CN106127905A - A kind of electrical lock apparatus, system and method for unlocking thereof - Google Patents

A kind of electrical lock apparatus, system and method for unlocking thereof Download PDF

Info

Publication number
CN106127905A
CN106127905A CN201610521438.3A CN201610521438A CN106127905A CN 106127905 A CN106127905 A CN 106127905A CN 201610521438 A CN201610521438 A CN 201610521438A CN 106127905 A CN106127905 A CN 106127905A
Authority
CN
China
Prior art keywords
password
time
lock body
lock
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610521438.3A
Other languages
Chinese (zh)
Inventor
温志明
余绵梓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing shake Intelligent Technology Co., Ltd.
Original Assignee
Hangzhou Yaoguang Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Yaoguang Technology Co Ltd filed Critical Hangzhou Yaoguang Technology Co Ltd
Priority to CN201610521438.3A priority Critical patent/CN106127905A/en
Publication of CN106127905A publication Critical patent/CN106127905A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention relates to a kind of electronic lock system, including: lock body and password generator.Password generator uses condition to obtain the reference time T of calculating temporary password according to password, and generates the coding C of password effective time section beginning and ending time;Coding C, time T, seed information S are used algorithm 1 to be calculated F by password generator;C and F obtains temporary password P by algorithm 2;When casual user is at lock body Password Input module input temporary password P, lock body computing module uses the inverse operation of algorithm 2 to obtain C and F;Current time t is obtained from lock body clock module;According to C and t, analyze the reference time T ' currently being calculated temporary password;Coding C, time T ', seed information S are used above-mentioned algorithm 1 to be calculated F ' by lock body electronic module;Relatively F and F ', if identical, is unblanked by control module.The application present invention, can meet casual user and unblank demand, and door lock is without networking, easy to use, safe and reliable.

Description

A kind of electrical lock apparatus, system and method for unlocking thereof
Technical field
The present invention relates to electronic lock technical field, casual user can be met in particular to one and unblank demand, use Convenient, safe and reliable electrical lock apparatus, system and method for unlocking thereof..
Background technology
Current electronic lock is substantially all and can arrange password, and password leaves non-volatile memory device in lock body in In, hereinafter referred to as fixed password;Input password, the password of input and leaving in non-volatile memory device when unblanking every time Password compare, unblank time consistent.This mode in use, especially for casual user, has not convenient property.If User is not or not lock side, and casual user needs to open door lock, and user is accomplished by fixed password is informed casual user;Use when interim After family makes to be finished, user, it is generally required to time update password, otherwise easily causes password leakage.
In order to solve this problem, in prior art, mainly there is a following two method:
A kind of method is by mobile phone A PP, can authorize to casual user.The defect of this mode is:
1, it is desirable to door lock has the most complete mandate solution, the way of major part product is to make door lock network, by net at present Network realizes the control to lock, on the one hand adds cost, on the other hand also brings potential safety hazard.
2, it is desirable to casual user is it is necessary that with being mounted with the mobile phone of APP, mobile phone also needs to networking and receives authorization message, right APP can not be filled or be fitted without the user of corresponding A PP, and for network environment is not good user, this method is just Helpless.
Another kind of method is, document CN102168509 B proposes a kind of password with moving that date or time is changed State coding lock system, but still there is defect will be apparent below in it:
1, password is changed with date or time, and when generating password, coded lock manager inputs fixed password F and date D Calculating password, this means that password is relevant with the date, when can use this password within of even date one day, The password of same date is not dynamically change;User cannot arrange the time period, also cannot be set using number of times, and same date does not needs Different passwords just can be unblanked, and uses very inconvenient.
2, safety is very poor, and password is the most relevant to fixed password F and date D, and with user profile, lock information is the most unrelated.As Really certain casual user obtains temporary password P, and the date is known, easilys lead to fixed password F by collision and is cracked.
This technology more simply expects solving the problem of interim user by temporary password scheme, as facility Property, economy, particularly potential safety hazard, substantially it is not involved with, greatly reduces the commercial value of product..
Summary of the invention
The invention provides and a kind of can solve casual user very well and use the electronic lock system of demand, it can overcome existing Drawbacks described above present in technology, easy-to-use, safe and reliable.
In order to reach this purpose, take following measures:
1, use the time as one of them parameter calculating password.On the one hand, there is clock module in lock body, and password generator Generally operate in mobile device, computer, the software on server, or portable electronic equipment, internet application, Also clock information is had.Therefore, the time is that both sides need not move through the information that communication just possesses.On the other hand, use temporarily The time of family dual lock demand is uncertain, and therefore user is also uncertain to the selection of password effective time section, password Only could realize this demand as parameter between the used time.
2, devise coding, meet the requirement that password is used condition to select by user.Temporary password is made by different user Being not quite similar by condition, this uses scene to be relevant to user.Such as, casual user is waiting enabling outdoors , then from the beginning of current time, in the short time, effective temporary password is proper;And as the room of similar airbnb Visitor, typically can make a reservation in advance, needs several days, then in following several days, effective temporary password is proper.This Information is known at password generator end, but lock end unclear.Therefore, devise coding, various use conditions are entered Row segmentation, and encode and also the part as password is passed to lock.After receiving coding, lock is decoded, and can obtain password Use condition.In view of safety, whether coding or not occur form in plain text, but can do some reversible computings, such as Permutation and combination, with other information carry out simple computation etc..
3, it is contemplated that safety, different users, different locks, the password requirement of calculating is different;Therefore, close in calculating During code, except reference time T, encode C, also seed information S.Seed information S can be user profile, lock information etc., it is desirable to These information interacts at lock end and password generator end before using, it is ensured that both sides' is consistent.
Specifically, the technical solution used in the present invention is as follows.
A kind of electronic lock system, including: lock body and password generator.Lock body has Password Input module, computing module, time Clock module, control module.It is characterized in that:
When calculating password and checking password, lock body and password generator need not mutual communication;User is in password generator Arranging password and use condition, password uses condition to include effective time period, and password generator uses condition to obtain meter according to password Calculate the reference time T of temporary password, and generate the coding C of password effective time section beginning and ending time;Password generator to coding C, Time T and seed information S uses algorithm 1 to be calculated F;C and F obtains temporary password P by algorithm 2;User will be the closeest Code P informs casual user;When casual user is at lock body Password Input module input temporary password P, lock body computing module uses The inverse operation of algorithm 2 obtains C and F;Current time t is obtained from lock body clock module;According to C and t, analyze currently to be calculated and face Time password reference time T ';Coding C, time T ', seed information S are used above-mentioned algorithm 1 to calculate by lock body electronic module To F ';Relatively F and F ', if identical, is unblanked by control module.
Preferably, described password uses condition can also include password access times.Password access times include 1 time or many Secondary.
Further, described password effective time section refers to that password is effective, at this within following continuous print a period of time In the section time, input this password and can open door lock.
Further, following continuous time, the optional time range of section was the longest, and precision is the thinnest, it is desirable to coding the longest.Institute Stating password generator uses condition to obtain the reference time T of calculating temporary password according to password, when calculating the reference of temporary password Between T determine according to any one in following two mode:
(1) by cryptographic validity initial time, the variable length cycle determines;
(2) by the cryptographic validity end time, the variable length cycle determines.
Further, the described variable length cycle refers to that the cycle is unfixed, can arrange in advance, it is also possible to by coding C transmits;But password generator determines that when calculating password, and lock end and also can be by agreement or encode acquisition.
The described cycle refers to that system is supplied to the maximum duration of at user option temporary password effective time section.Such as, For casual user just in the scene on lock side, about fixed cycle is 10 minutes, then the password that generates is the longest to be had within 10 minutes Effect, user can arrange initial time and end time as required so that password effective time is less than 10 minutes.For short The user rented, casual user is exactly tenant, and about fixed cycle is one month, then the password generated is the longest effective within one month, Same user can arrange initial time and end time as required so that password effective time is less than one month;If room The time that visitor rents has exceeded one month, then user needs to regenerate temporary password and is supplied to tenant's use.
Further, the time period that user selects can be across the cycle, and total time is less than the time in a cycle ?.
In the two ways of the reference time T of described calculating temporary password the 1st kind, calculates the reference time of temporary password T can be the initial time in the cycle at cryptographic validity initial time place, it is also possible to be period end time, or other There is the time of fixed character.
In the two ways of the reference time T of described calculating temporary password the 2nd kind, calculates the reference time of temporary password T can be the initial time in the cycle at cryptographic validity end time place, it is also possible to be period end time, or other There is the time of fixed character.
Described password generator generates the coding C of password effective time section beginning and ending time, including password effective time section Initial time coding and end time encode, and initial time coding and end time coding have together decided on password effective time Section.Effective time section beginning and ending time coding is currently calculated temporary password to analyze when locking end checking password Reference time T '.
Described initial time coding is to encode initial time relative time within its place cycle.
Coding of described end time is to encode end time relative time within its place cycle.
Further, when active between section determine that value time, initial time coding and the end time coding have only to it In one the most permissible.Such as, for casual user just in the scene on lock side, about fixed cycle is 10 minutes, effective time section Also take 10 minutes, then to have only to one of them the most permissible for initial time coding and end time coding.
Coding C, time T and seed information S are used algorithm 1 to be calculated encryption data F by described password generator.
Further, described algorithm 1 uses unidirectional mathematical function to realize, and is computationally irreversible, i.e. from coding C, Time T, seed information S can be calculated F, cannot be calculated coding C, time T, seed information S from F.
Preferably, algorithm 1 uses hash hash function.
Described C and F obtains temporary password P by algorithm 2, and wherein, C does not encrypts;F is the output of unidirectional mathematical function, Being encryption, result is random.C and F does computing, and the P obtained also is random, and safety is higher.
When verifying password, needing first to solve coded data C and encryption data F, therefore, described algorithm 2 have to be can Inverse.
Described according to C and t, analyze the reference time T ' currently being calculated temporary password.
Further, first it needs to be determined that the cycle, if arranging in advance, then the value of agreement is read;If coding C Transmission, then decoding coding C.
Further, with encode C include initial time coding and the end time encode, calculate temporary password reference time As a example by T takes the initial time this situation in the cycle at cryptographic validity initial time place, obtain according to below scheme analysis The current reference time T ' calculating temporary password, remaining situation can the rest may be inferred:
(1) current time relative time t_c within its place cycle is obtained;
(2) initial time t_s0 in current time place cycle is obtained;
(3) initial time t_s1 in the previous cycle in current time place cycle is obtained;
(4) initial time relative time t_r0 within its place cycle is obtained after initial time code parsing;
(5) end time relative time t_r1 within its place cycle is obtained after end time code parsing;
(6) if t_r1 > t_r0, then show that effective time section is not across the cycle;If t_r0>t_c or t_c<t_r1, then T ' is invalid;Otherwise T '=t_s0;
(7) t_r1≤t_r0, then show effective time section across the cycle, if t_c > t_r1, T '=t_s0;Otherwise T '=t_s1.
Coding C, time T ', seed information S are used above-mentioned algorithm 1 to be calculated encryption data F by lock body electronic module ';
Relatively F and F ', if identical, is unblanked by control module.
Use the solution of the present invention, lock need not networking, calculate password and checking password time, password generator without and lock Carry out communication just can generate a temporary password, and can be verified by lock body;Meeting under various scene, unblanking of casual user need to Ask.
Accompanying drawing explanation
Fig. 1 is system composition in embodiment 1.
Fig. 2 is modules and annexation in lock body electronic module.
Fig. 3 is to generate password flow process and checking password flow process.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to the present invention Embodiment be described in detail.It should be noted that technical characteristic involved in each described embodiment that The conflict that do not constitutes between this just can be mutually combined other embodiments of composition, or, it is possible to according to circumstances delete each embodiment party Some technical characteristic in formula and constitute other embodiments.
The algorithm that the present invention relates to or mathematical function, all can find similar algorithm, the letter therefore used in embodiment The merely illustrative explanation of number, is not limited to only use these functions.
User refers to the manager of lock or has the user of corresponding authority, can be natural person, it is also possible to be the pipe of lock Reason system.
Casual user refers to that itself is not the user locked, but is because certain reason, has the people of the demand of unblanking.
Embodiment one:
As it is shown in figure 1, electronic lock system includes lock body 10, mobile phone 20 that user holds and server 30.Mobile phone 20 and lock body 10 Between mutual by bluetooth, only registration or other need communication when controlling, when calculating temporary password, need not between the two Communication;Network interaction is passed through between mobile phone 20 and server 30.
Lock body 10 includes electronic module and mechanical module, and wherein electronic module is mainly by MCU chip, peripheral circuit and program Composition.From the angle of function, electronic module includes Password Input module 11, clock module 12, computing module 13, memory module 14, control module 15, as shown in Figure 2.
Password Input module 11 is numeric keypad, can input these numerals of 0-9;Clock module 12 is real-time clock RTC, For the clock signal that the electronic section offer of whole lock body is stable;Memory module 14 is nonvolatile memory, after power down, it Before be written to the data of memorizer and can preserve;Computing module 13 and control module 15 are to operate in the program on MCU.
APP, this APP are installed on mobile phone 20 can realize carrying out communication with lock, between can and locking, synchronize seed information, and right Lock is controlled;The most also can generate a temporary password, be a kind of password generator in the present system.
Providing the interface that generates a temporary password on APP, have 2 kinds of temporary password, one is from the beginning of current time, 10 minutes Within effectively, disposal password once can only be opened;Another is that future time section, user is the longest can be selected one week, essence Degree to hour, within the time period selected by user, can open the door.
If what user selected is disposal password, then the cycle is 10 minutes, calculates the reference time T of password for time initial Between the beginning in place cycle.Such as: current time is 10:48 on June 20th, 2016, then time T is 20 days 10 June in 2016: 40。
If selecting continuous print a period of time in the following week, then the cycle is a week, calculates the reference time T of password Beginning for the initial time place cycle.Such as: certain user is set and uses time period of temporary password to be on June 22nd, 2016 In evening 8 June 25 in the 8 o'clock to 2016 morning point, initial time is point in morning 8 on June 22nd, 2016, and this is Wednesday, then T is Sunday 0 point, i.e. 2016 on June 19,0: 0: 0.
What in APP, above-mentioned algorithm 1 selected is HASH function.
What in APP, above-mentioned algorithm 2 selected is that C and F is carried out corresponding data addition, and result is to 10 remainders.
Seed information is unique mark of user, locks ID.
User and lock are mainly managed by server 30, register including user, and user and the association of lock, to system time Management, open the door record management etc..In system, use server that the time is managed rather than directly by mobile phone basis The time on ground, main cause is:
(1) system time on mobile phone typically can be carried out amendment, and simply the time with mobile phone this locality is insecure.
(2), between multiple users, or between the different mobile phones of same user, the time there may be certain difference.
(3) precision of the RTC of different equipment is inconsistent, and when system long-play, the time there will be deviation.Make During with, when each mobile phone 20 and lock 10 communication, mobile phone 20 all will be attempted becoming and server the time synchronized locking 10 this locality Time consistency on 30.
At lock 10 ends, F can directly obtain from P;The inverse operation of algorithm 2 is that F and P corresponding data subtracts each other, and result may Occur negative, therefore, result add 10 after to 10 remainders, C can be solved.
Lock 10 ends from RTC, read current time, in conjunction with the cycle information solved from C, can be calculated and obtain Initial time t_s0 in current time place cycle, initial time t_s1 in the previous cycle in current time place cycle, and Current time relative time t_c within its place cycle.Such as, current time is 8: 30 30 morning of on June 22nd, 2016 Second, on Wednesday, the cycle is a week, then t_s0 is 0: 0: 0 on the 19th June in 2016;T_s1 is 12 days 0: 0 June in 2016 Divide 0 second;T_c be 3 days 8 hours 30 points 30 seconds.
Initial time relative time t_r0 within its place cycle and end time can also be solved at its place from C Relative time t_r1 in cycle.Further, analysis obtains T'.Illustrated below:
(1) if t_r0 be 2 days 8 hours 0 point 0 second, t_r1 be 4 days 8 hours 0 point 0 second, i.e. cryptographic validity is morning 8 Tuesday Put point in morning Thursday 8, t_r1>t_r0, and t_r0<t_c<t_r1, therefore T '=t_s0, it is 2016 on June 19,0: 0 0 second.
(2) if t_r0 be 4 days 8 hours 0 point 0 second, t_r1 be 6 days 8 hours 0 point 0 second, i.e. cryptographic validity be Thursday early Upper 8 to point in morning Saturday 8, t_r1 > t_r0, and t_r0 > t_c, therefore T ' is invalid.
(3) if t_r0 be 4 days 8 hours 0 point 0 second, t_r1 be 2 days 8 hours 0 point 0 second, t_r1 < t_r0, i.e. password have The effect phase, across week, for point in morning Thursday 8 to morning Tuesday 8, t_r0>t_c<t_r1, therefore T '=t_s1, is June 12 in 2016 At 0: 0: 0 day.
In the present embodiment, the flow process that user uses is as follows:
(1) user is registered as new user on the server by mobile phone A PP, and server-assignment is to user the most only One mark.
(2) user adds lock by mobile phone A PP;When adding lock, APP obtains the ID of lock;Lock will obtain user profile, and Uniquely mark is written to the storage device of lock;Unique mark of user, locks the information such as ID and is all written to server;APP reads Take the temporal information on server and synchronize with lock.
(3) when there being casual user to need to unblank, user opens the APP on mobile phone, selects this casual user to use password Condition;APP goes out temporary password according to generation password workflow management in Fig. 3.
(4) this temporary password (is included the means such as phone, note) by the way of oral and informs casual user by user.
(5) after casual user gets temporary password, by Password Input in the Password Input module of lock body;Lock body is by root According to Fig. 3 verifying, password is verified by password flow process;If the verification passes, lock can be opened.
Embodiment two:
On the basis of embodiment one, server can be deleted.The management of time is completed by APP, has certain on using Limitation.For whole system, it also it is a complete system.
As it will be easily appreciated by one skilled in the art that and the foregoing is only presently preferred embodiments of the present invention, be not used to Limit the present invention, all any amendment, equivalent replacement and improvement etc. made within the spirit and principles in the present invention, all should comprise Within protection scope of the present invention.

Claims (10)

1. an electronic lock system, including: lock body and password generator, lock body has Password Input module, computing module, clock Module, control module, it is characterised in that:
When calculating password and checking password, lock body and password generator need not mutual communication;User is in password generator Arranging password and use condition, password uses condition to include effective time period, and password generator uses condition to obtain meter according to password Calculate the reference time T of temporary password, and generate the coding C of password effective time section beginning and ending time;Password generator to coding C, Time T and seed information S uses algorithm 1 to be calculated F;C and F obtains temporary password P by algorithm 2;User will be the closeest Code P informs casual user;When casual user is at lock body Password Input module input temporary password P, lock body computing module uses The inverse operation of algorithm 2 obtains C and F;Current time t is obtained from lock body clock module;According to C and t, analyze currently to be calculated and face Time password reference time T ';Coding C, time T ', seed information S are used above-mentioned algorithm 1 to calculate by lock body electronic module To F ';Relatively F and F ', if identical, is unblanked by control module.
Electronic lock system the most according to claim 1, it is characterized in that the reference time T of described calculating temporary password according to Any one in lower two ways determines:
(1) by cryptographic validity initial time, the variable length cycle determines;
(2) by the cryptographic validity end time, the variable length cycle determines.
3. according to the electronic lock system described in any one of claim 1-2, it is characterized in that, algorithm 1 uses unidirectional mathematical function real Existing.
4. according to the electronic lock system described in any one of claim 1-3, it is characterized in that, algorithm 2 is can inverse operation.
5. according to the electronic lock system described in any one of claim 1-4, it is characterized in that, the variable length cycle is to arrange in advance, or Transmitted by coding C.
6. according to the electronic lock system described in any one of claim 1-5, it is characterized in that, before use, lock body and password generate Device at least needs lock in time, and seed information S two aspect information, the time precision of lock body clock module and password generator is general It not completely the same, when time deviation effects is to when using, in addition it is also necessary to lock in time again.
7. according to the electronic lock system described in any one of claim 1-6, it is characterized in that, described password uses condition also may be used To include password access times.
8. according to the electronic lock system described in any one of claim 1-7, it is characterized in that, password generator can be to operate in Mobile device, computer, the software on server;Can also be portable electronic equipment, internet application.
9. according to the electronic lock system described in any one of claim 1-8, it is characterized in that, described system is desirably integrated into existing Various electronic locks.
10. the method for unlocking of an electronic lock, it is characterised in that use the electronic lock system as described in any one of claim 1-8 System.
CN201610521438.3A 2016-07-05 2016-07-05 A kind of electrical lock apparatus, system and method for unlocking thereof Pending CN106127905A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610521438.3A CN106127905A (en) 2016-07-05 2016-07-05 A kind of electrical lock apparatus, system and method for unlocking thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610521438.3A CN106127905A (en) 2016-07-05 2016-07-05 A kind of electrical lock apparatus, system and method for unlocking thereof

Publications (1)

Publication Number Publication Date
CN106127905A true CN106127905A (en) 2016-11-16

Family

ID=57469366

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610521438.3A Pending CN106127905A (en) 2016-07-05 2016-07-05 A kind of electrical lock apparatus, system and method for unlocking thereof

Country Status (1)

Country Link
CN (1) CN106127905A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107221061A (en) * 2017-06-16 2017-09-29 北京摇光智能科技有限公司 A kind of cipher management method of smart lock
CN107274532A (en) * 2017-07-11 2017-10-20 广东能兴科技发展有限公司 The temporary password gate control system that encryption parameter dynamically updates
CN107564161A (en) * 2017-09-13 2018-01-09 广东亚太天能科技股份有限公司 Visitor's method for unlocking and electronic lock, passwords of visitors generation method and server
CN107978047A (en) * 2017-12-04 2018-05-01 北京深思数盾科技股份有限公司 Use the methods, devices and systems of password unlocking
CN108492413A (en) * 2018-03-15 2018-09-04 广东西雅斯智能科技有限公司 Dynamic cipher generating method, password generator and coded lock
CN108932771A (en) * 2018-05-23 2018-12-04 王力安防科技股份有限公司 A kind of long-range temporary Authorization, method for unlocking and system
CN109889346A (en) * 2019-04-02 2019-06-14 中邮智递科技有限公司 A kind of dynamic cipher authentication method that do not network
CN110192228A (en) * 2017-01-09 2019-08-30 云丁网络技术(北京)有限公司 A kind of generation method and its system of the off-line verification code based on intelligent door lock system
CN110648418A (en) * 2019-09-04 2020-01-03 广东纬德信息科技有限公司 Passive intelligent lock, terminal, inspection system and inspection method
WO2020140363A1 (en) * 2019-01-03 2020-07-09 上海助邦信息技术有限公司 Dynamic password-enabled storage box system
CN113781686A (en) * 2021-09-10 2021-12-10 青岛海信智慧生活科技股份有限公司 Verification method, generation method and device for temporary password of intelligent door lock
US11527120B2 (en) 2017-01-09 2022-12-13 Yunding Network Technology (Beijing) Co., Ltd. Methods and systems for offline verification code generation based on smart door lock system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101294463A (en) * 2008-06-18 2008-10-29 大连交通大学 Dynamically encrypting and unlock method based on electronic trick lock
US20120299700A1 (en) * 2006-05-16 2012-11-29 Lynne Parker Davis Methods of controlling access to real estate properties
CN104631961A (en) * 2014-02-17 2015-05-20 袁磊 Dynamic password electronic lock system in which password changes according to random codes
CN105931337A (en) * 2016-05-09 2016-09-07 杭州摇光科技有限公司 Electronic lock device and system and authorizing method of electronic lock system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120299700A1 (en) * 2006-05-16 2012-11-29 Lynne Parker Davis Methods of controlling access to real estate properties
CN101294463A (en) * 2008-06-18 2008-10-29 大连交通大学 Dynamically encrypting and unlock method based on electronic trick lock
CN104631961A (en) * 2014-02-17 2015-05-20 袁磊 Dynamic password electronic lock system in which password changes according to random codes
CN105931337A (en) * 2016-05-09 2016-09-07 杭州摇光科技有限公司 Electronic lock device and system and authorizing method of electronic lock system

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11527120B2 (en) 2017-01-09 2022-12-13 Yunding Network Technology (Beijing) Co., Ltd. Methods and systems for offline verification code generation based on smart door lock system
CN110192228A (en) * 2017-01-09 2019-08-30 云丁网络技术(北京)有限公司 A kind of generation method and its system of the off-line verification code based on intelligent door lock system
CN107221061A (en) * 2017-06-16 2017-09-29 北京摇光智能科技有限公司 A kind of cipher management method of smart lock
CN107274532A (en) * 2017-07-11 2017-10-20 广东能兴科技发展有限公司 The temporary password gate control system that encryption parameter dynamically updates
CN107564161A (en) * 2017-09-13 2018-01-09 广东亚太天能科技股份有限公司 Visitor's method for unlocking and electronic lock, passwords of visitors generation method and server
CN107978047B (en) * 2017-12-04 2019-05-07 北京深思数盾科技股份有限公司 Use the methods, devices and systems of password unlocking
CN107978047A (en) * 2017-12-04 2018-05-01 北京深思数盾科技股份有限公司 Use the methods, devices and systems of password unlocking
CN108492413A (en) * 2018-03-15 2018-09-04 广东西雅斯智能科技有限公司 Dynamic cipher generating method, password generator and coded lock
CN108932771A (en) * 2018-05-23 2018-12-04 王力安防科技股份有限公司 A kind of long-range temporary Authorization, method for unlocking and system
WO2020140363A1 (en) * 2019-01-03 2020-07-09 上海助邦信息技术有限公司 Dynamic password-enabled storage box system
CN109889346A (en) * 2019-04-02 2019-06-14 中邮智递科技有限公司 A kind of dynamic cipher authentication method that do not network
CN110648418A (en) * 2019-09-04 2020-01-03 广东纬德信息科技有限公司 Passive intelligent lock, terminal, inspection system and inspection method
CN113781686A (en) * 2021-09-10 2021-12-10 青岛海信智慧生活科技股份有限公司 Verification method, generation method and device for temporary password of intelligent door lock
CN113781686B (en) * 2021-09-10 2023-08-18 青岛海信智慧生活科技股份有限公司 Verification method, generation method and device for temporary password of intelligent door lock

Similar Documents

Publication Publication Date Title
CN106127905A (en) A kind of electrical lock apparatus, system and method for unlocking thereof
US11120656B2 (en) Methods and systems for offline verification code generation based on smart door lock system
CN109272606B (en) Intelligent lock supervision equipment and method based on block chain and storage medium
DE102014105249B4 (en) Time synchronization
KR102255287B1 (en) Physical identity management system using One-time-password on Blockchain
CN108462568A (en) A kind of secure file storage and sharing method based on block chain
CN107508619B (en) Mobile power based on Bluetooth technology rents self-help serving system
CN107274532A (en) The temporary password gate control system that encryption parameter dynamically updates
CN207409010U (en) The newer temporary password access control system of encryption parameter dynamic
KR20180115779A (en) How to Implement a Block Chain for Controlling and Distributing Digital Content
EP3447667A1 (en) Cryptographic security for a distributed data storage
CN107689097B (en) Synchronizing Passwords based on frequency hopping generate and verify system and its application
US20150207621A1 (en) Method for creating asymmetrical cryptographic key pairs
CN106656505A (en) Mobile terminal electronic signature system based on event certificate and mobile terminal electronic signature method thereof
CN107886602A (en) A kind of method for unlocking and system
CN107958513A (en) A kind of offline authorization method and system of electronic lock
CN104580246B (en) Dynamic and intelligent safe key is produced and managing and control system and method under WiFi environment
CN114567447A (en) Data sharing management method and device based on cloud server
CN110659967B (en) House management method and device based on block chain
CN106548059A (en) The method of teacher, head of a family&#39;s mobile terminal and head of a family&#39;s authentication
CN107749854A (en) Client-based single-point logging method and system
CN113037827B (en) Voting method based on block chain, self-organization management method and computer equipment
CN110084665A (en) It rents a house method of commerce, device, electronic equipment and computer readable storage medium
CN113593094A (en) Apartment intelligent lock management method and system
CN111259075B (en) Medical information generation method, device, equipment and storage medium based on blockchain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20161226

Address after: 100024 Beijing city Haidian District Nongda Road No. 1 Building No. 5, Silicon Valley city 610C

Applicant after: Beijing shake Intelligent Technology Co., Ltd.

Address before: 310012 Hangzhou, Zhejiang, Xueyuan Road, No. 50, Chinese Academy of Sciences, science and Technology Park, room, room 1109

Applicant before: HANGZHOU YAOGUANG TECHNOLOGY CO., LTD.

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161116