Summary of the invention
Present invention is primarily targeted at and propose a kind of realize method that dynamic code electronic lock two-way authentication unblanks and be
System, it is intended to solve defect, Yi Jiyou that in prior art, dynamic code electronic lock cannot be unblanked in the environment of without network signal
Because using voice or short message interacting certification generation communication cost to cause the defect that operation cost is high in the environment of network signal.
For achieving the above object, a kind of of present invention offer realizes the method that dynamic code electronic lock two-way authentication is unblanked,
Including step:
In back-stage management center newly-built work order task, accordingly generate work order data;
Described back-stage management center is connected with mobile terminal, downloads described work order data to mobile terminal;
Carry out double authentication and data interactive authentication on the mobile terminal, generate after certification success and disposably open
Lock cipher;
Described disposable unlocking cipher is applied to be unblanked by electronic password lock.
Wherein, be set forth in back-stage management center newly-built work order task, the step accordingly generating work order data includes:
Appointment is unblanked business personnel and electronic password lock related constraint information;The constraint information of the described business personnel that unblanks
For there is coding or the pictorial information of uniqueness, including work card number, cell-phone number and/or fingerprint;The business personnel that unblanks includes business
Personnel A and business personnel B;The constraint information of described electronic password lock is coding or the pictorial information with uniqueness, including lock
No. ID;
According to work order information through special algorithm computing, generate the checking data relevant to lockset, data of unblanking and added
Work order data are formed after close.
Wherein, described appointment electronic password lock is a specific lock, or all locks on same service circuit.
Wherein, described back-stage management center is connected by wired mode with mobile terminal, specially USB connected mode or
Serial ports connected mode;Or wirelessly connect, specially gprs, wifi or bluetooth approach.
Wherein, described double authentication and the data interactive authentication of carrying out on mobile terminals, certification success after-cost
The step of secondary disposable unlocking cipher farther includes:
Business personnel A obtains previous interlock code information, and input fingerprint and after being verified on mobile terminals,
Input previous interlock code information to verify;
After being verified, described mobile terminal automatically generates business personnel A and the identity code of business personnel B two people;
Described business personnel A and business personnel B locks input identity code at described electronic cipher respectively and is verified
After, electronic password lock automatically generates condition code;
After described business personnel B inputs fingerprint on mobile terminals and is verified, input feature vector code is verified, checking
Disposable unlocking cipher is automatically generated by rear mobile terminal.
Wherein, the method also includes:
After unblanking successfully, locking, described electronic password lock automatically generates this interlock code information, described mobile whole
Preserve this interlock code information on end, and upload this subtask related data to described back-stage management center.
A kind of realizing the system that dynamic code electronic lock two-way authentication is unblanked, described system includes: back-stage management center, shifting
Dynamic terminal and electronic password lock;
Described back-stage management center, as centralized management system, for being responsible for the arrangement of work order task, the pipe of electronic password lock
Reason, the management of business personnel and the centralized management work to various data, generate work order data and encrypt;
Described mobile terminal, for downloading work order data from described back-stage management center, carries out double authentication accordingly
With data interactive authentication, after certification success, generate disposable unlocking cipher;
Described electronic password lock, for unblanking by described disposable unlocking cipher.
Wherein, described mobile terminal particularly as follows: mobile phone, personal digital assistant, panel computer.
Wherein, described electronic password lock, it is additionally operable to after locking automatically generate this interlock code information, by described movement
Terminal preserves this interlock code information and uploads this subtask related data to described back-stage management center.
Wherein, the quantity of described electronic password lock is several on or same service circuit.
Compared with prior art, the method have the advantages that
1, solution dynamic code electronic lock is under adverse circumstances or the occasion without communication signal, completes identification, data
Interactive authentication, it is achieved unblank;
2, use " two-player mode " to work in coordination, inputted identification and data interactive authentication on mobile terminals,
Improve safety;
3, the present invention can fully phase out intermediate communication and produce the link of expense, saves long-term operation cost, ageing height, work
Make efficiency high.
Detailed description of the invention
Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
The mobile terminal realizing each embodiment of the present invention is described referring now to accompanying drawing.In follow-up description, use
For representing the suffix explanation only for the beneficially present invention of such as " module ", " parts " or " unit " of element, itself
Not specific meaning.Therefore, " module " can mixedly use with " parts ".
Mobile terminal can be implemented in a variety of manners.Such as, the terminal described in the present invention can include such as moving
Phone, smart phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD (panel computer), PMP
The mobile terminal of (portable media player), guider etc. and consolidating of such as numeral TV, desk computer etc.
Determine terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that, mobile except being used in particular for
Outside the element of purpose, root
Refer to Fig. 2, the present embodiment realizes the system that dynamic code electronic lock two-way authentication unblanks and includes: back-stage management
Center, mobile terminal and be positioned at the electronic password lock of front end.
Wherein, back-stage management center, as centralized management system, it is responsible for clear, adds the work order task arrangement of the business such as paper money,
The management of electronic password lock, the management of business personnel, and identity code, the generation of code of unblanking and condition code, interlock code
The centralized management work such as certification, pre-generatmg work order data encrypting after algorithm computing.
Mobile terminal, is connected with back-stage management center by the way of wired or wireless, by under pregenerated work order data
It is downloaded to local terminal preserve, two business personnels authorized is carried out authentication and data interactive authentication, after certification success, generates one
Secondary property unlocking cipher.
Electronic password lock, for unblanking by described disposable unlocking cipher.Business personnel A, B (double) are hand-held
The electronic password lock data obtained in terminal PDA by the input through keyboard on electronic lock to locking, electronic password lock through with after
Generate or authentication-related data after the algorithm computing that platform is identical, it is achieved unblank and locking.
Referring to Fig. 3, needs according to clear/add paper money business in the present embodiment, centralized management system manager is new on backstage
Build work order task, it is achieved the method that dynamic code electronic lock two-way authentication is unblanked is:
Step 301, manager specify the business personnel that unblanks (the present embodiment is appointed as double, be called as personnel A and
Personnel B), specify the related constraint information such as electronic password lock.
1) the unblank constraint information of business personnel can be work card number, cell-phone number, fingerprint etc., has the coding of uniqueness
Or pictorial information;
2) constraint information of electronic password lock can be No. ID or other coding with uniqueness or pictorial informations of lock;
3) specify electronic password lock, can be specific a certain lock, or all locks on same service circuit.
Step 302, system through special algorithm computing according to work order information, generate checking data relevant to lockset, unblank
Work order data are formed after the encryption such as data.
Step 303, manager are connected with handheld terminal PDA by USB data line, and download work order data to handheld terminal
On PDA.
The data wire being connected with handheld terminal PDA can be the data wire of the wired connection such as USB line, Serial Port Line;At other
In embodiment, except wired connection mode, handheld terminal PDA also can be with the wireless connections of back-stage management center, such as: gprs, wifi,
The wireless data transmission modes such as bluetooth.
Step 304, the most authorized business personnel A, B two people receive handheld terminal PDA (getting task) arrive electronics close
The on-the-spot execution task of code lock (such as: ATM clear business, add paper money business etc.).
After step 305, business personnel A, B show up, business personnel A locks acquisition " interlock code " letter at electronic cipher
Breath, and on handheld terminal PDA, input fingerprint and after being verified, input " interlock code " information;In this step,
1) " interlock code " information, is string number or the coding of character composition of electronic password lock generation;
2) " interlock code " can be specific coding or random code or the result after algorithm computing;
3) " interlock code " information obtained is that business personnel locks by button operation at electronic cipher, at electronic password lock
Display screen show this lock once success locking after generate interlock code information.
After " interlock code " information of step 306, business personnel A input is verified on handheld terminal PDA, handheld terminal
PDA automatically generate business personnel A, B two people " identity code " and show;In this step,
1) can be " interlock code " of checking on handheld terminal PDA, that the interlock code that back-stage management center previously generates is downloaded
In handheld terminal PDA, it is also possible to be the interlock code of in-time generatin after handheld terminal PDA enterprising line algorithm computing, and with defeated
" interlock code " entered has compared the checking on handheld terminal PDA of the interlock code information;
2) " identity code " generated on handheld terminal PDA can be that the identity code that backstage previously generates downloads to
In PDA, it is also possible to be the identity code of in-time generatin after handheld terminal PDA enterprising line algorithm computing;
Step 307, business personnel A, B two people lock after input " identity code " is verified at electronic cipher, electronics
Coded lock automatically generates " condition code " and shows.
Step 308, business personnel B input after fingerprint authentication passes through on handheld terminal PDA, input " condition code ".
After " condition code " of step 309, business personnel B input is verified on handheld terminal PDA, handheld terminal PDA
Automatically generate disposable " unlocking cipher " and show;In this step,
1) " condition code " of checking on handheld terminal PDA, can be that the condition code that backstage previously generates downloads in PDA,
Can also be the condition code of in-time generatin after handheld terminal PDA enterprising line algorithm computing, and compare with " condition code " of input
Complete condition code checking on handheld terminal PDA;
2) disposable " unlocking cipher " generated on handheld terminal PDA can be that the unlocking cipher that backstage previously generates is downloaded
In PDA, it is also possible to be the unlocking cipher of in-time generatin after PDA enterprising line algorithm computing.
Step 310, business personnel B, after electronic cipher is locked input " unlocking cipher " and is verified, unblank successfully.
Step 311, locking, electronic password lock automatically generates " interlock code " information and shows.
Step 312, business personnel input " interlock code " information record on handheld terminal PDA, and preserve;
After step 313, business personnel's clear/add paper money business completes, return handheld terminal PDA and upload dependency number to manager
According to, task terminates.
In the embodiment of the present invention, it is necessary to be that two-player mode coordinates and just can complete to unblank, indispensable.The double business people that unblanks
The priority operation order of member is that order A specified according to manager, B two people have coordinated.Such as: manager appoints in generation work order
Specify after reaching the spot during business, first by A human users, then B human users, it is also possible to specify first by B human users, then A personnel
Operation.
It should be noted that in this article, term " includes ", " comprising " or its any other variant are intended to non-row
Comprising of his property, so that include that the process of a series of key element, method, article or device not only include those key elements, and
And also include other key elements being not expressly set out, or also include intrinsic for this process, method, article or device
Key element.In the case of there is no more restriction, statement " including ... " key element limited, it is not excluded that including this
The process of key element, method, article or device there is also other identical element.
Through the above description of the embodiments, those skilled in the art is it can be understood that arrive above-described embodiment side
Method can add the mode of required general hardware platform by software and realize, naturally it is also possible to by hardware, but a lot of in the case of
The former is more preferably embodiment.Based on such understanding, prior art is done by technical scheme the most in other words
The part going out contribution can embody with the form of software product, and this computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions with so that a station terminal equipment (can be mobile phone, computer, take
Business device, air-conditioner, or the network equipment etc.) perform the method described in each embodiment of the present invention.
These are only the preferred embodiments of the present invention, not thereby limit the scope of the claims of the present invention, every utilize this
Equivalent structure or equivalence flow process that bright description and accompanying drawing content are made convert, or are directly or indirectly used in other relevant skills
Art field, is the most in like manner included in the scope of patent protection of the present invention.