CN109035510A - A method of controlling the access of express delivery smart lock by block chain - Google Patents

A method of controlling the access of express delivery smart lock by block chain Download PDF

Info

Publication number
CN109035510A
CN109035510A CN201810763116.9A CN201810763116A CN109035510A CN 109035510 A CN109035510 A CN 109035510A CN 201810763116 A CN201810763116 A CN 201810763116A CN 109035510 A CN109035510 A CN 109035510A
Authority
CN
China
Prior art keywords
access
receiving device
smart lock
code
processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810763116.9A
Other languages
Chinese (zh)
Inventor
刘祎
马克西姆·马修斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan Ys Jusen Technology Co Ltd
Original Assignee
Foshan Ys Jusen Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foshan Ys Jusen Technology Co Ltd filed Critical Foshan Ys Jusen Technology Co Ltd
Priority to CN201810763116.9A priority Critical patent/CN109035510A/en
Publication of CN109035510A publication Critical patent/CN109035510A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The present invention provides a kind of methods of access that express delivery smart lock is controlled by block chain, the described method includes: generating fetcher code and private key associated with the fetcher code by the processor of computing system, the fetcher code is used to obtain the access to the smart lock;Processor hashes access code to obtain hash access code;Processor hashes access code using public key encryption to create digital signature, wherein hash access code and digital signature are stored in block chain on block;Processor response in the access smart lock from receiving device request and authenticate receiving device;Private key and digital signature is sent to by processor the receiving device of certification;Certification receiving device decrypts digital signature using private key to obtain hash access code, and hash access code is sent to computing system;In response to receiving hash access code from receiving device, processor controls smart lock and is unlocked or locked.

Description

A method of controlling the access of express delivery smart lock by block chain
Technical field
The present invention relates to block chain application fields, control express delivery smart lock by block chain in particular to a kind of The method of access.
Background technique
It is more and more convenient that the prosperity of express delivery industry makes the modern life, but the safety of express delivery is a tender subject, weight Wanting article to dispense by express delivery, risk is very high, now with dispatching is by the progress such as combination lock but password cracks so that the party Formula safety reduces.And it is current by Internet of Things encryption technology, can market not allowed to trust completely.And block chain is encrypting Aspect is advantageous.Block chain is the computers skills such as Distributed Storage, point-to-point transmission, common recognition mechanism, Encryption Algorithm The new application mode of art.So-called common recognition mechanism is to realize to establish between different nodes in block catenary system trust, obtain equity Mathematical algorithm.It is, in general, that block catenary system is by data Layer, network layer, common recognition layer, excitation layer, contract layer and application layer group At.Wherein, data Layer encapsulates bottom data block and the basic datas such as relevant data encryption and timestamp and basic calculation Method;Network layer then includes distributed networking mechanism, data dissemination mechanism and data authentication mechanism etc.;Common recognition layer predominant package network All kinds of common recognition algorithms of node;Economic factor is integrated into block chain technical system by excitation layer, mainly includes economic incentives Issuing mechanism and distribution mechanism etc.;All kinds of scripts of contract layer predominant package, algorithm and intelligent contract are the programmable spies of block chain The basis of property;Application layer then encapsulates the various application scenarios and case of block chain.In the model, the chain type area based on timestamp Block structure, the common recognition mechanism of distributed node, the intelligent contract based on the know together economic incentives and flexible programmable of calculating power are areas The most representative innovative point of block chain technology.Due to using distributed accounting and storage, there is no the hardware of centralization or management Mechanism, the rights and duties of arbitrary node be all it is impartial, data block in system by whole system with maintenance function Node is jointly safeguarded.System be it is open, in addition to the private information of Trading parties is encrypted outer, the data of block chain are to owning People discloses, anyone can be by disclosed interface polls block chain data and exploitation related application, therefore whole system is believed Cease highly transparent.Block chain is used to be made entirely based on consensus specification and agreement (such as a set of open and clear algorithm) All nodes in system can be in the exchange data that going the free safety of the environment trusted, so that being changed to pair to the trust of " people " The trust of machine, any artificial intervention do not work.Once information permanent will be deposited by verifying and being added to block chain Storage is got up, unless can control simultaneously be more than in system 51% node, be otherwise to the modification of database on individual node Invalid, therefore the data stability of block chain and reliability are high.Since the exchange between node follows fixed algorithm, Data interaction without trust (rules of order in block chain can voluntarily judge whether activity effective), therefore counterparty without Other side must be allowed to generate oneself by way of public identity to trust, it is very helpful to the accumulation of credit.
Block chain as future generation computer system, the practical problem urgently handled in practical application there are also it is many not It is proposed specific solution.
Summary of the invention
The invention proposes a kind of methods of access that express delivery smart lock is controlled by block chain, which is characterized in that described Method includes: to generate fetcher code and private key associated with the fetcher code, the access by the processor of computing system Code is used to obtain the access to the smart lock;Processor hashes access code to obtain hash access code;Processor Using public key encryption hash access code to create digital signature, wherein hash access code and digital signature are stored in block on block Chain;Processor response in the access smart lock from receiving device request and authenticate receiving device;By processor by private key and Digital signature is sent to the receiving device of certification;Certification receiving device decrypts digital signature using private key to obtain hash access Code, and hash access code is sent to computing system;In response to receiving hash access code from receiving device, processor is to intelligence Lock is controlled and is unlocked or locked.
Further, wherein being coupled to one or more input mechanisms of the computing system in the predetermined of the smart lock The presence of the detection receiving device in the adopted degree of approach, wherein enter in response to the receiving device and send the private key.Into One step, the smart lock can access in finite time, and work as the finite time past tense, and the private key is no longer valid To obtain the access to smart lock and generate new fetcher code.
It further, further include the access that the receiving device acquisition is generated on the block chain to the smart lock Affairs, and the block chain prevents the computing system from sending more than one private key.
Further, the smart lock is located on express delivery delivery container, and the receiving device is to transport public affairs by package Take charge of the mobile computing device of operation.
Specific embodiment
In order to enable the objectives, technical solutions, and advantages of the present invention are more clearly understood, below in conjunction with embodiment, to this Invention is further elaborated;It should be appreciated that described herein, the specific embodiments are only for explaining the present invention, and does not have to It is of the invention in limiting.To those skilled in the art, after access is described in detail below, other systems of the present embodiment System, method and/or feature will become obvious.All such additional systems, method, feature and advantage are intended to be included in It in this specification, is included within the scope of the invention, and by the protection of the appended claims.In description described in detail below The other feature of the disclosed embodiments, and these characteristic roots will be apparent according to described in detail below.
Embodiment one.
A kind of method that the present embodiment explains access that express delivery smart lock is controlled by block chain, wherein the smart lock position In on express delivery delivery container, and the receiving device is the mobile computing device operated by package transport company, such as hand-held The barcode scanning gun or NFC of formula read equipment.
The described method includes: generating fetcher code and private associated with the fetcher code by the processor of computing system Key, the fetcher code are used to obtain the access to the smart lock;Processor hashes access code to obtain hash and visit Ask code;Processor hashes access code using public key encryption to create digital signature, wherein hash access code and digital signature storage The block chain on block;Processor response in the access smart lock from receiving device request and authenticate receiving device;By handling Device sends private key and digital signature to the receiving device of certification;Receiving device is authenticated using private key decryption digital signature to obtain Access code is hashed, and hash access code is sent to computing system;In response to receiving hash access code from receiving device, handle Device controls smart lock and is unlocked or locked.
Further, wherein being coupled to one or more input mechanisms of the computing system in the predetermined of the smart lock The presence of the detection receiving device in the adopted degree of approach, wherein enter in response to the receiving device and send the private key.Into One step, the smart lock can access in finite time, and work as the finite time past tense, and the private key is no longer valid To obtain the access to smart lock and generate new fetcher code.
It further, further include the access that the receiving device acquisition is generated on the block chain to the smart lock Affairs, and the block chain prevents the computing system from sending more than one private key.
Embodiment two.
For design of the invention is explained further, it is explained further here based on a kind of computer system, computer system It include: processor;At least one is coupled to the input mechanism of the processor;It is coupled to the memory devices of the processor; With the computer readable storage devices for being coupled to processor, wherein storage equipment includes program code, which can be by It manages device to execute via memory devices to realize the method for controlling the access to smart lock, this method comprises: being by calculating The processor of system generates, fetcher code and private key associated with fetcher code, and fetcher code is used to obtain the visit to smart lock It asks;By processor hash fetcher code to obtain hash fetcher code;By processor encryption public key hash access code to create Digital signature, wherein hash access code and digital signature are stored on the block of block chain;By processor response in from reception dress Reception device is verified in the request set.Obtain the access to smart lock;It is sent private key and digital signature to through recognizing by processor The receiving device of card;By processor instruction receiving device using private key decryption digital signature to obtain hash access code, and will dissipate Column access code is sent to computing system;In response to receiving hash access code from receiving device, processor smart lock, such as by intelligence It can lock locking or unlock.Smart lock can be the intelligent cipher lock of existing express delivery, belong to existing device dress on the market It sets, no longer just plays structure here and repeat.
Wherein it is coupled to the predefined degree of approach of one or more input mechanisms in the smart lock of the computing system The presence of the interior detection receiving device, wherein send the private key in response to the receiving device.And the smart lock can It is accessed in finite time, and works as the finite time past tense, the private key is no longer valid to obtain the visit to smart lock It asks and generates new fetcher code.Wherein the fetcher code keeps unknown for the receiving device.It further include described Generate the affairs for the access that the receiving device is obtained to the lock space on block chain, and the block chain prevent it is described Computing system sends more than one private key.
Embodiment three.
The present embodiment provides a kind of method for sending express delivery comprising arranges smart lock on the container of express delivery, then leads to Cross block chain control express delivery smart lock access, access include: by computing system processor generate fetcher code and with it is described The associated private key of fetcher code, the fetcher code are used to obtain the access to the smart lock;Processor to access code into Row hash is to obtain hash access code;Processor, to create digital signature, is visited using public key encryption hash access code wherein hashing Ask that code and digital signature are stored in block chain on block;Processor response in the access smart lock from receiving device request and recognize Demonstrate,prove receiving device;Private key and digital signature is sent to by processor the receiving device of certification;It authenticates receiving device and uses private key Hash access code is sent to computing system to obtain hash access code by decryption digital signature;In response to being connect from receiving device Hash access code is received, processor controls smart lock and unlocked or locked.
Wherein it is coupled to the predefined degree of approach of one or more input mechanisms in the smart lock of the computing system The presence of the interior detection receiving device, wherein enter in response to the receiving device and send the private key.
The smart lock can access in finite time, and work as the finite time past tense, the private key there is no Effect is to obtain the access to smart lock and generate new fetcher code.
Further include the affairs for the access that the receiving device is obtained to the smart lock are generated on the block chain, and The block chain prevents the computing system from sending more than one private key.
Example IV.
The method concept of the invention is configured to a kind of computer program product by the present embodiment, including storage computer can The computer-readable hardware storage device of reader code, the computer readable program code include when the meter by computing system The algorithm of the method for controlling the access to lock space is realized when calculation machine processor executes.It include: by computing system It manages device and generates fetcher code and private key associated with fetcher code, fetcher code is used to obtain the access to lock space;By Processor hashes fetcher code to obtain hash access code;By hash access code of the processor encryption with public key to create number Signature, wherein hash access code and digital signature are stored on the block of block chain;It is set by processor auth response in from reception Standby request receiving device is to obtain the access to lock space;Authenticating step is sent by private key and digital signature by processor Receiving device;Processor indicates that receiving device decrypts digital signature using private key to obtain hash access code, and hash is accessed Code is sent to computing system;In response to receiving hash access code, processor lock space from receiving device.Wherein it is coupled to institute The one or more input mechanisms for stating computing system detect the receiving device in the predefined degree of approach of the lock space Presence, wherein in response to the reception, send the private key.Equipment enters the predefined degree of approach of lock space.The lock Determining space can access in finite time, and work as the finite time past tense, and the private key is no longer valid to obtain to lock Determine the access in space and generates new fetcher code.
And the transaction for the access that the receiving device is obtained to the lock space is generated on the block chain.It is described Block chain prevents the computing system from sending more than one private key.
Although describing the present invention by reference to various embodiments above, but it is to be understood that of the invention not departing from In the case where range, many changes and modifications can be carried out.Therefore, be intended to foregoing detailed description be considered as it is illustrative and It is unrestricted, and it is to be understood that following following claims (including all equivalents) is intended to limit spirit and model of the invention It encloses.The above embodiment is interpreted as being merely to illustrate the present invention rather than limit the scope of the invention.It is reading After the content of record of the invention, technical staff can be made various changes or modifications the present invention, these equivalence changes and Modification equally falls into the scope of the claims in the present invention.

Claims (5)

1. a kind of method for the access for controlling express delivery smart lock by block chain, which is characterized in that the described method includes: by calculating The processor of system generates fetcher code and private key associated with the fetcher code, and the fetcher code is for obtaining to institute State the access of smart lock;Processor hashes access code to obtain hash access code;Processor is hashed using public key encryption Access code is to create digital signature, wherein hash access code and digital signature are stored in block chain on block;
Processor response in the access smart lock from receiving device request and authenticate receiving device;By processor by private key and Digital signature is sent to the receiving device of certification;Certification receiving device decrypts digital signature using private key to obtain hash access Code, and hash access code is sent to computing system;In response to receiving hash access code from receiving device, processor is to intelligence Lock is controlled and is unlocked or locked.
2. the method according to claim 1, wherein the one or more for being wherein coupled to the computing system is defeated Enter the presence that mechanism detects the receiving device in the predefined degree of approach of the smart lock, wherein in response to the reception Equipment enters and sends the private key.
3. method according to claim 2, which is characterized in that the smart lock can access in finite time, and work as institute Finite time past tense is stated, the private key is no longer valid to obtain the access to smart lock and generate new fetcher code.
4. the method as claimed in claims 1-3, which is characterized in that further include generating the receiving device on the block chain The affairs of the access to the smart lock are obtained, and the block chain prevents the computing system from sending more than one private key.
5. the method according to one of preceding claims, which is characterized in that the smart lock is located on express delivery delivery container, And the receiving device is the mobile computing device operated by package transport company.
CN201810763116.9A 2018-07-12 2018-07-12 A method of controlling the access of express delivery smart lock by block chain Withdrawn CN109035510A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810763116.9A CN109035510A (en) 2018-07-12 2018-07-12 A method of controlling the access of express delivery smart lock by block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810763116.9A CN109035510A (en) 2018-07-12 2018-07-12 A method of controlling the access of express delivery smart lock by block chain

Publications (1)

Publication Number Publication Date
CN109035510A true CN109035510A (en) 2018-12-18

Family

ID=64642218

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810763116.9A Withdrawn CN109035510A (en) 2018-07-12 2018-07-12 A method of controlling the access of express delivery smart lock by block chain

Country Status (1)

Country Link
CN (1) CN109035510A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109800897A (en) * 2018-12-26 2019-05-24 中链科技有限公司 Hotel occupancy processing method, device, system and calculating equipment based on block chain
CN110490505A (en) * 2019-06-25 2019-11-22 北京京东振世信息技术有限公司 Logistics information processing method, device and equipment
CN113661527A (en) * 2019-04-09 2021-11-16 通力股份公司 Access rights management

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101490687A (en) * 2006-07-07 2009-07-22 桑迪士克股份有限公司 Control system and method using identity objects
CN104851159A (en) * 2014-12-01 2015-08-19 讯美电子科技有限公司 Network-type door access control system
CN105847276A (en) * 2016-04-28 2016-08-10 乐视控股(北京)有限公司 Access control method and device
US20170270721A1 (en) * 2016-03-18 2017-09-21 Dangerous Things LLC. In vivo identity and security application implant and method
CN107978047A (en) * 2017-12-04 2018-05-01 北京深思数盾科技股份有限公司 Use the methods, devices and systems of password unlocking
CN108009878A (en) * 2017-11-24 2018-05-08 深圳市轱辘车联数据技术有限公司 A kind of information processing method and its device
US20180167394A1 (en) * 2016-12-14 2018-06-14 Wal-Mart Stores, Inc. Controlling access to a locked space using cryptographic keys stored on a blockchain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101490687A (en) * 2006-07-07 2009-07-22 桑迪士克股份有限公司 Control system and method using identity objects
CN104851159A (en) * 2014-12-01 2015-08-19 讯美电子科技有限公司 Network-type door access control system
US20170270721A1 (en) * 2016-03-18 2017-09-21 Dangerous Things LLC. In vivo identity and security application implant and method
CN105847276A (en) * 2016-04-28 2016-08-10 乐视控股(北京)有限公司 Access control method and device
US20180167394A1 (en) * 2016-12-14 2018-06-14 Wal-Mart Stores, Inc. Controlling access to a locked space using cryptographic keys stored on a blockchain
CN108009878A (en) * 2017-11-24 2018-05-08 深圳市轱辘车联数据技术有限公司 A kind of information processing method and its device
CN107978047A (en) * 2017-12-04 2018-05-01 北京深思数盾科技股份有限公司 Use the methods, devices and systems of password unlocking

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109800897A (en) * 2018-12-26 2019-05-24 中链科技有限公司 Hotel occupancy processing method, device, system and calculating equipment based on block chain
CN113661527A (en) * 2019-04-09 2021-11-16 通力股份公司 Access rights management
CN113661527B (en) * 2019-04-09 2023-09-01 通力股份公司 Access rights management
CN110490505A (en) * 2019-06-25 2019-11-22 北京京东振世信息技术有限公司 Logistics information processing method, device and equipment
WO2020258954A1 (en) * 2019-06-25 2020-12-30 北京京东振世信息技术有限公司 Method, apparatus and device for processing logstical information
US11922743B2 (en) 2019-06-25 2024-03-05 Beijing Jingdong Zhenshi Information Technology Co., Ltd. Logistics information processing method based on electronic lock, blockchain and waybill, and apparatus and device thereof

Similar Documents

Publication Publication Date Title
Jangirala et al. Designing secure lightweight blockchain-enabled RFID-based authentication protocol for supply chains in 5G mobile edge computing environment
TWI813677B (en) Methods and systems for automatic object recognition and authentication
US10635801B2 (en) Systems and methods for securing access to storage and retrieval systems
Alqassem et al. A taxonomy of security and privacy requirements for the Internet of Things (IoT)
Joshi et al. Unified authentication and access control for future mobile communication-based lightweight IoT systems using blockchain
CN101937528B (en) Systems and methods for implementing supply chain visibility policies
CA3124167A1 (en) Methods and systems for preparing and performing an object authentication
CN108134791A (en) A kind of data center's total management system login validation method
CN111886828B (en) Online authentication based on consensus
CN102394896A (en) Privacy-protection fingerprint authentication method and system based on token
CN109035510A (en) A method of controlling the access of express delivery smart lock by block chain
US20230133756A1 (en) Safe delivery container, and system and method thereof
CN109903135A (en) A kind of jewelry electronic information shared system based on block chain
CN108846297B (en) A method of distributing and retrieve data in the block chain network with peer node
CN106789059A (en) A kind of long-range two-way access control system and method based on trust computing
CN110300971A (en) Telnet based on biological characteristic
CN109285256A (en) Computer room based on block chain authentication enter permission give method
GB2599416A (en) Authentication system and method
KR102497076B1 (en) Computer device, method and computer program for providing fido biometric authentication security key based blockchain wallet service
Prada-Delgado et al. A blockchain-based crypto-anchor platform for interoperable product authentication
CN109035509A (en) A method of intelligent door lock is opened and closed by block chain
CN101425901A (en) Control method and device for customer identity verification in processing terminals
Yang et al. A Hybrid Blockchain-Based Authentication Scheme for Smart Home
CN101741557B (en) Hierarchical key-based access control system and method
KR102249758B1 (en) Artificial intelligence personal privacy data security system applying case based reasoning technology and block chain method and server thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20181218