CN107516360A - A kind of spoonful one close intelligent fingerprint lock cipher implementation method - Google Patents

A kind of spoonful one close intelligent fingerprint lock cipher implementation method Download PDF

Info

Publication number
CN107516360A
CN107516360A CN201710626921.2A CN201710626921A CN107516360A CN 107516360 A CN107516360 A CN 107516360A CN 201710626921 A CN201710626921 A CN 201710626921A CN 107516360 A CN107516360 A CN 107516360A
Authority
CN
China
Prior art keywords
fingerprint lock
mobile phone
password
phone terminal
spoonful
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710626921.2A
Other languages
Chinese (zh)
Inventor
赵飞
卢孟
刘磊
张飞飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Bang Rong Microtronics AS
Original Assignee
Jiangsu Bang Rong Microtronics AS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Bang Rong Microtronics AS filed Critical Jiangsu Bang Rong Microtronics AS
Priority to CN201710626921.2A priority Critical patent/CN107516360A/en
Publication of CN107516360A publication Critical patent/CN107516360A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/0042Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
    • G07C2009/00476Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically
    • G07C2009/00484Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically whereby the code is a variable code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a kind of spoonful one close intelligent fingerprint lock cipher implementation method, step includes:Fingerprint Lock is set with mobile phone terminal pairing, three steps of unlocking are verified in the generation of mobile phone terminal password and fingerprint lock end, through the above way, the spoonful close intelligent fingerprint lock cipher implementation method of the present invention, on the basis of ordinary password checking, mainly uniquely matched with lockset by mobile phone terminal, after time calibration, mobile phone terminal generation can be used for the password that fingerprint lock opens the door, generated using specific method and limit number, realized and unlocked using unique password in limiting time, facilitate the access of guest.

Description

A kind of spoonful one close intelligent fingerprint lock cipher implementation method
Technical field
It is close more particularly to a kind of spoonful one close intelligent fingerprint lock the present invention relates to finger-print puzzle lock implementation method field Code implementation method.
Background technology
In recent years, with science and technology development with rapid changepl. never-ending changes and improvements, especially microelectronics biology information technology is in all trades and professions Extensive use, lockset industry is just developed towards the strong direction of with high content of technology, level security, in recent years, Fingerprint Lock Occur, the most advanced level of China's lockmaking industry is represented with its practical reliability, security, convenience, is located in the world In leading position.From conventional door lock, Fingerprint Lock, the revolutionary update of scientific and technological direct product, changes human lives side till now Formula, and Fingerprint Lock, as the fashion digital product across the epoch, gradually substitute traditional locks, turn into the mark of symbol modern quality life Label, fingerprint identification technology development time is longer, and technology is highly developed, but civilian Fingerprint Lock is just to develop recent years Come, the cryptographic authorization functions in Fingerprint Lock are to do a kind of guarantee in the case of being failed as fingerprint, traditional password authentification side Formula is only applicable to lockset possessor use, for visiting guest or some have the occasion of specific limitation to access times, pass The password of system is then helpless, once password reveal, can only Modify password, and frequently password modification it is both dangerous and also not side Just, so traditional password authentification mode cannot meet that guest conveniently accesses, and especially possesses the people of authority not When at the scene.
The content of the invention
The present invention solves the technical problem of a kind of spoonful one close intelligent fingerprint lock cipher implementation method is provided, originally The advantages of method is in specific occasion, such as guest to family, facilitates guest to enter when owner stays out, some flows of the people compared with Greatly, but to access it is conditional in the case of, individually can disposably verify password to every visitor, facilitate the pipe of access rights Reason, it is easy to use quick, saves the time, while solve safety problem.
In order to solve the above technical problems, one aspect of the present invention is:
There is provided a kind of spoonful one close intelligent fingerprint lock cipher implementation method, it is characterised in that comprise the following steps:
(1)Fingerprint Lock is set with mobile phone terminal pairing:Fingerprint lock end generates initial pair-wise key A at random, by this key A input handset End, mobile phone terminal and Fingerprint Lock are bound;
(2)Mobile phone terminal password generates:Mobile phone terminal takes forward 1 nearest whole minute or half a minute institute according to the Beijing Today time Corresponding Unix timestamps, with the key A by D3DES algorithms generation mobile phone terminal password;
(3)Fingerprint lock end is unlocked:Fingerprint lock end, take nearest whole minute and half a minute some altogether forward according to the Beijing Today time It is individual, take backward nearest whole minute and half a minute altogether several, take Unix timestamps corresponding to several above-mentioned times, it is and described Key A passes through D3DES algorithms, generates some groups of fingerprint lock ciphers;
Fingerprint lock end is additionally provided with unlocking limiting time module;
When mobile phone terminal Password Input is into Fingerprint Lock, the password of some groups of passwords and mobile phone terminal in Fingerprint Lock is compared, and appoints One group of comparison of anticipating passes through, and realizes and unlocks, and by this group of password storage into Fingerprint Lock, the input next time password will be unable to realization and open Lock;
When the mobile phone terminal password generation time exceeding the unlocking limiting time that the fingerprint lock end is set, the password can not be by testing Card, can not realize unlocking.
In a preferred embodiment of the present invention, the key A is 8 decimal numbers, is entered by one 32 two Random number is converted to.
In a preferred embodiment of the present invention, the fingerprint lock cipher is 20 groups of passwords.
In a preferred embodiment of the present invention, the unlocking limiting time is 5 minutes.
In a preferred embodiment of the present invention, the time sets and is consistent in the mobile phone terminal and the fingerprint lock end.
The beneficial effects of the invention are as follows:Generated using specific method and limit number, the password used in limiting time, side Just the access of guest, it is larger in some flows of the people, and to access it is conditional in the case of, can give every visitor it is individually disposable Password is verified, management that is efficient and convenient, while facilitating access rights is used, improves cryptosecurity performance.
Technical scheme in order to illustrate the embodiments of the present invention more clearly, make required in being described below to embodiment Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for For those of ordinary skill in the art, on the premise of not paying creative work, it can also be obtained according to these accompanying drawings other Accompanying drawing, wherein:
Fig. 1 is the schematic flow sheet of the detailed realization of the spoonful one close intelligent fingerprint lock cipher implementation method of the present invention;
Fig. 2 is fingerprint and the mobile phone terminal pairing flow signal of the spoonful one close intelligent fingerprint lock cipher implementation method of the present invention Figure;
Fig. 3 is the Fingerprint Lock door opening process schematic flow sheet of the spoonful one close intelligent fingerprint lock cipher implementation method of the present invention.
Embodiment
The technical scheme in the embodiment of the present invention will be clearly and completely described below, it is clear that described implementation Example is only the part of the embodiment of the present invention, rather than whole embodiments.It is common based on the embodiment in the present invention, this area All other embodiment that technical staff is obtained under the premise of creative work is not made, belong to the model that the present invention protects Enclose.
Fig. 1-3 are referred to, the embodiment of the present invention includes:
The specific steps of spoonful one close intelligent fingerprint lock cipher implementation method include:
(1) Fingerprint Lock is set with mobile phone terminal pairing:Fingerprint lock end generates initial pair-wise key A at random, and the key A is one 8 Position decimal number, is to enter random number by one 32 two to be converted to, by this key A input handset end, by mobile phone terminal and fingerprint Lock binding;
(2)Mobile phone terminal password generates:During mobile phone terminal is combined with the key A, according to the Beijing Today time take forward 1 it is nearest Unix timestamps corresponding to whole minute or half a minute, mobile phone terminal password is generated by D3DES algorithms;
(3)Fingerprint lock end is unlocked:Fingerprint lock end can take nearest whole minute and half a minute to be total to forward according to the Beijing Today time 10, nearest whole minute and half a minute totally 10 is taken backward, Unix timestamps corresponding to above-mentioned 20 time is taken, with key A With reference to D3DES AESs are passed through, 20 groups of fingerprint lock ciphers are generated;
Fingerprint lock end is additionally provided with unlocking limiting time module;
When mobile phone terminal Password Input is into Fingerprint Lock, the password of 20 groups of passwords and mobile phone terminal in Fingerprint Lock is compared, arbitrarily One group of comparison passes through, then is verified, and can open the door, and Fingerprint Lock can will hold the password record moved into one's husband's household upon marriage, and next time, input will be unable to out Door, password compare not by or password have been used by, authentication failed, it is impossible to realize and unlock, can so realize spoonful one it is close i.e. The mobile phone for having pairing can generate the password that can be opened the door, and the password generated can only be within the time of restriction using once.
Specific embodiment one
The fingerprint lock end is additionally provided with unlocking limiting time, and the unlocking limiting time is 5 minutes, when mobile phone terminal password generates When time was more than 5 minutes, the password can not can not realize unlocking, every visitor single one is given in limiting time by checking Secondary property verifies password, facilitates the management of access rights.
Specific embodiment two
The mobile phone terminal uniquely matches with lockset, after time calibration, is consistent time setting in mobile phone terminal and fingerprint lock end, Mobile phone terminal generation can be used for the password A that fingerprint lock opens the door.
The beneficial effect of the spoonful close intelligent fingerprint lock cipher implementation method of the present invention is:Generated using specific method Limit number, the password used in limiting time, in specific occasion(Owner, which stays out, facilitates that guest enters or flow of the people is larger And in the case of conditional to visitor)Password individually can be disposably verified to every visitor, facilitate the management of access rights, It is easy to use quick, saves the time, while solve safety problem.
Embodiments of the invention are the foregoing is only, are not intended to limit the scope of the invention, it is every to utilize this hair The equivalent structure or equivalent flow conversion that bright description is made, or directly or indirectly it is used in other related technology necks Domain, it is included within the scope of the present invention.

Claims (5)

1. a kind of spoonful one close intelligent fingerprint lock cipher implementation method, it is characterised in that comprise the following steps:
(1)Fingerprint Lock is set with mobile phone terminal pairing:Fingerprint lock end generates initial pair-wise key A at random, by this key A input handset End, mobile phone terminal and Fingerprint Lock are bound;
(2)Mobile phone terminal password generates:Mobile phone terminal takes forward 1 nearest whole minute or half a minute institute according to the Beijing Today time Corresponding Unix timestamps, with the key A by D3DES algorithms generation mobile phone terminal password;
(3)Fingerprint lock end is unlocked:Fingerprint lock end, take nearest whole minute and half a minute some altogether forward according to the Beijing Today time It is individual, take backward nearest whole minute and half a minute altogether several, take Unix timestamps corresponding to several above-mentioned times, it is and described Key A, which combines, passes through D3DES algorithms, generates some groups of fingerprint lock ciphers;
Fingerprint lock end is additionally provided with unlocking limiting time module;
When mobile phone terminal Password Input is into Fingerprint Lock, the password of some groups of passwords and mobile phone terminal in Fingerprint Lock is compared, and appoints One group of comparison of anticipating passes through, and realizes and unlocks, and by this group of password storage into Fingerprint Lock, the input next time password will be unable to realization and open Lock;
When the mobile phone terminal password generation time exceeding the unlocking limiting time that the fingerprint lock end is set, the password can not be by testing Card, can not realize unlocking.
2. according to claim 1 spoonful one close intelligent fingerprint lock cipher implementation method, it is characterised in that the key A is 8 decimal numbers, is to enter random number by one 32 two to be converted to.
3. according to claim 1 spoonful one close intelligent fingerprint lock cipher implementation method, it is characterised in that the fingerprint Lock cipher is 20 groups of passwords.
4. according to claim 1 spoonful one close intelligent fingerprint lock cipher implementation method, it is characterised in that the unlocking Limiting time is 5 minutes.
5. according to claim 1 spoonful one close intelligent fingerprint lock cipher implementation method, it is characterised in that the mobile phone The time sets and is consistent on end and the fingerprint lock end.
CN201710626921.2A 2017-07-28 2017-07-28 A kind of spoonful one close intelligent fingerprint lock cipher implementation method Pending CN107516360A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710626921.2A CN107516360A (en) 2017-07-28 2017-07-28 A kind of spoonful one close intelligent fingerprint lock cipher implementation method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710626921.2A CN107516360A (en) 2017-07-28 2017-07-28 A kind of spoonful one close intelligent fingerprint lock cipher implementation method

Publications (1)

Publication Number Publication Date
CN107516360A true CN107516360A (en) 2017-12-26

Family

ID=60722617

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710626921.2A Pending CN107516360A (en) 2017-07-28 2017-07-28 A kind of spoonful one close intelligent fingerprint lock cipher implementation method

Country Status (1)

Country Link
CN (1) CN107516360A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109389716A (en) * 2018-09-21 2019-02-26 深圳市二八智能家居有限公司 Realize the method and device that safety long-distance is unlocked
CN111321947A (en) * 2018-12-14 2020-06-23 云丁网络技术(北京)有限公司 Control method and device based on one-time password

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104282058A (en) * 2014-08-08 2015-01-14 厦门华数电力科技有限公司 Unlocking method of Bluetooth-based safety intelligent lock system with video monitoring function
CN205644683U (en) * 2015-10-26 2016-10-12 深圳市国结智能技术有限公司 Intelligent fingerprint lock
CN106056713A (en) * 2016-06-08 2016-10-26 珠海明居智能科技有限公司 Remote authorization method for combination locks
CN106131179A (en) * 2016-07-05 2016-11-16 林哲敏 The password Rights Management System of a kind of intelligent door lock and method
CN106898065A (en) * 2017-01-21 2017-06-27 云丁网络技术(北京)有限公司 A kind of method for unlocking of intelligent door lock
CN106934884A (en) * 2017-01-19 2017-07-07 云丁网络技术(北京)有限公司 A kind of method and its system of the intelligent door lock auto-unlocking based on mobile device
CN106952378A (en) * 2017-04-11 2017-07-14 徐士兰 Method for unlocking and device, electronic lock

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104282058A (en) * 2014-08-08 2015-01-14 厦门华数电力科技有限公司 Unlocking method of Bluetooth-based safety intelligent lock system with video monitoring function
CN205644683U (en) * 2015-10-26 2016-10-12 深圳市国结智能技术有限公司 Intelligent fingerprint lock
CN106056713A (en) * 2016-06-08 2016-10-26 珠海明居智能科技有限公司 Remote authorization method for combination locks
CN106131179A (en) * 2016-07-05 2016-11-16 林哲敏 The password Rights Management System of a kind of intelligent door lock and method
CN106934884A (en) * 2017-01-19 2017-07-07 云丁网络技术(北京)有限公司 A kind of method and its system of the intelligent door lock auto-unlocking based on mobile device
CN106898065A (en) * 2017-01-21 2017-06-27 云丁网络技术(北京)有限公司 A kind of method for unlocking of intelligent door lock
CN106952378A (en) * 2017-04-11 2017-07-14 徐士兰 Method for unlocking and device, electronic lock

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109389716A (en) * 2018-09-21 2019-02-26 深圳市二八智能家居有限公司 Realize the method and device that safety long-distance is unlocked
CN111321947A (en) * 2018-12-14 2020-06-23 云丁网络技术(北京)有限公司 Control method and device based on one-time password

Similar Documents

Publication Publication Date Title
CN105513184B (en) One kind can network audio intelligent lock and mobile phone terminal authorization unlocking method
CN108600213B (en) Composite identity authentication method and composite identity authentication system applying same
CN105554035B (en) A kind of electronic lock system and its control method
EP2513834B1 (en) System and method for verifying the identity of an individual by employing biometric data features associated with the individual as well as a computer program product for performing said method
CN106161442A (en) A kind of system control user login method
CN102004872A (en) Fingerprint encryption-based identity authentication system and implementation method thereof
CN106372481A (en) Fingerprint permutation and combination password
CN102456102A (en) Method for carrying out identity recertification on particular operation of information system by using Usb key technology
CN112581656A (en) Identity verification method, mobile phone and intelligent door lock
CN110163998A (en) A kind of intelligent door lock application method of intelligent door lock system and offline authentication
CN107516360A (en) A kind of spoonful one close intelligent fingerprint lock cipher implementation method
CN109933966A (en) Continuous authentication method and system based on biological characteristics
CN209070615U (en) Electronics unlocking system
CN105897708A (en) Information protection method and mobile terminal
WO2011113326A1 (en) Person identity identification system
CN105986734B (en) The unlocking method of intelligent safe
CN110349301A (en) Gate inhibition's open method and device
CN110391909A (en) Terminal unlock method and system based on living things feature recognition
CN110111462A (en) A kind of right management method and system based on intelligent door lock double authentication
CN107070663A (en) A kind of on-site verification method and on-site verification system based on mobile terminal
CN112949582A (en) Biological characteristic acquisition system based on block chain
CN110246246A (en) Access control management method and device
KR100609612B1 (en) Biometrics Door Lock by Using Identification and Control Method Thereof
CN110335373A (en) Intelligent door lock and intelligent access control system
CN110390190A (en) A kind of intelligent terminal unlocking method and system based on biological characteristic

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171226

RJ01 Rejection of invention patent application after publication