CN105894627B - A kind of control of bluetooth access equipment, control of bluetooth access management system and method - Google Patents
A kind of control of bluetooth access equipment, control of bluetooth access management system and method Download PDFInfo
- Publication number
- CN105894627B CN105894627B CN201610194903.7A CN201610194903A CN105894627B CN 105894627 B CN105894627 B CN 105894627B CN 201610194903 A CN201610194903 A CN 201610194903A CN 105894627 B CN105894627 B CN 105894627B
- Authority
- CN
- China
- Prior art keywords
- control
- bluetooth
- access equipment
- bluetooth access
- blue
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00412—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/08—With time considerations, e.g. temporary activation, valid time window or time limitations
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Lock And Its Accessories (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
The present invention relates to a kind of control of bluetooth access equipment, control of bluetooth access management system and methods, the control of bluetooth access management method includes: blue-tooth intelligence terminal after receiving the trigger request of user, the Bluetooth broadcast message that control of bluetooth access equipment issues is scanned, and sends Bluetooth connection request to control of bluetooth access equipment;Control of bluetooth access equipment from extract the MAC Address of the blue-tooth intelligence terminal in received Bluetooth connection request, and judge that extracted MAC Address whether there is in white list;Control of bluetooth access equipment when judging that extracted MAC Address is present in white list, open the door by control.The present invention also constructs a kind of control of bluetooth access management system and its control of bluetooth access equipment.Implement technical solution of the present invention, substantially reduce opening time, moreover, can more people open the door simultaneously.
Description
Technical field
The present invention relates to field of electronic device more particularly to a kind of control of bluetooth access equipment, control of bluetooth access management system and side
Method.
Background technique
In today that digitizing technique and network technology develop rapidly, gate inhibition's technology is also grown rapidly, it is already
Simple gateway and key management are surmounted, have been developing progressively the access management system for complete set, has become and solve important portion
Door entrance realizes the effective measures of safety precaution management, various confidential departments is applicable in, such as intellectual communityintellectualized village, bank, hotel, machine
Room, armory, factory etc..
Since Bluetooth transmission can realize that equipment short distance is read, access control system is set using bluetooth more and more
It is standby to realize that automatic authorization opens the door to substitute contact card reader.Currently, control of bluetooth access management system is opened at APP layers
Hair, for example, enabling process are as follows: when user reaches desired enabling at gate inhibition, need first to set in blue-tooth intelligence terminal with control of bluetooth access
A Bluetooth data channel is established between standby, by the Bluetooth data channel, blue-tooth intelligence terminal could be sent out to control of bluetooth access equipment
Door opening command is sent, control of bluetooth access equipment is opened the door when verifying legal.However, this bluetooth door opening method is lacked there are following
It falls into:
1. scanning and connection take a long time, slow so as to cause enabling speed when establishing Bluetooth data channel;
2. Bluetooth protocol only allows to establish a bluetooth connection, can not open the door simultaneously so as to cause more people.
Summary of the invention
The technical problem to be solved in the present invention is that in view of the above drawbacks of the prior art, a kind of control of bluetooth access is provided and is set
Standby, control of bluetooth access management system and method, can shorten opening time, and can more people open the door simultaneously.
The technical solution adopted by the present invention to solve the technical problems is: constructing a kind of control of bluetooth access management method, comprising:
S10. for blue-tooth intelligence terminal after receiving the trigger request of user, the bluetooth that scanning control of bluetooth access equipment issues is wide
Message is broadcast, and sends Bluetooth connection request to control of bluetooth access equipment;
S20. control of bluetooth access equipment from the MAC of the blue-tooth intelligence terminal is extracted in received Bluetooth connection request
Location, and judge that extracted MAC Address whether there is in white list, and when being, execute step S30, the white list packet
Include the MAC Address list of the blue-tooth intelligence terminal authorized;
S30. control of bluetooth access equipment control is opened the door.
Preferably, the white list further includes effective deadline corresponding to each blue-tooth intelligence terminal authorized;
The step S20 are as follows:
Control of bluetooth access equipment from the MAC Address of the blue-tooth intelligence terminal is extracted in received Bluetooth connection request, and
Judge that extracted MAC Address whether there is in white list, and when being, judges whether current date effectively cuts corresponding
Only before the date, if so, thening follow the steps S30.
Preferably, further includes:
S40. control of bluetooth access equipment is when judging that extracted MAC Address is not present in white list, according to being received
Connection request and blue-tooth intelligence terminal establish bluetooth connection;
S50. blue-tooth intelligence terminal sends unlocking control instruction to control of bluetooth access equipment;
S60. control of bluetooth access equipment according to received unlocking control instruction the legitimacy of user is verified;
S70. control of bluetooth access equipment when being verified, open the door, and extracted MAC Address is stored in white list by control
In.
Preferably, further includes:
S00. when user registers before first use, blue-tooth intelligence terminal is received first transmitted by background server
Encryption information, and received first encryption information of institute being decrypted using public key, to obtain user password, wherein described the
One encryption information be background server using private key to user identity information, room number information, user password, effective deadline into
Row encrypts information generated;
Moreover, the unlocking control instruction includes: the first encryption information and the second encryption information, wherein described second adds
Confidential information is encrypted by the ID using the order of user password clamshell doors, the control of bluetooth access equipment that bluetooth connection has been established and is generated
Information;
The step S60 includes:
S61. control of bluetooth access equipment is decrypted received first encryption information of institute using public key, to obtain user identifier
Information, room number information, user password, effective deadline;
S62. whether control of bluetooth access equipment judges current date before acquired effective deadline;
S63. control of bluetooth access equipment is when judging that current date is before acquired effective deadline, according to acquired
Room number information judges whether user has enabling permission;
S64. control of bluetooth access equipment is when user has enabling permission, using acquired user password to institute received second
Encryption information is decrypted, to obtain the ID of door opening command and control of bluetooth access equipment;
S65. whether the acquired ID of control of bluetooth access equipment judgement is consistent with self ID;
The step S70 are as follows:
Control of bluetooth access equipment when being verified, open the door by control, and acquired cuts extracted MAC Address and effectively
Only date storage is in white list.
Preferably, second encryption information is using the order of user password clamshell doors, the bluetooth of bluetooth connection has been established
The ID of access control equipment, current time carry out encrypting information generated;Moreover,
The step S64 are as follows:
Control of bluetooth access equipment uses the second encryption received to institute of acquired user password when user has enabling permission
Information is decrypted, to obtain door opening command, the ID of control of bluetooth access equipment, current time;
After the step S65, further includes:
S66. control of bluetooth access equipment is when whether the acquired ID of judgement consistent with self ID, according to it is acquired current when
Between judge whether occur cut packet.
The present invention also constructs a kind of control of bluetooth access equipment, comprising:
Bluetooth module receives Bluetooth connection request for sending Bluetooth broadcast message, and from blue-tooth intelligence terminal;
Extraction module, for from the MAC Address of the blue-tooth intelligence terminal is extracted in received Bluetooth connection request;
Judgment module, for judging that extracted MAC Address whether there is in white list, the white list includes having awarded
The MAC Address list of the blue-tooth intelligence terminal of power;
Enabling control module, for when judging that extracted MAC Address is present in white list, control to be opened the door.
Preferably, the white list further includes effective deadline corresponding to each blue-tooth intelligence terminal authorized;
Moreover,
The judgment module is also used to judge current date when judging that extracted MAC Address is present in white list
Whether before the corresponding effectively deadline;
The enabling control module is also used to when judging that current date is before the corresponding effectively deadline, and control is opened
Door.
It preferably, further include authentication module and adding module, moreover,
The bluetooth module is also used to establish bluetooth company according to the received Bluetooth connection request of institute and blue-tooth intelligence terminal
It connects, and receives unlocking control instruction from blue-tooth intelligence terminal;
The authentication module, for according to received unlocking control instruction the legitimacy of user is verified;
The enabling control module, is also used to when being verified, and control is opened the door;
The adding module, for when being verified, extracted MAC Address to be stored in white list.
Preferably, the unlocking control instruction includes: the first encryption information and the second encryption information, wherein described first
Encryption information is that background server carries out user identity information, room number information, user password, effective deadline using private key
Encryption generates and sends to the information of blue-tooth intelligence terminal;Second encryption information is that blue-tooth intelligence terminal is close using user
Code clamshell doors order, the control of bluetooth access equipment that bluetooth connection has been established ID carry out encrypting information generated;
The authentication module includes:
First decryption unit, for received first encryption information of institute to be decrypted using public key, to obtain user's mark
Know information, room number information, user password, effective deadline;
Date judging unit, for judging current date whether before acquired effective deadline;Permission judgement is single
Member, for judging user according to acquired room number information when judging that current date is before acquired effective deadline
Whether enabling permission is had;
Second decryption unit uses acquired user password received to institute for when user has enabling permission
Two encryption information are decrypted, to obtain the ID of door opening command and control of bluetooth access equipment;
ID judging unit, for judging whether acquired ID is consistent with self ID, if unanimously, being verified;
Moreover,
The adding module is also used to when being verified, and acquired effective deadline is stored in white list.
Preferably, second encryption information be blue-tooth intelligence terminal using the order of user password clamshell doors, indigo plant has been established
The ID of the control of bluetooth access equipment of tooth connection, current time carry out encrypting information generated;
The authentication module further includes a section packet judging unit, moreover,
Second decryption unit uses acquired user password received to institute for when user has enabling permission
Two encryption information are decrypted, to obtain door opening command, the ID of control of bluetooth access equipment, current time;
Described section of packet judging unit, for when the acquired ID of judgement is consistent with self ID, according to acquired current
Time judges whether to occur to cut packet.
The present invention also constructs a kind of control of bluetooth access management system, including blue-tooth intelligence terminal and above-described control of bluetooth access
Equipment.
Implement technical solution of the present invention, the connection request that control of bluetooth access equipment is issued according to blue-tooth intelligence terminal can be sentenced
It is disconnected whether to open the door, have no whether the Bluetooth data channel created dependent on bluetooth connection itself can successfully complete, because
This, not only shortens opening time, but also supports more people while opening the door.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.In attached drawing:
Fig. 1 is the flow chart of control of bluetooth access management method embodiment one of the present invention;
Fig. 2 is the flow chart of control of bluetooth access management method embodiment two of the present invention;
Fig. 3 is the building-block of logic of control of bluetooth access management system embodiment one of the present invention;
Fig. 4 is the building-block of logic of control of bluetooth access apparatus embodiments one in Fig. 3;
Fig. 5 is the building-block of logic of control of bluetooth access apparatus embodiments two in Fig. 3;
Fig. 6 is the building-block of logic of authentication module embodiment one in Fig. 5.
Specific embodiment
Fig. 1 is the flow chart of control of bluetooth access management method embodiment one of the present invention, the control of bluetooth access manager of the embodiment
Method the following steps are included:
Step S10. blue-tooth intelligence terminal is after receiving the trigger request of user, the indigo plant of scanning control of bluetooth access equipment sending
Tooth broadcast message, and Bluetooth connection request is sent to control of bluetooth access equipment.In this step, control of bluetooth access equipment as bluetooth from
Equipment continuously sends out Bluetooth broadcast message.It is reached near control of bluetooth access equipment when user carries blue-tooth intelligence terminal, and needs to open
When door enters, user can trigger the key on the APP of blue-tooth intelligence terminal, and blue-tooth intelligence terminal is asked in the triggering for receiving user
After asking, start to scan Bluetooth broadcast message as bluetooth master, and send Bluetooth connection request, the indigo plant to control of bluetooth access equipment
It include the MAC Address of itself in tooth connection request.
Step S20. control of bluetooth access equipment from the MAC of the blue-tooth intelligence terminal is extracted in received Bluetooth connection request
Address, and judge that extracted MAC Address whether there is in white list, if so, thening follow the steps S30.In this step, blue
It is also stored with white list in tooth access control equipment, which is the MAC Address of the blue-tooth intelligence terminal of legitimate user (authorization)
List.
The control of step S30. control of bluetooth access equipment is opened the door.
Implement the technical solution of the embodiment, the connection request that control of bluetooth access equipment is issued according to blue-tooth intelligence terminal
It judges whether to open the door, has no whether the Bluetooth data channel created dependent on bluetooth connection itself can successfully complete,
Therefore, opening time is not only shortened, but also supports more people while opening the door.
Further, white list may also include every other than including the MAC Address list of the blue-tooth intelligence terminal authorized
Effective deadline corresponding to a blue-tooth intelligence terminal authorized;Moreover, step S20 are as follows:
Control of bluetooth access equipment from the MAC Address of the blue-tooth intelligence terminal is extracted in received Bluetooth connection request, and
Judge that extracted MAC Address whether there is in white list, and when being, judges whether current date effectively cuts corresponding
Only before the date, if so, thening follow the steps S30.
In this embodiment, carry out open the door control when, in addition to judge user blue-tooth intelligence terminal MAC Address whether
It is legal outer, the current enabling date is also judged whether before effective deadline, can prevent user from moving away from cell so subsequent
The gate inhibition in continuous Kaiyuan dwelling.
Fig. 2 is the flow chart of control of bluetooth access management method embodiment two of the present invention, the control of bluetooth access manager of the embodiment
Method the following steps are included:
Step S10. blue-tooth intelligence terminal is after receiving the trigger request of user, the indigo plant of scanning control of bluetooth access equipment sending
Tooth broadcast message, and Bluetooth connection request is sent to control of bluetooth access equipment.In this step, control of bluetooth access equipment as bluetooth from
Equipment continuously sends out Bluetooth broadcast message.It is reached near control of bluetooth access equipment when user carries blue-tooth intelligence terminal, and needs to open
When door enters, user can trigger the key on the APP of blue-tooth intelligence terminal, and blue-tooth intelligence terminal is asked in the triggering for receiving user
After asking, start to scan Bluetooth broadcast message as bluetooth master, and send Bluetooth connection request, the indigo plant to control of bluetooth access equipment
It include the MAC Address of itself in tooth connection request.
Step S20. control of bluetooth access equipment from the MAC of the blue-tooth intelligence terminal is extracted in received Bluetooth connection request
Address, and judge that extracted MAC Address whether there is in white list, if so, thening follow the steps S30;If it is not, then executing step
Rapid S40.
The control of step S30. control of bluetooth access equipment is opened the door.
Step S40. establishes bluetooth connection according to the received connection request of institute and blue-tooth intelligence terminal.In this step, it needs
Illustrate, as long as illustrating that the user is for the first time in the bluetooth when judging that extracted MAC Address does not exist in white list
It opens the door at access control equipment, just needs to establish bluetooth connection with blue-tooth intelligence terminal at this time.
Step S50. blue-tooth intelligence terminal sends unlocking control instruction to control of bluetooth access equipment.
Step S60. control of bluetooth access equipment according to received unlocking control instruction the legitimacy of user is verified, if
It is verified, thens follow the steps S70;If verifying does not pass through, illustrate that the user is illegal user, without opening the door.
The control of step S70. control of bluetooth access equipment is opened the door, and extracted MAC Address is stored in white list.In the step
In rapid, it should be noted that, control of bluetooth access equipment can carry out self study after good authentication user validation, by the legitimate user
MAC Address be recorded in white list, in case subsequent use.
Preferably, need opened the door using unlocking control instruction when, can based on public key infrastructure to user validation into
Row verifying.Illustrate first, background server manages multiple cells, a public private key pair is distributed for each cell, in cell
The public key of this built-in cell of each control of bluetooth access equipment.Moreover, when user is when moving in cell, Xiang Houtai server registration
(APP of intelligent terminal can be used to be registered) room number information (for example, the room * * cell * * * *), phone number, to open door
Prohibit.The phone number that background server is reserved according to user is verified (such as short-message verification) to the phone number registered,
After being proved to be successful, a character string is generated for the user, wherein including " user identity information (AppID)+room number information+use
Family password+effective deadline ", and with the corresponding private key encryption of the cell.
In this way, in the preferred embodiment, before step S10, further includes:
S00. when user registers before first use, blue-tooth intelligence terminal is received first transmitted by background server
Encryption information (i.e. above-mentioned character string), and received first encryption information of institute is decrypted using public key, it is close to obtain user
Code, wherein first encryption information be background server using private key to user identity information, room number information, user password,
Effective deadline carries out encrypting information generated;
In step s 50, unlocking control instruction transmitted by blue-tooth intelligence terminal includes: the first encryption information and the second encryption
Information, wherein the second encryption information is using the order of user password clamshell doors, the control of bluetooth access equipment that bluetooth connection has been established
ID carries out encrypting information generated;
Moreover, step S60 specifically includes the following steps:
Step S61. control of bluetooth access equipment is decrypted received first encryption information of institute using public key, to obtain user
Identification information, room number information, user password, effective deadline;
Whether step S62. control of bluetooth access equipment judges current date before acquired effective deadline;
Step S63. control of bluetooth access equipment is when judging that current date is before acquired effective deadline, according to being obtained
The room number information taken judges whether user has enabling permission, for example, acquired room number information is 8 rooms 1203 of A cell, when this
After control of bluetooth access equipment at A cell doorway or at 8 doorways gets the room number information, so that it may judge that the user has enabling to weigh
Limit, still, if after the control of bluetooth access equipment at 9 doorways gets the room number information, so that it may judge the user without enabling permission;
Step S64. control of bluetooth access equipment is received to institute using acquired user password when user has enabling permission
Second encryption information is decrypted, and to obtain the ID of door opening command and control of bluetooth access equipment, the ID of the control of bluetooth access equipment is for example
For MAC Address;
Whether the acquired ID of step S65. control of bluetooth access equipment judgement is consistent with self ID, if unanimously, illustrating that this is opened
Door control instruction is intended for oneself, and verifying can pass through at this time.
Meanwhile step S70 are as follows:
Control of bluetooth access equipment when being verified, open the door by control, and acquired cuts extracted MAC Address and effectively
Only date storage is in white list.In this step, control of bluetooth access equipment can be learnt by oneself after good authentication user validation
It practises, effective deadline of the blue-tooth intelligence terminal of the legitimate user is recorded in white list, in case subsequent use.
Further, on the basis of the above embodiments, the second encryption information is using the order of user password clamshell doors,
Establish the ID of the control of bluetooth access equipment of bluetooth connection, current time carries out encrypting information generated.Moreover,
Step S64 are as follows: control of bluetooth access equipment is when user has enabling permission, using acquired user password to being received
The second encryption information be decrypted, to obtain door opening command, the ID of control of bluetooth access equipment, current time.
After step S65, further includes:
Step S66. control of bluetooth access equipment when the acquired ID of judgement is consistent with self ID, according to it is acquired current when
Between judge whether occur cut packet, in this way, being retransmitted after illegal user's data intercept packet can be prevented.If being verified most without occurring to cut packet
Pass through eventually.
Fig. 3 is the building-block of logic of control of bluetooth access management system embodiment one of the present invention, which includes indigo plant
Tooth access control equipment 10 and blue-tooth intelligence terminal 20, wherein control of bluetooth access equipment 10 may be provided at cell doorway, the door in every building
At mouthful etc., blue-tooth intelligence terminal is, for example, smart phone, and APP is equipped in the blue-tooth intelligence terminal, and the APP can be used in user
Carry out user's registration, enabling etc..
Fig. 4 is the building-block of logic of control of bluetooth access apparatus embodiments one in Fig. 3, which includes: bluetooth mould
Block 11, extraction module 12, judgment module 13 and enabling control module 14, wherein bluetooth module 11 disappears for sending Bluetooth broadcast
Breath, and Bluetooth connection request is received from blue-tooth intelligence terminal.Extraction module 12 is used to from the received Bluetooth connection request of institute mention
Take the MAC Address of the blue-tooth intelligence terminal.Judgment module 13 is for judging that extracted MAC Address whether there is in white list
In, the white list includes the MAC Address list of the blue-tooth intelligence terminal authorized.Enabling control module 14 is used for judging
When the MAC Address of extraction is present in white list, control is opened the door.
Preferably, white list further includes effective deadline corresponding to each blue-tooth intelligence terminal authorized.Moreover,
Whether judgment module 13 is also used to when judging that extracted MAC Address is present in white list, judge current date corresponding
Effective deadline before;Enabling control module 14 is also used to when judging that current date is before the corresponding effectively deadline,
Control is opened the door.
Fig. 5 is the building-block of logic of control of bluetooth access apparatus embodiments two in Fig. 3, and the control of bluetooth access equipment of the embodiment is compared
Embodiment shown in Fig. 4 further includes authentication module 15 and adding module 16.Moreover, bluetooth module 11 is also used to according to being received
Bluetooth connection request and blue-tooth intelligence terminal establish bluetooth connection, and receive unlocking control instruction from blue-tooth intelligence terminal.It tests
Card module 15 be used for according to received unlocking control instruction the legitimacy of user is verified.Enabling control module 14 is also used
In when being verified, control is opened the door.Adding module 16 is used for when being verified, and extracted MAC Address is stored in white
In list.
Preferably, the control of bluetooth access management system can be designed based on public key infrastructure, illustrated first, background server pipe
Multiple cells are managed, distribute a public private key pair for each cell, the public affairs of this built-in cell of each control of bluetooth access equipment in cell
Key.Moreover, when user is when moving in cell, Xiang Houtai server registration (APP of intelligent terminal can be used to be registered) room number
Information (for example, the room * * cell * * * *), phone number, to open gate inhibition.The cell-phone number that background server is reserved according to user
Code, is verified (such as short-message verification) to the phone number registered, and after being proved to be successful, generates a character for the user
String, wherein including " user identity information (AppID)+room number information+user password+effective deadline ", and with the cell pair
The private key encryption answered.
The 11 received unlocking control instruction of institute of bluetooth module includes the first encryption information and the second encryption information, wherein institute
Stating the first encryption information is that background server uses private key to user identity information, room number information, user password, effective deadline
Phase is encrypted the information generated and sent to blue-tooth intelligence terminal;Second encryption information is the use of blue-tooth intelligence terminal
The order of user password clamshell doors, the ID of control of bluetooth access equipment that bluetooth connection has been established, current time encrypt generated
Information.
Authentication module as shown in connection with fig. 6, the authentication module of the embodiment include the first decryption unit 151, date judgement
Unit 152, permission judging unit 153, the second decryption unit 154, ID judging unit 155 and section packet judging unit 156.Wherein,
First decryption unit 151 is used to that received first encryption information of institute to be decrypted using public key, with obtain user identity information,
Room number information, user password, effective deadline.Whether date judging unit 152 is for judging current date acquired
Before effective deadline.Permission judging unit 153 is used for the root when judging that current date is before acquired effective deadline
Judge whether user has enabling permission according to acquired room number information.Second decryption unit 154 is used to have enabling permission in user
When, received second encryption information of institute is decrypted using acquired user password, to obtain door opening command and bluetooth door
Prohibit the ID of equipment.ID judging unit 155 is used to judge whether acquired ID to be consistent with self ID.Packet judging unit 156 is cut to use
In when the acquired ID of judgement is consistent with self ID, judge whether to occur to cut packet according to acquired current time, if without hair
It is raw to cut packet, it is verified at this time.Moreover, adding module is also used to when being verified, acquired effective deadline is deposited
It is stored in white list.
It is last it should be noted that, above only one embodiment of the present of invention can save wherein one in other embodiments
A or multiple units, for example, cutting packet judging unit 156, this is also within the scope of the present invention.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any bun
Change, equivalent replacement, improvement etc., should be included within scope of the presently claimed invention.
Claims (7)
1. a kind of control of bluetooth access management method characterized by comprising
S10. after receiving the trigger request of user, the Bluetooth broadcast that scanning control of bluetooth access equipment issues disappears blue-tooth intelligence terminal
Breath, and Bluetooth connection request is sent to control of bluetooth access equipment, it include the MAC Address of itself in the Bluetooth connection request;
S20. control of bluetooth access equipment from the MAC Address of the blue-tooth intelligence terminal is extracted in received Bluetooth connection request, and
Judge that extracted MAC Address whether there is in white list, and when being, executes step S30;When no, step is executed
S40;The white list includes the MAC Address list of the blue-tooth intelligence terminal authorized;
S30. control of bluetooth access equipment control is opened the door;
S40. control of bluetooth access equipment establishes bluetooth connection according to the received connection request of institute and blue-tooth intelligence terminal;
S50. blue-tooth intelligence terminal sends unlocking control instruction to control of bluetooth access equipment, and the unlocking control instruction includes: first
Encryption information and the second encryption information, wherein first encryption information is that background server believes user identifier using private key
Breath, room number information, user password, effective deadline carry out encrypting information generated, moreover, user before first use into
When row registration, blue-tooth intelligence terminal receives the first encryption information transmitted by background server, and received to institute using public key
First encryption information is decrypted, to obtain user password;Second encryption information be using the order of user password clamshell doors,
The ID that the control of bluetooth access equipment of bluetooth connection has been established carries out encrypting information generated;
S60. control of bluetooth access equipment according to received unlocking control instruction the legitimacy of user is verified;
S70. control of bluetooth access equipment when being verified, open the door, and extracted MAC Address is stored in white list by control;
Moreover,
The step S60 includes:
S61. control of bluetooth access equipment is decrypted received first encryption information of institute using public key, to obtain user identifier letter
Breath, room number information, user password, effective deadline;
S62. whether control of bluetooth access equipment judges current date before acquired effective deadline;
S63. control of bluetooth access equipment is when judging that current date is before acquired effective deadline, according to acquired room number
Information judges whether user has enabling permission;
S64. control of bluetooth access equipment uses the second encryption received to institute of acquired user password when user has enabling permission
Information is decrypted, to obtain the ID of door opening command and control of bluetooth access equipment;
S65. whether the acquired ID of control of bluetooth access equipment judgement is consistent with self ID.
2. control of bluetooth access management method according to claim 1, which is characterized in that
The white list further includes effective deadline corresponding to each blue-tooth intelligence terminal authorized;
The step S20 are as follows:
Control of bluetooth access equipment from extract the MAC Address of the blue-tooth intelligence terminal in received Bluetooth connection request, and judge
Whether extracted MAC Address whether there is in white list, and when being, judge current date in corresponding effective deadline
Before phase, if so, thening follow the steps S30.
3. control of bluetooth access management method according to claim 1, which is characterized in that
Second encryption information is using the order of user password clamshell doors, the control of bluetooth access equipment that bluetooth connection has been established
ID, current time carry out encrypting information generated;Moreover,
The step S64 are as follows:
Control of bluetooth access equipment is when user has enabling permission, using acquired user password to received second encryption information of institute
It is decrypted, to obtain door opening command, the ID of control of bluetooth access equipment, current time;
After the step S65, further includes:
S66. control of bluetooth access equipment is sentenced when whether the acquired ID of judgement is consistent with self ID according to acquired current time
It is disconnected whether to occur to cut packet.
4. a kind of control of bluetooth access equipment characterized by comprising
Bluetooth module receives Bluetooth connection request for sending Bluetooth broadcast message, and from blue-tooth intelligence terminal, and the bluetooth connects
Connect the MAC Address in request comprising itself;It is also used to when judging that extracted MAC Address is not present in white list, according to
The received Bluetooth connection request of institute and blue-tooth intelligence terminal establish bluetooth connection, and receive control of unlocking from blue-tooth intelligence terminal and refer to
It enables, the unlocking control instruction includes: the first encryption information and the second encryption information, wherein after first encryption information is
Platform server using private key to user identity information, room number information, user password, effective deadline is encrypted generates simultaneously
It is sent to the information of blue-tooth intelligence terminal;Second encryption information is that blue-tooth intelligence terminal is ordered using user password clamshell doors
Enable, have been established the ID of the control of bluetooth access equipment of bluetooth connection to carry out encrypting information generated;
Extraction module, for from the MAC Address of the blue-tooth intelligence terminal is extracted in received Bluetooth connection request;
Judgment module, for judging that extracted MAC Address whether there is in white list, the white list includes having authorized
The MAC Address list of blue-tooth intelligence terminal;
Authentication module, for according to received unlocking control instruction the legitimacy of user is verified;
Enabling control module, for when judging that extracted MAC Address is present in white list, control enabling to be also used to
When being verified, control is opened the door;
Adding module, for when being verified, extracted MAC Address to be stored in white list;
The authentication module includes:
First decryption unit, for received first encryption information of institute to be decrypted using public key, to obtain user identifier letter
Breath, room number information, user password, effective deadline;
Date judging unit, for judging current date whether before acquired effective deadline;Permission judging unit is used
In when judging that current date is before acquired effective deadline, judge whether user has according to acquired room number information
Enabling permission;
Second decryption unit, for being added to institute received second using acquired user password when user has enabling permission
Confidential information is decrypted, to obtain the ID of door opening command and control of bluetooth access equipment;
ID judging unit, for judging whether acquired ID is consistent with self ID, if unanimously, being verified.
5. control of bluetooth access equipment according to claim 4, which is characterized in that
The white list further includes effective deadline corresponding to each blue-tooth intelligence terminal authorized;Moreover,
The judgment module is also used to whether judge current date when judging that extracted MAC Address is present in white list
Before the corresponding effectively deadline;
The enabling control module is also used to when judging that current date is before the corresponding effectively deadline, and control is opened the door.
6. control of bluetooth access equipment according to claim 4, which is characterized in that second encryption information is that blue-tooth intelligence is whole
End carries out encryption institute using the order of user password clamshell doors, the ID for the control of bluetooth access equipment that bluetooth connection has been established, current time
The information of generation;
The authentication module further includes a section packet judging unit, moreover,
Second decryption unit, for being added to institute received second using acquired user password when user has enabling permission
Confidential information is decrypted, to obtain door opening command, the ID of control of bluetooth access equipment, current time;
Described section of packet judging unit, when consistent with self ID for the ID acquired in judgement, according to acquired current time
Judge whether to occur to cut packet.
7. a kind of control of bluetooth access management system, which is characterized in that including described in blue-tooth intelligence terminal and claim any one of 4-6
Control of bluetooth access equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610194903.7A CN105894627B (en) | 2016-03-30 | 2016-03-30 | A kind of control of bluetooth access equipment, control of bluetooth access management system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610194903.7A CN105894627B (en) | 2016-03-30 | 2016-03-30 | A kind of control of bluetooth access equipment, control of bluetooth access management system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105894627A CN105894627A (en) | 2016-08-24 |
CN105894627B true CN105894627B (en) | 2019-04-16 |
Family
ID=57014407
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610194903.7A Active CN105894627B (en) | 2016-03-30 | 2016-03-30 | A kind of control of bluetooth access equipment, control of bluetooth access management system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105894627B (en) |
Families Citing this family (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108122307A (en) * | 2016-11-29 | 2018-06-05 | 上海慧流云计算科技有限公司 | Access control management method, apparatus and system |
CN106530471A (en) * | 2016-12-13 | 2017-03-22 | 广州极酷物联智能科技有限公司 | Intelligent lock, intelligent lock system and intelligent lock control method |
US11997193B2 (en) | 2017-03-29 | 2024-05-28 | Yunding Network Technology (Beijing) Co., Ltd. | Secure communication method and smart lock system based thereof |
CN107038777B (en) | 2017-03-29 | 2020-08-18 | 云丁网络技术(北京)有限公司 | Safety communication method based on intelligent door lock system and intelligent door lock system thereof |
CN107248208B (en) * | 2017-04-20 | 2020-02-21 | 捷开通讯(深圳)有限公司 | Access control method, terminal, access control equipment and storage device |
CA3023589A1 (en) * | 2017-11-08 | 2019-05-08 | Carrier Corporation | Mesh networking using peer to peer messages for a hospitality entity |
TWI651458B (en) * | 2018-01-04 | 2019-02-21 | 台灣福興工業股份有限公司 | Electronic lock and its control method |
CN108198308A (en) * | 2018-01-11 | 2018-06-22 | 广州得令信息科技有限公司 | Door-access control method and device |
CN110246258A (en) * | 2019-07-05 | 2019-09-17 | 武汉慧联无限科技有限公司 | A kind of door opening method, device, equipment and the readable medium of control of bluetooth access system |
CN110446197B (en) * | 2019-08-13 | 2022-06-07 | 山东爱德邦智能科技有限公司 | Communication control method, device, equipment and storage medium of intelligent equipment |
CN110654944A (en) * | 2019-09-29 | 2020-01-07 | 沈阳格众科技有限公司 | Bluetooth elevator control system and method |
CN112333677B (en) * | 2019-11-19 | 2022-08-19 | 杭州智缤科技有限公司 | Safe communication method of low-power-consumption Bluetooth |
CN111192383A (en) * | 2020-01-09 | 2020-05-22 | 广州视声智能科技有限公司 | Bluetooth technology-based access control management method and Bluetooth access control equipment |
CN111314897B (en) * | 2020-02-27 | 2024-09-27 | 科世达(上海)机电有限公司 | Method for recording vehicle Bluetooth key white list |
CN111915782A (en) * | 2020-02-27 | 2020-11-10 | 宁波大学 | Intelligent door safety control method |
CN111986359B (en) * | 2020-09-02 | 2021-08-24 | 山东艾琳智能科技有限公司 | Intelligent office building lock based on Bluetooth control |
CN112184954A (en) * | 2020-09-07 | 2021-01-05 | 宁波生久柜锁有限公司 | Electronic lock system based on unlocking of NFC (near field communication) Bluetooth quick connection single chip |
CN112037400A (en) * | 2020-09-08 | 2020-12-04 | 四川长虹电器股份有限公司 | Noninductive information acquisition method based on android Bluetooth SPP |
CN112887948B (en) * | 2021-01-15 | 2023-04-18 | 英华达(上海)科技有限公司 | Method and system for binding Bluetooth device |
KR102303793B1 (en) * | 2021-02-04 | 2021-09-17 | 허정 | An apparatus and system for controlling the opening and closing of the door, and a method thereof |
CN113053005A (en) * | 2021-03-10 | 2021-06-29 | 深圳市兴海物联科技有限公司 | Access control method, system thereof and computer readable storage medium |
CN113823027A (en) * | 2021-09-09 | 2021-12-21 | 浙江慧享信息科技有限公司 | Intelligent non-inductive passing control system |
CN114445947B (en) * | 2021-12-24 | 2024-07-23 | 珠海华发数智技术有限公司 | Intelligent access control system |
CN114582057A (en) * | 2022-03-01 | 2022-06-03 | 上海番羽电子科技有限公司 | Bluetooth and password-based multi-authentication intelligent access control management method and system |
US20230370850A1 (en) * | 2022-05-13 | 2023-11-16 | Holitech Technology America, Inc. | Intelligent unlocking method, apparatus, device and storage medium |
CN114885405A (en) * | 2022-05-13 | 2022-08-09 | 江西合力泰科技有限公司 | Intelligent unlocking method, device, equipment and storage medium |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19901961A1 (en) * | 1999-01-19 | 2000-07-20 | Kaulmann Gisbert | Remote control device in central locking system of vehicle has central control unit including a data processing device with interface control lines leading to door control devices |
CN201667086U (en) * | 2009-12-22 | 2010-12-08 | 山东信宇通信科技有限公司 | Door lock controller and door lock control system using the same |
CN103378876A (en) * | 2012-04-16 | 2013-10-30 | 上海博路信息技术有限公司 | Bluetooth-based terminal unlocking method |
CN103679885A (en) * | 2013-12-02 | 2014-03-26 | 大连智慧城科技有限公司 | Door control identity recognition system and method based on mobile terminal |
CN104794798A (en) * | 2015-05-11 | 2015-07-22 | 河海大学常州校区 | Bluetooth door lock control device based on mobile intelligent terminal and management method thereof |
CN104821031A (en) * | 2015-05-27 | 2015-08-05 | 重庆大学 | Dynamic authentication method for intelligent lock control system of Bluetooth mobile phone |
CN104853354A (en) * | 2015-05-18 | 2015-08-19 | 深圳门萨通信科技有限公司 | Bluetooth authentication method and system thereof |
CN204808451U (en) * | 2015-07-14 | 2015-11-25 | 上海拜恩投资管理有限公司 | Intelligent entrance guard system |
CN105118127A (en) * | 2015-09-17 | 2015-12-02 | 慧锐通智能科技股份有限公司 | Visiting system and control method thereof |
CN105184931A (en) * | 2015-09-30 | 2015-12-23 | 上海艾迅士建筑科技有限公司 | Bluetooth-based unlocking method, system and hand-held terminal and Bluetooth-based electronic lock |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105208206B (en) * | 2015-08-31 | 2018-04-10 | 北京奇虎科技有限公司 | Mobile terminal anti-tracking method and mobile terminal |
-
2016
- 2016-03-30 CN CN201610194903.7A patent/CN105894627B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19901961A1 (en) * | 1999-01-19 | 2000-07-20 | Kaulmann Gisbert | Remote control device in central locking system of vehicle has central control unit including a data processing device with interface control lines leading to door control devices |
CN201667086U (en) * | 2009-12-22 | 2010-12-08 | 山东信宇通信科技有限公司 | Door lock controller and door lock control system using the same |
CN103378876A (en) * | 2012-04-16 | 2013-10-30 | 上海博路信息技术有限公司 | Bluetooth-based terminal unlocking method |
CN103679885A (en) * | 2013-12-02 | 2014-03-26 | 大连智慧城科技有限公司 | Door control identity recognition system and method based on mobile terminal |
CN104794798A (en) * | 2015-05-11 | 2015-07-22 | 河海大学常州校区 | Bluetooth door lock control device based on mobile intelligent terminal and management method thereof |
CN104853354A (en) * | 2015-05-18 | 2015-08-19 | 深圳门萨通信科技有限公司 | Bluetooth authentication method and system thereof |
CN104821031A (en) * | 2015-05-27 | 2015-08-05 | 重庆大学 | Dynamic authentication method for intelligent lock control system of Bluetooth mobile phone |
CN204808451U (en) * | 2015-07-14 | 2015-11-25 | 上海拜恩投资管理有限公司 | Intelligent entrance guard system |
CN105118127A (en) * | 2015-09-17 | 2015-12-02 | 慧锐通智能科技股份有限公司 | Visiting system and control method thereof |
CN105184931A (en) * | 2015-09-30 | 2015-12-23 | 上海艾迅士建筑科技有限公司 | Bluetooth-based unlocking method, system and hand-held terminal and Bluetooth-based electronic lock |
Also Published As
Publication number | Publication date |
---|---|
CN105894627A (en) | 2016-08-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105894627B (en) | A kind of control of bluetooth access equipment, control of bluetooth access management system and method | |
CN105788047B (en) | A kind of control of bluetooth access equipment, control of bluetooth access management system and method | |
CN108173822B (en) | Intelligent door lock control method, intelligent door lock and computer readable storage medium | |
CN101217805B (en) | A wireless LAN access control method | |
CN109272606B (en) | Intelligent lock supervision equipment and method based on block chain and storage medium | |
CN103793960B (en) | Method for mobile key service | |
EP2579220A1 (en) | Entrance guard control method and system thereof | |
CN101714918A (en) | Safety system for logging in VPN and safety method for logging in VPN | |
CN101853533B (en) | Password setting method and device used for building gate control system | |
CN105282179B (en) | A method of family's Internet of Things security control based on CPK | |
CN102111766A (en) | Network accessing method, device and system | |
CN107770137A (en) | A kind of information processing method and device | |
CN108537927B (en) | Lockset terminal and method for controlling lockset terminal through regional management | |
CN108990062A (en) | Intelligent and safe Wi-Fi management method and system | |
CN109714769A (en) | Information binding method, device, equipment and storage medium | |
CN106576238A (en) | Method and apparatus for establishment of private communication between devices | |
CN107968745A (en) | One kind is based on dynamic token double factor Quick Response Code open-door system and implementation method | |
CN106875532B (en) | A kind of intelligent door lock and control equipment and system and remotely control method for unlocking | |
EP1927254B1 (en) | Method and a device to suspend the access to a service | |
CN109448164A (en) | A kind of terminal, lock body, door-locking system and management method | |
CN101877852B (en) | User access control method and system | |
CN107786978B (en) | NFC authentication system based on quantum encryption | |
CN106855924A (en) | Embedded intelligent chip equipment and background application system | |
CN107046525A (en) | One kind recognizes matching security system nearby based on intelligent hardware devices | |
CN109615730A (en) | A kind of secondary authentication unlocking system of smart lock and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |