CN105894627B - A kind of control of bluetooth access equipment, control of bluetooth access management system and method - Google Patents

A kind of control of bluetooth access equipment, control of bluetooth access management system and method Download PDF

Info

Publication number
CN105894627B
CN105894627B CN201610194903.7A CN201610194903A CN105894627B CN 105894627 B CN105894627 B CN 105894627B CN 201610194903 A CN201610194903 A CN 201610194903A CN 105894627 B CN105894627 B CN 105894627B
Authority
CN
China
Prior art keywords
control
bluetooth
access equipment
bluetooth access
blue
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610194903.7A
Other languages
Chinese (zh)
Other versions
CN105894627A (en
Inventor
宋政斌
仝海燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qding Interconnection Technology Co ltd
Original Assignee
Beijing Qding Interconnection Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qding Interconnection Technology Co ltd filed Critical Beijing Qding Interconnection Technology Co ltd
Priority to CN201610194903.7A priority Critical patent/CN105894627B/en
Publication of CN105894627A publication Critical patent/CN105894627A/en
Application granted granted Critical
Publication of CN105894627B publication Critical patent/CN105894627B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/08With time considerations, e.g. temporary activation, valid time window or time limitations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

The present invention relates to a kind of control of bluetooth access equipment, control of bluetooth access management system and methods, the control of bluetooth access management method includes: blue-tooth intelligence terminal after receiving the trigger request of user, the Bluetooth broadcast message that control of bluetooth access equipment issues is scanned, and sends Bluetooth connection request to control of bluetooth access equipment;Control of bluetooth access equipment from extract the MAC Address of the blue-tooth intelligence terminal in received Bluetooth connection request, and judge that extracted MAC Address whether there is in white list;Control of bluetooth access equipment when judging that extracted MAC Address is present in white list, open the door by control.The present invention also constructs a kind of control of bluetooth access management system and its control of bluetooth access equipment.Implement technical solution of the present invention, substantially reduce opening time, moreover, can more people open the door simultaneously.

Description

A kind of control of bluetooth access equipment, control of bluetooth access management system and method
Technical field
The present invention relates to field of electronic device more particularly to a kind of control of bluetooth access equipment, control of bluetooth access management system and side Method.
Background technique
In today that digitizing technique and network technology develop rapidly, gate inhibition's technology is also grown rapidly, it is already Simple gateway and key management are surmounted, have been developing progressively the access management system for complete set, has become and solve important portion Door entrance realizes the effective measures of safety precaution management, various confidential departments is applicable in, such as intellectual communityintellectualized village, bank, hotel, machine Room, armory, factory etc..
Since Bluetooth transmission can realize that equipment short distance is read, access control system is set using bluetooth more and more It is standby to realize that automatic authorization opens the door to substitute contact card reader.Currently, control of bluetooth access management system is opened at APP layers Hair, for example, enabling process are as follows: when user reaches desired enabling at gate inhibition, need first to set in blue-tooth intelligence terminal with control of bluetooth access A Bluetooth data channel is established between standby, by the Bluetooth data channel, blue-tooth intelligence terminal could be sent out to control of bluetooth access equipment Door opening command is sent, control of bluetooth access equipment is opened the door when verifying legal.However, this bluetooth door opening method is lacked there are following It falls into:
1. scanning and connection take a long time, slow so as to cause enabling speed when establishing Bluetooth data channel;
2. Bluetooth protocol only allows to establish a bluetooth connection, can not open the door simultaneously so as to cause more people.
Summary of the invention
The technical problem to be solved in the present invention is that in view of the above drawbacks of the prior art, a kind of control of bluetooth access is provided and is set Standby, control of bluetooth access management system and method, can shorten opening time, and can more people open the door simultaneously.
The technical solution adopted by the present invention to solve the technical problems is: constructing a kind of control of bluetooth access management method, comprising:
S10. for blue-tooth intelligence terminal after receiving the trigger request of user, the bluetooth that scanning control of bluetooth access equipment issues is wide Message is broadcast, and sends Bluetooth connection request to control of bluetooth access equipment;
S20. control of bluetooth access equipment from the MAC of the blue-tooth intelligence terminal is extracted in received Bluetooth connection request Location, and judge that extracted MAC Address whether there is in white list, and when being, execute step S30, the white list packet Include the MAC Address list of the blue-tooth intelligence terminal authorized;
S30. control of bluetooth access equipment control is opened the door.
Preferably, the white list further includes effective deadline corresponding to each blue-tooth intelligence terminal authorized;
The step S20 are as follows:
Control of bluetooth access equipment from the MAC Address of the blue-tooth intelligence terminal is extracted in received Bluetooth connection request, and Judge that extracted MAC Address whether there is in white list, and when being, judges whether current date effectively cuts corresponding Only before the date, if so, thening follow the steps S30.
Preferably, further includes:
S40. control of bluetooth access equipment is when judging that extracted MAC Address is not present in white list, according to being received Connection request and blue-tooth intelligence terminal establish bluetooth connection;
S50. blue-tooth intelligence terminal sends unlocking control instruction to control of bluetooth access equipment;
S60. control of bluetooth access equipment according to received unlocking control instruction the legitimacy of user is verified;
S70. control of bluetooth access equipment when being verified, open the door, and extracted MAC Address is stored in white list by control In.
Preferably, further includes:
S00. when user registers before first use, blue-tooth intelligence terminal is received first transmitted by background server Encryption information, and received first encryption information of institute being decrypted using public key, to obtain user password, wherein described the One encryption information be background server using private key to user identity information, room number information, user password, effective deadline into Row encrypts information generated;
Moreover, the unlocking control instruction includes: the first encryption information and the second encryption information, wherein described second adds Confidential information is encrypted by the ID using the order of user password clamshell doors, the control of bluetooth access equipment that bluetooth connection has been established and is generated Information;
The step S60 includes:
S61. control of bluetooth access equipment is decrypted received first encryption information of institute using public key, to obtain user identifier Information, room number information, user password, effective deadline;
S62. whether control of bluetooth access equipment judges current date before acquired effective deadline;
S63. control of bluetooth access equipment is when judging that current date is before acquired effective deadline, according to acquired Room number information judges whether user has enabling permission;
S64. control of bluetooth access equipment is when user has enabling permission, using acquired user password to institute received second Encryption information is decrypted, to obtain the ID of door opening command and control of bluetooth access equipment;
S65. whether the acquired ID of control of bluetooth access equipment judgement is consistent with self ID;
The step S70 are as follows:
Control of bluetooth access equipment when being verified, open the door by control, and acquired cuts extracted MAC Address and effectively Only date storage is in white list.
Preferably, second encryption information is using the order of user password clamshell doors, the bluetooth of bluetooth connection has been established The ID of access control equipment, current time carry out encrypting information generated;Moreover,
The step S64 are as follows:
Control of bluetooth access equipment uses the second encryption received to institute of acquired user password when user has enabling permission Information is decrypted, to obtain door opening command, the ID of control of bluetooth access equipment, current time;
After the step S65, further includes:
S66. control of bluetooth access equipment is when whether the acquired ID of judgement consistent with self ID, according to it is acquired current when Between judge whether occur cut packet.
The present invention also constructs a kind of control of bluetooth access equipment, comprising:
Bluetooth module receives Bluetooth connection request for sending Bluetooth broadcast message, and from blue-tooth intelligence terminal;
Extraction module, for from the MAC Address of the blue-tooth intelligence terminal is extracted in received Bluetooth connection request;
Judgment module, for judging that extracted MAC Address whether there is in white list, the white list includes having awarded The MAC Address list of the blue-tooth intelligence terminal of power;
Enabling control module, for when judging that extracted MAC Address is present in white list, control to be opened the door.
Preferably, the white list further includes effective deadline corresponding to each blue-tooth intelligence terminal authorized; Moreover,
The judgment module is also used to judge current date when judging that extracted MAC Address is present in white list Whether before the corresponding effectively deadline;
The enabling control module is also used to when judging that current date is before the corresponding effectively deadline, and control is opened Door.
It preferably, further include authentication module and adding module, moreover,
The bluetooth module is also used to establish bluetooth company according to the received Bluetooth connection request of institute and blue-tooth intelligence terminal It connects, and receives unlocking control instruction from blue-tooth intelligence terminal;
The authentication module, for according to received unlocking control instruction the legitimacy of user is verified;
The enabling control module, is also used to when being verified, and control is opened the door;
The adding module, for when being verified, extracted MAC Address to be stored in white list.
Preferably, the unlocking control instruction includes: the first encryption information and the second encryption information, wherein described first Encryption information is that background server carries out user identity information, room number information, user password, effective deadline using private key Encryption generates and sends to the information of blue-tooth intelligence terminal;Second encryption information is that blue-tooth intelligence terminal is close using user Code clamshell doors order, the control of bluetooth access equipment that bluetooth connection has been established ID carry out encrypting information generated;
The authentication module includes:
First decryption unit, for received first encryption information of institute to be decrypted using public key, to obtain user's mark Know information, room number information, user password, effective deadline;
Date judging unit, for judging current date whether before acquired effective deadline;Permission judgement is single Member, for judging user according to acquired room number information when judging that current date is before acquired effective deadline Whether enabling permission is had;
Second decryption unit uses acquired user password received to institute for when user has enabling permission Two encryption information are decrypted, to obtain the ID of door opening command and control of bluetooth access equipment;
ID judging unit, for judging whether acquired ID is consistent with self ID, if unanimously, being verified;
Moreover,
The adding module is also used to when being verified, and acquired effective deadline is stored in white list.
Preferably, second encryption information be blue-tooth intelligence terminal using the order of user password clamshell doors, indigo plant has been established The ID of the control of bluetooth access equipment of tooth connection, current time carry out encrypting information generated;
The authentication module further includes a section packet judging unit, moreover,
Second decryption unit uses acquired user password received to institute for when user has enabling permission Two encryption information are decrypted, to obtain door opening command, the ID of control of bluetooth access equipment, current time;
Described section of packet judging unit, for when the acquired ID of judgement is consistent with self ID, according to acquired current Time judges whether to occur to cut packet.
The present invention also constructs a kind of control of bluetooth access management system, including blue-tooth intelligence terminal and above-described control of bluetooth access Equipment.
Implement technical solution of the present invention, the connection request that control of bluetooth access equipment is issued according to blue-tooth intelligence terminal can be sentenced It is disconnected whether to open the door, have no whether the Bluetooth data channel created dependent on bluetooth connection itself can successfully complete, because This, not only shortens opening time, but also supports more people while opening the door.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.In attached drawing:
Fig. 1 is the flow chart of control of bluetooth access management method embodiment one of the present invention;
Fig. 2 is the flow chart of control of bluetooth access management method embodiment two of the present invention;
Fig. 3 is the building-block of logic of control of bluetooth access management system embodiment one of the present invention;
Fig. 4 is the building-block of logic of control of bluetooth access apparatus embodiments one in Fig. 3;
Fig. 5 is the building-block of logic of control of bluetooth access apparatus embodiments two in Fig. 3;
Fig. 6 is the building-block of logic of authentication module embodiment one in Fig. 5.
Specific embodiment
Fig. 1 is the flow chart of control of bluetooth access management method embodiment one of the present invention, the control of bluetooth access manager of the embodiment Method the following steps are included:
Step S10. blue-tooth intelligence terminal is after receiving the trigger request of user, the indigo plant of scanning control of bluetooth access equipment sending Tooth broadcast message, and Bluetooth connection request is sent to control of bluetooth access equipment.In this step, control of bluetooth access equipment as bluetooth from Equipment continuously sends out Bluetooth broadcast message.It is reached near control of bluetooth access equipment when user carries blue-tooth intelligence terminal, and needs to open When door enters, user can trigger the key on the APP of blue-tooth intelligence terminal, and blue-tooth intelligence terminal is asked in the triggering for receiving user After asking, start to scan Bluetooth broadcast message as bluetooth master, and send Bluetooth connection request, the indigo plant to control of bluetooth access equipment It include the MAC Address of itself in tooth connection request.
Step S20. control of bluetooth access equipment from the MAC of the blue-tooth intelligence terminal is extracted in received Bluetooth connection request Address, and judge that extracted MAC Address whether there is in white list, if so, thening follow the steps S30.In this step, blue It is also stored with white list in tooth access control equipment, which is the MAC Address of the blue-tooth intelligence terminal of legitimate user (authorization) List.
The control of step S30. control of bluetooth access equipment is opened the door.
Implement the technical solution of the embodiment, the connection request that control of bluetooth access equipment is issued according to blue-tooth intelligence terminal It judges whether to open the door, has no whether the Bluetooth data channel created dependent on bluetooth connection itself can successfully complete, Therefore, opening time is not only shortened, but also supports more people while opening the door.
Further, white list may also include every other than including the MAC Address list of the blue-tooth intelligence terminal authorized Effective deadline corresponding to a blue-tooth intelligence terminal authorized;Moreover, step S20 are as follows:
Control of bluetooth access equipment from the MAC Address of the blue-tooth intelligence terminal is extracted in received Bluetooth connection request, and Judge that extracted MAC Address whether there is in white list, and when being, judges whether current date effectively cuts corresponding Only before the date, if so, thening follow the steps S30.
In this embodiment, carry out open the door control when, in addition to judge user blue-tooth intelligence terminal MAC Address whether It is legal outer, the current enabling date is also judged whether before effective deadline, can prevent user from moving away from cell so subsequent The gate inhibition in continuous Kaiyuan dwelling.
Fig. 2 is the flow chart of control of bluetooth access management method embodiment two of the present invention, the control of bluetooth access manager of the embodiment Method the following steps are included:
Step S10. blue-tooth intelligence terminal is after receiving the trigger request of user, the indigo plant of scanning control of bluetooth access equipment sending Tooth broadcast message, and Bluetooth connection request is sent to control of bluetooth access equipment.In this step, control of bluetooth access equipment as bluetooth from Equipment continuously sends out Bluetooth broadcast message.It is reached near control of bluetooth access equipment when user carries blue-tooth intelligence terminal, and needs to open When door enters, user can trigger the key on the APP of blue-tooth intelligence terminal, and blue-tooth intelligence terminal is asked in the triggering for receiving user After asking, start to scan Bluetooth broadcast message as bluetooth master, and send Bluetooth connection request, the indigo plant to control of bluetooth access equipment It include the MAC Address of itself in tooth connection request.
Step S20. control of bluetooth access equipment from the MAC of the blue-tooth intelligence terminal is extracted in received Bluetooth connection request Address, and judge that extracted MAC Address whether there is in white list, if so, thening follow the steps S30;If it is not, then executing step Rapid S40.
The control of step S30. control of bluetooth access equipment is opened the door.
Step S40. establishes bluetooth connection according to the received connection request of institute and blue-tooth intelligence terminal.In this step, it needs Illustrate, as long as illustrating that the user is for the first time in the bluetooth when judging that extracted MAC Address does not exist in white list It opens the door at access control equipment, just needs to establish bluetooth connection with blue-tooth intelligence terminal at this time.
Step S50. blue-tooth intelligence terminal sends unlocking control instruction to control of bluetooth access equipment.
Step S60. control of bluetooth access equipment according to received unlocking control instruction the legitimacy of user is verified, if It is verified, thens follow the steps S70;If verifying does not pass through, illustrate that the user is illegal user, without opening the door.
The control of step S70. control of bluetooth access equipment is opened the door, and extracted MAC Address is stored in white list.In the step In rapid, it should be noted that, control of bluetooth access equipment can carry out self study after good authentication user validation, by the legitimate user MAC Address be recorded in white list, in case subsequent use.
Preferably, need opened the door using unlocking control instruction when, can based on public key infrastructure to user validation into Row verifying.Illustrate first, background server manages multiple cells, a public private key pair is distributed for each cell, in cell The public key of this built-in cell of each control of bluetooth access equipment.Moreover, when user is when moving in cell, Xiang Houtai server registration (APP of intelligent terminal can be used to be registered) room number information (for example, the room * * cell * * * *), phone number, to open door Prohibit.The phone number that background server is reserved according to user is verified (such as short-message verification) to the phone number registered, After being proved to be successful, a character string is generated for the user, wherein including " user identity information (AppID)+room number information+use Family password+effective deadline ", and with the corresponding private key encryption of the cell.
In this way, in the preferred embodiment, before step S10, further includes:
S00. when user registers before first use, blue-tooth intelligence terminal is received first transmitted by background server Encryption information (i.e. above-mentioned character string), and received first encryption information of institute is decrypted using public key, it is close to obtain user Code, wherein first encryption information be background server using private key to user identity information, room number information, user password, Effective deadline carries out encrypting information generated;
In step s 50, unlocking control instruction transmitted by blue-tooth intelligence terminal includes: the first encryption information and the second encryption Information, wherein the second encryption information is using the order of user password clamshell doors, the control of bluetooth access equipment that bluetooth connection has been established ID carries out encrypting information generated;
Moreover, step S60 specifically includes the following steps:
Step S61. control of bluetooth access equipment is decrypted received first encryption information of institute using public key, to obtain user Identification information, room number information, user password, effective deadline;
Whether step S62. control of bluetooth access equipment judges current date before acquired effective deadline;
Step S63. control of bluetooth access equipment is when judging that current date is before acquired effective deadline, according to being obtained The room number information taken judges whether user has enabling permission, for example, acquired room number information is 8 rooms 1203 of A cell, when this After control of bluetooth access equipment at A cell doorway or at 8 doorways gets the room number information, so that it may judge that the user has enabling to weigh Limit, still, if after the control of bluetooth access equipment at 9 doorways gets the room number information, so that it may judge the user without enabling permission;
Step S64. control of bluetooth access equipment is received to institute using acquired user password when user has enabling permission Second encryption information is decrypted, and to obtain the ID of door opening command and control of bluetooth access equipment, the ID of the control of bluetooth access equipment is for example For MAC Address;
Whether the acquired ID of step S65. control of bluetooth access equipment judgement is consistent with self ID, if unanimously, illustrating that this is opened Door control instruction is intended for oneself, and verifying can pass through at this time.
Meanwhile step S70 are as follows:
Control of bluetooth access equipment when being verified, open the door by control, and acquired cuts extracted MAC Address and effectively Only date storage is in white list.In this step, control of bluetooth access equipment can be learnt by oneself after good authentication user validation It practises, effective deadline of the blue-tooth intelligence terminal of the legitimate user is recorded in white list, in case subsequent use.
Further, on the basis of the above embodiments, the second encryption information is using the order of user password clamshell doors, Establish the ID of the control of bluetooth access equipment of bluetooth connection, current time carries out encrypting information generated.Moreover,
Step S64 are as follows: control of bluetooth access equipment is when user has enabling permission, using acquired user password to being received The second encryption information be decrypted, to obtain door opening command, the ID of control of bluetooth access equipment, current time.
After step S65, further includes:
Step S66. control of bluetooth access equipment when the acquired ID of judgement is consistent with self ID, according to it is acquired current when Between judge whether occur cut packet, in this way, being retransmitted after illegal user's data intercept packet can be prevented.If being verified most without occurring to cut packet Pass through eventually.
Fig. 3 is the building-block of logic of control of bluetooth access management system embodiment one of the present invention, which includes indigo plant Tooth access control equipment 10 and blue-tooth intelligence terminal 20, wherein control of bluetooth access equipment 10 may be provided at cell doorway, the door in every building At mouthful etc., blue-tooth intelligence terminal is, for example, smart phone, and APP is equipped in the blue-tooth intelligence terminal, and the APP can be used in user Carry out user's registration, enabling etc..
Fig. 4 is the building-block of logic of control of bluetooth access apparatus embodiments one in Fig. 3, which includes: bluetooth mould Block 11, extraction module 12, judgment module 13 and enabling control module 14, wherein bluetooth module 11 disappears for sending Bluetooth broadcast Breath, and Bluetooth connection request is received from blue-tooth intelligence terminal.Extraction module 12 is used to from the received Bluetooth connection request of institute mention Take the MAC Address of the blue-tooth intelligence terminal.Judgment module 13 is for judging that extracted MAC Address whether there is in white list In, the white list includes the MAC Address list of the blue-tooth intelligence terminal authorized.Enabling control module 14 is used for judging When the MAC Address of extraction is present in white list, control is opened the door.
Preferably, white list further includes effective deadline corresponding to each blue-tooth intelligence terminal authorized.Moreover, Whether judgment module 13 is also used to when judging that extracted MAC Address is present in white list, judge current date corresponding Effective deadline before;Enabling control module 14 is also used to when judging that current date is before the corresponding effectively deadline, Control is opened the door.
Fig. 5 is the building-block of logic of control of bluetooth access apparatus embodiments two in Fig. 3, and the control of bluetooth access equipment of the embodiment is compared Embodiment shown in Fig. 4 further includes authentication module 15 and adding module 16.Moreover, bluetooth module 11 is also used to according to being received Bluetooth connection request and blue-tooth intelligence terminal establish bluetooth connection, and receive unlocking control instruction from blue-tooth intelligence terminal.It tests Card module 15 be used for according to received unlocking control instruction the legitimacy of user is verified.Enabling control module 14 is also used In when being verified, control is opened the door.Adding module 16 is used for when being verified, and extracted MAC Address is stored in white In list.
Preferably, the control of bluetooth access management system can be designed based on public key infrastructure, illustrated first, background server pipe Multiple cells are managed, distribute a public private key pair for each cell, the public affairs of this built-in cell of each control of bluetooth access equipment in cell Key.Moreover, when user is when moving in cell, Xiang Houtai server registration (APP of intelligent terminal can be used to be registered) room number Information (for example, the room * * cell * * * *), phone number, to open gate inhibition.The cell-phone number that background server is reserved according to user Code, is verified (such as short-message verification) to the phone number registered, and after being proved to be successful, generates a character for the user String, wherein including " user identity information (AppID)+room number information+user password+effective deadline ", and with the cell pair The private key encryption answered.
The 11 received unlocking control instruction of institute of bluetooth module includes the first encryption information and the second encryption information, wherein institute Stating the first encryption information is that background server uses private key to user identity information, room number information, user password, effective deadline Phase is encrypted the information generated and sent to blue-tooth intelligence terminal;Second encryption information is the use of blue-tooth intelligence terminal The order of user password clamshell doors, the ID of control of bluetooth access equipment that bluetooth connection has been established, current time encrypt generated Information.
Authentication module as shown in connection with fig. 6, the authentication module of the embodiment include the first decryption unit 151, date judgement Unit 152, permission judging unit 153, the second decryption unit 154, ID judging unit 155 and section packet judging unit 156.Wherein, First decryption unit 151 is used to that received first encryption information of institute to be decrypted using public key, with obtain user identity information, Room number information, user password, effective deadline.Whether date judging unit 152 is for judging current date acquired Before effective deadline.Permission judging unit 153 is used for the root when judging that current date is before acquired effective deadline Judge whether user has enabling permission according to acquired room number information.Second decryption unit 154 is used to have enabling permission in user When, received second encryption information of institute is decrypted using acquired user password, to obtain door opening command and bluetooth door Prohibit the ID of equipment.ID judging unit 155 is used to judge whether acquired ID to be consistent with self ID.Packet judging unit 156 is cut to use In when the acquired ID of judgement is consistent with self ID, judge whether to occur to cut packet according to acquired current time, if without hair It is raw to cut packet, it is verified at this time.Moreover, adding module is also used to when being verified, acquired effective deadline is deposited It is stored in white list.
It is last it should be noted that, above only one embodiment of the present of invention can save wherein one in other embodiments A or multiple units, for example, cutting packet judging unit 156, this is also within the scope of the present invention.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any bun Change, equivalent replacement, improvement etc., should be included within scope of the presently claimed invention.

Claims (7)

1. a kind of control of bluetooth access management method characterized by comprising
S10. after receiving the trigger request of user, the Bluetooth broadcast that scanning control of bluetooth access equipment issues disappears blue-tooth intelligence terminal Breath, and Bluetooth connection request is sent to control of bluetooth access equipment, it include the MAC Address of itself in the Bluetooth connection request;
S20. control of bluetooth access equipment from the MAC Address of the blue-tooth intelligence terminal is extracted in received Bluetooth connection request, and Judge that extracted MAC Address whether there is in white list, and when being, executes step S30;When no, step is executed S40;The white list includes the MAC Address list of the blue-tooth intelligence terminal authorized;
S30. control of bluetooth access equipment control is opened the door;
S40. control of bluetooth access equipment establishes bluetooth connection according to the received connection request of institute and blue-tooth intelligence terminal;
S50. blue-tooth intelligence terminal sends unlocking control instruction to control of bluetooth access equipment, and the unlocking control instruction includes: first Encryption information and the second encryption information, wherein first encryption information is that background server believes user identifier using private key Breath, room number information, user password, effective deadline carry out encrypting information generated, moreover, user before first use into When row registration, blue-tooth intelligence terminal receives the first encryption information transmitted by background server, and received to institute using public key First encryption information is decrypted, to obtain user password;Second encryption information be using the order of user password clamshell doors, The ID that the control of bluetooth access equipment of bluetooth connection has been established carries out encrypting information generated;
S60. control of bluetooth access equipment according to received unlocking control instruction the legitimacy of user is verified;
S70. control of bluetooth access equipment when being verified, open the door, and extracted MAC Address is stored in white list by control;
Moreover,
The step S60 includes:
S61. control of bluetooth access equipment is decrypted received first encryption information of institute using public key, to obtain user identifier letter Breath, room number information, user password, effective deadline;
S62. whether control of bluetooth access equipment judges current date before acquired effective deadline;
S63. control of bluetooth access equipment is when judging that current date is before acquired effective deadline, according to acquired room number Information judges whether user has enabling permission;
S64. control of bluetooth access equipment uses the second encryption received to institute of acquired user password when user has enabling permission Information is decrypted, to obtain the ID of door opening command and control of bluetooth access equipment;
S65. whether the acquired ID of control of bluetooth access equipment judgement is consistent with self ID.
2. control of bluetooth access management method according to claim 1, which is characterized in that
The white list further includes effective deadline corresponding to each blue-tooth intelligence terminal authorized;
The step S20 are as follows:
Control of bluetooth access equipment from extract the MAC Address of the blue-tooth intelligence terminal in received Bluetooth connection request, and judge Whether extracted MAC Address whether there is in white list, and when being, judge current date in corresponding effective deadline Before phase, if so, thening follow the steps S30.
3. control of bluetooth access management method according to claim 1, which is characterized in that
Second encryption information is using the order of user password clamshell doors, the control of bluetooth access equipment that bluetooth connection has been established ID, current time carry out encrypting information generated;Moreover,
The step S64 are as follows:
Control of bluetooth access equipment is when user has enabling permission, using acquired user password to received second encryption information of institute It is decrypted, to obtain door opening command, the ID of control of bluetooth access equipment, current time;
After the step S65, further includes:
S66. control of bluetooth access equipment is sentenced when whether the acquired ID of judgement is consistent with self ID according to acquired current time It is disconnected whether to occur to cut packet.
4. a kind of control of bluetooth access equipment characterized by comprising
Bluetooth module receives Bluetooth connection request for sending Bluetooth broadcast message, and from blue-tooth intelligence terminal, and the bluetooth connects Connect the MAC Address in request comprising itself;It is also used to when judging that extracted MAC Address is not present in white list, according to The received Bluetooth connection request of institute and blue-tooth intelligence terminal establish bluetooth connection, and receive control of unlocking from blue-tooth intelligence terminal and refer to It enables, the unlocking control instruction includes: the first encryption information and the second encryption information, wherein after first encryption information is Platform server using private key to user identity information, room number information, user password, effective deadline is encrypted generates simultaneously It is sent to the information of blue-tooth intelligence terminal;Second encryption information is that blue-tooth intelligence terminal is ordered using user password clamshell doors Enable, have been established the ID of the control of bluetooth access equipment of bluetooth connection to carry out encrypting information generated;
Extraction module, for from the MAC Address of the blue-tooth intelligence terminal is extracted in received Bluetooth connection request;
Judgment module, for judging that extracted MAC Address whether there is in white list, the white list includes having authorized The MAC Address list of blue-tooth intelligence terminal;
Authentication module, for according to received unlocking control instruction the legitimacy of user is verified;
Enabling control module, for when judging that extracted MAC Address is present in white list, control enabling to be also used to When being verified, control is opened the door;
Adding module, for when being verified, extracted MAC Address to be stored in white list;
The authentication module includes:
First decryption unit, for received first encryption information of institute to be decrypted using public key, to obtain user identifier letter Breath, room number information, user password, effective deadline;
Date judging unit, for judging current date whether before acquired effective deadline;Permission judging unit is used In when judging that current date is before acquired effective deadline, judge whether user has according to acquired room number information Enabling permission;
Second decryption unit, for being added to institute received second using acquired user password when user has enabling permission Confidential information is decrypted, to obtain the ID of door opening command and control of bluetooth access equipment;
ID judging unit, for judging whether acquired ID is consistent with self ID, if unanimously, being verified.
5. control of bluetooth access equipment according to claim 4, which is characterized in that
The white list further includes effective deadline corresponding to each blue-tooth intelligence terminal authorized;Moreover,
The judgment module is also used to whether judge current date when judging that extracted MAC Address is present in white list Before the corresponding effectively deadline;
The enabling control module is also used to when judging that current date is before the corresponding effectively deadline, and control is opened the door.
6. control of bluetooth access equipment according to claim 4, which is characterized in that second encryption information is that blue-tooth intelligence is whole End carries out encryption institute using the order of user password clamshell doors, the ID for the control of bluetooth access equipment that bluetooth connection has been established, current time The information of generation;
The authentication module further includes a section packet judging unit, moreover,
Second decryption unit, for being added to institute received second using acquired user password when user has enabling permission Confidential information is decrypted, to obtain door opening command, the ID of control of bluetooth access equipment, current time;
Described section of packet judging unit, when consistent with self ID for the ID acquired in judgement, according to acquired current time Judge whether to occur to cut packet.
7. a kind of control of bluetooth access management system, which is characterized in that including described in blue-tooth intelligence terminal and claim any one of 4-6 Control of bluetooth access equipment.
CN201610194903.7A 2016-03-30 2016-03-30 A kind of control of bluetooth access equipment, control of bluetooth access management system and method Active CN105894627B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610194903.7A CN105894627B (en) 2016-03-30 2016-03-30 A kind of control of bluetooth access equipment, control of bluetooth access management system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610194903.7A CN105894627B (en) 2016-03-30 2016-03-30 A kind of control of bluetooth access equipment, control of bluetooth access management system and method

Publications (2)

Publication Number Publication Date
CN105894627A CN105894627A (en) 2016-08-24
CN105894627B true CN105894627B (en) 2019-04-16

Family

ID=57014407

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610194903.7A Active CN105894627B (en) 2016-03-30 2016-03-30 A kind of control of bluetooth access equipment, control of bluetooth access management system and method

Country Status (1)

Country Link
CN (1) CN105894627B (en)

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108122307A (en) * 2016-11-29 2018-06-05 上海慧流云计算科技有限公司 Access control management method, apparatus and system
CN106530471A (en) * 2016-12-13 2017-03-22 广州极酷物联智能科技有限公司 Intelligent lock, intelligent lock system and intelligent lock control method
US11997193B2 (en) 2017-03-29 2024-05-28 Yunding Network Technology (Beijing) Co., Ltd. Secure communication method and smart lock system based thereof
CN107038777B (en) 2017-03-29 2020-08-18 云丁网络技术(北京)有限公司 Safety communication method based on intelligent door lock system and intelligent door lock system thereof
CN107248208B (en) * 2017-04-20 2020-02-21 捷开通讯(深圳)有限公司 Access control method, terminal, access control equipment and storage device
CA3023589A1 (en) * 2017-11-08 2019-05-08 Carrier Corporation Mesh networking using peer to peer messages for a hospitality entity
TWI651458B (en) * 2018-01-04 2019-02-21 台灣福興工業股份有限公司 Electronic lock and its control method
CN108198308A (en) * 2018-01-11 2018-06-22 广州得令信息科技有限公司 Door-access control method and device
CN110246258A (en) * 2019-07-05 2019-09-17 武汉慧联无限科技有限公司 A kind of door opening method, device, equipment and the readable medium of control of bluetooth access system
CN110446197B (en) * 2019-08-13 2022-06-07 山东爱德邦智能科技有限公司 Communication control method, device, equipment and storage medium of intelligent equipment
CN110654944A (en) * 2019-09-29 2020-01-07 沈阳格众科技有限公司 Bluetooth elevator control system and method
CN112333677B (en) * 2019-11-19 2022-08-19 杭州智缤科技有限公司 Safe communication method of low-power-consumption Bluetooth
CN111192383A (en) * 2020-01-09 2020-05-22 广州视声智能科技有限公司 Bluetooth technology-based access control management method and Bluetooth access control equipment
CN111314897B (en) * 2020-02-27 2024-09-27 科世达(上海)机电有限公司 Method for recording vehicle Bluetooth key white list
CN111915782A (en) * 2020-02-27 2020-11-10 宁波大学 Intelligent door safety control method
CN111986359B (en) * 2020-09-02 2021-08-24 山东艾琳智能科技有限公司 Intelligent office building lock based on Bluetooth control
CN112184954A (en) * 2020-09-07 2021-01-05 宁波生久柜锁有限公司 Electronic lock system based on unlocking of NFC (near field communication) Bluetooth quick connection single chip
CN112037400A (en) * 2020-09-08 2020-12-04 四川长虹电器股份有限公司 Noninductive information acquisition method based on android Bluetooth SPP
CN112887948B (en) * 2021-01-15 2023-04-18 英华达(上海)科技有限公司 Method and system for binding Bluetooth device
KR102303793B1 (en) * 2021-02-04 2021-09-17 허정 An apparatus and system for controlling the opening and closing of the door, and a method thereof
CN113053005A (en) * 2021-03-10 2021-06-29 深圳市兴海物联科技有限公司 Access control method, system thereof and computer readable storage medium
CN113823027A (en) * 2021-09-09 2021-12-21 浙江慧享信息科技有限公司 Intelligent non-inductive passing control system
CN114445947B (en) * 2021-12-24 2024-07-23 珠海华发数智技术有限公司 Intelligent access control system
CN114582057A (en) * 2022-03-01 2022-06-03 上海番羽电子科技有限公司 Bluetooth and password-based multi-authentication intelligent access control management method and system
US20230370850A1 (en) * 2022-05-13 2023-11-16 Holitech Technology America, Inc. Intelligent unlocking method, apparatus, device and storage medium
CN114885405A (en) * 2022-05-13 2022-08-09 江西合力泰科技有限公司 Intelligent unlocking method, device, equipment and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19901961A1 (en) * 1999-01-19 2000-07-20 Kaulmann Gisbert Remote control device in central locking system of vehicle has central control unit including a data processing device with interface control lines leading to door control devices
CN201667086U (en) * 2009-12-22 2010-12-08 山东信宇通信科技有限公司 Door lock controller and door lock control system using the same
CN103378876A (en) * 2012-04-16 2013-10-30 上海博路信息技术有限公司 Bluetooth-based terminal unlocking method
CN103679885A (en) * 2013-12-02 2014-03-26 大连智慧城科技有限公司 Door control identity recognition system and method based on mobile terminal
CN104794798A (en) * 2015-05-11 2015-07-22 河海大学常州校区 Bluetooth door lock control device based on mobile intelligent terminal and management method thereof
CN104821031A (en) * 2015-05-27 2015-08-05 重庆大学 Dynamic authentication method for intelligent lock control system of Bluetooth mobile phone
CN104853354A (en) * 2015-05-18 2015-08-19 深圳门萨通信科技有限公司 Bluetooth authentication method and system thereof
CN204808451U (en) * 2015-07-14 2015-11-25 上海拜恩投资管理有限公司 Intelligent entrance guard system
CN105118127A (en) * 2015-09-17 2015-12-02 慧锐通智能科技股份有限公司 Visiting system and control method thereof
CN105184931A (en) * 2015-09-30 2015-12-23 上海艾迅士建筑科技有限公司 Bluetooth-based unlocking method, system and hand-held terminal and Bluetooth-based electronic lock

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105208206B (en) * 2015-08-31 2018-04-10 北京奇虎科技有限公司 Mobile terminal anti-tracking method and mobile terminal

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19901961A1 (en) * 1999-01-19 2000-07-20 Kaulmann Gisbert Remote control device in central locking system of vehicle has central control unit including a data processing device with interface control lines leading to door control devices
CN201667086U (en) * 2009-12-22 2010-12-08 山东信宇通信科技有限公司 Door lock controller and door lock control system using the same
CN103378876A (en) * 2012-04-16 2013-10-30 上海博路信息技术有限公司 Bluetooth-based terminal unlocking method
CN103679885A (en) * 2013-12-02 2014-03-26 大连智慧城科技有限公司 Door control identity recognition system and method based on mobile terminal
CN104794798A (en) * 2015-05-11 2015-07-22 河海大学常州校区 Bluetooth door lock control device based on mobile intelligent terminal and management method thereof
CN104853354A (en) * 2015-05-18 2015-08-19 深圳门萨通信科技有限公司 Bluetooth authentication method and system thereof
CN104821031A (en) * 2015-05-27 2015-08-05 重庆大学 Dynamic authentication method for intelligent lock control system of Bluetooth mobile phone
CN204808451U (en) * 2015-07-14 2015-11-25 上海拜恩投资管理有限公司 Intelligent entrance guard system
CN105118127A (en) * 2015-09-17 2015-12-02 慧锐通智能科技股份有限公司 Visiting system and control method thereof
CN105184931A (en) * 2015-09-30 2015-12-23 上海艾迅士建筑科技有限公司 Bluetooth-based unlocking method, system and hand-held terminal and Bluetooth-based electronic lock

Also Published As

Publication number Publication date
CN105894627A (en) 2016-08-24

Similar Documents

Publication Publication Date Title
CN105894627B (en) A kind of control of bluetooth access equipment, control of bluetooth access management system and method
CN105788047B (en) A kind of control of bluetooth access equipment, control of bluetooth access management system and method
CN108173822B (en) Intelligent door lock control method, intelligent door lock and computer readable storage medium
CN101217805B (en) A wireless LAN access control method
CN109272606B (en) Intelligent lock supervision equipment and method based on block chain and storage medium
CN103793960B (en) Method for mobile key service
EP2579220A1 (en) Entrance guard control method and system thereof
CN101714918A (en) Safety system for logging in VPN and safety method for logging in VPN
CN101853533B (en) Password setting method and device used for building gate control system
CN105282179B (en) A method of family's Internet of Things security control based on CPK
CN102111766A (en) Network accessing method, device and system
CN107770137A (en) A kind of information processing method and device
CN108537927B (en) Lockset terminal and method for controlling lockset terminal through regional management
CN108990062A (en) Intelligent and safe Wi-Fi management method and system
CN109714769A (en) Information binding method, device, equipment and storage medium
CN106576238A (en) Method and apparatus for establishment of private communication between devices
CN107968745A (en) One kind is based on dynamic token double factor Quick Response Code open-door system and implementation method
CN106875532B (en) A kind of intelligent door lock and control equipment and system and remotely control method for unlocking
EP1927254B1 (en) Method and a device to suspend the access to a service
CN109448164A (en) A kind of terminal, lock body, door-locking system and management method
CN101877852B (en) User access control method and system
CN107786978B (en) NFC authentication system based on quantum encryption
CN106855924A (en) Embedded intelligent chip equipment and background application system
CN107046525A (en) One kind recognizes matching security system nearby based on intelligent hardware devices
CN109615730A (en) A kind of secondary authentication unlocking system of smart lock and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant