CN108364385A - A kind of intelligent door lock equipment based on RSA Algorithm - Google Patents

A kind of intelligent door lock equipment based on RSA Algorithm Download PDF

Info

Publication number
CN108364385A
CN108364385A CN201810181838.3A CN201810181838A CN108364385A CN 108364385 A CN108364385 A CN 108364385A CN 201810181838 A CN201810181838 A CN 201810181838A CN 108364385 A CN108364385 A CN 108364385A
Authority
CN
China
Prior art keywords
module
card
fingerprint
key
microcontroller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810181838.3A
Other languages
Chinese (zh)
Inventor
朱敏玲
刘经纬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CAPITAL UNIVERSITY OF ECONOMICS AND BUSINESS
Beijing Jiaotong University
Beijing Information Science and Technology University
Original Assignee
CAPITAL UNIVERSITY OF ECONOMICS AND BUSINESS
Beijing Information Science and Technology University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CAPITAL UNIVERSITY OF ECONOMICS AND BUSINESS, Beijing Information Science and Technology University filed Critical CAPITAL UNIVERSITY OF ECONOMICS AND BUSINESS
Priority to CN201810181838.3A priority Critical patent/CN108364385A/en
Publication of CN108364385A publication Critical patent/CN108364385A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Abstract

The intelligent door lock equipment based on RSA Algorithm that the invention discloses a kind of, and provide a set of hardware model that can make system entire run.It swipes the card module, fingerprint module and bluetooth module including singlechip controller, latch module, buzzer module, RFID.In smart lock field of today, generally only by fingerprint, password, swipe the card, bluetooth unlocking function is combined, rare key sharing function.In order to ensure that the confidentiality and timeliness of key during key is shared, wherein RSA Algorithm can preferably be met the requirements.In order to ensure the integrality of system, the present invention also proposed a set of executable design scheme based on STM32F103 types low-power scm device in order to control to hardware system (fingerprint, unlock of swiping the card).The experimental results showed that system can preferably realize the function that key is shared.

Description

A kind of intelligent door lock equipment based on RSA Algorithm
Technical field
The present invention relates to the technical fields of electronic password lock, and in particular to a kind of intelligent door lock equipment based on RSA Algorithm.
Background technology
Electronic password lock is improved using Password Input control circuit or control on the basis of tradition machinery coded lock Chip realizes the electronic password lock product unlocked, be latched.Electronic password lock from performance, safety, stability and user by Ratings much exceed tradition machinery coded lock:Electronic password lock good confidentiality, password sampling is more, and (password quantity is far above Tradition machinery coded lock), the possibility of decryption is very low.The safety higher of electronic password lock preferably protects user's The security of the lives and property.
From the development trend on of lock, at present mainly to swipe the card, the directions such as cell phone application carry out, especially intelligence at present Household industry flourishes, and development trend is blended with smart home, functionally increasingly hommization.Along in recent years Since, as country is to the very big support of Internet of Things and input, the also development at full speed again of Internet of Things this industry.The hair of internet Exhibition is even more to have pushed the technological innovation of security industry.So our safety-protection system is then to become more intelligent.Artificial intelligence Energy, cloud computing, embedded chip, Intelligent treatment function etc. will largely launch to in the relevant product of security protection.
Invention content
The technical problem to be solved in the present invention is:A kind of intelligent door lock equipment based on RSA Algorithm is provided to ensure to share The safety and reliability of key is related to the realization of system hardware, the design and realization of key sharing function process algorithm.
The present invention solve the technical solution that above-mentioned technical problem uses for:A kind of intelligent door lock based on RSA Algorithm is set It is standby, including singlechip controller, latch module, buzzer module, RFID swipe the card module, fingerprint module and bluetooth module, wherein:
When being swiped the card using IC, microcontroller reads RFID data:If swiping the card success, then buzzer is not rung, and microcontroller is logical Electromagnetic lock driving circuit of overdriving controls electromagnetic lock unlocking;If swiping the card unsuccessfully, buzzer ring alarm;It unlocks when using fingerprint When, fingerprint module acquires finger print information:If successful match, then buzzer is not rung, and microcontroller is by driving electromagnetic lock driving electricity Road controls electromagnetic lock unlocking;If it fails to match, buzzer ring alarm;When being unlocked using bluetooth, the system of cell phone application connection at this time The bluetooth module of system, and to bluetooth module transmission data;Serial communication is used between bluetooth module and microcontroller, works as microcontroller After receiving data, whether verification data is accurate, and when data are correct, microcontroller is by driving electromagnetic lock driving circuit to control Electromagnetic lock unlocking;
Swipe the card module, fingerprint module and bluetooth module of singlechip controller and latch module, buzzer module, RFID connects It connects;
Latch module locks on/off function for simulated implementation;
Buzzer module, for alarming and prompting;
RFID swipes the card module, for reading card image;
Fingerprint module, for reading/typing finger print information;
Bluetooth module transmits for realizing the information between mobile phone and hardware system.
Wherein, singlechip controller selects STM32 singlechip chips, module of swiping the card to use Mfrc522 model modules, bluetooth Module uses HC-05 model modules.
Wherein, share door lock algorithm to realize based on RSA Algorithm.
The advantages of the present invention over the prior art are that:
(1) present invention is added in mobile phone terminal shares function of key, while can be limited with antithetical phrase key.
(2) present invention ensure that the safety and reliability for sharing key by the optimization use to RSA Algorithm.
(3) user of the present invention uses independence bigger, can be to lockset name, and the information such as address are into edlin.
Description of the drawings
Fig. 1 is a kind of intelligent door lock equipment Organization Chart based on RSA Algorithm of the present invention;
Fig. 2 is a kind of intelligent door lock device hardware systems function diagram based on RSA Algorithm of the present invention;
Fig. 3 is a kind of intelligent door lock device hardware fingerprint unlocking flow chart based on RSA Algorithm of the present invention;
Fig. 4 is that a kind of intelligent door lock device hardware based on RSA Algorithm of the present invention is swiped the card unlocking flow chart;
Fig. 5 is a kind of intelligent door lock device hardware interrupt routine flow chart based on RSA Algorithm of the present invention;
Fig. 6 is a kind of intelligent door lock device hardware house dog flow chart based on RSA Algorithm of the present invention;
Fig. 7 is a kind of intelligent door lock equipment mobile phone terminal Organization Chart based on RSA Algorithm of the present invention;
Fig. 8 is a kind of intelligent door lock equipment two-dimension code structure figure based on RSA Algorithm of the present invention.
Specific implementation mode
Below in conjunction with the accompanying drawings and specific embodiment further illustrates the present invention.
The present invention provides a kind of intelligent door lock equipment based on RSA Algorithm, and hardware aspect utilizes the production of ST companies STM32 microcontrollers control, and unlocking is realized by modes such as radio-frequency card, fingerprint, Bluetooth of mobile phone, to realize the intelligence of household unlocking Property and simplicity.The design of governor circuit is completed using STM32 as main control chip, auxiliary circuit requires to include radio frequency and swipes the card electricity Road, Bluetooth circuit, power circuit etc..
In terms of mobile phone terminal, using Android Studio Software for Design APP, it is made to complete addition (electronics) key, share Key, the function using key.
Fig. 1 shows system architecture, and system includes latch module, buzzer module, and RFID swipes the card module, fingerprint module, Bluetooth module.
The main design thought of the system is:When being swiped the card using IC, microcontroller reads RFID data, if swiping the card into Work(, then buzzer is not rung, if swiping the card unsuccessfully, buzzer ring alarm.After swiping the card successfully, microcontroller is by driving electromagnetic lock Driving circuit controls electromagnetic lock unlocking.When being unlocked using fingerprint, fingerprint module acquires finger print information, if successful match, then Buzzer is not rung, if it fails to match, buzzer ring alarm.After successful match, microcontroller is by driving electromagnetic lock to drive Circuit controling electromagnetism lock is unlocked.When being unlocked using bluetooth, the bluetooth module of the system of cell phone application connection at this time, and to bluetooth Module transmission data.Serial communication, after microcontroller receives data, verification data are used between bluetooth module and microcontroller Whether accurate, when data are correct, microcontroller is by driving electromagnetic lock driving circuit to control electromagnetic lock unlocking.
Microcontroller system circuit design in microcontroller type selecting it is most important, for one planned clear module and For the system of task index, the model for selecting required microcontroller can be gone according to its module and the function to be realized. During type selecting, if having chosen the less type of function, then the circuit system built of the microcontroller may cannot Complete scheduled control task;If the type function of choosing is very powerful, the actual demand of system design scheme is had exceeded just It can cause the waste of functional resources, it is non-in this way but it is not necessary to the cost for increasing design also in vain.Synthesis is to cost and reality The considerations of with property, the STM32F1xx series monolithics of the quasi- selection ST Microelectronics production of the design.
STM32F1xx series monolithic processors are broadly divided into standard type and enhanced two major class.STM32F101 systems Row type microcontroller is standard type, and working frequency is at 36 megahertzs;STM32F103 series type microcontrollers are enhanced, work Frequency with better performance and more perfect internal module and supports the outside more expanded at 72 megahertzs Equipment.STM32F103 series monolithics are 32 standard RISC (reduced instruction set computer) monolithics that first carries ARMv7-M kernels Machine controller, it can meet high performance requirement and keep the use electricity condition of low-power consumption, both adapt to low budget The exploitation of the small establishments of low cost, and the performance requirement of complicated applications high-end market can be met, and also cheap suitable price is exhausted To value-for-money.
The STM32F103 chips of ST companies production have low-power consumption, the speed of service fast, at low cost, the anti-interference functions such as strong, The chip runs dominant frequency up to 72Mhz, disclosure satisfy that the processing needs of system.The multiple timers of the integrated chip, can meet The needs of acquisition system information.
RFID swipes the card module type selecting:
Scheme one:It is swiped the card module using Mfrc522.The module is designed using common MFRC522 modules, is had simultaneously There is onboard antenna, charging process can be carried out to IC card piece in Card Reader.Simultaneously because the module is applied relatively extensively on the market, Module can with cost price it is lower on the basis of realize and sensitive swipe the card, write the operations such as card.Simultaneously as the module is answered extensively With, at present its design scheme, operational version all relative maturities, purchasing channel is extensive.The chip is automotive grade chip, Ke Yiman The use environment of sufficient household.
Scheme two:Using RDM6300ID card readers.Module is communicated using 125kHz, is serial ports with single chip communication Communication.The module has the characteristics that identification is sensitive, more in some industry control applications.The module needs external electricity when in use Line could realize communication, charging to IC card.Since the module application is less, purchasing channel is relatively single.
The cost of scheme one only has three point one of scheme two, while scheme two needs external antenna that could use, using compared with For trouble.Consider the cost of design, the practicability of operation and reliability, the factors such as sensitivity of sensor, the design choosing It selects and is swiped the card sensor of the module as our field positioning system using Mfrc522.
The module is core production using the MFRC522 radio frequency chips that PHILIPS Co. produces.The module is The radio frequency of the induction type high integration of 13.56MHz is swiped the card chip, and chip exterior circuit is simple, and cost is relatively low, can support 14443A is compatible with transponder signal.Its supply voltage is 3.3V, operating current 13-26mA, and power consumption is relatively small.In idle shape Operating current only has 10mA or so under state, disclosure satisfy that the requirement continued a journey when use.The chip disclosure satisfy that S50, S70 etc. simultaneously A variety of IC card, compatibility can meet the system requirements.
Fingerprint module can be divided by its fingerprint recognition mode:Optical finger print module;Capacitive fingerprint module;Radio-frequency fingerprint mould Block (scraping fingerprint module) three classes.
It is preceding two class wherein to use most common, wherein essentially identical on imaging capability but more and dirtier in sweat Finger optical finger print module can be at relatively fuzzy picture;In resolution ratio, the two performance is suitable;In durability, optical finger print Module is even more to surpass capacitive fingerprint module;Optical finger print module also has power consumption few a little simultaneously.So this system determines Optical finger print module is selected, selects Guangdong Ah at the optical finger print module of Science and Technology Ltd..
The design carries out Bluetooth data transfer using HC-05 bluetooth modules.Bluetooth is using distributed network structure and soon Frequency hopping and short packet technology support point-to-point and point-to-multipoint delivery, are operated in 2.4GHz ISM (i.e. industry, the section of global general-use Learn, medicine) frequency range.Its data rate is 1Mbps.Full duplex transmission, application method letter are realized using time division duplex transmission scheme Folk prescription just, stabilization reliable for operation.On hardware using serial ports RX TX and single chip communication.
Fig. 2 shows the realization methods of system hardware function, and in this design, system needs after initialization finishes It swipes the card task etc. pending RFID, fingerprint is adapted to task and bluetooth serial ports communication task etc., and when success of swiping the card, fingerprint is paired into After work(or Bluetooth communication success, driving electromagnetic lock carries out the task of unlocking etc..
System initiation task includes mainly timer initialization, bluetooth serial ports initializes, RFID is initialized, LED is initial Change, buzzer initialization and electromagnetic lock initialization etc..
RFID, which unlocks, to be realized:It when there is label close to reader, is detected, reads information and system information in label Match.When successful match, call function is unlocked, and passes through buzzer warning when failing.
The realization method that Fig. 3 fingerprints are unlocked:It is connect with computer by USB interface, fingerprint is carried out by upper computer software Collected fingerprint image generation feature command file is stored in each piece of fingerprint typing 2 times by typing respectively In CharBuffer1Img2Tz ()/CharBuffer2Img2Tz (), RegMode () feature is called to synthesize template, led to simultaneously Store () instructions are crossed, fingerprint stores successfully.
When carrying out fingerprint matching, by fingerprint head optical sensor, acquisition will verify fingerprint image, be referred to by GenImg () Enable reading image, Search () and mould fingerprint template in the block called to carry out matching comparison, module provide matching result (by or Failure).Controller is interacted with fingerprint module by communications protocol completion.
Use the instruction carried to module:
GenImg records fingerprint image;Img2Tz images turn feature;Match fingerprint comparisons;Serach searches for fingerprint; RegModel features synthesize template;Store stores template.
Tag file buffering area:
Tag file buffering area CharBuffer1 or CharBuffer2 both can be used for storing general feature file or can For storing template characteristic file.
Radio frequency programming:In this design, it needs first to initialize RFID, is initially divided into two parts, a part Microcontroller SPI is initialized, another part is initialized to RFID module.Its initialization program is as follows:
After initialization, need to having detected whether the task of swiping the card in program, it is to drive RFID module first to swipe the card Card seeking is carried out, if card seeking success, then carry out Anti-knocking processing.Anti-knocking processing mainly prevents multiple cards from entering model of swiping the card It encloses, causes swipe the card conflict or error.If there is multiple cards to enter range of swiping the card, anti-collision mechanism can be from wherein one card of selection Communication is identified.After communicating successfully, microcontroller reads the sequence number of card, then by the sequence number and the sequence built in program It number is compared, if the sequence number is correct, then illustrates that the card is household internal card, then relay is driven to unlock.If card It identifies mistake, then carries out alert process.System general diagram is as shown in Figure 4:
Software timing handles task:In this design, STM32 microcontrollers need timing acquiring card, finger print information, execution House dog task dispatching, and glittering LED lamp indicates that system mode is normal in timer, and in this design, timing uses Timer 0 carries out timing.In initialization, microcontroller timer 0 is arranged to 10ms Interruptions, i.e. microcontroller is every 10ms enters an Interruption.When microcontroller enters Interruption every time, system is counted using a timer interruption to be become Amount counts 10ms Interruptions, when the variable is added to 10 multiple, illustrates that the system passes by 100ms, will 100ms timing indexs set one.Similarly, be added to 50 multiple i.e. 500ms be timed to come, system flow chart is illustrated in fig. 5 shown below:
Design of Software Anti-interference:In order to which system can normally be run, the factor of external interference should be by the weight of height Depending on so this graduation project is provided with the program of Software Anti-interference.
To prevent program to be absorbed in endless loop, system uses " house dog " this Software for Design.Many times, due to some Inevitable disturbing factor, either interruption subroutine can be in card machine or the state when machine, whole system to system main program It cannot be monitored as usual, life property safety can be jeopardized.Therefore, setting in the defence of this graduation project this respect It sets." house dog " technology is exactly the Software for Design of this subsystem design, its working principle is that:After system electrification is run, " guard the gate Dog " timer starts therewith, in normal system operation, " house dog " timer self-clocking, and under normal condition, timing Device automatic clear " house dog " after the numerical value for reaching setting;If " house dog " is not cleared and causes to overflow in a period of time If, illustrate that system is absorbed in abnormal operating state, at this moment system can automatically reset, to re-start work.House dog work It is illustrated in fig. 6 shown below as flow chart.
The realization of cell phone application end software function is as follows:
1. Software Development Tools
Android Studio (ends PC Android application development software)
2. software function upgrades
2.1 share (electronics) key
1, user selects to ask for key to good friend.
2, using generating a pair of of public-key cryptographic keys at random according to RSA Algorithm, and key is hidden and is stored in internal system, it will be public Key addition is asked for key text (or Quick Response Code) and is encrypted.Key text (or Quick Response Code) is asked for what user's return generated.
3, user shares link (or Quick Response Code) to good friend.
4, application (or opening application scanning Quick Response Code) is opened after good friend's replication link text.
5, the interior RSA public keys for including of key text (or Quick Response Code) are asked in analytic application and acquisition, according to good friend's selection point Receipt text (or Quick Response Code) is generated after the key encryption enjoyed.
6, good friend returns to receipt text (or Quick Response Code) to user (side of asking for).
7, application (or opening application scanning Quick Response Code) is opened after user's replication link text.
8, the information in analytic application receipt text (or Quick Response Code) and the RSA key decrypted text by generating before, Successful decryption by the key shared after user's confirmation operation then by being added database.
2.2 opening door lock
1, user selects opening door lock.
2, it door lock bluetooth state and attempts to connect using detection.
3, successful connection then sends opening door lock instruction by bluetooth to door lock.
2.3 about the supplement for sharing door lock function
1, user can make the limit such as access times, usage time interval when sharing door lock to good friend to sharing door lock System.
The key restrictive condition is inquired when 2, using by enabling the key every time to determine whether to send door open command.
(usage time interval etc. is limited in use, user carries out the operations such as offline adjustment time in order to prevent, using strong User processed must connect network to ensure that the time is correct when using the key containing time restriction)
This software uses three-tier architecture, and project is roughly divided into presentation layer, Business Logic and data access layer.
1, presentation layer (User Interface Layer):User interface.User's operation is transferred to service logic Layer simultaneously responds user's operation according to the data of user logic layer return.
2, Business Logic (Business Logic Layer):Function realizes module.Pass through data access layer execution pair The operational set of data reaches the realization of function.
3, data access layer (Data Access Layer):Data operation modules.The data progress additions and deletions of storage are changed and are looked into The simple module of operation.
Specifically interaction design such as Fig. 7 between Software Architecture Design and each layering:
1.RSA public key encryption algorithms
RSA public-key encryptosystems.So-called public-key encryptosystem is exactly to use different encryption key and solution Key is a kind of " it is infeasible to go out decruption key computationally by known encryption key derivation " cipher system.Open In secret key cipher system, encryption key (i.e. public-key cryptography) PK is public information, and decruption key (i.e. privacy key) SK is to need It to be maintained secrecy.Encryption Algorithm E and decipherment algorithm D is also disclosed.Although decruption key SK is determined by public-key cryptography PK, But SK cannot be calculated according to PK.
And the realization with algorithm is based on a foolproof number theory fact:It is very easy that two big prime number is multiplied, but It is intended to carry out factorization to its product extremely difficult, therefore product can be disclosed as encryption key[2]
The algorithm of RSA is related to three parameters, n, e1、e2
Wherein, n is the product of prime number p, q two big, when binary representation of n occupied digit, be exactly so-called key Length.
e1And e2It is a pair of relevant value, e1It can arbitrarily take, but require e1It is relatively prime with (p-1) * (q-1);Reselection e2, Seek (e2*e1) mod (p-1) * (q-1)=1.
(n,e1),(n,e2) it is exactly key pair.Wherein (n, e1) it is public key, (n, e2) it is private key.
The algorithm of RSA encryption and decryption is identical, if A is in plain text, B is ciphertext, then: (in public encryption system, generally using public key encryption, private key decryption)
E1 and e2 may be used interchangeably, i.e.,:
2. Quick Response Code transmits information
Quick Response Code usually described in everybody is to refer to matrix two-dimensional barcode, is built upon computer image processing technology With a kind of basic raw encoding mechanism such as assembly coding principle.Principle is black by white point mainly in the region of a rectangle The permutation and combination of point transmits information, and on some position, white point (null point) represents binary " 0 ", stain represent two into " 1 " of system.
Square on three angles of Quick Response Code is called the anchor point of this Quick Response Code, there is these three points, no matter Quick Response Code From which direction discernment, information can be correctly identified.A plane just be can determine due to 3 points, so the 4th of Quick Response Code the A angle then saves come to store more information.
Just it is called the positioning pattern of Quick Response Code in two right-angle sides of the triangle that three anchor points are constituted, it determines two dimension The coordinate of module in code.Separator is then the stray line being centered around around anchor point, its effect is by anchor point and other letters Breath separates.
For each Quick Response Code there are one version number, the information of this version number is then stored at Quick Response Code lower left corner anchor point Top.And the encoding format information of Quick Response Code just is then stored at the periphery of three anchor points.
In other regions of Quick Response Code, storage is exactly data information and error correction code information, when scanning input Quick Response Code, It cannot be guaranteed that scanning is all correct to all information, at this moment error correcting code just works.
In addition, when Quick Response Code is maliciously torn to pieces, the correction figure positioned at Quick Response Code center then ensure that not by Still it can normally be read the part torn to pieces.
The basic structure of one ordinary QR code is as shown in Figure 8:
Test and analysis of experimental results are as follows:
1. hardware system:Under the system primary condition, electromagnetic lock is closed, and is swiped the card, is identified successfully using correct IC card, Lock is opened, and after maintaining 5 seconds open states, electromagnetic lock is automatically closed, and is connected fingerprint module, is inputted correct fingerprint, lock is opened.
2. mobile phone end system is as shown in table 1-4:
Table 1 adds door latch device test case
2 unlocking test case of table
3 door lock of table asks for test case
Table 4 shares the use limitation test case of door lock
3. analysis of experimental results
Find that 90% or so can be reached with the effective unlocking times of fingerprint by swiping the card, and failure conditions are happened at company by test (if continuously swiped the card, unlocked by fingerprint etc.) when continuous progress unlocking operation.It, can be by each operation lock in improvement later It is fixed, come the conflict for avoiding continuous operation from bringing and unlocking failure conditions.
In the test of Bluetooth information transmission, bluetooth connection success rate is 95% or so, when connection carries out bluetooth unlocking for the first time, Send unlocking instruction after, it may appear that lose instruction the case where, but it is in stable condition after, lose instruction the case where can disappear.Through dividing It analyses, flow of entirely unlocking under bluetooth original state is not very stable, but concrete reason is also to be determined.
To sum up, which realizes the requirement of initial design substantially under current state, but in system stability also It needs to continue to improve.
Mobile phone terminal APP is applied at many aspects or cannot be met expectation of the user in terms of " convenient, safety ", such as Share the cumbersome of key step, the insecurity of key information storage, and can not achieve user information between multiple equipment Transfer operation etc..
In view of these situations, the cloud server that can subsequently establish the application, sale sex is ensured to high in the clouds.It will All key informations store beyond the clouds, to replace dangerous situation key information being stored on personal mobile phone.It simultaneously can be with Realize that key can only be identified by unique buyer, the user targets such as user information is shared on multiple platforms.
On the other hand, by cloud platform, the exchange between user also would be much more convenient, and the key verified by high in the clouds is shared Operation also can be safer.
Cloud platform may be implemented user terminal and not store the high private information of any security level, this is to for security requirement It can be a prodigious promotion for high this application.

Claims (3)

1. a kind of intelligent door lock equipment based on RSA Algorithm, it is characterised in that:Including singlechip controller, latch module, buzzing Device module, RFID swipe the card module, fingerprint module and bluetooth module, wherein:
When being swiped the card using IC, microcontroller reads RFID data:If swiping the card success, then buzzer is not rung, and microcontroller passes through drive Dynamic electromagnetic lock driving circuit controls electromagnetic lock unlocking;If swiping the card unsuccessfully, buzzer ring alarm;When being unlocked using fingerprint, refer to Line module acquires finger print information:If successful match, then buzzer is not rung, and microcontroller is by driving electromagnetic lock driving circuit to control Electromagnetic lock unlocking;If it fails to match, buzzer ring alarm;When being unlocked using bluetooth, the indigo plant of the system of cell phone application connection at this time Tooth module, and to bluetooth module transmission data;Serial communication is used between bluetooth module and microcontroller, when microcontroller receives After data, whether verification data is accurate, and when data are correct, microcontroller is by driving electromagnetic lock driving circuit to control electromagnetic lock It unlocks;
Swipe the card module, fingerprint module and bluetooth module of singlechip controller and latch module, buzzer module, RFID is connect;
Latch module locks on/off function for simulated implementation;
Buzzer module, for alarming and prompting;
RFID swipes the card module, for reading card image;
Fingerprint module, for reading/typing finger print information;
Bluetooth module transmits for realizing the information between mobile phone and hardware system.
2. a kind of intelligent door lock equipment based on RSA Algorithm according to claim 1, it is characterised in that:Microcontroller controls Device selects STM32 singlechip chips, module of swiping the card that Mfrc522 model modules, bluetooth module is used to use HC-05 model modules.
3. a kind of intelligent door lock equipment based on RSA Algorithm according to claim 1, it is characterised in that:Share door lock calculation Method, which is realized, is based on RSA Algorithm.
CN201810181838.3A 2018-03-06 2018-03-06 A kind of intelligent door lock equipment based on RSA Algorithm Pending CN108364385A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810181838.3A CN108364385A (en) 2018-03-06 2018-03-06 A kind of intelligent door lock equipment based on RSA Algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810181838.3A CN108364385A (en) 2018-03-06 2018-03-06 A kind of intelligent door lock equipment based on RSA Algorithm

Publications (1)

Publication Number Publication Date
CN108364385A true CN108364385A (en) 2018-08-03

Family

ID=63003487

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810181838.3A Pending CN108364385A (en) 2018-03-06 2018-03-06 A kind of intelligent door lock equipment based on RSA Algorithm

Country Status (1)

Country Link
CN (1) CN108364385A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108961516A (en) * 2018-09-10 2018-12-07 广州大学 A kind of intelligence based on STM32 and RFID radio-frequency technique is swiped the card control system and method
CN109246205A (en) * 2018-08-27 2019-01-18 武汉市国扬科技集团有限公司 A kind of smart lock upgrade method and device based on mobile Internet and bluetooth
CN109493473A (en) * 2018-10-23 2019-03-19 智达信自动化设备有限公司 The current entrance guard device of resident identification card can be assisted in identifying
CN111127719A (en) * 2020-01-07 2020-05-08 国网山西省电力公司长治供电公司 Intelligent five-prevention key box and intelligent five-prevention realization method thereof
CN113660086A (en) * 2021-09-18 2021-11-16 上海瓶钵信息科技有限公司 Reliable failure method and system for off-line digital key

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103174337A (en) * 2013-03-05 2013-06-26 鲁亚诗 Bluetooth Low Energy (BLE) invisible intelligent lock system controlled by BLE equipment
CN105719374A (en) * 2016-01-22 2016-06-29 慧锐通智能科技股份有限公司 Door access control method
CN105871874A (en) * 2016-04-27 2016-08-17 武汉市国扬科技有限公司 Mobile Internet virtual key authorizing system and hardware door lock control method thereof
CN105915344A (en) * 2016-04-15 2016-08-31 重庆金瓯科技发展有限责任公司 Electronic key sharing service system for house renting
CN106056728A (en) * 2016-07-29 2016-10-26 福州米立科技有限公司 Split type Bluetooth lock access device
EP3125201A1 (en) * 2015-07-29 2017-02-01 Docapost Iot Method for controlling the opening of a lock by one-time passcode
US20180204399A1 (en) * 2017-01-13 2018-07-19 NextEv USA, Inc. Secured vehicle for user use only

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103174337A (en) * 2013-03-05 2013-06-26 鲁亚诗 Bluetooth Low Energy (BLE) invisible intelligent lock system controlled by BLE equipment
EP3125201A1 (en) * 2015-07-29 2017-02-01 Docapost Iot Method for controlling the opening of a lock by one-time passcode
CN105719374A (en) * 2016-01-22 2016-06-29 慧锐通智能科技股份有限公司 Door access control method
CN105915344A (en) * 2016-04-15 2016-08-31 重庆金瓯科技发展有限责任公司 Electronic key sharing service system for house renting
CN105871874A (en) * 2016-04-27 2016-08-17 武汉市国扬科技有限公司 Mobile Internet virtual key authorizing system and hardware door lock control method thereof
CN106056728A (en) * 2016-07-29 2016-10-26 福州米立科技有限公司 Split type Bluetooth lock access device
US20180204399A1 (en) * 2017-01-13 2018-07-19 NextEv USA, Inc. Secured vehicle for user use only

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109246205A (en) * 2018-08-27 2019-01-18 武汉市国扬科技集团有限公司 A kind of smart lock upgrade method and device based on mobile Internet and bluetooth
CN108961516A (en) * 2018-09-10 2018-12-07 广州大学 A kind of intelligence based on STM32 and RFID radio-frequency technique is swiped the card control system and method
CN109493473A (en) * 2018-10-23 2019-03-19 智达信自动化设备有限公司 The current entrance guard device of resident identification card can be assisted in identifying
CN111127719A (en) * 2020-01-07 2020-05-08 国网山西省电力公司长治供电公司 Intelligent five-prevention key box and intelligent five-prevention realization method thereof
CN113660086A (en) * 2021-09-18 2021-11-16 上海瓶钵信息科技有限公司 Reliable failure method and system for off-line digital key

Similar Documents

Publication Publication Date Title
CN108364385A (en) A kind of intelligent door lock equipment based on RSA Algorithm
US7845567B2 (en) Contactless card reader and information processing system
US7493495B2 (en) Biometrics interface
US20130173925A1 (en) Systems and Methods for Fingerprint-Based Operations
EP1004980A2 (en) Smart card PIN system, card, and reader
CN101783040B (en) Smart card swipe machine and information exchange method
CN107230272A (en) Intelligent key and passive intelligent lock core and its application method based on arrowband Internet of Things
CN102682255B (en) Coordinating multiple contactless data carriers
WO2006100171A1 (en) Secure credit card with near field communications (nfc)
CN101122939B (en) Security apparatus for computer system and method thereof
CN102129730A (en) Non-contact CPU (Central Processing Unit) card entrance guard reader
CN107689871A (en) The Internet of Things mobile terminal veritified with identity and testimony of a witness unification checking method
US11100379B1 (en) Multi-purpose smart card with user trusted bond
CN107422838A (en) A kind of Wearable, solution lock control system and solution lock control method
CN205788368U (en) A kind of cell phone access control
CN104410968A (en) Portable universal integrated circuit card (UICC) subscriber terminal equipment and identity authentication system thereof
CN102118250A (en) System and method for indentifying dynamic password based on double-interface intelligent card
CN103226856B (en) Multi-identification based security system
CN101697184B (en) Plug-in card fingerprint identification anti-theft laptop
CN105128818A (en) Multistage-identity-authentication car remote controlled key and work method thereof
CN104123644A (en) IC (Integrated Circuit) card capable of communicating with capacitive touch screen as well as system and method thereof
CN101009555A (en) An intelligent secret key device and the method for information interaction with the host
Gayathri et al. Fingerprint and GSM based security system
CN102013026A (en) Smart card dynamic password authentication system and smart card dynamic password authentication method
CN110485825A (en) A kind of safety intelligent lock

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Zhu Minling

Inventor after: Liu Jingwei

Inventor after: Zhang Chun

Inventor after: Zhang Jun

Inventor after: Chen Wei

Inventor before: Zhu Minling

Inventor before: Liu Jingwei

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20181024

Address after: 100101 No. 35 North Fourth Ring Road, Chaoyang District, Beijing

Applicant after: BEIJING INFORMATION SCIENCE AND TECHNOLOGY University

Applicant after: CAPITAL University OF ECONOMICS AND BUSINESS

Applicant after: Beijing Jiaotong University

Address before: 100101 No. 35 North Fourth Ring Road, Chaoyang District, Beijing

Applicant before: Beijing Information Science and Technology University

Applicant before: Capital University of Economics and Business

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180803