CN109322587B - Intelligent anti-theft method and system for safe - Google Patents

Intelligent anti-theft method and system for safe Download PDF

Info

Publication number
CN109322587B
CN109322587B CN201710641389.1A CN201710641389A CN109322587B CN 109322587 B CN109322587 B CN 109322587B CN 201710641389 A CN201710641389 A CN 201710641389A CN 109322587 B CN109322587 B CN 109322587B
Authority
CN
China
Prior art keywords
safe
base station
mobile terminal
information
report
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710641389.1A
Other languages
Chinese (zh)
Other versions
CN109322587A (en
Inventor
戚建淮
宋晶
姚兆东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Y&D Electronics Information Co Ltd
Original Assignee
Shenzhen Y&D Electronics Information Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Y&D Electronics Information Co Ltd filed Critical Shenzhen Y&D Electronics Information Co Ltd
Priority to CN201710641389.1A priority Critical patent/CN109322587B/en
Publication of CN109322587A publication Critical patent/CN109322587A/en
Application granted granted Critical
Publication of CN109322587B publication Critical patent/CN109322587B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05GSAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
    • E05G1/00Safes or strong-rooms for valuables
    • E05G1/10Safes or strong-rooms for valuables with alarm, signal or indicator
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The invention discloses an intelligent theft-proof method and system for a safe, which comprises the following steps: the base station end receives an online report, a door opening report and an asset report at regular time; judging whether the safe is moved out of the safety range according to the state information of the online report, and sending the state information of the online report to the mobile terminal; judging whether the safe door is opened or not according to the judgment result of whether the safe is moved out of the safety range or not and the state information of the door opening report, and sending the state information of the door opening report to the mobile terminal; and judging whether the stolen-proof articles in the safe are moved out of the safety range and placed back into the safe or not according to the judgment result of whether the safe door is opened or not and the state information of the asset report, and sending the state information of the asset report to the mobile terminal. The invention aims to prevent the safe and valuables therein from being illegally stolen by a low-cost technical means and report the door opening and closing states of the safe in time.

Description

Intelligent anti-theft method and system for safe
Technical Field
The invention relates to the technical field of theft and loss prevention of a safety box, in particular to an intelligent theft and loss prevention method and system for the safety box.
Background
For the burglary prevention of a safety box, the currently adopted technical means mainly comprise: physical theft prevention: the method comprises the steps of installing the safe in a hidden position, reinforcing the safe (such as welding and fixing by steel bars, embedding into a wall body and the like) and selecting a firm safe. And (4) strengthening the password: and (3) adopting a higher-level password device, such as electronic technology means of fingerprints, irises and the like besides the traditional password. Technical anti-theft: the anti-theft door and the anti-prying lock are additionally arranged, and the anti-theft alarm device, the electronic eye and the like are additionally arranged. The current anti-theft system of the safe case focuses more on the design of the cabinet door and the lock of the cabinet body of the safe case, various trigger devices related to physical safety such as an isolation circuit, high-voltage pulse, ground-off vibration and the like, and a password system such as a mechanical password, an electronic password, a biological fingerprint and the like, however, the 'prevention' cannot overcome the prevention, and the traditional anti-theft system which takes physical hard characteristics as detection alarm has high investment and high cost and cannot adapt to the development trend of civilization pervasive popularization and countermeasure technology.
Disclosure of Invention
The invention mainly aims to provide an intelligent anti-theft method and system for a safety box, and aims to solve the problems of high investment, high cost and the like caused by the fact that a physical hard characteristic is used as a detection alarm in the existing anti-theft system for the safety box.
In order to achieve the purpose, the invention provides an intelligent anti-theft method for a safety box, which comprises the following steps:
s1, the base station end receives the on-line report of the external Bluetooth label arranged outside the safe case, the door opening report of the door opening Bluetooth label arranged in the safe case and the asset report of the asset Bluetooth label attached to the anti-theft article in the safe case at regular time;
s2, the base station end judges whether the safe is moved out of the safety range according to the state information of the online report, and sends the state information of the online report to the mobile terminal;
s3, the base station judges whether the safe door is opened or not according to the judgment result of whether the safe is moved out of the safety range or not and the state information of the door opening report, and sends the state information of the door opening report to the mobile terminal;
and S4, the base station end judges whether the stolen goods in the safe are moved out of the safe range and placed back into the safe according to the judgment result of whether the safe door is opened and the state information of the asset report, and sends the state information of the asset report to the mobile terminal.
In the intelligent theft-proof method for the safe case, the step S2 specifically includes:
s21, if the base station end receives the on-line report, the safe is judged not to be moved out of the safe range; if the base station end does not receive the online report at the preset time interval, judging that the safe is moved out of the safety range, and sending an alarm prompt and alarm information to the mobile terminal by the base station end;
step S3 specifically includes:
s31, when the safe is determined not to be moved out of the safety range, if the base station end receives the door opening report, the door of the safe is judged to be opened; if the base station end does not receive the door opening report at the time intervals of the preset number, judging that the safe door is closed;
step S4 specifically includes:
s41, when the safe door is determined to be opened, if the base station end does not receive the asset report within a preset time interval, the anti-theft object in the safe is judged to be moved out of the safety range, and the base station end sends out an alarm sound prompt and sends alarm information to the mobile terminal; and when the safe door is determined to be closed, if the base station end still receives the asset report, judging that the anti-theft article in the safe is not put back into the safe, and sending prompt information to the mobile terminal.
In the intelligent theft-proof method for the safe case, when the safe case is determined to be moved out of the safety range, after step S21, the method further comprises:
s22, the base station side acquires the position sensing information of the safe;
s23, the base station accurately positions the position of the safe based on the position sensing information;
s24, the base station calculates the distance between the safe and the base station and the mobile terminal respectively;
when it is determined that the item in the safe is moved out of the safe range, the method further includes, after step S41:
s42, the base station end acquires the position sensing information of the anti-theft articles in the safe;
s43, accurately positioning the position of the thief-proof article by the base station based on the position perception information;
and S44, the base station calculates the distance between the theft-proof article and the base station and the mobile terminal respectively.
In the intelligent theft-proof method for the safe case, the process of sending alarm information in the steps S21 and S41 comprises the following steps:
presetting digital alarm information at a base station end, carrying out hash operation based on a hash algorithm to obtain an information abstract, encrypting the information abstract by using a private key to obtain a digital signature, attaching the digital signature to the digital alarm information, randomly generating an encryption key at the same time, and encrypting the encryption key to the alarm information to be sent to form a ciphertext;
the base station side encrypts an encryption key generated randomly by using a public key shared by the two sides, and simultaneously sends the encrypted encryption key and the encrypted ciphertext to the mobile terminal;
the mobile terminal decrypts the encrypted encryption key by using a private key of the mobile terminal to obtain a decrypted encryption key; decrypting the ciphertext by using the decrypted encryption key to obtain digital alarm information of the plaintext, and invalidating the encryption key; the mobile terminal decrypts the digital signature of the base station end by using a public key shared by the two parties to obtain a decrypted information abstract; carrying out hash operation on the digital alarm information of the plaintext by using the same hash algorithm as that of the base station end to obtain a newly generated information abstract;
the mobile terminal compares the decrypted information abstract with the newly generated information abstract, and if the decrypted information abstract is the same as the newly generated information abstract, the information sent by the base station end is judged not to be modified; and if the decrypted message digest is different from the newly generated message digest, judging that the message sent by the base station end is modified.
The present invention also provides a base station, comprising: a first memory, a first processor and a first anti-theft program stored on the first memory and executable on the first processor, the first anti-theft program when executed by the first processor implementing the steps of the intelligent safe anti-theft method as claimed in any one of claims 1 to 3.
In the base station of the present invention, the first theft prevention program further realizes, when executed by the first processor, the steps of:
presetting digital alarm information at a base station end, carrying out hash operation based on a hash algorithm to obtain an information abstract, encrypting the information abstract by using a private key to obtain a digital signature, attaching the digital signature to the digital alarm information, randomly generating an encryption key at the same time, and encrypting the encryption key to the alarm information to be sent to form a ciphertext;
and the base station side encrypts the randomly generated encryption key by using the public key shared by the two sides and simultaneously sends the encrypted encryption key and the encrypted ciphertext to the mobile terminal.
The present invention also provides a mobile terminal, comprising: a second memory, a second processor, and a second theft-deterrent program stored on the second memory and operable on the second processor, the second theft-deterrent program, when executed by the second processor, implementing the steps of:
and the mobile terminal receives the state information of the online report, the state information of the door opening report, the state information of the asset report and the alarm information sent by the base station terminal and sends out an alarm sound prompt.
In the mobile terminal of the present invention, when the mobile terminal receives the alarm information, the second theft-prevention program is executed by the second processor to implement the following steps:
the mobile terminal receives an encrypted encryption key and an encrypted ciphertext sent by the base station;
the mobile terminal decrypts the encrypted encryption key by using a private key of the mobile terminal to obtain a decrypted encryption key; decrypting the ciphertext by using the decrypted encryption key to obtain digital alarm information of the plaintext, and invalidating the encryption key; the mobile terminal decrypts the digital signature of the base station end by using a public key shared by the two parties to obtain a decrypted information abstract; carrying out hash operation on the digital alarm information of the plaintext by using the same hash algorithm as that of the base station end to obtain a newly generated information abstract;
the mobile terminal compares the decrypted information abstract with the newly generated information abstract, and if the decrypted information abstract is the same as the newly generated information abstract, the information sent by the base station end is judged not to be modified; and if the decrypted message digest is different from the newly generated message digest, judging that the message sent by the base station end is modified.
The invention also provides an intelligent anti-theft system for the safety box, which comprises the base station end, the mobile terminal, the external Bluetooth tag, the door opening Bluetooth tag and the asset Bluetooth tag;
the external Bluetooth tag is used for sending the online report;
the door opening Bluetooth tag is used for sending the door opening report;
the asset Bluetooth tag is used for sending the asset report.
In addition, to achieve the above object, the present invention further provides a computer readable storage medium storing a first theft-prevention program and a second theft-prevention program, which are executed by a first processor and a second processor, respectively, to implement the steps of the intelligent theft-prevention method for safes described above.
The invention provides an intelligent anti-theft method and system for a safety box, which aim to judge whether an article is still controlled in the safety range of the safety box by using a communication connection mechanism of a base station end and a Bluetooth end through distance change, prevent the safety box and the valuables in the safety box from being illegally stolen by using a low-cost technical means, and report the door opening and closing states of the safety box in time.
Drawings
Figure 1 is a flow chart of a first embodiment of the intelligent theft-protection method for a safe of the present invention;
FIG. 2 is a flow chart of locating and searching for a safe in a second embodiment of the intelligent theft-protection method for the safe of the present invention;
figure 3 is a flow chart of the intelligent theft-proof method for the safe case of the invention for locating and searching the theft-proof articles in the second embodiment;
FIG. 4 is a flow chart of encrypted alarm information sending in a third embodiment of the intelligent theft-proof method for the safe of the present invention;
fig. 5 is a schematic diagram of a hardware structure of an alternative mobile terminal for implementing various embodiments of the present invention;
figure 6 is a functional block diagram of a first embodiment of the intelligent anti-theft system for a safe of the present invention;
figure 7 is a schematic diagram of the functional modules of the positioning search in the second embodiment of the intelligent theft-proof system for the safe case;
fig. 8 is a functional module diagram of an intelligent anti-theft system for a safe of the present invention, wherein the functional module diagram is used for sending alarm information in an encrypted manner in a third embodiment.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in itself. Thus, "module", "component" or "unit" may be used mixedly.
The invention solves the problems that the prior various anti-theft schemes cannot be remotely monitored or the remotely monitored communication is easily tampered, counterfeited and damaged based on novel technologies such as a Bluetooth technology, a wireless WIFI communication technology, an embedded technology, an INTERNET communication technology, a communication encryption technology and the like, and provides a solution and a technical route for preventing the safe case from being illegally moved or valuables therein from being illegally moved and the like.
Please refer to fig. 1, which is a flowchart illustrating an intelligent theft-protection method for a safe according to a first embodiment of the present invention.
The intelligent anti-theft method for the safety box comprises the following steps:
s1, the base station 10 receives the online report of the external Bluetooth tag 301 installed outside the safe 30, the door opening report of the door opening Bluetooth tag 302 installed inside the safe 30 and the asset report of the asset Bluetooth tag 303 attached to the anti-theft article inside the safe 30 at regular time;
s2, the base station 10 determines whether the safe is moved out of the safe range according to the status information of the online report, and sends the status information of the online report to the mobile terminal 20;
s3, the base station 10 determines whether the safe door is opened according to the determination result of whether the safe is moved out of the safe range and the state information of the door opening report, and sends the state information of the door opening report to the mobile terminal 20;
s4, the base station 10 determines whether the stolen goods in the safe 30 are moved out of the safe range and placed back into the safe 30 according to the determination result of whether the safe door is opened and the status information of the asset report, and sends the status information of the asset report to the mobile terminal 20.
Step S2 specifically includes:
s21, if the base station 10 receives the online report, it determines that the safe 30 is not moved out of the safe range; if the base station 10 does not receive the online report at the preset time interval, it is determined that the safe 30 is moved out of the safety range, the base station 10 sends out a warning sound prompt and sends warning information to the mobile terminal 20, and the mobile terminal 20 also sends out a warning sound prompt at the same time. The base station 10 may also send alarm information to the external bluetooth tag 301, and the external bluetooth tag 301 may also send an alarm prompt.
Step S3 specifically includes:
s31, when the safe 30 is determined not to be moved out of the safe range, if the base station end 10 receives the door opening report, the door of the safe is judged to be opened; if the base station terminal 10 does not receive the door opening report at the preset number of time intervals, it is determined that the safe door is closed.
Step S4 specifically includes:
s41, when it is determined that the door of the safe is opened, if the base station 10 does not receive the asset report at the time interval of the preset amount, it is determined that the theft-proof object in the safe 30 is moved out of the safe range, and the base station 10 sends out an alarm sound prompt and sends an alarm message to the mobile terminal 20; the mobile terminal 20 also sends out a warning sound. The base station 10 may also send alarm information to the asset bluetooth tag 303, and the asset bluetooth tag 303 may also send a warning sound.
When it is determined that the safe door is closed, if the base station 10 still receives the asset report, it is determined that the stolen-proof object in the safe 10 is not put back into the safe 10, and a prompt message is sent to the mobile terminal 20.
The method realizes the anti-theft and door opening and closing state monitoring of the safety box, wherein the base station end 10 mainly refers to an electronic fence base station end, and the mobile terminal mainly refers to a mobile phone, specifically a mobile phone APP. And a communication pair is composed of a plurality of Bluetooth tags and a base station end 10 (electronic fence base station end). The preset number of time intervals is three in the present embodiment, and may be two or four in other embodiments.
Bluetooth tags are mounted on items that are to be stolen, typically referred to as valuables, outside, inside safe 30 and inside safe 30, respectively. The Bluetooth tag arranged outside the safe 30 is called as an external Bluetooth tag 301, the Bluetooth tag arranged inside the safe 30 is divided into a door opening Bluetooth tag 302 and an asset Bluetooth tag 303, the door opening Bluetooth tag 302 is used for sending a door opening report to the base station end 10 (electronic fence base station end), and the asset Bluetooth tag 303 is attached to the valuable articles which are stolen and lost in the safe 30 and used for monitoring the valuable articles. The external Bluetooth tag 301 is installed outside the safe 30, and regularly sends an online report customized by a specific protocol to the base station end 10 (electronic fence base station end) at time intervals, and when the base station end 10 (electronic fence base station end) does not receive the online report of the external Bluetooth tag 301 at 3 time intervals, the external Bluetooth tag sends alarm information to the mobile terminal 20 (mobile phone APP), and the external Bluetooth tag also sends an alarm sound; the door opening Bluetooth tag 302 is installed inside the safe 30, and also sends a door opening report customized in a specific format to the base station terminal 10 (electronic fence base station terminal) at a specific time interval, because the safe 30 is closed and shields wireless communication signals, when the safe door is not opened, the door opening report cannot be transmitted to the base station terminal 10 (electronic fence base station terminal), and therefore when the base station terminal 10 (electronic fence base station terminal) receives the door opening report, it indicates that the safe door is opened; when the door opening report is not received in 3 time intervals, the safe door can be judged to be closed. The asset bluetooth tag 303 is attached to a protected and loss-proof valuable item, and can be in the shape of a bookmark or a pendant. The asset bluetooth tag 303 also sends asset reports in a specific format to the base station end 10 (electronic fence base station end) at regular time intervals. When the safe door is closed, the base station end 10 (electronic fence base station end) cannot receive the asset report of the stolen goods due to signal shielding; when the safe door is opened, the base station terminal 10 (electronic fence base station terminal) starts to receive the asset report after receiving the door opening report, and sends the asset report state to the mobile terminal 20 (mobile phone APP) through INTERNET. When the safe door is not closed and the corresponding asset report is not sent to the base station end 10 (electronic fence base station end) at 3 time intervals, the base station end 10 (electronic fence base station end) judges that the corresponding theft-proof article is moved out of the monitoring area, namely the safety range, alarms to the mobile terminal 20 (mobile phone APP), and sends out warning sound; when the safe door is closed and the corresponding asset report is received, the stolen-proof article is judged not to be put back into the safe 30, and a prompt message report is sent to the mobile terminal 20 (mobile phone APP).
The reports sent by the external bluetooth tag 301, the door-open bluetooth tag 302 and the asset bluetooth tag 303 to the base station 10 are called an online report, a door-open report and an asset report, respectively, and have the following formats: header (2 bytes) + message type (1 byte) + device number (1 byte) + check code (2 bytes). Wherein, the header is a leader sequence and consists of a 16-system code A5A 5; the message type is defined as: 0 xFE: online report, 0x0 FF: door open report, 0x00- -0 xFD: asset reports and doubles as asset numbers, i.e., manageable assets numbers from 0-0xFD, up to 253. The equipment number is the number of the safe case, and the value range is 0-255. The check code adopts standard CRC check to check the information of the 1 st to the 4 th bytes of the message.
Judging whether the anti-theft articles are still controlled within the safety range of the safe case or not by utilizing the communication connection condition between the base station end 10 (electronic fence base station end) and the Bluetooth ends on the external Bluetooth tag 301, the door opening Bluetooth tag 302 and the asset Bluetooth tag 303; support to dynamically set an alarm context on the mobile terminal 20 (mobile APP), mainly including but not limited to: the signal intensity is continuously weakened, connection interruption and signal shielding are performed, or the electric quantity of the bluetooth terminals on the base station terminal 10, the external bluetooth tag 301, the door-opening bluetooth tag 302 and the asset bluetooth tag 303 is insufficient, and the like. Specifically, the base station end 10 (e.g., the electronic fence base station end) obtains the signal intensity and the power information from the external bluetooth tag 301, the door-opening bluetooth tag 302, or the bluetooth end of the asset bluetooth tag 303, and when the signal intensity and the power information exceed the preset condition threshold, the base station end 10 (e.g., the electronic fence base station end) sends the alarm information to the mobile terminal 20 (e.g., the mobile APP), and also can simultaneously send the alarm information to the external bluetooth tag 301, the door-opening bluetooth tag 302, or the asset bluetooth tag 303, so that the mobile terminal 20 (e.g., the mobile APP), the base station end 10 (e.g., the electronic fence base station end) and the external bluetooth tag 301, the door-opening bluetooth tag 302, or the. By selecting and utilizing the algorithm, the false alarm rate of a safe theft-proof system is minimized, and the service life rate of the battery of the object label is maximized. The APP software can automatically detect a new version and upgrade the firmware of the base station 10 (base station of the electronic fence) and the tag of the anti-theft object.
Further, referring to fig. 2 and fig. 3, the present invention also provides a flow chart of locating and finding the safe and a flow chart of locating and finding the theft-proof article in the intelligent theft-proof method for the safe according to the second embodiment of the present invention.
In the second embodiment, when it is determined that the safe 30 is moved out of the safe range, after step S21, the method further includes:
s22, the base station 10 acquires the position sensing information of the safe 30;
s23, the base station 10 accurately positions the position of the safe 30 based on the position sensing information;
and S24, calculating the distance between the safe 30 and the base station end 10 and the mobile terminal 20 respectively.
When it is determined that the item to be stolen in the safe 30 is moved out of the safe range, the method further includes, after step S41:
s42, the base station 10 acquires the position sensing information of the stolen-proof articles in the safe 30;
s43, the base station terminal 10 accurately positions the position of the theft-proof article based on the position perception information;
s44, the base station 10 calculates the distance between the article to be stolen and the base station 10 and the mobile terminal 20 respectively.
The base station 10 (electronic fence base station) forms alarm information, encrypts and transmits the alarm information to the mobile terminal 20 (mobile phone APP), and gives an alarm together with the mobile terminal 20 (mobile phone APP) and a tag end on an object to be stolen (indicating a safe or an article to be stolen in the safe). Meanwhile, the mobile phone mobile terminal 20 (mobile phone APP) enables a fast positioning and searching function.
The base station 10 (electronic fence base station) obtains the corresponding location sensing information of the theft-proof object by positioning the bluetooth end on the bluetooth tag of the theft-proof object (referring to the safe or the theft-proof object in the safe). In this embodiment, the location awareness information includes: the location of the base station end 10, the location of the bluetooth end of the bluetooth tag of the loss-deterrent object (including the external bluetooth tag 301 and the asset bluetooth tag 303), absolute positioning calculations, communication connection disconnection time records, etc. are known.
Based on the location sensing information, the map function on the mobile terminal 20 (mobile phone APP) is used to display the accurate location (referring to the safe or the anti-theft object in the safe), that is, the accurate location of the anti-theft object is accurately located.
The position distance between the mobile terminal 20 and the loss-proof object (namely the safe or the loss-proof object in the safe) is calculated, and the position distance between the base station end 10 (the electronic fence base station end) and the loss-proof object (namely the safe or the loss-proof object in the safe) is calculated.
Further, referring to fig. 4, the present invention also provides a flow chart of the base station 10 encrypting and transmitting alarm information to the mobile terminal 20 in the intelligent theft-proof method for the safe according to the third embodiment of the present invention.
In the third embodiment, the process of sending alarm information in steps S21 and S41 includes:
the method comprises the steps that a base station terminal 10 presets digital alarm information, hash operation is carried out based on a hash algorithm to obtain an information abstract, the information abstract is encrypted by a private key to obtain a digital signature, the digital signature is attached to the digital alarm information, meanwhile, an encryption key is randomly generated and encrypted to the alarm information to be sent to form a ciphertext;
the base station 10 encrypts the randomly generated encryption key by using the public key shared by both parties, and simultaneously sends the encrypted encryption key and the encrypted ciphertext to the mobile terminal 20;
the mobile terminal 20 decrypts the encrypted encryption key by using its own private key to obtain a decrypted encryption key; decrypting the ciphertext by using the decrypted encryption key to obtain digital alarm information of the plaintext, and invalidating the encryption key; the mobile terminal 20 decrypts the digital signature of the base station end by using the public key shared by both parties to obtain a decrypted information digest; carrying out hash operation on the digital alarm information of the plaintext by using the same hash algorithm as that of the base station terminal 10 to obtain a newly generated information abstract;
the mobile terminal 20 compares the decrypted message digest with the newly generated message digest, and if the decrypted message digest is the same as the newly generated message digest, it is determined that the message sent by the base station 10 is not modified; if the decrypted message digest is different from the newly generated message digest, it is determined that the message sent by the base station 10 is modified.
The process comprises the following steps: the base station 10 (electronic fence base station) prepares the digital alarm information to be transmitted, and performs hash operation to obtain an information abstract; encrypting the information abstract by using a private key (SK) to obtain a digital signature, and attaching the digital signature to the digital alarm information; at the same time, randomly generating an encryption key (DES key), and encrypting the information to be transmitted by using the DES key to form a ciphertext;
the base station 10 (electronic fence base station) encrypts the encryption key generated randomly by using a Public Key (PK) shared by both parties, and transmits the encrypted DES key and the ciphertext to the mobile terminal 20 (mobile phone APP);
the mobile terminal 20 (mobile phone APP) receives the ciphertext and the encrypted DES key transmitted by the base station 10 (electronic fence base station), and decrypts the encrypted DES key by using its own private key (SK) to obtain the DES key; then, the DES key is used for decrypting the received ciphertext to obtain the digital alarm information of the plaintext, and then the DES key is discarded (namely the DES key is invalidated); the mobile terminal 20 (mobile phone APP) decrypts the digital signature of the base station 10 (electronic fence base station) by using a Public Key (PK) shared by both parties to obtain an information digest; carrying out hash operation on the received plaintext by using the same hash algorithm to obtain a new information abstract;
the mobile terminal 20 (mobile APP) compares the received message digest with the newly generated message digest, and if they are consistent, it indicates that the received message has not been modified.
The mobile phone APP algorithm is connected with INTERNET through WIFI or mobile data communication of a mobile phone, and realizes communication with the base station end 10 (electronic fence base station end). The functions of the mobile phone APP comprise the following points:
(1) the configuration of the base station end 10 (electronic fence base station end) is realized, and the configuration comprises IP address setting, wireless WIFI setting, external Bluetooth label 301 address number setting, door opening Bluetooth label 302 number setting, asset Bluetooth label 303 number setting, alarm mobile phone setting and the like of the base station end 10 (electronic fence base station end). One handset can support the connection of a plurality of base station terminals 10 (electronic fence base station terminals).
(2) The communication with a plurality of base station terminals 10 (electronic fence base station terminals) is realized, the geographical position and the switch state of the safe 30 are mastered in real time, and the information is displayed to a user through a mobile phone APP interface.
(3) The prescribed communication encryption algorithm is adopted in the communication process, so that safe transmission is realized, and the safety of the system is improved.
The invention also provides an intelligent theft-proof system 1 of the safety box, which is suitable for the intelligent theft-proof method of the safety box, wherein the intelligent theft-proof system 1 comprises: the system comprises a base station end 10, a mobile terminal 20, a safe 30, an external Bluetooth tag 301 arranged outside the safe, a door-opening Bluetooth tag 302 arranged in the safe, and an asset Bluetooth tag 303 attached to an anti-theft article in the safe. Wherein, the base station 10 mainly refers to the base station of the electronic fence. The mobile terminal may be implemented in various forms. For example, the terminal described in the present invention may include a mobile terminal such as a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, a wearable device, a smart band, a pedometer, and the like. In this embodiment, the present invention mainly refers to a mobile phone, and more specifically refers to an APP of the mobile phone.
The base station end (electronic fence base station end) can bind and manage a plurality of Bluetooth labels in a grouping mode at the same time, and the base station end (electronic fence base station end) is associated with the mobile terminal (mobile phone APP).
The method comprises the following steps that a mobile terminal (a mobile phone APP) is bound with a base station end (an electronic fence base station end), the base station end (the electronic fence base station end) is arranged to be connected with a plurality of Bluetooth tags at the same time, and the Bluetooth tags are correspondingly attached to anti-theft objects one by one; the anti-theft object is placed in a safe with good communication connection environment; and a tolerable safety distance is kept between the base station end (electronic fence base station end) and the safe.
An external Bluetooth tag is arranged on the outer side of a protected safe, a hidden position is selected as the installation position, if the safe can be customized, a slot position for installing the external Bluetooth tag can be customized on the side surface or the front surface of the safe, and corresponding covering treatment is carried out, so that the special part of the common safe cannot be seen from the appearance. The door opening Bluetooth tag is required to be installed inside the safety cabinet, and the door opening Bluetooth tag is installed in the same mode as the external Bluetooth tag so as to be difficult to find. The external Bluetooth tag and the door-opening Bluetooth tag can be designed according to the customized requirement. The asset Bluetooth tag is required to be installed on the valuable articles in the safe, namely the loss-proof articles, and the asset Bluetooth tag can be customized in appearance according to the type of the protected valuable articles, such as a file folder shape for the valuable articles of documents, a product tag shape for the valuable articles of jewels and the like. Thus, the installation of the bluetooth tag is completed. The Bluetooth tag is powered by a miniature battery, can generally work for one year, and needs to be replaced at regular time. Install base station end (fence base station end) in the comparatively hidden position of safe deposit box within 10 meters of being protected to connect through mobile terminal (cell-phone APP) and WIFI and set up it, including base station end self ID number, IP address, subnet mask, router, DNS, gateway etc. network parameter and external module, the module of opening the door and each equipment number of connecting the label of valuables (the serial number is the only serial number in the region, can not be repeated) that wireless WIFI module connects. This completes the base station side setup. And finally, setting the mobile terminal (mobile phone APP), wherein the information of the connected base station end is mainly set, and the information is mainly an ID number and the serial number of each connected label. After the setting is completed, the system starts to work normally, and the base station end sends the state information of the safe and the valuables to the mobile terminal (mobile phone APP). When an alarm occurs, the mobile phone APP can timely send out a prompt to the user through sound, vibration and other modes so as to be processed timely.
In addition, the various memories described below may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. The various processors described below are control centers that utilize various interfaces and lines to connect the various components and perform overall monitoring by running or executing software programs and/or modules stored in memory and invoking data stored in memory to perform various functions and process the data. A processor may include one or more processing units; preferably, the processor may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor.
The base station side 10 comprises a first memory, a first processor and a first theft prevention program 100 stored on the first memory and operable on the first processor.
The mobile terminal 20 includes a second memory, a second processor, and a second theft-deterrent program 200 stored on the second memory and operable on the second processor.
The first theft-deterrent program 100 may be partitioned into one or more modules stored in the first memory and executed by one or more first processors; the second theft prevention procedure 200 may be partitioned into one or more modules stored in the second memory and executed by one or more second processors to accomplish the present invention.
For example, in fig. 5 and 6, the first theft prevention program 100 stored in the base station 10 is divided into a first receiving module 101, an embedded management module 102, and a WIFI communication module 103. The embedded management module 102 is further divided into a judging unit 102a, a sending unit 102b and a warning unit 102 c.
The second theft prevention program 200 stored in the mobile terminal 20 is divided into a second reception module 201 and a warning sound module 202.
The module referred to in the present invention refers to a series of computer program instruction segments capable of performing specific functions, and is more suitable than computer programs for describing the execution process of software in the base station and the mobile terminal.
It should be noted that the first receiving module 101, the embedded management module 102 and the WIFI communication module 103 may be hardware or software, and all of them are within the protection scope of the present invention.
The first receiving module 101 receives an online report, a door opening report and an asset report sent by various bluetooth tags by using a universal bluetooth technology; the embedded management module 102 adopts a common embedded technology, the first receiving module 101 and the WIFI communication module 103 perform state judgment through a corresponding online report, a door opening report and an asset report received from bluetooth, and send corresponding alarm and state information to the mobile terminal 20 through the WIFI communication module 103 and INTERNET; the WIFI communication module 103 adopts a general WIFI communication technology, connects to a wireless router on the INTERNET, connects to INTERNET, communicates with a specific mobile terminal 20, and reports the status of the safe 30 and the internal assets thereof.
The specific functions of the above functional blocks will be described in detail below.
The first receiving module 101 is used for regularly receiving an online report of an external Bluetooth tag 301 installed outside the safe 30, a door opening report of a door opening Bluetooth tag 302 installed inside the safe 30 and an asset report of an asset Bluetooth tag 303 attached to an item stolen from the safe 30;
the embedded management module 102 is configured to determine whether the safe 30 is moved out of the safe range according to the status information of the online report, and send the status information of the online report to the mobile terminal 20;
the embedded management module 102 is further configured to determine whether the safe door is opened according to the determination result of whether the safe 30 is moved out of the safety range and the state information of the door opening report, and send the state information of the door opening report to the mobile terminal 20;
the embedded management module 102 is further configured to determine whether the stolen goods in the safe 30 are moved out of the safe range and placed back into the safe 30 according to the determination result of whether the safe door is opened and the status information of the asset report, and send the status information of the asset report to the mobile terminal 20.
Specifically, if the first receiving module 101 receives the online report, the determining unit 102a is configured to determine that the safe is not moved out of the safe range; if the first receiving module 101 does not receive the online report at the preset number of time intervals, the determining unit 102a is configured to determine that the safe is moved out of the safety range, the warning unit 102c is configured to send a warning sound prompt, and the sending unit 102b is configured to send warning information to the mobile terminal 20.
When the safe is determined not to be moved out of the safety range, if the first receiving module 101 receives the door opening report, the judging unit 102a is used for judging that the door of the safe is opened; if the first receiving module does not receive the door opening report at the time interval of the preset number, the determining unit 102a is configured to determine that the safe door is closed.
When the safe door is determined to be opened, if the first receiving module 101 does not receive the asset report at a preset number of time intervals, the judging unit 102a is used for judging that the stolen-proof articles in the safe are moved out of the safety range, the warning sound unit 102c sends a warning sound prompt, and the sending unit 102b sends alarm information to the mobile terminal 20; when it is determined that the safe door is closed, if the first receiving module 101 still receives the asset report, the determining unit 102a is configured to determine that the stolen-proof object in the safe is not put back into the safe, and the sending unit 102b is configured to send a prompt message to the mobile terminal 20.
It should be noted that the preset number of time intervals is three in the present embodiment, and may be two or four in other embodiments.
Bluetooth tags are mounted on items that are to be stolen, typically referred to as valuables, outside, inside safe 30 and inside safe 30, respectively. The Bluetooth tag arranged outside the safe 30 is called as an external Bluetooth tag 301, the Bluetooth tag arranged inside the safe 30 is divided into a door opening Bluetooth tag 302 and an asset Bluetooth tag 303, the door opening Bluetooth tag 302 is used for sending a door opening report to the base station end 10 (electronic fence base station end), and the asset Bluetooth tag 303 is attached to the valuable articles which are stolen and lost in the safe 30 and used for monitoring the valuable articles. The external Bluetooth tag 301 is installed outside the safe 30, and sends an online report customized by a specific protocol to the base station end 10 (electronic fence base station end) at regular time intervals, and when the first receiving module 101 of the base station end 10 (electronic fence base station end) does not receive the online report of the external Bluetooth tag 301 at 3 time intervals, the embedded management module 102 sends alarm information to the mobile terminal 20 (mobile phone APP), and the embedded management module itself will sound an alarm; the door-opening bluetooth tag 302 is installed inside the safe 30, and also sends a door-opening report customized in a specific format to the base station terminal 10 (electronic fence base station terminal) at a specific time interval, because the safe 30 is closed and shields wireless communication signals, when the safe door is not opened, the door-opening report cannot be transmitted to the base station terminal 10 (electronic fence base station terminal), and therefore when the first receiving module 101 of the base station terminal 10 (electronic fence base station terminal) receives the door-opening report, it indicates that the safe door is opened; when the first receiving module 101 does not receive the door opening report at 3 time intervals, the embedded management module 102 may determine that the safe door is closed. The asset bluetooth tag 303 is attached to a protected and loss-proof valuable item, and can be in the shape of a bookmark or a pendant. The asset bluetooth tag 303 also sends asset reports in a specific format to the base station end 10 (electronic fence base station end) at regular time intervals. When the safe door is closed, the first receiving module 101 of the base station 10 (electronic fence base station) cannot receive the asset report of these theft-proof articles due to signal shielding; when the safe door is opened, the first receiving module 101 starts to receive the asset report after receiving the door opening report, and sends the asset report state to the mobile terminal 20 (mobile phone APP) through INTERNET. When the safe door is not closed and the corresponding asset report is not sent to the base station end 10 (electronic fence base station end) at 3 time intervals, the embedded management module 102 determines that the corresponding theft-proof article is moved out of the monitoring area, i.e. the safety range, and alarms to the mobile terminal 20 (mobile phone APP), and also warns itself; when the safe door is closed and the first receiving module 101 still receives the corresponding asset report, the stolen-proof article is judged not to be placed in the safe 30, and the embedded management module 102 sends a prompt message report to the mobile terminal 20 (mobile phone APP).
The reports sent by the external bluetooth tag 301, the door-open bluetooth tag 302 and the asset bluetooth tag 303 to the base station 10 are called an online report, a door-open report and an asset report, respectively, and have the following formats: header (2 bytes) + message type (1 byte) + device number (1 byte) + check code (2 bytes). Wherein, the header is a leader sequence and consists of a 16-system code A5A 5; the message type is defined as: 0 xFE: online report, 0x0 FF: door open report, 0x00- -0 xFD: asset reports and doubles as asset numbers, i.e., manageable assets numbers from 0-0xFD, up to 253. The equipment number is the number of the safe case, and the value range is 0-255. The check code adopts standard CRC check to check the information of the 1 st to the 4 th bytes of the message.
Judging whether the loss-proof object is still controlled in the safety range of the safety cabinet 30 by utilizing the communication connection condition between the base station terminal 10 (electronic fence base station terminal) and the Bluetooth terminal on the loss-proof object label; support to dynamically set an alarm context on the mobile terminal 20 (mobile APP), mainly including but not limited to: the signal strength is continuously weakened, the connection is interrupted and the signal is shielded, or the electric quantity of the base station terminal 10 and the Bluetooth terminal is insufficient. Specifically, the base station end 10 (e.g., the electronic fence base station end) obtains the signal intensity and the power information from the tag ends of the external bluetooth tag 301, the door-opening bluetooth tag 302, or the asset bluetooth tag 303, and when the signal intensity and the power information exceed the preset condition threshold, the base station end 10 (e.g., the electronic fence base station end) sends the alarm information to the mobile terminal 20 (e.g., the mobile APP), and also can simultaneously send the alarm information to the external bluetooth tag 301, the door-opening bluetooth tag 302, or the asset bluetooth tag 303, so that the mobile terminal 20 (e.g., the mobile APP), the base station end 10 (e.g., the electronic fence base station end) and the external bluetooth tag 301, the door-opening bluetooth tag 302, or the. By selecting and utilizing the algorithm, the false alarm rate of a safe theft-proof system is minimized, and the service life rate of the battery of the object label is maximized. The APP software can automatically detect a new version and upgrade the firmware of the base station 10 (base station of the electronic fence) and the tag of the anti-theft object.
Further, referring to fig. 7, the present invention also provides a second embodiment of the intelligent anti-theft system for safes.
In the second embodiment, the embedded management module 102 is further divided into a location-aware information acquisition unit 102d, a positioning unit 102e, and a calculation unit 102 f.
When it is determined that the safe 30 is moved out of the safe range, the location awareness information acquiring unit 102d is configured to acquire location awareness information of the safe 30; the positioning unit 102e is used for accurately positioning the position of the safe 30 based on the position sensing information; the calculation unit 102f is used for calculating the distances between the safe 30 and the base station 10 and the mobile terminal 20, respectively.
When it is determined that the theft-proof object in the safe 30 is moved out of the safe range, the position sensing information obtaining unit 102d is configured to obtain position sensing information of the theft-proof object in the safe; the positioning unit 102e is used for accurately positioning the position of the stolen goods based on the position perception information; the calculation unit 102f is used for calculating the distance between the article to be stolen and the base station 10 and the mobile terminal 20, respectively.
Specifically, the location awareness information acquiring unit 102d acquires the location awareness information corresponding to the theft-deterrent object by locating the position of the bluetooth end of the external bluetooth tag 301 or the asset bluetooth tag 303. The location awareness information includes: the position of the base station terminal 10, the position of the bluetooth end of the external bluetooth tag 301 or the asset bluetooth tag 303, absolute positioning calculation, communication connection disconnection time record and the like are known.
The positioning unit 102e displays the precise positioning of the safe 30 or the theft-proof article by using the map function of the mobile terminal 20 (mobile phone APP) based on the above position sensing information, that is, precisely positions the safe 30 or the theft-proof article.
The calculation unit 102f calculates the distance between the mobile terminal 20 and the safe 30 or the stolen-proof object, and calculates the distance between the base station 10 and the safe 30 or the stolen-proof object.
Further, referring to fig. 8, the present invention also provides a third embodiment of the intelligent theft-proof system for safe.
In the third embodiment, the embedded management module 102 is also divided into encryption units 102 g. The mobile terminal 20 is further divided into a decryption module 203 and a comparison and judgment module 204.
The encryption unit 102g of the embedded management module 102 is configured to preset digital alarm information, perform hash operation based on a hash algorithm to obtain an information digest, encrypt the information digest by using a private key to obtain a digital signature, attach the digital signature to the digital alarm information, randomly generate an encryption key at the same time, encrypt the encryption key to the alarm information to be sent, and form a ciphertext; the randomly generated encryption key is encrypted using a public key common to both parties.
The sending unit 102b of the embedded management module 102 is configured to send the encrypted encryption key and the encrypted ciphertext to the mobile terminal at the same time.
The second receiving module 201 is configured to receive the encrypted encryption key and the encrypted ciphertext sent by the base station 10.
The decryption module 203 is configured to decrypt the encrypted encryption key with a private key of the decryption module, so as to obtain a decrypted encryption key; decrypting the ciphertext by using the decrypted encryption key to obtain digital alarm information of the plaintext, and invalidating the encryption key; the mobile terminal decrypts the digital signature of the base station end by using a public key shared by the two parties to obtain a decrypted information abstract; and carrying out hash operation on the digital alarm information of the plaintext by using the same hash algorithm as that of the base station end to obtain a newly generated information abstract.
The comparison and determination module 204 is configured to compare the decrypted message digest with the newly generated message digest, and if the decrypted message digest is the same as the newly generated message digest, determine that the message sent by the base station is not modified; and if the decrypted message digest is different from the newly generated message digest, judging that the message sent by the base station end is modified.
The specific process is as follows: the encryption unit 102g prepares digital alarm information to be transmitted, and performs hash operation to obtain an information abstract; encrypting the information abstract by using a private key (SK) to obtain a digital signature of a safe theft-proof system, and attaching the digital signature to digital alarm information; at the same time, randomly generating an encryption key (DES key), and encrypting the information to be transmitted by using the DES key to form a ciphertext;
the encryption unit 102g encrypts the encryption key which is generated randomly just before by using a Public Key (PK) which is shared by both parties, and the sending unit 102b transmits the encrypted DES key and the ciphertext to the mobile terminal 20 (mobile phone APP);
the second receiving module 201 of the mobile terminal 20 (mobile APP) receives the transmitted ciphertext and the encrypted DES key, and the decryption module 203 decrypts the encrypted DES key by using its own private key (SK) to obtain the DES key; then, the DES key is used for decrypting the received ciphertext to obtain the digital alarm information of the plaintext, and then the DES key is discarded (namely the DES key is invalidated); decrypting the digital signature of the electronic fence base station end by using a Public Key (PK) shared by the two parties to obtain an information abstract; carrying out hash operation on the received plaintext by using the same hash algorithm to obtain a new information abstract;
the comparison and determination module 204 compares the received message digest with the newly generated message digest, and if they are consistent, it indicates that the received message has not been modified.
Compared with the prior art, the anti-theft measure for the safety box, which is simple, low in cost, convenient to install, high in confidentiality and capable of being remotely monitored, is an effective supplement to the prior art.
The invention also provides a computer-readable storage medium on which a first and a second anti-theft program are stored, which, when executed by a first and a second processor, respectively, implement the steps of the intelligent anti-theft method for safes described above.
It is noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (8)

1. An intelligent anti-theft method for a safety box is characterized by comprising the following steps:
s1, the base station end receives the on-line report of the external Bluetooth label arranged outside the safe case, the door opening report of the door opening Bluetooth label arranged in the safe case and the asset report of the asset Bluetooth label attached to the anti-theft article in the safe case at regular time;
s2, the base station end judges whether the safe is moved out of the safety range according to the state information of the online report, and sends the state information of the online report to the mobile terminal;
s3, the base station judges whether the safe door is opened or not according to the judgment result of whether the safe is moved out of the safety range or not and the state information of the door opening report, and sends the state information of the door opening report to the mobile terminal;
s4, the base station end judges whether the stolen goods in the safe are moved out of the safe range and placed back into the safe according to the judgment result of whether the safe door is opened and the state information of the asset report, and sends the state information of the asset report to the mobile terminal; step S2 specifically includes:
s21, if the base station end receives the on-line report, the safe is judged not to be moved out of the safe range; if the base station end does not receive the online report at the preset time interval, judging that the safe is moved out of the safety range, and sending an alarm prompt and alarm information to the mobile terminal by the base station end;
step S3 specifically includes:
s31, when the safe is determined not to be moved out of the safety range, if the base station end receives the door opening report, the door of the safe is judged to be opened; if the base station end does not receive the door opening report at the time intervals of the preset number, judging that the safe door is closed;
step S4 specifically includes:
s41, when the safe door is determined to be opened, if the base station end does not receive the asset report within a preset time interval, the anti-theft object in the safe is judged to be moved out of the safety range, and the base station end sends out an alarm sound prompt and sends alarm information to the mobile terminal; when the safe door is determined to be closed, if the base station end still receives the asset report, judging that the anti-theft article in the safe is not put back into the safe, and sending prompt information to the mobile terminal;
the process of sending alarm information in steps S21 and S41 includes:
presetting digital alarm information at a base station end, carrying out hash operation based on a hash algorithm to obtain an information abstract, encrypting the information abstract by using a private key to obtain a digital signature, attaching the digital signature to the digital alarm information, randomly generating an encryption key at the same time, and encrypting the encryption key to the alarm information to be sent to form a ciphertext;
the base station side encrypts an encryption key generated randomly by using a public key shared by the two sides, and simultaneously sends the encrypted encryption key and the encrypted ciphertext to the mobile terminal;
the mobile terminal decrypts the encrypted encryption key by using a private key of the mobile terminal to obtain a decrypted encryption key; decrypting the ciphertext by using the decrypted encryption key to obtain digital alarm information of the plaintext, and invalidating the encryption key; the mobile terminal decrypts the digital signature of the base station end by using a public key shared by the two parties to obtain a decrypted information abstract; carrying out hash operation on the digital alarm information of the plaintext by using the same hash algorithm as that of the base station end to obtain a newly generated information abstract;
the mobile terminal compares the decrypted information abstract with the newly generated information abstract, and if the decrypted information abstract is the same as the newly generated information abstract, the information sent by the base station end is judged not to be modified; and if the decrypted message digest is different from the newly generated message digest, judging that the message sent by the base station end is modified.
2. The intelligent theft-protection method for the safe according to claim 1, when determining that the safe is moved out of the safe range, after step S21, further comprising:
s22, the base station side acquires the position sensing information of the safe;
s23, the base station accurately positions the position of the safe based on the position sensing information;
s24, the base station calculates the distance between the safe and the base station and the mobile terminal respectively;
when it is determined that the item in the safe is moved out of the safe range, the method further includes, after step S41:
s42, the base station end acquires the position sensing information of the anti-theft articles in the safe;
s43, accurately positioning the position of the thief-proof article by the base station based on the position perception information;
and S44, the base station calculates the distance between the theft-proof article and the base station and the mobile terminal respectively.
3. A base station, wherein the base station comprises: a first memory, a first processor and a first anti-theft program stored on the first memory and executable on the first processor, the first anti-theft program, when executed by the first processor, implementing the steps of the intelligent safe anti-theft method according to claim 1 or 2.
4. The base station according to claim 3, wherein the first theft-deterrent program, when executed by the first processor, further implements the steps of:
presetting digital alarm information at a base station end, carrying out hash operation based on a hash algorithm to obtain an information abstract, encrypting the information abstract by using a private key to obtain a digital signature, attaching the digital signature to the digital alarm information, randomly generating an encryption key at the same time, and encrypting the encryption key to the alarm information to be sent to form a ciphertext;
and the base station side encrypts the randomly generated encryption key by using the public key shared by the two sides and simultaneously sends the encrypted encryption key and the encrypted ciphertext to the mobile terminal.
5. A mobile terminal, characterized in that the mobile terminal comprises: a second memory, a second processor and a second anti-theft program stored on the second memory and executable on the second processor, the second anti-theft program, when executed by the second processor, implementing the steps of the intelligent safe anti-theft method according to any one of claims 1 to 2.
6. The mobile terminal of claim 5, wherein when the mobile terminal receives the alarm message, the second theft-prevention program when executed by the second processor implements the steps of:
the mobile terminal receives an encrypted encryption key and an encrypted ciphertext sent by the base station;
the mobile terminal decrypts the encrypted encryption key by using a private key of the mobile terminal to obtain a decrypted encryption key; decrypting the ciphertext by using the decrypted encryption key to obtain digital alarm information of the plaintext, and invalidating the encryption key; the mobile terminal decrypts the digital signature of the base station end by using a public key shared by the two parties to obtain a decrypted information abstract; carrying out hash operation on the digital alarm information of the plaintext by using the same hash algorithm as that of the base station end to obtain a newly generated information abstract;
the mobile terminal compares the decrypted information abstract with the newly generated information abstract, and if the decrypted information abstract is the same as the newly generated information abstract, the information sent by the base station end is judged not to be modified; and if the decrypted message digest is different from the newly generated message digest, judging that the message sent by the base station end is modified.
7. An intelligent anti-theft system for a safety box is characterized by comprising a base station end according to claim 3 or 4, a mobile terminal according to claim 5 or 6, an external Bluetooth tag, a door-opening Bluetooth tag and an asset Bluetooth tag;
the external Bluetooth tag is used for sending the online report;
the door opening Bluetooth tag is used for sending the door opening report;
the asset Bluetooth tag is used for sending the asset report.
8. A computer-readable storage medium, characterized in that it stores a first and a second anti-theft program, which when executed by a first and a second processor, respectively, implement the steps of the intelligent anti-theft method for safes according to any one of claims 1 to 2.
CN201710641389.1A 2017-07-31 2017-07-31 Intelligent anti-theft method and system for safe Active CN109322587B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710641389.1A CN109322587B (en) 2017-07-31 2017-07-31 Intelligent anti-theft method and system for safe

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710641389.1A CN109322587B (en) 2017-07-31 2017-07-31 Intelligent anti-theft method and system for safe

Publications (2)

Publication Number Publication Date
CN109322587A CN109322587A (en) 2019-02-12
CN109322587B true CN109322587B (en) 2020-09-08

Family

ID=65245852

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710641389.1A Active CN109322587B (en) 2017-07-31 2017-07-31 Intelligent anti-theft method and system for safe

Country Status (1)

Country Link
CN (1) CN109322587B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101640859A (en) * 2009-05-19 2010-02-03 深圳市永达电子股份有限公司 Equipment cabinet alarm device, monitoring platform, management system and method
CN202090763U (en) * 2011-01-21 2011-12-28 白宏阳 Anti-theft alarm device of safety box with function of intelligent positioning
CN205135231U (en) * 2015-11-03 2016-04-06 南京叱咤信息科技有限公司 Safe based on bluetooth
CN205259799U (en) * 2015-09-02 2016-05-25 杨立新 Long -range theftproof control system of mobile intelligent Terminal safe deposit box
KR20170027458A (en) * 2015-09-02 2017-03-10 김은영 Safe opening or closing system based on the sound signal and safe opening or closing method therefor

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101640859A (en) * 2009-05-19 2010-02-03 深圳市永达电子股份有限公司 Equipment cabinet alarm device, monitoring platform, management system and method
CN202090763U (en) * 2011-01-21 2011-12-28 白宏阳 Anti-theft alarm device of safety box with function of intelligent positioning
CN205259799U (en) * 2015-09-02 2016-05-25 杨立新 Long -range theftproof control system of mobile intelligent Terminal safe deposit box
KR20170027458A (en) * 2015-09-02 2017-03-10 김은영 Safe opening or closing system based on the sound signal and safe opening or closing method therefor
CN205135231U (en) * 2015-11-03 2016-04-06 南京叱咤信息科技有限公司 Safe based on bluetooth

Also Published As

Publication number Publication date
CN109322587A (en) 2019-02-12

Similar Documents

Publication Publication Date Title
JP4660283B2 (en) Delivery container and delivery container locking / unlocking control system
KR101764650B1 (en) Antitheft System Of Smart Device
US20090214038A1 (en) Security-enhanced rfid system
JP4557807B2 (en) Delivery system, delivery system center device, and delivery container
US9516499B2 (en) Protection for a means of transportation against unauthorised usage or theft
US20130137376A1 (en) Systems and methods for recovering low power devices
CN104919467B (en) Control the method and network drive system of the access to network drive
US20090251318A1 (en) Anti-theft system of mobile device
CA2957319C (en) System and method for secure entry
CN102063601B (en) Radio frequency identification system, radio frequency identification method and reader
CN101690144A (en) Wireless device monitoring methods, wireless device monitoring system and manufacture
CN102287118B (en) Based on the intelligent coffer security protection detection system of technology of Internet of things
US9813408B2 (en) Asset guardian
WO2017106258A1 (en) System and method for establishing a secondary communication channel to control an internet of things (iot) device
CN111599042A (en) Unlocking method, self-service storage device, terminal equipment, server and system
EP2780900B1 (en) Systems and methods for recovering low power devices
CN109322587B (en) Intelligent anti-theft method and system for safe
US10529208B2 (en) Device tracking systems and methods
RU2701056C2 (en) Method and device for selecting wireless reader action, used for output data received from wireless identification device
CN114205377B (en) Binding method, binding device, binding storage medium and binding program product for Internet of things equipment
GB2387744A (en) Transponder alarm system
JP2009151557A (en) Anti-theft device
US10937292B2 (en) Device tracking systems and methods
CN104732687A (en) Article anti-theft system with data acquisition function and related method
CN108171845A (en) Theft preventing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant