitimacy of user is verified by the control message of unblanking scanned:
Step S31. control of bluetooth access equipment uses PKI to add confidential information to receive first and is decrypted, to obtain user totem information, room number information, user cipher, effective deadline;
Step S35. control of bluetooth access equipment judges that current date is whether before acquired effective deadline, if so, then performs step S32;If it is not, then perform step S37, so, can prevent user from after moving away from community, continuing the gate inhibition in dwelling, Kaiyuan;
According to acquired room number information, step S32. control of bluetooth access equipment judges whether user has enabling authority, if so, then perform step S33;If it is not, then perform step S37.In this step, such as, acquired room number information is rooms 1203,8, A community, after the control of bluetooth access equipment at this doorway place, A community or 8 doorways place gets this room number information, just can determine whether that this user has enabling authority, but, if after the control of bluetooth access equipment at 9 doorways place gets this room number information, so that it may judge that this user is without enabling authority;
Step S33. control of bluetooth access equipment uses acquired user cipher to add confidential information to receive second and is decrypted, to obtain the MAC Address of control of bluetooth access equipment, current time, door opening command;
Step S34. control of bluetooth access equipment judges that whether the MAC Address of acquired control of bluetooth access equipment is consistent with own MAC address, if so, then illustrates that this enabling control instruction is intended for oneself, and then performs step S36;If it is not, then perform step S37;
Step S36. control of bluetooth access equipment judges whether to occur to cut bag according to acquired current time, if it is not, be then verified, and then performs step S40;If so, step S37 is then performed.So, retransmit after disabled user's data intercept bag can be prevented;
Step S37. does not process.
Further, if there being multiple control of bluetooth access equipment in the signal cover of the blue-tooth intelligence terminal of user, then a closest control of bluetooth access equipment is selected to open the door.Specific as follows: on the basis of above-described embodiment, step S20 specifically includes following steps:
Step S21. blue-tooth intelligence terminal, after the triggering receiving user is asked, scans Bluetooth broadcast message, and broadcasts gate inhibition and detect message, and described broadcast gate inhibition detects message and includes user totem information;
Step S22. control of bluetooth access device scan gate inhibition detects message, calculates the signal strength values of the blue-tooth intelligence terminal scanned broadcast signal strength message, and described signal intensity message includes the MAC Address of self, user totem information and signal strength values;
The signal strength values of self in the signal intensity message that step S23. blue-tooth intelligence terminal inspection scans, according to checking that result determines the MAC Address of target Bluetooth access control equipment, and broadcast control message of unblanking, and, described in unblank to control second in message to add confidential information be that blue-tooth intelligence terminal uses user cipher that the MAC Address of determined target Bluetooth access control equipment, door opening command are encrypted the information generated.In this step, for instance, the control of bluetooth access equipment sending the strongest signal strength information is defined as target Bluetooth access control equipment.
Fig. 3 is the building-block of logic of control of bluetooth access of the present invention management system embodiment one, this control of bluetooth access system includes control of bluetooth access equipment 10 and blue-tooth intelligence terminal 20, wherein, control of bluetooth access equipment 10 may be provided at the doorway place etc. in doorway, community place, Mei Dong building, blue-tooth intelligence terminal is such as smart mobile phone, and this blue-tooth intelligence terminal is provided with APP, user can use this APP to carry out user's registration, enabling etc..
Fig. 4 is the building-block of logic of control of bluetooth access apparatus embodiments one in Fig. 3, this control of bluetooth access equipment includes: bluetooth module 11, authentication module 12 and open door control module 13, wherein, bluetooth module 11 is used for sending Bluetooth broadcast message, and scan blue-tooth intelligence terminal sent out broadcast unblank control message;Authentication module 12 is for being verified the legitimacy of user according to the control message of unblanking scanned;Open door control module 13 for when being verified, controlling to open the door.
Preferably, can designing this control of bluetooth access management system based on public key infrastructure, first illustrate, background server manages multiple communities, distributes a public private key pair for each community, the PKI of each control of bluetooth access equipment this community all built-in in community.And, when user is when moving in community, register (APP that can use intelligent terminal registers) room number information (such as, * * * room of * * community *), phone number to background server, to open gate inhibition.The phone number that background server is reserved according to user, the phone number registered is verified (such as short-message verification), after being proved to be successful, a character string is generated for this user, wherein comprise " user totem information (AppID)+room number information+user cipher+effective deadline etc. ", the encrypted private key that Qie Yonggai community is corresponding.
What bluetooth module 11 scanned unblank controls message and includes first and add confidential information and second and add confidential information, wherein, wherein, first add confidential information be background server use private key user totem information, room number information, user cipher, effective deadline are encrypted after send the information to blue-tooth intelligence terminal;Second to add confidential information be that blue-tooth intelligence terminal uses the user cipher MAC Address of control of bluetooth access equipment to scanning, current time, door opening command to be encrypted the information generated.
In conjunction with the authentication module shown in Fig. 5, the authentication module of this embodiment includes the first decryption unit 151, date judging unit 152, authority judging unit the 153, second decryption unit 154, MAC judging unit 155 and cuts bag judging unit 156.Wherein, the first decryption unit 151 is decrypted for using PKI to add confidential information to receive first, to obtain user totem information, room number information, user cipher;Date judging unit 152 is for judging that current date is whether before acquired effective deadline;According to acquired room number information, authority judging unit 153 is for when judging that current date is before acquired effective deadline, judging whether user has enabling authority;Second decryption unit 154 is for when user has enabling authority, using acquired user cipher to add confidential information to receive second and be decrypted, to obtain the MAC Address of control of bluetooth access equipment, current time, door opening command;MAC judging unit 155 is for judging that whether the MAC Address of acquired control of bluetooth access equipment is consistent with own MAC address;Cut bag judging unit 156 for when the MAC Address judging acquired control of bluetooth access equipment is consistent with own MAC address, judging whether to occur to cut bag according to acquired current time, if without occurring to cut bag, being then verified.
Finally it should be noted that, be more than one embodiment of the present of invention, in other embodiments, wherein one or more unit can be saved, for instance, save date judging unit 152 or cut bag judging unit 156, this is also in protection scope of the present invention.
If there being multiple control of bluetooth access equipment in the signal cover of the blue-tooth intelligence terminal of user, then the optional closest control of bluetooth access equipment of blue-tooth intelligence terminal opens the door.Particularly as follows: control of bluetooth access equipment also can farther include Strength co-mputation module, and, bluetooth module 11 is additionally operable to the scanning gate inhibition that broadcasts of blue-tooth intelligence terminal and detects message, and this broadcast gate inhibition detects message and includes user totem information.Then, Strength co-mputation module calculates the signal strength values of blue-tooth intelligence terminal for detecting message according to the gate inhibition scanned.Bluetooth module 11 is additionally operable to broadcast signal strength message, and described signal intensity message includes the MAC Address of self, user totem information and signal strength values;When after blue-tooth intelligence terminal scanning to signal intensity message, check the signal strength values of self wherein comprised, and according to checking that result determines the MAC Address of target Bluetooth access control equipment, such as, the control of bluetooth access equipment sending the strongest signal strength values is defined as target Bluetooth access control equipment, now, it is that blue-tooth intelligence terminal uses user cipher that the MAC Address of determined target Bluetooth access control equipment, door opening command are encrypted the information generated that unblank in control message second broadcasted adds confidential information.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, make any distort, equivalent replacement, improvement etc., should be included within scope of the presently claimed invention.

Claims (11)

1. a control of bluetooth access management method, it is characterised in that including:
S10. control of bluetooth access equipment sends Bluetooth broadcast message;
S20. blue-tooth intelligence terminal is after the triggering receiving user is asked, and scans Bluetooth broadcast message, and broadcasts control message of unblanking;
S30. control of bluetooth access device scan unblanks to control message, and according to the control message of unblanking scanned, the legitimacy of user is verified;
S40. control of bluetooth access equipment is when being verified, and controls to open the door.
2. control of bluetooth access management method according to claim 1, it is characterised in that also include:
S00. when user registers before first use, what blue-tooth intelligence terminal received that background server sends first adds confidential information, and use PKI to add confidential information to receive first to be decrypted, to obtain user cipher, wherein, described first add confidential information be background server use private key user totem information, room number information, user cipher are encrypted the information generated;
And, described control message of unblanking includes: first adds confidential information and second adds confidential information, wherein, described second to add confidential information be that blue-tooth intelligence terminal uses the user cipher MAC Address of control of bluetooth access equipment to scanning, door opening command to be encrypted the information generated;
In described step S30, what described basis scanned unblank controls the step that the legitimacy of user is verified by message and includes:
S31. control of bluetooth access equipment uses PKI to add confidential information to receive first and be decrypted, to obtain user totem information, room number information, user cipher;
S32. according to acquired room number information, control of bluetooth access equipment judges whether user has enabling authority;
S33. control of bluetooth access equipment is when user has enabling authority, uses acquired user cipher to add confidential information to receive second and is decrypted, to obtain the MAC Address of control of bluetooth access equipment, door opening command;
S34. control of bluetooth access equipment judges that whether the MAC Address of acquired control of bluetooth access equipment is consistent with own MAC address.
3. control of bluetooth access management method according to claim 2, it is characterised in that
Described first add confidential information be background server use private key user totem information, room number information, user cipher, effective deadline are encrypted the information generated;
Described step S31 is:
Control of bluetooth access equipment uses PKI to add confidential information to receive first and is decrypted, to obtain user totem information, room number information, user cipher, effective deadline;
Between described step S31 and described step S32, also include:
S35. control of bluetooth access equipment judges that current date is whether before acquired effective deadline, and when being, performs step S32.
4. control of bluetooth access management method according to claim 2, it is characterised in that
Described second to add confidential information be that blue-tooth intelligence terminal uses the user cipher MAC Address of control of bluetooth access equipment to scanning, current time, door opening command to be encrypted the information generated;And,
Described step S33 is:
Control of bluetooth access equipment, when user has enabling authority, uses acquired user cipher to add confidential information to receive second and is decrypted, to obtain the MAC Address of control of bluetooth access equipment, current time, door opening command;
After described step S34, also include:
S36. control of bluetooth access equipment is when the MAC Address judging acquired control of bluetooth access equipment is consistent with own MAC address, judges whether to occur to cut bag according to acquired current time.
5. control of bluetooth access management method according to claim 2, it is characterised in that described step S20 includes:
S21. blue-tooth intelligence terminal is after the triggering receiving user is asked, and scans Bluetooth broadcast message, and broadcasts gate inhibition and detect message, and described broadcast gate inhibition detects message and includes user totem information;
S22. control of bluetooth access device scan gate inhibition detects message, calculates the signal strength values of the blue-tooth intelligence terminal scanned broadcast signal strength message, and described signal intensity message includes the MAC Address of self, user totem information and signal strength values;
S23. the signal strength values of self in the signal intensity message that the inspection of blue-tooth intelligence terminal scans, according to checking that result determines the MAC Address of target Bluetooth access control equipment, and broadcast control message of unblanking, and, described in unblank to control second in message to add confidential information be that blue-tooth intelligence terminal uses user cipher that the MAC Address of determined target Bluetooth access control equipment, door opening command are encrypted the information generated.
6. a control of bluetooth access equipment, it is characterised in that including:
Bluetooth module, is used for sending Bluetooth broadcast message, and scan blue-tooth intelligence terminal sent out broadcast unblank control message;
Authentication module, for being verified the legitimacy of user according to the control message of unblanking scanned;
Open door control module, for when being verified, controlling to open the door.
7. control of bluetooth access equipment according to claim 6, it is characterised in that
Described unblank control message include: first adds confidential information and second adds confidential information, wherein, described first add confidential information be background server use private key user totem information, room number information, user cipher are sent the information to blue-tooth intelligence terminal after being encrypted;Described second to add confidential information be that blue-tooth intelligence terminal uses the user cipher MAC Address of control of bluetooth access equipment to scanning, door opening command to be encrypted the information generated;
Described authentication module includes:
First decryption unit, is decrypted for using PKI to add confidential information to receive first, to obtain user totem information, room number information, user cipher;
According to acquired room number information, authority judging unit, for judging whether user has enabling authority;
Second decryption unit, for when user has enabling authority, using acquired user cipher to add confidential information to receive second and be decrypted, to obtain the MAC Address of control of bluetooth access equipment, door opening command;
MAC judging unit, for judging that whether the MAC Address of acquired control of bluetooth access equipment is consistent with own MAC address.
8. control of bluetooth access equipment according to claim 7, it is characterised in that
Described first add confidential information be background server use private key user totem information, room number information, user cipher, effective deadline are encrypted after send the information to blue-tooth intelligence terminal;
Described authentication module also includes date judging unit, and,
Described first decryption unit, is decrypted for using PKI to add confidential information to receive first, to obtain user totem information, room number information, user cipher, effective deadline;
Described date judging unit, for judging that current date is whether before acquired effective deadline;
According to acquired room number information, described authority judging unit, for when judging that current date is before acquired effective deadline, judging whether user has enabling authority.
9. control of bluetooth access equipment according to claim 7, it is characterised in that described second to add confidential information be that blue-tooth intelligence terminal uses the user cipher MAC Address of control of bluetooth access equipment to scanning, current time, door opening command to be encrypted the information generated;
Described authentication module also includes cutting bag judging unit, and,
Described second decryption unit, for when user has enabling authority, using acquired user cipher to add confidential information to receive second and be decrypted, to obtain the MAC Address of control of bluetooth access equipment, current time, door opening command;
Described section of bag judging unit, for when the MAC Address judging acquired control of bluetooth access equipment is consistent with own MAC address, judging whether to occur to cut bag according to acquired current time.
10. control of bluetooth access equipment according to claim 7, it is characterised in that also include Strength co-mputation module, and,
Described bluetooth module, is additionally operable to the scanning gate inhibition that broadcasts of blue-tooth intelligence terminal and detects message and broadcast signal strength message;Described broadcast gate inhibition detects message and includes user totem information, and described signal intensity message includes the MAC Address of self, user totem information and signal strength values;
Described Strength co-mputation module, calculates the signal strength values of blue-tooth intelligence terminal for detecting message according to the gate inhibition scanned;
And, described in unblank to control second in message to add confidential information be that blue-tooth intelligence terminal uses user cipher that the MAC Address of determined target Bluetooth access control equipment, door opening command are encrypted the information generated.
11. a control of bluetooth access management system, it is characterised in that include the control of bluetooth access equipment described in blue-tooth intelligence terminal and claim 6-10.
CN201610194559.1A 2016-03-30 2016-03-30 A kind of control of bluetooth access equipment, control of bluetooth access management system and method Active CN105788047B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610194559.1A CN105788047B (en) 2016-03-30 2016-03-30 A kind of control of bluetooth access equipment, control of bluetooth access management system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610194559.1A CN105788047B (en) 2016-03-30 2016-03-30 A kind of control of bluetooth access equipment, control of bluetooth access management system and method

Publications (2)

Publication Number Publication Date
CN105788047A true CN105788047A (en) 2016-07-20
CN105788047B CN105788047B (en) 2018-12-14

Family

ID=56395377

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610194559.1A Active CN105788047B (en) 2016-03-30 2016-03-30 A kind of control of bluetooth access equipment, control of bluetooth access management system and method

Country Status (1)

Country Link
CN (1) CN105788047B (en)

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106408723A (en) * 2016-10-26 2017-02-15 贵州华尚高新技术有限公司 Bluetooth intelligent lock system and unlocking method
CN106652062A (en) * 2016-11-23 2017-05-10 海尔优家智能科技(北京)有限公司 Gate control charging method and device and gate control method and device
CN106710038A (en) * 2016-11-29 2017-05-24 特斯联(北京)科技有限公司 One-key unlocking method and system based on Bluetooth as well as mobile terminal
CN107248208A (en) * 2017-04-20 2017-10-13 捷开通讯(深圳)有限公司 Access control method, terminal, access control equipment and storage device
CN107481356A (en) * 2017-06-30 2017-12-15 广州智富电子智能装备有限公司 The acquisition methods and device of a kind of unlocking method of smart lock, unlocking instruction
CN107622547A (en) * 2017-09-13 2018-01-23 广州咩也科技有限公司 Method, apparatus, storage medium and the computer equipment that terminal is unlocked
CN108597087A (en) * 2018-06-30 2018-09-28 上海爱优威软件开发有限公司 A kind of Intelligent door control system and intelligent door
CN109039588A (en) * 2018-10-16 2018-12-18 深圳市华腾物联科技有限公司 A kind of data safe transmission method and equipment based on block chain
CN109472903A (en) * 2018-11-20 2019-03-15 北京千丁互联科技有限公司 A kind of control of bluetooth access control method and its device
CN109741476A (en) * 2018-12-27 2019-05-10 北京金山安全软件有限公司 Attendance system
CN109961544A (en) * 2019-01-23 2019-07-02 广东启正电子科技有限公司 A kind of enabling control method and system
CN110070652A (en) * 2019-04-26 2019-07-30 广东昇辉电子控股有限公司 A kind of access control method, system, electronic equipment and storage medium
CN110073420A (en) * 2016-11-28 2019-07-30 江苏宏宝工具有限公司 System and method for unlocking
CN110415404A (en) * 2019-07-19 2019-11-05 佛山市拓拓网络科技有限公司 A kind of mobile phone induction system of building gate inhibition
CN110612556A (en) * 2017-05-16 2019-12-24 开利公司 Access control system with wireless communication
CN110738776A (en) * 2019-10-22 2020-01-31 飞天诚信科技股份有限公司 method and system for opening Bluetooth forbidden devices, Bluetooth equipment and working method thereof
CN111311791A (en) * 2020-02-12 2020-06-19 德施曼机电(中国)有限公司 Intelligent lock verification system and method based on Bluetooth communication
CN111478917A (en) * 2016-10-25 2020-07-31 雷飏 Background system for providing network service for access control device and user terminal
CN111491279A (en) * 2019-01-29 2020-08-04 北京骑胜科技有限公司 Bluetooth scanning method, device, equipment and computer readable storage medium
CN111554028A (en) * 2020-05-19 2020-08-18 青岛聚好联科技有限公司 Bluetooth access control system and interaction method thereof
WO2020211714A1 (en) * 2019-04-16 2020-10-22 华为技术有限公司 Bluetooth scanning method and electronic device
CN111882706A (en) * 2020-07-13 2020-11-03 深圳市国邦泰富科技有限公司 Intelligent house management method
CN112037400A (en) * 2020-09-08 2020-12-04 四川长虹电器股份有限公司 Noninductive information acquisition method based on android Bluetooth SPP
CN112330869A (en) * 2020-10-21 2021-02-05 广东省安心加科技有限公司 Door opening control method and system of Bluetooth entrance guard
CN113099393A (en) * 2021-04-02 2021-07-09 欧阳博 Method for realizing user identity authentication based on Bluetooth broadcast and application
CN113298982A (en) * 2021-05-18 2021-08-24 新疆爱华盈通信息技术有限公司 Bluetooth lock binding method and related control system
CN113313864A (en) * 2021-05-26 2021-08-27 Oppo广东移动通信有限公司 Access control method and device, wireless earphone, access control equipment and storage medium
CN113487765A (en) * 2021-06-08 2021-10-08 福建新大陆通信科技股份有限公司 CTID (computer telephony integration) access control method and system supporting dynamic encryption
CN114039786A (en) * 2021-11-12 2022-02-11 浩云科技股份有限公司 Authority verification system, equipment and computer medium
CN114677787A (en) * 2022-03-09 2022-06-28 深圳指芯物联技术有限公司 Method and system for realizing automatic unlocking based on ibeacon geo-fence

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1538632A (en) * 2003-04-15 2004-10-20 栗宏刚 Intelligent mobile identification method based on blue teeth technology and its application
CN103679885A (en) * 2013-12-02 2014-03-26 大连智慧城科技有限公司 Door control identity recognition system and method based on mobile terminal
CN104063931A (en) * 2014-06-18 2014-09-24 大连智慧城科技有限公司 Mobile internet access system based on wireless signal identification and implementation method
CN104219058A (en) * 2014-09-28 2014-12-17 小米科技有限责任公司 Identity authentication and authorization method and device
CN204288345U (en) * 2014-12-30 2015-04-22 张时铭 A kind of Intelligent controlling door lock based on bluetooth module
CN104732636A (en) * 2015-04-14 2015-06-24 重庆特斯联科技有限公司 Bluetooth cellphone-based intelligent community access control system and method
CN204492482U (en) * 2015-02-11 2015-07-22 西南大学 A kind of smart electronics threshold lock
CN204531545U (en) * 2015-03-21 2015-08-05 孟祥涛 A kind of long-distance remote control berth lock based on multiple control modes
CN104853354A (en) * 2015-05-18 2015-08-19 深圳门萨通信科技有限公司 Bluetooth authentication method and system thereof
WO2015130834A1 (en) * 2014-02-28 2015-09-03 Alibaba Group Holding Limited Establishing communication between devices

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1538632A (en) * 2003-04-15 2004-10-20 栗宏刚 Intelligent mobile identification method based on blue teeth technology and its application
CN103679885A (en) * 2013-12-02 2014-03-26 大连智慧城科技有限公司 Door control identity recognition system and method based on mobile terminal
WO2015130834A1 (en) * 2014-02-28 2015-09-03 Alibaba Group Holding Limited Establishing communication between devices
CN104063931A (en) * 2014-06-18 2014-09-24 大连智慧城科技有限公司 Mobile internet access system based on wireless signal identification and implementation method
CN104219058A (en) * 2014-09-28 2014-12-17 小米科技有限责任公司 Identity authentication and authorization method and device
CN204288345U (en) * 2014-12-30 2015-04-22 张时铭 A kind of Intelligent controlling door lock based on bluetooth module
CN204492482U (en) * 2015-02-11 2015-07-22 西南大学 A kind of smart electronics threshold lock
CN204531545U (en) * 2015-03-21 2015-08-05 孟祥涛 A kind of long-distance remote control berth lock based on multiple control modes
CN104732636A (en) * 2015-04-14 2015-06-24 重庆特斯联科技有限公司 Bluetooth cellphone-based intelligent community access control system and method
CN104853354A (en) * 2015-05-18 2015-08-19 深圳门萨通信科技有限公司 Bluetooth authentication method and system thereof

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111478917A (en) * 2016-10-25 2020-07-31 雷飏 Background system for providing network service for access control device and user terminal
CN106408723A (en) * 2016-10-26 2017-02-15 贵州华尚高新技术有限公司 Bluetooth intelligent lock system and unlocking method
CN106652062A (en) * 2016-11-23 2017-05-10 海尔优家智能科技(北京)有限公司 Gate control charging method and device and gate control method and device
CN110073420A (en) * 2016-11-28 2019-07-30 江苏宏宝工具有限公司 System and method for unlocking
CN106710038A (en) * 2016-11-29 2017-05-24 特斯联(北京)科技有限公司 One-key unlocking method and system based on Bluetooth as well as mobile terminal
CN107248208A (en) * 2017-04-20 2017-10-13 捷开通讯(深圳)有限公司 Access control method, terminal, access control equipment and storage device
CN107248208B (en) * 2017-04-20 2020-02-21 捷开通讯(深圳)有限公司 Access control method, terminal, access control equipment and storage device
CN110612556A (en) * 2017-05-16 2019-12-24 开利公司 Access control system with wireless communication
CN107481356A (en) * 2017-06-30 2017-12-15 广州智富电子智能装备有限公司 The acquisition methods and device of a kind of unlocking method of smart lock, unlocking instruction
CN107622547A (en) * 2017-09-13 2018-01-23 广州咩也科技有限公司 Method, apparatus, storage medium and the computer equipment that terminal is unlocked
CN108597087A (en) * 2018-06-30 2018-09-28 上海爱优威软件开发有限公司 A kind of Intelligent door control system and intelligent door
CN109039588A (en) * 2018-10-16 2018-12-18 深圳市华腾物联科技有限公司 A kind of data safe transmission method and equipment based on block chain
CN109472903A (en) * 2018-11-20 2019-03-15 北京千丁互联科技有限公司 A kind of control of bluetooth access control method and its device
CN109741476A (en) * 2018-12-27 2019-05-10 北京金山安全软件有限公司 Attendance system
CN109961544A (en) * 2019-01-23 2019-07-02 广东启正电子科技有限公司 A kind of enabling control method and system
CN111491279B (en) * 2019-01-29 2022-02-25 北京骑胜科技有限公司 Bluetooth scanning method, device, equipment and computer readable storage medium
CN111491279A (en) * 2019-01-29 2020-08-04 北京骑胜科技有限公司 Bluetooth scanning method, device, equipment and computer readable storage medium
WO2020211714A1 (en) * 2019-04-16 2020-10-22 华为技术有限公司 Bluetooth scanning method and electronic device
US11849376B2 (en) 2019-04-16 2023-12-19 Huawei Technologies Co., Ltd. Bluetooth scanning method and electronic device
CN110070652A (en) * 2019-04-26 2019-07-30 广东昇辉电子控股有限公司 A kind of access control method, system, electronic equipment and storage medium
CN110415404A (en) * 2019-07-19 2019-11-05 佛山市拓拓网络科技有限公司 A kind of mobile phone induction system of building gate inhibition
CN110738776A (en) * 2019-10-22 2020-01-31 飞天诚信科技股份有限公司 method and system for opening Bluetooth forbidden devices, Bluetooth equipment and working method thereof
CN111311791A (en) * 2020-02-12 2020-06-19 德施曼机电(中国)有限公司 Intelligent lock verification system and method based on Bluetooth communication
CN111554028A (en) * 2020-05-19 2020-08-18 青岛聚好联科技有限公司 Bluetooth access control system and interaction method thereof
CN111882706A (en) * 2020-07-13 2020-11-03 深圳市国邦泰富科技有限公司 Intelligent house management method
CN112037400A (en) * 2020-09-08 2020-12-04 四川长虹电器股份有限公司 Noninductive information acquisition method based on android Bluetooth SPP
CN112330869A (en) * 2020-10-21 2021-02-05 广东省安心加科技有限公司 Door opening control method and system of Bluetooth entrance guard
CN113099393A (en) * 2021-04-02 2021-07-09 欧阳博 Method for realizing user identity authentication based on Bluetooth broadcast and application
CN113298982A (en) * 2021-05-18 2021-08-24 新疆爱华盈通信息技术有限公司 Bluetooth lock binding method and related control system
CN113313864A (en) * 2021-05-26 2021-08-27 Oppo广东移动通信有限公司 Access control method and device, wireless earphone, access control equipment and storage medium
CN113487765A (en) * 2021-06-08 2021-10-08 福建新大陆通信科技股份有限公司 CTID (computer telephony integration) access control method and system supporting dynamic encryption
CN114039786A (en) * 2021-11-12 2022-02-11 浩云科技股份有限公司 Authority verification system, equipment and computer medium
CN114677787A (en) * 2022-03-09 2022-06-28 深圳指芯物联技术有限公司 Method and system for realizing automatic unlocking based on ibeacon geo-fence

Also Published As

Publication number Publication date
CN105788047B (en) 2018-12-14

Similar Documents

Publication Publication Date Title
CN105788047A (en) Bluetooth access control device, Bluetooth access control management system and Bluetooth access control management method
CN105894627A (en) Bluetooth access control equipment and bluetooth access control management system and method
US10089810B1 (en) Rolling code based proximity verification for entry access
US9824193B2 (en) Method for using mobile devices with validated user network identity as physical identity proof
US9787683B2 (en) Seamless wi-fi subscription remediation
CN103634795B (en) Radio communication device and method
RU2010131184A (en) AUTHENTICATION ACCESS METHOD AND AUTHENTICATION ACCESS SYSTEM IN A WIRELESS MULTIPLOCKING NETWORK
CN106056707A (en) Residential quarter network access control scheme
EP2579220A1 (en) Entrance guard control method and system thereof
CN106127890A (en) Control of bluetooth access equipment, Bluetooth terminal, control of bluetooth access management system and method
JP2001345819A (en) Access point device and method of authentication processing therefor
CN101212798B (en) Pre-authentication process that supports quick switching
CN109920100B (en) Unlocking method and system of intelligent lock
US8638718B2 (en) Radio base transceiver station and method of connecting the same to network
CN102143492B (en) Method for establishing virtual private network (VPN) connection, mobile terminal and server
CN1659898B (en) Determining the state of a station in a local area
CN104837136B (en) Wireless access authentication method and device
CN111199601A (en) Access control method and device, intelligent terminal, server and storage medium
CN112640387B (en) non-SI device, method, and computer readable and/or microprocessor executable medium for wireless connection
CN104424676A (en) Identity information sending method, identity information sending device, access control card reader and access control system
EP3523989B1 (en) Iot device connectivity provisioning
CN109472903A (en) A kind of control of bluetooth access control method and its device
JP2011528203A (en) Method and associated apparatus for managing a communication network
KR101692161B1 (en) System and method for authorization using beacon transmitter and one-time password
CN105208557B (en) A kind of safety establishes the method and wireless router of WIFI connection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant