CN106060002B - A kind of data sharing method and system based on the current equipment unlocking of intelligence - Google Patents

A kind of data sharing method and system based on the current equipment unlocking of intelligence Download PDF

Info

Publication number
CN106060002B
CN106060002B CN201610302701.XA CN201610302701A CN106060002B CN 106060002 B CN106060002 B CN 106060002B CN 201610302701 A CN201610302701 A CN 201610302701A CN 106060002 B CN106060002 B CN 106060002B
Authority
CN
China
Prior art keywords
electronic key
bluetooth electronic
app bluetooth
key
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610302701.XA
Other languages
Chinese (zh)
Other versions
CN106060002A (en
Inventor
李杨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Terminus Beijing Technology Co Ltd
Original Assignee
Terminus Beijing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Terminus Beijing Technology Co Ltd filed Critical Terminus Beijing Technology Co Ltd
Priority to CN201610302701.XA priority Critical patent/CN106060002B/en
Publication of CN106060002A publication Critical patent/CN106060002A/en
Application granted granted Critical
Publication of CN106060002B publication Critical patent/CN106060002B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B5/00Near-field transmission systems, e.g. inductive or capacitive transmission systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Lock And Its Accessories (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention provides a kind of data sharing method unlocked based on the current equipment of intelligence and systems, and wherein method includes: the acquisition of the first App Bluetooth electronic key to sharing data, and backstage will be sent to sharing data;Backstage will be bound to sharing data and the MAC Address of the current equipment of intelligence;2nd App Bluetooth electronic key generates request of opening the door, and is sent to backstage, wherein request of opening the door includes at least authorization key and requests;After clamshell doors request in backstage carries out Authority Verification and passes through, according to authorization key request feedback data, wherein, feedback data at least includes authorization key data and to sharing data, and authorization key data are the authorization key data with the 2nd App Bluetooth electronic key of the MAC Address binding of the current equipment of intelligence;2nd App Bluetooth electronic key receives feedback data, and verifies to authorization key data;2nd App Bluetooth electronic key sends unlocking data after verifying authorization key passes through, to the current equipment of intelligence, and exports to sharing data.

Description

A kind of data sharing method and system based on the current equipment unlocking of intelligence
Technical field
The present invention relates to field of electronic device more particularly to a kind of data sharing methods unlocked based on the current equipment of intelligence And system.
Background technique
With the development of technology of Internet of things, the fields such as household networking, electric appliance networking, car networking are technically and application scenarios On have the development advanced by leaps and bounds.Current equipment IOT (Internet Of Things, Internet of Things) is changed, with Bluetooth technology, people Face identification technology, the continuous maturation of fingerprint identification technology, lock to intelligent entrance guard, intelligent door lock, intelligent barrier gate, intelligent car position, intelligence The current device intelligence control of the intelligence such as can argue for the sake of arguing and networking, allow current control to become more convenient, safer, more intelligent.
Bluetooth 3.0 arrives bluetooth 4.0, and Bluetooth protocol is allowed to have become a low-power consumption, efficient near field agreement, compared with The characteristics of wifi and NFC protocol, safety and convenience that Bluetooth protocol more has both.Added by Bluetooth protocol, and dynamic The encapsulation of the methods of close algorithm, AES allow Bluetooth protocol to become a kind of more convenient and fast intelligent door lock solution of opening door lock, It allows the epoch of many years tradition machinery key of human history that can draw perfect fullstop, changes the tradition such as mechanical key, card Physics mode allows pass through digitizing.
However existing intelligent unlocking solution is all excessively cumbersome and complicated, can not achieve data sharing, and therefore, wound It makes a kind of intelligent Portable safety and the unlocking solution with data sharing ability is a problem to be solved.
Summary of the invention
The present invention is directed at least overcome one of drawbacks described above to provide a kind of data sharing unlocked based on the current equipment of intelligence Method and system so that unlocking becomes intelligent convenient and safe, and can complete data sharing.
In order to achieve the above objectives, technical solution of the present invention is specifically achieved in that
One aspect of the present invention provides a kind of data sharing method unlocked based on the current equipment of intelligence, comprising: the One App Bluetooth electronic key is acquired to sharing data, and is sent to backstage to sharing data for described;Described in the backstage receives It is bound to sharing data, and by described to sharing data and the MAC Address of the current equipment of intelligence;2nd App Bluetooth electronic Key generates request of opening the door, and enabling request is sent to the backstage, wherein the enabling request includes at least authorization Key request;The backstage receives the enabling request, requests the enabling to carry out Authority Verification;The backstage is to described Request of opening the door carries out after Authority Verification passes through, according to the authorization key request feedback data, and by the feedback data It is sent to the 2nd App Bluetooth electronic key, wherein the feedback data at least includes authorization key data and number to be shared According to the authorization key data are awarding for the 2nd App Bluetooth electronic key bound with the MAC Address of the current equipment of the intelligence Weigh key data;The 2nd App Bluetooth electronic key receives the feedback data, and tests the authorization key data Card;The 2nd App Bluetooth electronic key sends unlocking number after verifying the authorization key and passing through, to the current equipment of intelligence According to, and export described to sharing data.
In addition, the 2nd App Bluetooth electronic key generates request of opening the door, and by enablings request to be sent to it is described after Before platform, method further include: the 2nd App Bluetooth electronic key generates encryption authorization request, and the encryption authorization is asked It asks and is sent to backstage, wherein include at least encryption authorization key data in the encryption authorization request;Described in the backstage receives Encryption authorization request requests the encryption authorization to carry out Authority Verification;The backstage is being requested to carry out by the encryption authorization After Authority Verification passes through, the encryption authorization key data is obtained, and stores the encryption authorization key data;It the backstage will Key storage state is sent to the 2nd App Bluetooth electronic key;The 2nd App Bluetooth electronic key receives the key Storage state.
In addition, generating encryption authorization request in the 2nd App Bluetooth electronic key, and the encryption authorization is requested to send out It send to before backstage, method further include: the backstage carries out the scanning of App Bluetooth electronic key, and overtime duration is arranged;If described Backstage judges time-out, then judges whether to search effective App Bluetooth electronic key, searching effective App Bluetooth electronic key When, at least two effective App Bluetooth electronic keys are judged whether there is, are judging there are at least two effective App Bluetooth electronic keys When spoon, user is prompted to select effective App Bluetooth electronic key, and obtains the effective App Bluetooth electronic key of determination of user's selection, Judge only one effective App Bluetooth electronic key when, obtain the effective App Bluetooth electronic key of the determination;If described Backstage judgement is not timed-out, then obtains described one effective App Bluetooth electronic key, and is judged described one effective App bluetooth Whether the signal strength of electron key is less than preset value and is not belonging to default lock type, if being less than preset value and being not belonging to pre- If locking type, then obtains described take and determine effective App Bluetooth electronic key, otherwise judge whether to search effective App described in execution The step of Bluetooth electronic key;The backstage stops after obtaining the effective App Bluetooth electronic key of determination to the App The operation that Bluetooth electronic key is scanned.
In addition, described search to effective App Bluetooth electronic key include: the App Bluetooth electronic key for judging described search and arriving Spoon, if belong to effective App Bluetooth electronic key list, if judgement belongs to effective App Bluetooth electronic key list, search Effective App Bluetooth electronic key.
In addition, before the backstage carries out the scanning of App Bluetooth electronic key, method further include: the background query is local App Bluetooth electronic key list;The backstage judges whether the local App Bluetooth electronic key is greater than one;If after described Platform judges that the local App Bluetooth electronic key only has one, then is added to the local App Bluetooth electronic key effectively App Bluetooth electronic key list;If the backstage judges described local App Bluetooth electronic key at least two, start indigo plant Tooth scans effective App Bluetooth electronic key, and according to the local App Bluetooth electronic key list, and addition is described to be scanned Effective App Bluetooth electronic key is to effective App Bluetooth electronic key list.
Another aspect of the invention provides a kind of data sharing system unlocked based on the current equipment of intelligence, comprising: the One App Bluetooth electronic key is sent to backstage to sharing data for acquiring to sharing data, and by described;The backstage is used It is described to sharing data in receiving, and bound described to sharing data and the MAC Address of the current equipment of intelligence;Second App Bluetooth electronic key is sent to the backstage for generating request of opening the door, and by enabling request, wherein the enabling Request includes at least authorization key and requests;The backstage is also used to receive the enabling request, weighs to enabling request Limit verifying;After requesting progress Authority Verification to pass through the enabling, according to the authorization key request feedback data, and The feedback data is sent to the 2nd App Bluetooth electronic key, wherein the feedback data at least includes authorization key data And to sharing data, the authorization key data are the 2nd App bluetooth with the MAC Address binding of the current equipment of the intelligence The authorization key data of electron key;The 2nd App Bluetooth electronic key is also used to receive the feedback data, and to institute Authorization key data are stated to be verified;After verifying the authorization key and passing through, unlocking data are sent to the current equipment of intelligence, and Output is described to sharing data.
In addition, the 2nd App Bluetooth electronic key generates request of opening the door, and by enablings request to be sent to it is described after Before platform, the 2nd App Bluetooth electronic key is also used to generate encryption authorization request, and the encryption authorization is requested to send out It send to backstage, wherein include at least encryption authorization key data in the encryption authorization request;The backstage is also used to receive The encryption authorization request, requests the encryption authorization to carry out Authority Verification;The encryption authorization is being requested to carry out permission After being verified, the encryption authorization key data is obtained, and stores the encryption authorization key data;By key storage state It is sent to the 2nd App Bluetooth electronic key;The 2nd App Bluetooth electronic key, is also used to receive the key storage State.
In addition, generating encryption authorization request in the 2nd App Bluetooth electronic key, and the encryption authorization is requested to send out It send to before backstage, the backstage, is also used to carry out the scanning of App Bluetooth electronic key, and overtime duration is set;If judgement is super When, then judge whether that search effective App Bluetooth electronic key judges whether when searching effective App Bluetooth electronic key There are at least two effective App Bluetooth electronic keys, when judging there are at least two effective App Bluetooth electronic keys, prompts to use Family selects effective App Bluetooth electronic key, and obtains the effective App Bluetooth electronic key of determination of user's selection, is judging only When having an effective App Bluetooth electronic key, the effective App Bluetooth electronic key of the determination is obtained;If judgement is not timed-out, Described one is obtained effective App Bluetooth electronic key, and judges that described one is the signal strength of effective App Bluetooth electronic key It is no to be less than preset value and be not belonging to default lock type, if being less than preset value and being not belonging to default lock type, obtain described take It determines effective App Bluetooth electronic key, otherwise judges whether the step of searching effective App Bluetooth electronic key described in execution; After obtaining the effective App Bluetooth electronic key of determination, stop the operation being scanned to the App Bluetooth electronic key.
In addition, it includes: the backstage that the backstage searches effective App Bluetooth electronic key in the following way, it is used for Judge the App Bluetooth electronic key that described search arrives, if belong to effective App Bluetooth electronic key list, if judgement, which belongs to, to be had App Bluetooth electronic key list is imitated, then searches effective App Bluetooth electronic key.
In addition, before the backstage carries out the scanning of App Bluetooth electronic key, it is blue to be also used to inquire local App for the backstage Tooth electron key list;Judge whether the local App Bluetooth electronic key is greater than one;If judging the local App bluetooth Electron key only has one, then the local App Bluetooth electronic key is added to effective App Bluetooth electronic key list;If Judge described local App Bluetooth electronic key at least two, then starts bluetooth and scan effective App Bluetooth electronic key, and root According to the local App Bluetooth electronic key list, effective App Bluetooth electronic key scan is added to described effective App Bluetooth electronic key list.
As seen from the above technical solution provided by the invention, provided by the invention to pass through what equipment was unlocked based on intelligence Data sharing method and system establish what connection-Data Encryption Transmission-authentication-result returned by Bluetooth communication protocol Communication mechanism verifies the validity of App Bluetooth electronic key, and after being verified, door lock is opened, so that unlocking becomes intelligent convenient And safety, and data sharing may be implemented.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment Attached drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this For the those of ordinary skill in field, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.
Fig. 1 is the flow chart of the data sharing method provided in an embodiment of the present invention unlocked based on the current equipment of intelligence;
Fig. 2 is the structural representation of the data sharing system provided in an embodiment of the present invention unlocked based on the current equipment of intelligence Figure;
Fig. 3 is a kind of specific reality of the data sharing method provided in an embodiment of the present invention unlocked based on the current equipment of intelligence The flow chart of existing mode.
Specific embodiment
Detailed description of embodiments of the present invention with reference to the accompanying drawing.
Fig. 1 shows the process of the data sharing method provided in an embodiment of the present invention unlocked based on the current equipment of intelligence Figure, referring to Fig. 1, the data sharing method provided in an embodiment of the present invention unlocked based on the current equipment of intelligence, comprising:
S101, the first App Bluetooth electronic key are acquired to sharing data, and backstage will be sent to sharing data;
Specifically, in the present invention, for the current equipment of the same intelligence, N number of App Bluetooth electronic key, N be can have >=2, N number of App Bluetooth electronic key, from the background can be by the MAC Address and each App of the current equipment of intelligence by being managed collectively from the background Bluetooth electronic key is bound, for example, can by by intelligence colleague equipment MAC Address and each App Bluetooth electronic key MAC Address bound, or bound with the ID of each App Bluetooth electronic key, this is not limited in the present invention System.In addition, the form of each App Bluetooth electronic key can be the same or different, for example, can use smart phone or It is separately configured to autonomous device, such as can have android intelligent machine system and IOS intelligent machine system, due to android intelligence Energy machine system and IOS intelligent machine system can carry bluetooth module, therefore App Bluetooth electronic key can be assisted by bluetooth 3.0 View and 4.0 agreement of bluetooth (according to Bluetooth of mobile phone version, supporting bimodulus agreement) are communicated.
In addition, in the present invention to sharing data, can be message data, or voice data can also be language Sound message data, certainly, the present invention does not limit to the composition form to sharing data, as long as the data that can be shared, It should belong to protection scope of the present invention.
Below, as tone information data instance, to be schematically illustrated to sharing data: the first App Bluetooth electronic key Tone information is acquired, and formats and generates tone information data;And tone information data are sent to backstage.Specifically Ground, the function that the first App Bluetooth electronic key can have voice collecting and data upload, such as: App Bluetooth electronic key Voice and recorded speech message are received, acquisition format is automatically converted into amr format before upload, and compression is uploaded by Http agreement Into backstage TFS file system, after tone information data and the intelligent address equipment Mac (and account) binding of going together, setting is effective Time is 30 days, and voice data is deleted after saving 30 days etc..
S102, backstage are received to sharing data, and will be tied up to sharing data and the MAC Address of the current equipment of intelligence It is fixed;
Specifically, backstage is received to sharing data (such as tone information data), and will be current to sharing data and intelligence The MAC Address of equipment is bound.
Wherein, it can have phonetic storage service from the background, such as: backstage storage uses TFS data storage architecture, and use is flat The data organizational structure of graduation, using HA framework, can smooth expansion, support large and small file to store, can provide height for outside can By the storage access with high concurrent.It is possible thereby to get voice together when App Bluetooth electronic key requests authorization key and stay Say data.
S103, the 2nd App Bluetooth electronic key generate request of opening the door, and the request that will open the door is sent to backstage, wherein open the door Request includes at least authorization key and requests;
Specifically, the 2nd App Bluetooth electronic key can be identical App bluetooth electricity with the first App Bluetooth electronic key Sub- key, or different App Bluetooth electronic keys, preferably different App Bluetooth electronic keys can be protected in this way Demonstrate,prove can sharing to sharing data to the 2nd App Bluetooth electronic key for the first App Bluetooth electronic key acquisition.
Since App Bluetooth electronic key does not store authorization key, but by storing the authorization key from the background, therefore, often It is secondary when being unlocked, it needs to background request authorization key, at this point, the 2nd App Bluetooth electronic key asks authorization key Carrying is asked to be sent to backstage in request of opening the door, to know that the 2nd App Bluetooth electronic key needs to request authorization close from the background Key.
S104, backstage receive request of opening the door, and clamshell doors request carries out Authority Verification;
Specifically, after receiving enabling request from the background, which is requested to carry out Authority Verification, to verify enabling request Sender's (i.e. the 2nd App Bluetooth electronic key) whether identity legal, whether the request that sends legal etc., to guarantee the The authenticity and legitimacy of two App Bluetooth electronic keys.
S105 requests to carry out after Authority Verification passes through in clamshell doors from the background, according to authorization key request feedback data, And feedback data is sent to the 2nd App Bluetooth electronic key, wherein feedback data at least include authorization key data and to Sharing data, authorization key data are the authorization with the 2nd App Bluetooth electronic key of the MAC Address binding of the current equipment of intelligence Key data;
Specifically, from the background after clamshell doors requests verification passes through, authorization key request is obtained from request of opening the door, according to this Authorization key request at least obtains close with the authorization of the 2nd App Bluetooth electronic key of the MAC Address binding of the current equipment of intelligence Key data are unlocked to be sent to the 2nd App Bluetooth electronic key, meanwhile, it also obtains with the MAC of the current equipment of intelligence Location binding to sharing data, be sent to the 2nd App Bluetooth electronic key together.
S106, the 2nd App Bluetooth electronic key receives feedback data, and verifies to authorization key data;
Specifically, after the 2nd App Bluetooth electronic key receives feedback data, authorization key is verified, is thus completed Verifying of the 2nd App bluetooth equipment to the authorization key data validation is opened so as to subsequent using legal authorization key Lock.
S107, the 2nd App Bluetooth electronic key send unlocking number after verifying authorization key passes through, to the current equipment of intelligence According to, and export to sharing data.
Specifically, the 2nd App Bluetooth electronic key generates unlocking data, and to intelligence after verifying authorization key passes through Current equipment sends unlocking data, so that the current equipment of intelligence is unlocked, completes unlocking process, while can export wait share Data, so that the holder of the 2nd App Bluetooth electronic key obtains the number to be shared of the holder of the first App Bluetooth electronic key According to.
In use, such as A tone information is to B, and tone information data are acquired from party A-subscriber, after transcoding compression, are uploaded to From the background, into list of leaving a message under the account of party B-subscriber.The tone information data can maintain up to 1 month, delete after broadcasting.Language It is available by the address Mac when party B-subscriber opens the door after the address Mac of sound message data and intelligent equipment of going together is bound The tone information played to needs.
It can be seen that the data sharing method unlocked based on the current equipment of intelligence provided through the embodiment of the present invention, is led to Bluetooth communication protocol is crossed, the communication mechanism that connection-Data Encryption Transmission-authentication-result returns is established, verifies App bluetooth The validity of electron key, after being verified, door lock is opened, so that unlocking becomes intelligent convenient and safe, and may be implemented to count According to sharing.
In the present invention, whether App Bluetooth electronic key goes backstage inquiry with the authentication factor by remote key authentication mechanism Can intelligently be passed through equipment by this, returned to permission as a result, if can pass through to App Bluetooth electronic key from the background, returned The unlocking data of the Mac address binding for equipment of intelligently passing through with this, while obtaining to sharing data (such as tone information data), It improves the user experience.
With the arrival of mobile Internet+the internet of things era, cloud service+mobile terminal+Intelligent hardware, three's unification is public There are cloud and private clound all to obtain specific application on a large scale in each field.The technologies such as cloud push, cloud storage, voice are in Internet of Things Allow everyone tone information when what kinsfolk went home can play in a flash in.
When specifically used, the analysis of kinsfolk is a problem of all very difficult analysis of all internet products, but It is to have natural data supporting for intelligent door lock and community intelligent gate inhibition, for community gate inhibition user, house type is energy Enough judge whether be kinsfolk an important evidence, according to the remote key granting on property management backstage, the default of same house type For kinsfolk.For family door lock user by the user of App Bluetooth electronic key and the same Mac address device of pairing, sentence It is set to the same family user.Simultaneously for tone information data, it can constantly learn the certainty of kinsfolk.Kinsfolk's returns Family's moment plays tone information function, and the message message for obtaining household in time is allowed after going home to become the another great of the internet of things era It breaks through.Solves the important breakthrough that traditional mechanical door lock can not be completed.
As an optional embodiment of the invention, data communication process is carried out in App Bluetooth electronic key and backstage In, the data interaction between App Bluetooth electronic key and backstage can be realized using cryptographic means, guarantee App Bluetooth electronic The safety that data are transmitted between key and backstage.
As an optional embodiment of the embodiment of the present invention, in S103, the 2nd App Bluetooth electronic key, which generates, to open the door Request, and before the request that will open the door is sent to backstage, the data sharing method unlocked based on the current equipment of intelligence further include:
S1031, the 2nd App Bluetooth electronic key generates encryption authorization request, and encryption authorization request is sent to backstage, Wherein, encryption authorization key data is included at least in encryption authorization request;
Specifically, encryption authorization request is generated by the 2nd App Bluetooth electronic key, and encryption authorization key data will be carried Encryption authorization request be sent to backstage, to facilitate backstage to obtain the authorization key of the 2nd App Bluetooth electronic key, after convenient It is continuous that verifying unlocking is carried out to the 2nd App Bluetooth electronic key.
S1032, backstage receive encryption authorization request, request encryption authorization to carry out Authority Verification;
Specifically, after receiving encryption authorization request from the background, which is requested to carry out Authority Verification, it should with verifying Whether the request that whether identity of sender's (i.e. the 2nd App Bluetooth electronic key) of encryption authorization request is legal, sends is legal Deng to guarantee the authenticity and legitimacy of the 2nd App Bluetooth electronic key.
S1033 obtains encryption authorization key data from the background after requesting progress Authority Verification to pass through encryption authorization, and Store encryption authorization key data;
Specifically, from the background after passing through to encryption authorization requests verification, encryption authorization key data is stored, after thus facilitating It is continuous that verifying unlocking is carried out to the 2nd App Bluetooth electronic key.
Key storage state is sent to the 2nd App Bluetooth electronic key from the background by S1034;
Specifically, key storage state is sent to the 2nd App Bluetooth electronic key from the background, so as to the 2nd App bluetooth electricity Sub- key knows key storage state, facilitates subsequent use.
S1035, the 2nd App Bluetooth electronic key receive key storage state.
Specifically, it after the 2nd App Bluetooth electronic key obtains key storage state, can be used according to key storage state The key.
The available authorization key to the 2nd App Bluetooth electronic key in backstage as a result, so as to subsequent by the authorization key It is back to the 2nd App Bluetooth electronic key to unlock, ensure that the safety of unlocking.
As an optional embodiment of the embodiment of the present invention, encryption authorization is generated in the 2nd App Bluetooth electronic key Request, and before encryption authorization request is sent to backstage, the data sharing method unlocked based on the current equipment of intelligence further include:
Backstage carries out the scanning of App Bluetooth electronic key, and overtime duration (such as 4s) is arranged;
If backstage judges time-out, judge whether to search effective App Bluetooth electronic key, it is blue searching effective App When tooth electron key, at least two effective App Bluetooth electronic keys are judged whether there is, are judging there are at least two effective App When Bluetooth electronic key, user is prompted to select effective App Bluetooth electronic key, and the effective App of determination for obtaining user's selection is blue Tooth electron key, judge only one effective App Bluetooth electronic key when, obtain and determine effective App Bluetooth electronic key;
If backstage judgement is not timed-out, one is obtained effective App Bluetooth electronic key, and judges that one is blue effective App The signal strength of tooth electron key whether be less than preset value (such as 85) and be not belonging to default lock type (such as lock and door Lock), if being less than preset value and being not belonging to default lock type, obtains and determine effective App Bluetooth electronic key, otherwise execute and sentence Disconnected the step of whether searching effective App Bluetooth electronic key;
Backstage stops the behaviour being scanned to App Bluetooth electronic key after obtaining determining effective App Bluetooth electronic key Make.
It is possible thereby to guarantee that backstage when determining that App Bluetooth electronic key is effective, just executes subsequent unlocking process, raising is opened The safety of lock.
As an optional embodiment of the embodiment of the present invention, searching effective App Bluetooth electronic key includes:
Judge the App Bluetooth electronic key searched, if belong to effective App Bluetooth electronic key list, if judgement belongs to In effective App Bluetooth electronic key list, then effective App Bluetooth electronic key is searched.
It is possible thereby to improve the efficiency that App Bluetooth electronic key is searched on backstage, guarantee the efficiency unlocked.
As an optional embodiment of the embodiment of the present invention, before backstage carries out the scanning of App Bluetooth electronic key, base In the data sharing method that intelligently current equipment is unlocked further include:
Background query local App Bluetooth electronic key list;
Backstage judges whether local App Bluetooth electronic key is greater than one;
If backstage judgement local App Bluetooth electronic key only has one, local App Bluetooth electronic key has been added to Imitate App Bluetooth electronic key list;
If backstage judgement local App Bluetooth electronic key at least two, starts bluetooth and scans effective App Bluetooth electronic Key, and according to local App Bluetooth electronic key list, it is blue to effective App to add the effective App Bluetooth electronic key scanned Tooth electron key list.
It is possible thereby to guarantee the accuracy of App Bluetooth electronic key list, so guarantee efficiency that unlocking process executes and Safety.
Fig. 2 shows the structures of the data sharing system provided in an embodiment of the present invention unlocked based on the current equipment of intelligence to show It is intended to, the data sharing system that should be unlocked based on the current equipment of intelligence uses the above method, and details are not described herein, other do not use up thing Preferably, it is referred to the above method, referring to fig. 2, the data sharing provided in an embodiment of the present invention unlocked based on the current equipment of intelligence System, comprising: the first App Bluetooth electronic key 1010, backstage 2020 and the 2nd App Bluetooth electronic key 3020;
First App Bluetooth electronic key 10 for acquiring to sharing data, and will be sent to backstage 20 to sharing data;
From the background 20, for receiving to sharing data, and will be tied up to the MAC Address of sharing data and intelligence passage equipment It is fixed;
2nd App Bluetooth electronic key 30, for generating request of opening the door, and the request that will open the door is sent to backstage 20, wherein Request of opening the door includes at least authorization key and requests;
From the background 20, it is also used to receive enabling request, clamshell doors request carries out Authority Verification;It requests to carry out permission in clamshell doors After being verified, the 2nd App Bluetooth electronic key is sent to according to authorization key request feedback data, and by feedback data 30, wherein feedback data at least includes authorization key data and to sharing data, and authorization key data are to set with intelligence passage The authorization key data of 2nd App Bluetooth electronic key 30 of standby MAC Address binding;
2nd App Bluetooth electronic key 30 is also used to receive feedback data, and verifies to authorization key data;? After verifying authorization key passes through, unlocking data are sent to the current equipment of intelligence, and export to sharing data.
It can be seen that the system of the data sharing unlocked based on the current equipment of intelligence provided through the embodiment of the present invention, By Bluetooth communication protocol, the communication mechanism that connection-Data Encryption Transmission-authentication-result returns is established, verifying App is blue The validity of tooth electron key, after being verified, door lock is opened, so that unlocking becomes intelligent convenient and safe, and may be implemented Data sharing.
In use, such as A tone information is to B, and tone information data are acquired from party A-subscriber, after transcoding compression, are uploaded to From the background, into list of leaving a message under the account of party B-subscriber.The tone information data can maintain up to 1 month, delete after broadcasting.Language It is available by the address Mac when party B-subscriber opens the door after the address Mac of sound message data and intelligent equipment of going together is bound The tone information played to needs.
In the present invention, whether App Bluetooth electronic key goes backstage inquiry with the authentication factor by remote key authentication mechanism Can intelligently be passed through equipment by this, returned to permission as a result, if can pass through to App Bluetooth electronic key from the background, returned The unlocking data of the Mac address binding for equipment of intelligently passing through with this, while obtaining to sharing data (such as tone information data), It improves the user experience.
With the arrival of mobile Internet+the internet of things era, cloud service+mobile terminal+Intelligent hardware, three's unification is public There are cloud and private clound all to obtain specific application on a large scale in each field.The technologies such as cloud push, cloud storage, voice are in Internet of Things Allow everyone tone information when what kinsfolk went home can play in a flash in.
When specifically used, the analysis of kinsfolk is a problem of all very difficult analysis of all internet products, but It is to have natural data supporting for intelligent door lock and community intelligent gate inhibition, for community gate inhibition user, house type is energy Enough judge whether be kinsfolk an important evidence, according to the remote key granting on property management backstage, the default of same house type For kinsfolk.For family door lock user by the user of App Bluetooth electronic key and the same Mac address device of pairing, sentence It is set to the same family user.Simultaneously for tone information data, it can constantly learn the certainty of kinsfolk.Kinsfolk's returns Family's moment plays tone information function, and the message message for obtaining household in time is allowed after going home to become the another great of the internet of things era It breaks through.Solves the important breakthrough that traditional mechanical door lock can not be completed.
As an optional embodiment of the invention, data communication process is carried out in App Bluetooth electronic key and backstage In, the data interaction between App Bluetooth electronic key and backstage can be realized using cryptographic means, guarantee App Bluetooth electronic The safety that data are transmitted between key and backstage.
As an optional embodiment of the invention, the 2nd App Bluetooth electronic key 30 generates request of opening the door, and will open Door request is sent to before backstage 20, the 2nd App Bluetooth electronic key 30, is also used to generate encryption authorization request, and will encryption Authorization requests are sent to backstage 20, wherein include at least encryption authorization key data in encryption authorization request;From the background 20, also use In receiving encryption authorization request, encryption authorization is requested to carry out Authority Verification;Requesting progress Authority Verification logical encryption authorization Later, encryption authorization key data is obtained, and stores encryption authorization key data;Key storage state is sent to the 2nd App Bluetooth electronic key 30;2nd App Bluetooth electronic key 30, is also used to receive key storage state.
The 20 available authorization keys to the 2nd App Bluetooth electronic key 30 of backstage as a result, so as to subsequent by the authorization Key is back to the 2nd App Bluetooth electronic key 30 and unlocks, and ensure that the safety of unlocking.
As an optional embodiment of the embodiment of the present invention, encryption is generated in the 2nd App Bluetooth electronic key 30 and is awarded Power request, and by encryption authorization request be sent to backstage 20 before, backstage 20, be also used to carry out App Bluetooth electronic key scanning, And overtime duration is set;If judgement time-out, judges whether to search effective App Bluetooth electronic key, is searching effective App When Bluetooth electronic key, judge whether there is at least two effective App Bluetooth electronic keys, judge to have at least two effectively When App Bluetooth electronic key, user is prompted to select effective App Bluetooth electronic key, and obtains the effective App of determination of user's selection Bluetooth electronic key, judge only one effective App Bluetooth electronic key when, obtain and determine effective App Bluetooth electronic key Spoon;If judgement is not timed-out, obtain one effective App Bluetooth electronic key, and judges one effective App Bluetooth electronic key Signal strength whether be less than preset value and be not belonging to default lock type, if being less than preset value and being not belonging to default lock class Type then obtains and determines effective App Bluetooth electronic key, otherwise executes and judges whether to search effective App Bluetooth electronic key Step;After obtaining determining effective App Bluetooth electronic key, stop the operation being scanned to App Bluetooth electronic key.Thus It can guarantee that backstage when determining that App Bluetooth electronic key is effective, just executes subsequent unlocking process, improves the safety of unlocking.
As an optional embodiment of the embodiment of the present invention, it is blue that backstage 20 searches effective App in the following way Tooth electron key includes: backstage 20, the App Bluetooth electronic key for judging to search, if belong to effective App Bluetooth electronic Key list searches effective App Bluetooth electronic key if judgement belongs to effective App Bluetooth electronic key list.Thus may be used To improve the efficiency that App Bluetooth electronic key is searched on backstage, guarantee the efficiency unlocked.
As an optional embodiment of the embodiment of the present invention, before backstage 20 carries out the scanning of App Bluetooth electronic key, From the background 20, it is also used to inquire local App Bluetooth electronic key list;Judge whether local App Bluetooth electronic key is greater than one; If judgement local App Bluetooth electronic key only has one, local App Bluetooth electronic key is added to effective App bluetooth electricity Sub- key list;If judging local App Bluetooth electronic key at least two, starts bluetooth and scan effective App Bluetooth electronic Key, and according to local App Bluetooth electronic key list, it is blue to effective App to add the effective App Bluetooth electronic key scanned Tooth electron key list.It is possible thereby to guarantee the accuracy of App Bluetooth electronic key list, and then guarantee what unlocking process executed Efficiency and safety.
Hereinafter, it is of the invention based on the data sharing that intelligently current equipment is unlocked to realize to provide a kind of specific implementation Method, but the present invention is not limited thereto.Referring to Fig. 3, the data sharing method unlocked based on the current equipment of intelligence is applied in visitor Under family end and server architecture, wherein client includes customer end A pp and lock Software Development Kit (Lock SDK), service Device includes App server and lock module (Lock module), comprising:
Customer end A pp sends authorization requests to Lock SDK;
Lock SDK returns to the encryption authorization key data generated to App;
App sends encryption authorization request to App server;
App server requests encryption authorization to carry out Authority Verification, and after being verified, sends and encrypt to Lock module Authorization key data;
Lock module storage encryption authorization key data simultaneously returns to App server;
App server is to App " return " key" storage state;
App sends request of opening the door to App server;
The request of App server clamshell doors carries out Authority Verification, and after being verified, and sends authorization key to Lock module Request;
Lock module returns to authorization key data and tone information data to App server;
App server returns to encryption authorization key data and tone information data to App;
App sends request of opening the door to Lock SDK;
Lock SDK, which verifies authorization key and generates unlocking data, is back to App;
App returns to unlocking data to the current equipment of intelligence to open the current equipment of intelligence.
As a result, by the data sharing method specifically unlocked based on the current equipment of intelligence, by Bluetooth communication protocol, The communication mechanism that connection-Data Encryption Transmission-authentication-result returns is established, the effective of App Bluetooth electronic key is verified Property, after being verified, door lock is opened, so that unlocking becomes intelligent convenient and safe, and data sharing may be implemented.

Claims (10)

1. a kind of data sharing method unlocked based on the current equipment of intelligence characterized by comprising
First App Bluetooth electronic key is acquired to sharing data, and is sent to backstage to sharing data for described;
The backstage carries out described in receiving to sharing data, and by the MAC Address to sharing data and the current equipment of intelligence Binding;
2nd App Bluetooth electronic key generates request of opening the door, and enabling request is sent to the backstage, wherein described Request of opening the door includes at least authorization key and requests;
The backstage receives the enabling request, requests the enabling to carry out Authority Verification;
The backstage is after requesting progress Authority Verification to pass through the enabling, according to the authorization key request feedback coefficient According to, and the feedback data is sent to the 2nd App Bluetooth electronic key, wherein the feedback data at least includes that authorization is close Key data and to sharing data, the authorization key data are second with the MAC Address binding of the current equipment of the intelligence The authorization key data of App Bluetooth electronic key;
The 2nd App Bluetooth electronic key receives the feedback data, and verifies to the authorization key data;
The 2nd App Bluetooth electronic key sends unlocking number after verifying the authorization key and passing through, to the current equipment of intelligence According to, and export described to sharing data.
2. it is requested the method according to claim 1, wherein the 2nd App Bluetooth electronic key generates to open the door, And enabling request is sent to before the backstage, further includes:
The 2nd App Bluetooth electronic key generates encryption authorization request, and encryption authorization request is sent to backstage, In, encryption authorization key data is included at least in the encryption authorization request;
The backstage receives the encryption authorization request, requests the encryption authorization to carry out Authority Verification;
The backstage obtains the encryption authorization key data after requesting progress Authority Verification to pass through the encryption authorization, And store the encryption authorization key data;
Key storage state is sent to the 2nd App Bluetooth electronic key by the backstage;
The 2nd App Bluetooth electronic key receives the key storage state.
3. according to the method described in claim 2, being asked it is characterized in that, generating encryption authorization in the App Bluetooth electronic key It asks, and encryption authorization request is sent to before backstage, further includes:
The backstage carries out the scanning of App Bluetooth electronic key, and overtime duration is arranged;
If the backstage judgement time-out, judges whether to search effective App Bluetooth electronic key, blue searching effective App When tooth electron key, at least two effective App Bluetooth electronic keys are judged whether there is, are judging there are at least two effective App When Bluetooth electronic key, user is prompted to select effective App Bluetooth electronic key, and the effective App of determination for obtaining user's selection is blue Tooth electron key, judge only one effective App Bluetooth electronic key when, obtain the effective App Bluetooth electronic of the determination Key;
If the backstage judgement is not timed-out, described one is obtained effective App Bluetooth electronic key, and judge that described one has Whether the signal strength of effect App Bluetooth electronic key is less than preset value and is not belonging to default lock type, if being less than preset value simultaneously And be not belonging to default lock type, then the effective App Bluetooth electronic key of the determination is obtained, otherwise judges whether to search for described in execution The step of to effective App Bluetooth electronic key;
The backstage stops carrying out the App Bluetooth electronic key after obtaining the effective App Bluetooth electronic key of determination The operation of scanning.
4. according to the method described in claim 3, it is characterized in that, described search includes: to effective App Bluetooth electronic key
Judge the App Bluetooth electronic key that described search arrives, if belong to effective App Bluetooth electronic key list, if judgement belongs to In effective App Bluetooth electronic key list, then effective App Bluetooth electronic key is searched.
5. according to the method described in claim 4, it is characterized in that, the backstage carry out App Bluetooth electronic key scanning before, Further include:
The background query local App Bluetooth electronic key list;
The backstage judges whether the local App Bluetooth electronic key is greater than one;
If the backstage judges that the local App Bluetooth electronic key only has one, by the local App Bluetooth electronic key It is added to effective App Bluetooth electronic key list;
If the backstage judges described local App Bluetooth electronic key at least two, starts bluetooth and scan effective App bluetooth Electron key, and according to the local App Bluetooth electronic key list, add the effective App Bluetooth electronic key scanned Spoon is to effective App Bluetooth electronic key list.
6. a kind of data sharing system unlocked based on the current equipment of intelligence characterized by comprising
First App Bluetooth electronic key is sent to backstage to sharing data for acquiring to sharing data, and by described;
The backstage, it is described to sharing data for receiving, and by the MAC Address to sharing data and the current equipment of intelligence It is bound;
2nd App Bluetooth electronic key is sent to the backstage for generating request of opening the door, and by enabling request, wherein The enabling request, which includes at least authorization key, requests;
The backstage is also used to receive the enabling request, requests the enabling to carry out Authority Verification;It is asked to the enabling After asking progress Authority Verification to pass through, it is sent to according to the authorization key request feedback data, and by the feedback data 2nd App Bluetooth electronic key, wherein the feedback data at least includes authorization key data and to sharing data, described Authorization key data are the authorization key with the 2nd App Bluetooth electronic key of the MAC Address binding of the current equipment of the intelligence Data;
The 2nd App Bluetooth electronic key is also used to receive the feedback data, and tests the authorization key data Card;After verifying the authorization key and passing through, unlocking data are sent to the current equipment of intelligence, and export described to sharing data.
7. system according to claim 6, which is characterized in that the 2nd App Bluetooth electronic key generates request of opening the door, And before requesting the enabling to be sent to the backstage,
The 2nd App Bluetooth electronic key is also used to generate encryption authorization request, and encryption authorization request is sent to From the background, wherein include at least encryption authorization key data in the encryption authorization request;
The backstage is also used to receive the encryption authorization request, requests the encryption authorization to carry out Authority Verification;To institute Encryption authorization request is stated to carry out obtaining the encryption authorization key data, and store the encryption authorization after Authority Verification passes through Key data;Key storage state is sent to the 2nd App Bluetooth electronic key;
The 2nd App Bluetooth electronic key is also used to receive the key storage state.
8. system according to claim 7, which is characterized in that generate encryption in the 2nd App Bluetooth electronic key and award Power request, and by the encryption authorization request be sent to backstage before,
The backstage is also used to carry out the scanning of App Bluetooth electronic key, and overtime duration is arranged;If judgement time-out, judgement are It is no to search effective App Bluetooth electronic key, when searching effective App Bluetooth electronic key, judge whether there is at least two Effective App Bluetooth electronic key prompts user's selection effective when judging has at least two effective App Bluetooth electronic keys App Bluetooth electronic key, and the effective App Bluetooth electronic key of determination of user's selection is obtained, judging only one handle effectively When App Bluetooth electronic key, the effective App Bluetooth electronic key of the determination is obtained;If judgement is not timed-out, described one is obtained Effective App Bluetooth electronic key, and judge described one whether the signal strength of effective App Bluetooth electronic key is less than it is default It is worth and is not belonging to default lock type, if being less than preset value and being not belonging to default lock type, obtains the effective App of the determination Otherwise Bluetooth electronic key judges whether the step of searching effective App Bluetooth electronic key described in execution;It is described true obtaining After fixed effective App Bluetooth electronic key, stop the operation being scanned to the App Bluetooth electronic key.
9. system according to claim 8, which is characterized in that it is blue that the backstage searches effective App in the following way Tooth electron key includes:
The backstage, the App Bluetooth electronic key arrived for judging described search, if belong to effective App Bluetooth electronic key List searches effective App Bluetooth electronic key if judgement belongs to effective App Bluetooth electronic key list.
10. system according to claim 9, which is characterized in that the backstage carries out App Bluetooth electronic key and scans it Before, the backstage is also used to inquire local App Bluetooth electronic key list;Whether judge the local App Bluetooth electronic key Greater than one;If judging, the local App Bluetooth electronic key only has one, and the local App Bluetooth electronic key is added Add to effective App Bluetooth electronic key list;If judging described local App Bluetooth electronic key at least two, start indigo plant Tooth scans effective App Bluetooth electronic key, and according to the local App Bluetooth electronic key list, and addition is described to be scanned Effective App Bluetooth electronic key is to effective App Bluetooth electronic key list.
CN201610302701.XA 2016-05-09 2016-05-09 A kind of data sharing method and system based on the current equipment unlocking of intelligence Active CN106060002B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610302701.XA CN106060002B (en) 2016-05-09 2016-05-09 A kind of data sharing method and system based on the current equipment unlocking of intelligence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610302701.XA CN106060002B (en) 2016-05-09 2016-05-09 A kind of data sharing method and system based on the current equipment unlocking of intelligence

Publications (2)

Publication Number Publication Date
CN106060002A CN106060002A (en) 2016-10-26
CN106060002B true CN106060002B (en) 2019-07-02

Family

ID=57176804

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610302701.XA Active CN106060002B (en) 2016-05-09 2016-05-09 A kind of data sharing method and system based on the current equipment unlocking of intelligence

Country Status (1)

Country Link
CN (1) CN106060002B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109598574A (en) * 2018-10-11 2019-04-09 上海酷信息科技有限公司 A kind of APP remotely shares the method for equipment
CN114258013B (en) * 2020-09-11 2023-10-31 中国联合网络通信集团有限公司 Data encryption method, device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102568068A (en) * 2012-03-22 2012-07-11 章晋涛 Embedded access control management system
CN103856629A (en) * 2012-12-03 2014-06-11 三星电子株式会社 Information providing method and mobile terminal therefor
CN204204069U (en) * 2014-11-19 2015-03-11 马健 Gate inhibition's intelligent controller and gate inhibition's intelligent control system
CN105046796A (en) * 2015-08-31 2015-11-11 芝麻智能科技(北京)有限公司 Unlocking control method, device and system for electronic lock
CN105447949A (en) * 2015-12-30 2016-03-30 深圳市多度科技有限公司 Intelligent access control system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8225089B2 (en) * 1996-12-04 2012-07-17 Otomaku Properties Ltd., L.L.C. Electronic transaction systems utilizing a PEAD and a private key
US7552333B2 (en) * 2000-08-04 2009-06-23 First Data Corporation Trusted authentication digital signature (tads) system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102568068A (en) * 2012-03-22 2012-07-11 章晋涛 Embedded access control management system
CN103856629A (en) * 2012-12-03 2014-06-11 三星电子株式会社 Information providing method and mobile terminal therefor
CN204204069U (en) * 2014-11-19 2015-03-11 马健 Gate inhibition's intelligent controller and gate inhibition's intelligent control system
CN105046796A (en) * 2015-08-31 2015-11-11 芝麻智能科技(北京)有限公司 Unlocking control method, device and system for electronic lock
CN105447949A (en) * 2015-12-30 2016-03-30 深圳市多度科技有限公司 Intelligent access control system

Also Published As

Publication number Publication date
CN106060002A (en) 2016-10-26

Similar Documents

Publication Publication Date Title
CN106652135B (en) Access control method and its system based on cloud and planar bar code technology
CN105261104B (en) Bluetooth door lock system and its control method based on intelligent terminal
CN110213246B (en) Wide-area multi-factor identity authentication system
CN107403491B (en) A kind of automatic access control system and door opening method based on real-time geographic coordinate
CN106340087B (en) Intelligent switch lock system based on intelligent mobile terminal
CN105894627B (en) A kind of control of bluetooth access equipment, control of bluetooth access management system and method
Santoso et al. Securing IoT for smart home system
CN104778773A (en) System and method for controlling entrance guard by mobile phone
CN102404725B (en) Method for safely building WiFi connection by SSID in application program
CN109147111A (en) It is self-service to move in management system and method, electronic equipment and storage medium
TW201525749A (en) Method of identity verification and system thereof
WO2016145748A1 (en) Remote control method, device and system for terminal device
US20130335193A1 (en) Electronic wireless lock
CN105099673A (en) Authorization method, authorization requesting method and devices
CN106600775A (en) Non-networking dynamic password generation method used for intelligent access control system
CN109300208A (en) Method for unlocking, unlocking apparatus, lock system, lock device and storage medium
CN106878471A (en) A kind of bluetooth auto-unlocking checking and the autosynchronous method of high in the clouds client
CN110535882A (en) Identity authentication service method and system based on heterogeneous terminal
CN109949461A (en) Method for unlocking and device
CN107689097A (en) Synchronizing Passwords generation and checking system and its application based on frequency hopping
CN110021087A (en) Method based on the quick binding room that wechat is opened the door
CN106060002B (en) A kind of data sharing method and system based on the current equipment unlocking of intelligence
CN103281305A (en) Security gateway-based access control method for smart city system
CN110570559A (en) Electronic key sharing method in access control system based on mobile terminal
CN108734812A (en) Remote unlocking method, apparatus based on ZigBee and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant