CN107516360A - A kind of spoonful one close intelligent fingerprint lock cipher implementation method - Google Patents
A kind of spoonful one close intelligent fingerprint lock cipher implementation method Download PDFInfo
- Publication number
- CN107516360A CN107516360A CN201710626921.2A CN201710626921A CN107516360A CN 107516360 A CN107516360 A CN 107516360A CN 201710626921 A CN201710626921 A CN 201710626921A CN 107516360 A CN107516360 A CN 107516360A
- Authority
- CN
- China
- Prior art keywords
- fingerprint lock
- mobile phone
- password
- phone terminal
- spoonful
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/0042—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
- G07C2009/00476—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically
- G07C2009/00484—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically whereby the code is a variable code
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
- G07C2009/00825—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a kind of spoonful one close intelligent fingerprint lock cipher implementation method, step includes:Fingerprint Lock is set with mobile phone terminal pairing, three steps of unlocking are verified in the generation of mobile phone terminal password and fingerprint lock end, through the above way, the spoonful close intelligent fingerprint lock cipher implementation method of the present invention, on the basis of ordinary password checking, mainly uniquely matched with lockset by mobile phone terminal, after time calibration, mobile phone terminal generation can be used for the password that fingerprint lock opens the door, generated using specific method and limit number, realized and unlocked using unique password in limiting time, facilitate the access of guest.
Description
Technical field
It is close more particularly to a kind of spoonful one close intelligent fingerprint lock the present invention relates to finger-print puzzle lock implementation method field
Code implementation method.
Background technology
In recent years, with science and technology development with rapid changepl. never-ending changes and improvements, especially microelectronics biology information technology is in all trades and professions
Extensive use, lockset industry is just developed towards the strong direction of with high content of technology, level security, in recent years, Fingerprint Lock
Occur, the most advanced level of China's lockmaking industry is represented with its practical reliability, security, convenience, is located in the world
In leading position.From conventional door lock, Fingerprint Lock, the revolutionary update of scientific and technological direct product, changes human lives side till now
Formula, and Fingerprint Lock, as the fashion digital product across the epoch, gradually substitute traditional locks, turn into the mark of symbol modern quality life
Label, fingerprint identification technology development time is longer, and technology is highly developed, but civilian Fingerprint Lock is just to develop recent years
Come, the cryptographic authorization functions in Fingerprint Lock are to do a kind of guarantee in the case of being failed as fingerprint, traditional password authentification side
Formula is only applicable to lockset possessor use, for visiting guest or some have the occasion of specific limitation to access times, pass
The password of system is then helpless, once password reveal, can only Modify password, and frequently password modification it is both dangerous and also not side
Just, so traditional password authentification mode cannot meet that guest conveniently accesses, and especially possesses the people of authority not
When at the scene.
The content of the invention
The present invention solves the technical problem of a kind of spoonful one close intelligent fingerprint lock cipher implementation method is provided, originally
The advantages of method is in specific occasion, such as guest to family, facilitates guest to enter when owner stays out, some flows of the people compared with
Greatly, but to access it is conditional in the case of, individually can disposably verify password to every visitor, facilitate the pipe of access rights
Reason, it is easy to use quick, saves the time, while solve safety problem.
In order to solve the above technical problems, one aspect of the present invention is:
There is provided a kind of spoonful one close intelligent fingerprint lock cipher implementation method, it is characterised in that comprise the following steps:
(1)Fingerprint Lock is set with mobile phone terminal pairing:Fingerprint lock end generates initial pair-wise key A at random, by this key A input handset
End, mobile phone terminal and Fingerprint Lock are bound;
(2)Mobile phone terminal password generates:Mobile phone terminal takes forward 1 nearest whole minute or half a minute institute according to the Beijing Today time
Corresponding Unix timestamps, with the key A by D3DES algorithms generation mobile phone terminal password;
(3)Fingerprint lock end is unlocked:Fingerprint lock end, take nearest whole minute and half a minute some altogether forward according to the Beijing Today time
It is individual, take backward nearest whole minute and half a minute altogether several, take Unix timestamps corresponding to several above-mentioned times, it is and described
Key A passes through D3DES algorithms, generates some groups of fingerprint lock ciphers;
Fingerprint lock end is additionally provided with unlocking limiting time module;
When mobile phone terminal Password Input is into Fingerprint Lock, the password of some groups of passwords and mobile phone terminal in Fingerprint Lock is compared, and appoints
One group of comparison of anticipating passes through, and realizes and unlocks, and by this group of password storage into Fingerprint Lock, the input next time password will be unable to realization and open
Lock;
When the mobile phone terminal password generation time exceeding the unlocking limiting time that the fingerprint lock end is set, the password can not be by testing
Card, can not realize unlocking.
In a preferred embodiment of the present invention, the key A is 8 decimal numbers, is entered by one 32 two
Random number is converted to.
In a preferred embodiment of the present invention, the fingerprint lock cipher is 20 groups of passwords.
In a preferred embodiment of the present invention, the unlocking limiting time is 5 minutes.
In a preferred embodiment of the present invention, the time sets and is consistent in the mobile phone terminal and the fingerprint lock end.
The beneficial effects of the invention are as follows:Generated using specific method and limit number, the password used in limiting time, side
Just the access of guest, it is larger in some flows of the people, and to access it is conditional in the case of, can give every visitor it is individually disposable
Password is verified, management that is efficient and convenient, while facilitating access rights is used, improves cryptosecurity performance.
Technical scheme in order to illustrate the embodiments of the present invention more clearly, make required in being described below to embodiment
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for
For those of ordinary skill in the art, on the premise of not paying creative work, it can also be obtained according to these accompanying drawings other
Accompanying drawing, wherein:
Fig. 1 is the schematic flow sheet of the detailed realization of the spoonful one close intelligent fingerprint lock cipher implementation method of the present invention;
Fig. 2 is fingerprint and the mobile phone terminal pairing flow signal of the spoonful one close intelligent fingerprint lock cipher implementation method of the present invention
Figure;
Fig. 3 is the Fingerprint Lock door opening process schematic flow sheet of the spoonful one close intelligent fingerprint lock cipher implementation method of the present invention.
Embodiment
The technical scheme in the embodiment of the present invention will be clearly and completely described below, it is clear that described implementation
Example is only the part of the embodiment of the present invention, rather than whole embodiments.It is common based on the embodiment in the present invention, this area
All other embodiment that technical staff is obtained under the premise of creative work is not made, belong to the model that the present invention protects
Enclose.
Fig. 1-3 are referred to, the embodiment of the present invention includes:
The specific steps of spoonful one close intelligent fingerprint lock cipher implementation method include:
(1) Fingerprint Lock is set with mobile phone terminal pairing:Fingerprint lock end generates initial pair-wise key A at random, and the key A is one 8
Position decimal number, is to enter random number by one 32 two to be converted to, by this key A input handset end, by mobile phone terminal and fingerprint
Lock binding;
(2)Mobile phone terminal password generates:During mobile phone terminal is combined with the key A, according to the Beijing Today time take forward 1 it is nearest
Unix timestamps corresponding to whole minute or half a minute, mobile phone terminal password is generated by D3DES algorithms;
(3)Fingerprint lock end is unlocked:Fingerprint lock end can take nearest whole minute and half a minute to be total to forward according to the Beijing Today time
10, nearest whole minute and half a minute totally 10 is taken backward, Unix timestamps corresponding to above-mentioned 20 time is taken, with key A
With reference to D3DES AESs are passed through, 20 groups of fingerprint lock ciphers are generated;
Fingerprint lock end is additionally provided with unlocking limiting time module;
When mobile phone terminal Password Input is into Fingerprint Lock, the password of 20 groups of passwords and mobile phone terminal in Fingerprint Lock is compared, arbitrarily
One group of comparison passes through, then is verified, and can open the door, and Fingerprint Lock can will hold the password record moved into one's husband's household upon marriage, and next time, input will be unable to out
Door, password compare not by or password have been used by, authentication failed, it is impossible to realize and unlock, can so realize spoonful one it is close i.e.
The mobile phone for having pairing can generate the password that can be opened the door, and the password generated can only be within the time of restriction using once.
Specific embodiment one
The fingerprint lock end is additionally provided with unlocking limiting time, and the unlocking limiting time is 5 minutes, when mobile phone terminal password generates
When time was more than 5 minutes, the password can not can not realize unlocking, every visitor single one is given in limiting time by checking
Secondary property verifies password, facilitates the management of access rights.
Specific embodiment two
The mobile phone terminal uniquely matches with lockset, after time calibration, is consistent time setting in mobile phone terminal and fingerprint lock end,
Mobile phone terminal generation can be used for the password A that fingerprint lock opens the door.
The beneficial effect of the spoonful close intelligent fingerprint lock cipher implementation method of the present invention is:Generated using specific method
Limit number, the password used in limiting time, in specific occasion(Owner, which stays out, facilitates that guest enters or flow of the people is larger
And in the case of conditional to visitor)Password individually can be disposably verified to every visitor, facilitate the management of access rights,
It is easy to use quick, saves the time, while solve safety problem.
Embodiments of the invention are the foregoing is only, are not intended to limit the scope of the invention, it is every to utilize this hair
The equivalent structure or equivalent flow conversion that bright description is made, or directly or indirectly it is used in other related technology necks
Domain, it is included within the scope of the present invention.
Claims (5)
1. a kind of spoonful one close intelligent fingerprint lock cipher implementation method, it is characterised in that comprise the following steps:
(1)Fingerprint Lock is set with mobile phone terminal pairing:Fingerprint lock end generates initial pair-wise key A at random, by this key A input handset
End, mobile phone terminal and Fingerprint Lock are bound;
(2)Mobile phone terminal password generates:Mobile phone terminal takes forward 1 nearest whole minute or half a minute institute according to the Beijing Today time
Corresponding Unix timestamps, with the key A by D3DES algorithms generation mobile phone terminal password;
(3)Fingerprint lock end is unlocked:Fingerprint lock end, take nearest whole minute and half a minute some altogether forward according to the Beijing Today time
It is individual, take backward nearest whole minute and half a minute altogether several, take Unix timestamps corresponding to several above-mentioned times, it is and described
Key A, which combines, passes through D3DES algorithms, generates some groups of fingerprint lock ciphers;
Fingerprint lock end is additionally provided with unlocking limiting time module;
When mobile phone terminal Password Input is into Fingerprint Lock, the password of some groups of passwords and mobile phone terminal in Fingerprint Lock is compared, and appoints
One group of comparison of anticipating passes through, and realizes and unlocks, and by this group of password storage into Fingerprint Lock, the input next time password will be unable to realization and open
Lock;
When the mobile phone terminal password generation time exceeding the unlocking limiting time that the fingerprint lock end is set, the password can not be by testing
Card, can not realize unlocking.
2. according to claim 1 spoonful one close intelligent fingerprint lock cipher implementation method, it is characterised in that the key
A is 8 decimal numbers, is to enter random number by one 32 two to be converted to.
3. according to claim 1 spoonful one close intelligent fingerprint lock cipher implementation method, it is characterised in that the fingerprint
Lock cipher is 20 groups of passwords.
4. according to claim 1 spoonful one close intelligent fingerprint lock cipher implementation method, it is characterised in that the unlocking
Limiting time is 5 minutes.
5. according to claim 1 spoonful one close intelligent fingerprint lock cipher implementation method, it is characterised in that the mobile phone
The time sets and is consistent on end and the fingerprint lock end.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710626921.2A CN107516360A (en) | 2017-07-28 | 2017-07-28 | A kind of spoonful one close intelligent fingerprint lock cipher implementation method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710626921.2A CN107516360A (en) | 2017-07-28 | 2017-07-28 | A kind of spoonful one close intelligent fingerprint lock cipher implementation method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107516360A true CN107516360A (en) | 2017-12-26 |
Family
ID=60722617
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710626921.2A Pending CN107516360A (en) | 2017-07-28 | 2017-07-28 | A kind of spoonful one close intelligent fingerprint lock cipher implementation method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107516360A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109389716A (en) * | 2018-09-21 | 2019-02-26 | 深圳市二八智能家居有限公司 | Realize the method and device that safety long-distance is unlocked |
CN111321947A (en) * | 2018-12-14 | 2020-06-23 | 云丁网络技术(北京)有限公司 | Control method and device based on one-time password |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104282058A (en) * | 2014-08-08 | 2015-01-14 | 厦门华数电力科技有限公司 | Unlocking method of Bluetooth-based safety intelligent lock system with video monitoring function |
CN205644683U (en) * | 2015-10-26 | 2016-10-12 | 深圳市国结智能技术有限公司 | Intelligent fingerprint lock |
CN106056713A (en) * | 2016-06-08 | 2016-10-26 | 珠海明居智能科技有限公司 | Remote authorization method for combination locks |
CN106131179A (en) * | 2016-07-05 | 2016-11-16 | 林哲敏 | The password Rights Management System of a kind of intelligent door lock and method |
CN106898065A (en) * | 2017-01-21 | 2017-06-27 | 云丁网络技术(北京)有限公司 | A kind of method for unlocking of intelligent door lock |
CN106934884A (en) * | 2017-01-19 | 2017-07-07 | 云丁网络技术(北京)有限公司 | A kind of method and its system of the intelligent door lock auto-unlocking based on mobile device |
CN106952378A (en) * | 2017-04-11 | 2017-07-14 | 徐士兰 | Method for unlocking and device, electronic lock |
-
2017
- 2017-07-28 CN CN201710626921.2A patent/CN107516360A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104282058A (en) * | 2014-08-08 | 2015-01-14 | 厦门华数电力科技有限公司 | Unlocking method of Bluetooth-based safety intelligent lock system with video monitoring function |
CN205644683U (en) * | 2015-10-26 | 2016-10-12 | 深圳市国结智能技术有限公司 | Intelligent fingerprint lock |
CN106056713A (en) * | 2016-06-08 | 2016-10-26 | 珠海明居智能科技有限公司 | Remote authorization method for combination locks |
CN106131179A (en) * | 2016-07-05 | 2016-11-16 | 林哲敏 | The password Rights Management System of a kind of intelligent door lock and method |
CN106934884A (en) * | 2017-01-19 | 2017-07-07 | 云丁网络技术(北京)有限公司 | A kind of method and its system of the intelligent door lock auto-unlocking based on mobile device |
CN106898065A (en) * | 2017-01-21 | 2017-06-27 | 云丁网络技术(北京)有限公司 | A kind of method for unlocking of intelligent door lock |
CN106952378A (en) * | 2017-04-11 | 2017-07-14 | 徐士兰 | Method for unlocking and device, electronic lock |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109389716A (en) * | 2018-09-21 | 2019-02-26 | 深圳市二八智能家居有限公司 | Realize the method and device that safety long-distance is unlocked |
CN111321947A (en) * | 2018-12-14 | 2020-06-23 | 云丁网络技术(北京)有限公司 | Control method and device based on one-time password |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105513184B (en) | One kind can network audio intelligent lock and mobile phone terminal authorization unlocking method | |
CN108600213B (en) | Composite identity authentication method and composite identity authentication system applying same | |
CN105554035B (en) | A kind of electronic lock system and its control method | |
EP2513834B1 (en) | System and method for verifying the identity of an individual by employing biometric data features associated with the individual as well as a computer program product for performing said method | |
CN106161442A (en) | A kind of system control user login method | |
CN102004872A (en) | Fingerprint encryption-based identity authentication system and implementation method thereof | |
CN106372481A (en) | Fingerprint permutation and combination password | |
CN102456102A (en) | Method for carrying out identity recertification on particular operation of information system by using Usb key technology | |
CN112581656A (en) | Identity verification method, mobile phone and intelligent door lock | |
CN110163998A (en) | A kind of intelligent door lock application method of intelligent door lock system and offline authentication | |
CN107516360A (en) | A kind of spoonful one close intelligent fingerprint lock cipher implementation method | |
CN109933966A (en) | Continuous authentication method and system based on biological characteristics | |
CN209070615U (en) | Electronics unlocking system | |
CN105897708A (en) | Information protection method and mobile terminal | |
WO2011113326A1 (en) | Person identity identification system | |
CN105986734B (en) | The unlocking method of intelligent safe | |
CN110349301A (en) | Gate inhibition's open method and device | |
CN110391909A (en) | Terminal unlock method and system based on living things feature recognition | |
CN110111462A (en) | A kind of right management method and system based on intelligent door lock double authentication | |
CN107070663A (en) | A kind of on-site verification method and on-site verification system based on mobile terminal | |
CN112949582A (en) | Biological characteristic acquisition system based on block chain | |
CN110246246A (en) | Access control management method and device | |
KR100609612B1 (en) | Biometrics Door Lock by Using Identification and Control Method Thereof | |
CN110335373A (en) | Intelligent door lock and intelligent access control system | |
CN110390190A (en) | A kind of intelligent terminal unlocking method and system based on biological characteristic |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171226 |
|
RJ01 | Rejection of invention patent application after publication |