CN109741495B - Method and system for sealing and opening storage tail box - Google Patents

Method and system for sealing and opening storage tail box Download PDF

Info

Publication number
CN109741495B
CN109741495B CN201811611759.8A CN201811611759A CN109741495B CN 109741495 B CN109741495 B CN 109741495B CN 201811611759 A CN201811611759 A CN 201811611759A CN 109741495 B CN109741495 B CN 109741495B
Authority
CN
China
Prior art keywords
code
unlocking
information
lock
trunk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811611759.8A
Other languages
Chinese (zh)
Other versions
CN109741495A (en
Inventor
闵浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Easthouse Electrical Co Ltd
Original Assignee
Nanjing Easthouse Electrical Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Easthouse Electrical Co Ltd filed Critical Nanjing Easthouse Electrical Co Ltd
Priority to CN201811611759.8A priority Critical patent/CN109741495B/en
Publication of CN109741495A publication Critical patent/CN109741495A/en
Application granted granted Critical
Publication of CN109741495B publication Critical patent/CN109741495B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Lock And Its Accessories (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method for sealing and opening a storage trunk, which comprises a lockset registering step and a trunk sealing interaction step; the lock registering step: the lock and the server generate a public key and private key pair, a trunk registration code, a first unlocking code and a second unlocking code through interaction, and generate two-dimensional code information; the server stores a private key, a trunk registration code, a lock identification code, a first unlocking code and a second unlocking code; the two-dimensional code information at least comprises a tail box registration code. The invention has the following technical effects: the invention realizes the management of the deposit trunk by an electronic lock mode, is safe and reliable compared with a mechanical lock mode, and greatly reduces the management workload of bank workers.

Description

Method and system for sealing and opening storage tail box
Technical Field
The invention relates to a control technology of a trunk electronic lock.
Background
Businesses in the banking industry exist that maintain high value items for customers, such as artwork, business contracts, jewelry, and the like. The user stores high-value works of art, commercial contracts, jewelry and the like in a register tail box of a bank. The deposit tail box usually needs two keys corresponding to two locks due to the requirement of customer safety, wherein one key is held in the hand of a user, the other key is held in the hand of a bank worker, and when the user needs to unpack and take out articles deposited in the deposit tail box, the user and the bank worker need to open the corresponding deposit tail box after opening the two locks by using the two keys respectively held by the user and the bank worker. In this way, there are several problems:
1. such mechanical locks and mechanical keys present safety hazards themselves.
2. The bank masters a plurality of keys, so that potential safety hazards possibly caused by management of the keys are caused, for example, one key in the plurality of keys is suddenly less and is difficult to find, and the workload of checking which key is less is very large.
3. The bank has a lot of keys, so that the registration workload of keys, boxes and customers during box sealing and opening is large.
4. When bank workers shift the duty, the work load of key handover is very huge.
Disclosure of Invention
The problems to be solved by the invention are as follows: in the background art, the problem exists under the current mode of depositing the boot mechanical lock.
In order to solve the problems, the invention adopts the following scheme:
the method for sealing and opening the trunk of the deposited trunk comprises a lockset registration step and a trunk sealing interaction step;
the lock registering step: the lock and the server generate a public key and private key pair, a trunk registration code, a first unlocking code and a second unlocking code through interaction, and generate two-dimensional code information; the server stores a private key, a trunk registration code, a lock identification code, a first unlocking code and a second unlocking code; the two-dimension code information at least comprises a tail box registration code;
the box sealing interaction step comprises the following steps:
s11: the client receives and analyzes the lock two-dimensional code picture, and extracts the trunk registration code; the lock two-dimensional code picture is a two-dimensional code picture formed after the two-dimensional code information is converted into a two-dimensional code;
s12: after receiving a box sealing instruction input by a user, a client sends box sealing request information to a server; the box sealing request information at least comprises user information and a tail box registration code;
s13: after receiving the box sealing request information, the server performs user authentication according to the user information in the box sealing request information, and after the user authentication is passed, judges whether the current box sealing request is a first box sealing request; if the first box sealing request is received, encrypting a tail box registration code, a lock identification code and a first unlocking code through the private key to generate locking instruction information; if the box sealing request is a second box sealing request, encrypting a tail box registration code, a lock identification code and a second unlocking code through the private key to generate locking instruction information; then sending the locking instruction information to a client;
s14: the client side forwards the received locking instruction information to the lockset;
s15: after the lock receives the two locking instruction information, the public key is used for decrypting the two locking instruction information respectively to obtain two unlocking codes, the two unlocking codes are compared with the first unlocking code and the second unlocking code respectively, meanwhile, the trunk registration code and the lock identification code are compared, and when the information contained in the two locking instruction information is consistent with the information stored in the lock, the locking instruction is executed.
Further, the method for sealing and unpacking the register tail box further comprises the following steps of:
the unpacking interaction step comprises the following steps:
s21: the client receives and analyzes the lock two-dimensional code picture, and extracts the trunk registration code;
s22: after receiving a box opening instruction input by a user, a client sends box opening request information to a server; the unpacking request information at least comprises user information and a tail box registration code;
s23: after receiving the unpacking request information, the server performs user authentication according to the user information in the unpacking request information, and judges whether the current unpacking request is the first unpacking request or not after the user authentication is passed; if the first unlocking request is received, encrypting the trunk registration code, the lock identification code and the first unlocking code by the private key to generate unlocking instruction information; if the second unlocking request is received, encrypting the trunk registration code, the lock identification code and the second unlocking code by the private key to generate unlocking instruction information; then sending the unlocking instruction information to a client;
s24: the client side forwards the received unlocking instruction information to the lockset;
s25: after the lock receives the two unlocking instruction information, the two unlocking instruction information are respectively decrypted through the public key to obtain two unlocking codes, the two unlocking codes are respectively compared with the first unlocking code and the second unlocking code, the trunk registration code and the lock identification code are simultaneously compared, and when the information contained in the two unlocking instruction information is consistent with the information stored in the lock, the unlocking instruction is executed;
further, according to the method for sealing and opening the storage box of the trunk, the lock is a lock group consisting of two independent locks; when the locksets store the public key, the trunk registration code, the first unlocking code and the second unlocking code, one of the individual locksets stores the public key, the trunk registration code and the first unlocking code, and the other individual lockset stores the public key, the trunk registration code and the second unlocking code; in step S15, the two individual locksets receive the two locking instruction messages respectively, and compare the two locking instruction messages respectively and execute the locking instruction respectively.
Further, according to the method for sealing and opening the register tail box, the locking instruction information further comprises verification information; the verification information is obtained by a tail box registration code, a lock identification code, a first unlocking code or a second unlocking code through a summary algorithm.
Further, according to the method for sealing and unpacking the register trunk, in step S13, if the current request for sealing is the first request for sealing, the second request for sealing is waited for, after the second request for sealing is received, the trunk registration code, the lock identification code and the first unlock code are encrypted by the private key to generate the locking instruction information, then the trunk registration code, the lock identification code and the second unlock code are encrypted by the private key to generate another locking instruction information, and then the two locking instruction information are respectively sent to the corresponding clients.
The invention relates to a system for sealing and opening a deposited tail box, which comprises a lockset registration module and a box sealing interaction module;
the lock registration module is configured to: the lock and the server generate a public key and private key pair, a trunk registration code, a first unlocking code and a second unlocking code through interaction, and generate two-dimensional code information; the server stores a private key, a trunk registration code, a lock identification code, a first unlocking code and a second unlocking code; the two-dimension code information at least comprises a tail box registration code;
the box sealing interaction module comprises the following modules:
m11, used for: the client receives and analyzes the lock two-dimensional code picture, and extracts the trunk registration code; the lock two-dimensional code picture is a two-dimensional code picture formed after the two-dimensional code information is converted into a two-dimensional code;
m12, used for: after receiving a box sealing instruction input by a user, a client sends box sealing request information to a server; the box sealing request information at least comprises user information and a tail box registration code;
m13, used for: after receiving the box sealing request information, the server performs user authentication according to the user information in the box sealing request information, and after the user authentication is passed, judges whether the current box sealing request is a first box sealing request; if the first box sealing request is received, encrypting a tail box registration code, a lock identification code and a first unlocking code through the private key to generate locking instruction information; if the box sealing request is a second box sealing request, encrypting a tail box registration code, a lock identification code and a second unlocking code through the private key to generate locking instruction information; then sending the locking instruction information to a client;
m14, used for: the client side forwards the received locking instruction information to the lockset;
m15, used for: after the lock receives the two locking instruction information, the public key is used for decrypting the two locking instruction information respectively to obtain two unlocking codes, the two unlocking codes are compared with the first unlocking code and the second unlocking code respectively, meanwhile, the trunk registration code and the lock identification code are compared, and when the information contained in the two locking instruction information is consistent with the information stored in the lock, the locking instruction is executed.
Further, the system for sealing and unpacking the deposit trunk further comprises an unpacking interaction module:
the unpacking interaction module comprises the following modules:
m21, used for: the client receives and analyzes the lock two-dimensional code picture, and extracts the trunk registration code;
m22, used for: after receiving a box opening instruction input by a user, a client sends box opening request information to a server; the unpacking request information at least comprises user information and a tail box registration code;
m23, used for: after receiving the unpacking request information, the server performs user authentication according to the user information in the unpacking request information, and judges whether the current unpacking request is the first unpacking request or not after the user authentication is passed; if the first unlocking request is received, encrypting the trunk registration code, the lock identification code and the first unlocking code by the private key to generate unlocking instruction information; if the second unlocking request is received, encrypting the trunk registration code, the lock identification code and the second unlocking code by the private key to generate unlocking instruction information; then sending the unlocking instruction information to a client;
m24, used for: the client side forwards the received unlocking instruction information to the lockset;
m25, used for: after the lock receives the two unlocking instruction information, the two unlocking instruction information are respectively decrypted through the public key to obtain two unlocking codes, the two unlocking codes are respectively compared with the first unlocking code and the second unlocking code, the trunk registration code and the lock identification code are simultaneously compared, and when the information contained in the two unlocking instruction information is consistent with the information stored in the lock, the unlocking instruction is executed;
further, according to the system for sealing and opening the trunk of the storage trunk, the lock is a lock group consisting of two independent locks; when the locksets store the public key, the trunk registration code, the first unlocking code and the second unlocking code, one of the individual locksets stores the public key, the trunk registration code and the first unlocking code, and the other individual lockset stores the public key, the trunk registration code and the second unlocking code; in the module M15, two independent locks respectively receive two locking instruction messages, and respectively compare the locking instruction messages and respectively execute the locking instruction.
Further, according to the system for sealing and opening the register tail box, the locking instruction information further comprises verification information; the verification information is obtained by a tail box registration code, a lock identification code, a first unlocking code or a second unlocking code through a summary algorithm.
Further, according to the system for registering the trunk and the unpacking of the trunk, in the module M13, when the current request for the trunk is the first request for the trunk, waiting for the second request for the trunk, after receiving the second request for the trunk, encrypting the trunk registration code, the lock identification code, and the first unlock code with the private key to generate the locking instruction information, then encrypting the trunk registration code, the lock identification code, and the second unlock code with the private key to generate another locking instruction information, and then respectively sending the two locking instruction information to the corresponding clients.
The invention has the following technical effects: the invention realizes the management of the deposit trunk by an electronic lock mode, is safe and reliable compared with a mechanical lock mode, and greatly reduces the management workload of bank workers.
Drawings
Fig. 1 is a schematic diagram of the overall structure of the system according to the embodiment of the present invention. Where the left side of the dotted line represents the bank and the right side represents the user.
Fig. 2 is a schematic structural diagram of an electronic lock in a register boot according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
A deposit box sealing and unpacking system of this embodiment is used for a high-value article preservation business of a bank, and as shown in fig. 1, includes a deposit box 100, a server 200, a bank side terminal 301 and a client side terminal 302. Both the bank side terminal 301 and the client side terminal 302 are preferably mobile terminals, such as smart phones or palm top computers. The bank side terminal 301 and the client side terminal 302 are connected to the server 200 through WIFI or a mobile data network. The bank side terminal 301 and the client side terminal 302 are connected to the register file 100 by bluetooth. An electronic lock is arranged in the storage tail box 100. The electronic lock is composed of two logically independent locks, as shown in fig. 2, and includes a microprocessor 15, a first bluetooth module 111, a second bluetooth module 112, a first actuator 121, and a second actuator 122. The first actuator 121 and the second actuator 122 are both unlocking and locking actuators of a lock. The first bluetooth module 111, the second bluetooth module 112, the first actuator 121 and the second actuator 122 are connected to the microprocessor 15. The first bluetooth module 111, the first actuator 121 and the microprocessor 15 form a logically separate lock, and the second bluetooth module 112, the second actuator 122 and the microprocessor 15 form another logically separate lock. The first bluetooth module 111 is used for connecting the bank side terminal 301 by bluetooth, and the second bluetooth module 112 is used for connecting the client side terminal 302 by bluetooth. The bank side terminal 301 and the client side terminal 302 implement the client referred to in the present invention by executing an application program.
The interaction among the register file 100, the server 200, the bank side terminal 301 and the client side terminal 302 in the system, that is, the interaction among the aforementioned client, server and lock, at least includes: the method comprises a lockset registering step, a box sealing interaction step and a box opening interaction step.
And a lock registering step, namely, the lock and the server generate a public key and private key pair, a trunk registration code, a first unlocking code and a second unlocking code through interaction and generate two-dimensional code information. The lock stores a public key, a trunk registration code, a first unlocking code and a second unlocking code, and the server stores a private key, a trunk registration code, a lock identification code, a first unlocking code and a second unlocking code. The two-dimensional code information at least comprises a tail box registration code. The lock registration steps in this embodiment are as follows:
first, the client is connected with the server and connected with the lockset in a Bluetooth mode. Here, the client is the bank side terminal 301. Here, the lock is the lock in the storage box 100. The lockset is in a factory initialization state at the moment, and all operations can be carried out without authority verification. Therefore, after the client is connected with the lockset, the lockset identification code can be obtained through the lockset, the lockset identification code is the only code set by the factory, and each lockset has different lockset identification codes. And after the client side obtains the lock identification code of the lock, sending a lock registration request to the server. The lock registration request at least includes a lock identification code. After receiving the lock registration request, the server generates a public key private key pair, a first unlocking code and a second unlocking code in a random mode, generates a trunk registration code, and then sends the public key, the trunk registration code, the lock identification code, the first unlocking code and the second unlocking code to the client. The client forwards the public key, the trunk registration code, the lock identification code, the first unlocking code and the second unlocking code to the lock. The lockset judges that the lockset identification code is the same as the lockset identification code of the lockset, if the lockset identification code is the same as the lockset identification code of the lockset, the public key, the trunk registration code, the first unlocking code and the second unlocking code are stored, then the trunk registration code, the lockset identification code, the first unlocking code, the second unlocking code and the verification information are encrypted through the public key to form initialization success information, and the verification information is an abstract obtained through an abstract algorithm by the trunk registration code, the lockset identification code, the first unlocking code and the second unlocking code. And after receiving the initialization success information, the client forwards the initialization success information to the server. After the server receives the initialization success information, the initialization success information is decrypted through the private key, the trunk registration code, the lock identification code, the first unlocking code and the second unlocking code are verified through verification information, after the verification is passed, the private key, the trunk registration code, the lock identification code, the first unlocking code and the second unlocking code are stored, and the trunk registration code and the lock identification code form registration success information and are sent to the client. And after the client receives the successful registration information, the tail box registration code and the lock identification code form two-dimensional code information, and a corresponding two-dimensional code picture is generated. After the corresponding two-dimensional code picture is generated, the staff prints and attaches the two-dimensional code picture on the corresponding storage tail box 100, and the two-dimensional code picture is the lock two-dimensional code picture.
The box sealing interaction steps are as follows:
during the joint sealing, the client connects with the server and is connected with the lockset in a Bluetooth mode. Here, a bank-side terminal 301 or a client-side terminal 302. In the sealing interaction step, the steps of the processing performed by the bank-side terminal 301 and the client-side terminal 302 are the same. After a user shoots a two-dimensional code picture attached to the corresponding register trunk 100 through a camera of the bank side terminal 301 or the client side terminal 302, the client analyzes the two-dimensional code picture, and extracts a trunk registration code and a lock identification code from the two-dimensional code picture. And after extracting the tail box registration code and the lock identification code, the client enters a user operation interface to wait for the user to input a box sealing instruction. And after the user inputs a box sealing instruction, the client sends box sealing request information to the server. The sealing request information comprises user information, a trunk registration code and a lock identification code.
And after the user authentication is passed, judging whether the current box sealing request is the first box sealing request. If the first box sealing request is received, waiting for a second box sealing request, and after the second box sealing request is received, encrypting the tail box registration code, the lock identification code, the first unlocking code and the check code through a private key to generate locking instruction information. The check code is a digest obtained by a digest algorithm from a tail box registration code, a lock identification code and a first unlocking code. And then encrypting the trunk registration code, the lock identification code, the second unlocking code and the check code by a private key to generate another locking instruction information. The check code in the locking instruction information is an abstract obtained by a tail box registration code, a lockset identification code and a second unlocking code through an abstract algorithm. And then the two locking instruction messages are respectively sent to the bank side terminal 301 or the client side terminal 302. In the process of waiting for the second box sealing request, if the second box sealing request is not received within the preset time, the box sealing process fails. Here a first and a second banking request are issued by the bank side terminal 301 and the client side terminal 302, respectively. That is, when the aforementioned client sends the blocking request information to the server, it is desirable that the bank-side terminal 301 and the client-side terminal 302 send the blocking request information to the server at the same time, at least not exceeding a preset time, otherwise, the blocking operation fails. The predetermined time is generally 5 to 10 minutes.
After the bank side terminal 301 and the client side terminal 302 respectively receive the corresponding locking instruction information, the corresponding locking instruction information is respectively forwarded to the lock through bluetooth.
The lock receives two locking instruction messages. Specifically, in the lock structure shown in fig. 2, the first bluetooth module 111 and the second bluetooth module 112 respectively receive a locking instruction message. After the lockset receives the two locking instruction messages, the two locking instruction messages are respectively decrypted through the public key, and the received trunk registration code, the lockset identification code, the first unlocking code and the second unlocking code are verified through the verification information in the locking instruction messages. After the verification is passed, the lockset obtains two unlocking codes, a trunk registration code and a lockset identification code. Two unlocking codes are namely a first unlocking code and a second unlocking code. And then comparing the obtained two unlocking codes, the tail box registration code and the lock identification code with the two unlocking codes and the tail box registration code which are stored by the lock through the lock registration step and the lock identification code of the lock, and executing a locking instruction to finish the box sealing operation when the information contained in the two locking instruction information is consistent with the information stored in the lock.
After the box sealing is completed, the lockset sends information of successful box sealing to the client, the client returns the information of successful box sealing to the server, and the server stores the operation record of the box sealing.
The unpacking interaction steps are the same as the unpacking interaction steps, only the unpacking in the unpacking interaction steps is replaced by unpacking, and the locking is replaced by unlocking, so that the description is omitted.
It should be noted that in this embodiment, the lock is embedded in the rear cabinet, and in practical application, the lock may be separated from the rear cabinet, such as an electronic padlock. At this time, the tail box corresponds to two independent electronic padlocks. The two independent electronic padlocks now have two different lock identification codes. Correspondingly, the lock identification code in the process is divided into a first lock identification code and a second lock identification code, the specific interaction process is substantially the same, and the description is omitted.

Claims (10)

1. A method for sealing and opening a storage trunk is characterized by comprising a lockset registration step and a trunk sealing interaction step;
the lock registering step: the lock and the server generate a public key and private key pair, a trunk registration code, a first unlocking code and a second unlocking code through interaction, and generate two-dimensional code information; the server stores a private key, a trunk registration code, a lock identification code, a first unlocking code and a second unlocking code; the two-dimension code information at least comprises a tail box registration code;
the box sealing interaction step comprises the following steps:
s11: the client receives and analyzes the lock two-dimensional code picture, and extracts the trunk registration code; the lock two-dimensional code picture is a two-dimensional code picture formed after the two-dimensional code information is converted into a two-dimensional code;
s12: after receiving a box sealing instruction input by a user, a client sends box sealing request information to a server; the box sealing request information at least comprises user information and a tail box registration code;
s13: after receiving the box sealing request information, the server performs user authentication according to the user information in the box sealing request information, and after the user authentication is passed, judges whether the current box sealing request is a first box sealing request; if the first box sealing request is received, encrypting a tail box registration code, a lock identification code and a first unlocking code through the private key to generate locking instruction information; if the box sealing request is a second box sealing request, encrypting a tail box registration code, a lock identification code and a second unlocking code through the private key to generate locking instruction information; then sending the locking instruction information to a client;
s14: the client side forwards the received locking instruction information to the lockset;
s15: after the lock receives the two locking instruction information, the public key is used for decrypting the two locking instruction information respectively to obtain two unlocking codes, the two unlocking codes are compared with the first unlocking code and the second unlocking code respectively, meanwhile, the trunk registration code and the lock identification code are compared, and when the information contained in the two locking instruction information is consistent with the information stored in the lock, the locking instruction is executed.
2. The method of registering a tail box for box closing and opening as recited in claim 1, further comprising the step of box opening interaction:
the unpacking interaction step comprises the following steps:
s21: the client receives and analyzes the lock two-dimensional code picture, and extracts the trunk registration code;
s22: after receiving a box opening instruction input by a user, a client sends box opening request information to a server; the unpacking request information at least comprises user information and a tail box registration code;
s23: after receiving the unpacking request information, the server performs user authentication according to the user information in the unpacking request information, and judges whether the current unpacking request is the first unpacking request or not after the user authentication is passed; if the first unlocking request is received, encrypting the trunk registration code, the lock identification code and the first unlocking code by the private key to generate unlocking instruction information; if the second unlocking request is received, encrypting the trunk registration code, the lock identification code and the second unlocking code by the private key to generate unlocking instruction information; then sending the unlocking instruction information to a client;
s24: the client side forwards the received unlocking instruction information to the lockset;
s25: after the lock receives the two unlocking instruction information, the public key is used for decrypting the two unlocking instruction information respectively to obtain two unlocking codes, the two unlocking codes are compared with the first unlocking code and the second unlocking code respectively, meanwhile, the trunk registration code and the lock identification code are compared, and when the information contained in the two unlocking instruction information is consistent with the information stored in the lock, the unlocking instruction is executed.
3. The method of registering a trunk seal and an open as recited in claim 1, wherein said lock is a set of two separate locks; when the locksets store the public key, the trunk registration code, the first unlocking code and the second unlocking code, one of the individual locksets stores the public key, the trunk registration code and the first unlocking code, and the other individual lockset stores the public key, the trunk registration code and the second unlocking code; in step S15, the two individual locksets receive the two locking instruction messages respectively, and compare the two locking instruction messages respectively and execute the locking instruction respectively.
4. The method of registering tail box closing and opening as recited in claim 1, wherein said lock instruction information further comprises verification information; the verification information is obtained by a tail box registration code, a lock identification code, a first unlocking code or a second unlocking code through a summary algorithm.
5. The method as claimed in claim 1, wherein in step S13, if the current box sealing request is the first box sealing request, waiting for the second box sealing request, after receiving the second box sealing request, encrypting the box registration code, the lock identification code, and the first unlocking code with the private key to generate the locking instruction information, encrypting the box registration code, the lock identification code, and the second unlocking code with the private key to generate the other locking instruction information, and then sending the two locking instruction information to the corresponding clients respectively.
6. A system for sealing and opening a trunk for storing a trunk is characterized by comprising a lockset registration module and a trunk sealing interaction module;
the lock registration module is configured to: the lock and the server generate a public key and private key pair, a trunk registration code, a first unlocking code and a second unlocking code through interaction, and generate two-dimensional code information; the server stores a private key, a trunk registration code, a lock identification code, a first unlocking code and a second unlocking code; the two-dimension code information at least comprises a tail box registration code;
the box sealing interaction module comprises the following modules:
m11, used for: the client receives and analyzes the lock two-dimensional code picture, and extracts the trunk registration code; the lock two-dimensional code picture is a two-dimensional code picture formed after the two-dimensional code information is converted into a two-dimensional code;
m12, used for: after receiving a box sealing instruction input by a user, a client sends box sealing request information to a server; the box sealing request information at least comprises user information and a tail box registration code;
m13, used for: after receiving the box sealing request information, the server performs user authentication according to the user information in the box sealing request information, and after the user authentication is passed, judges whether the current box sealing request is a first box sealing request; if the first box sealing request is received, encrypting a tail box registration code, a lock identification code and a first unlocking code through the private key to generate locking instruction information; if the box sealing request is a second box sealing request, encrypting a tail box registration code, a lock identification code and a second unlocking code through the private key to generate locking instruction information; then sending the locking instruction information to a client;
m14, used for: the client side forwards the received locking instruction information to the lockset;
m15, used for: after the lock receives the two locking instruction information, the public key is used for decrypting the two locking instruction information respectively to obtain two unlocking codes, the two unlocking codes are compared with the first unlocking code and the second unlocking code respectively, meanwhile, the trunk registration code and the lock identification code are compared, and when the information contained in the two locking instruction information is consistent with the information stored in the lock, the locking instruction is executed.
7. The system for registering closing and opening of a tail box of claim 6, further comprising an opening interaction module:
the unpacking interaction module comprises the following modules:
m21, used for: the client receives and analyzes the lock two-dimensional code picture, and extracts the trunk registration code;
m22, used for: after receiving a box opening instruction input by a user, a client sends box opening request information to a server; the unpacking request information at least comprises user information and a tail box registration code;
m23, used for: after receiving the unpacking request information, the server performs user authentication according to the user information in the unpacking request information, and judges whether the current unpacking request is the first unpacking request or not after the user authentication is passed; if the first unlocking request is received, encrypting the trunk registration code, the lock identification code and the first unlocking code by the private key to generate unlocking instruction information; if the second unlocking request is received, encrypting the trunk registration code, the lock identification code and the second unlocking code by the private key to generate unlocking instruction information; then sending the unlocking instruction information to a client;
m24, used for: the client side forwards the received unlocking instruction information to the lockset;
m25, used for: after the lock receives the two unlocking instruction information, the public key is used for decrypting the two unlocking instruction information respectively to obtain two unlocking codes, the two unlocking codes are compared with the first unlocking code and the second unlocking code respectively, meanwhile, the trunk registration code and the lock identification code are compared, and when the information contained in the two unlocking instruction information is consistent with the information stored in the lock, the unlocking instruction is executed.
8. The system for closing and opening a storage container according to claim 6, wherein said lock is a set of two separate locks; when the locksets store the public key, the trunk registration code, the first unlocking code and the second unlocking code, one of the individual locksets stores the public key, the trunk registration code and the first unlocking code, and the other individual lockset stores the public key, the trunk registration code and the second unlocking code; in the module M15, two independent locks respectively receive two locking instruction messages, and respectively compare the locking instruction messages and respectively execute the locking instruction.
9. The system for closing and opening a registered tail box of claim 6, wherein said lock instruction information further comprises verification information; the verification information is obtained by a tail box registration code, a lock identification code, a first unlocking code or a second unlocking code through a summary algorithm.
10. The system for registering the sealing and unpacking of the trunk of claim 6, wherein in the module M13, when the current sealing request is the first sealing request, the second sealing request is waited for, after receiving the second sealing request, the trunk registration code, the lock identification code and the first unlocking code are encrypted by the private key to generate the locking instruction information, and then the trunk registration code, the lock identification code and the second unlocking code are encrypted by the private key to generate the other locking instruction information, and then the two locking instruction information are respectively sent to the corresponding clients.
CN201811611759.8A 2018-12-27 2018-12-27 Method and system for sealing and opening storage tail box Active CN109741495B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811611759.8A CN109741495B (en) 2018-12-27 2018-12-27 Method and system for sealing and opening storage tail box

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811611759.8A CN109741495B (en) 2018-12-27 2018-12-27 Method and system for sealing and opening storage tail box

Publications (2)

Publication Number Publication Date
CN109741495A CN109741495A (en) 2019-05-10
CN109741495B true CN109741495B (en) 2021-05-18

Family

ID=66361423

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811611759.8A Active CN109741495B (en) 2018-12-27 2018-12-27 Method and system for sealing and opening storage tail box

Country Status (1)

Country Link
CN (1) CN109741495B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109741505B (en) * 2019-02-19 2021-06-04 南京东屋电气有限公司 Box opening method, box sealing method and box opening and sealing system for depositing tail boxes
CN113611017A (en) * 2021-08-03 2021-11-05 广东纬德信息科技股份有限公司 Bank cabinet management system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8854180B2 (en) * 2009-01-10 2014-10-07 Pro Tech Systems Of Maryland, Inc. Access control system
CN104464048B (en) * 2014-11-14 2016-09-14 中国建设银行股份有限公司 A kind of electronic password lock method for unlocking and device
CN104680106B (en) * 2014-12-19 2018-09-28 中国印钞造币总公司 A kind of electronic sealing control method and device based on safety command
CN105827576B (en) * 2015-01-05 2019-07-26 珠海汇金科技股份有限公司 Method for unlocking and system based on dynamic puzzle-lock
CN106934886B (en) * 2017-02-28 2019-02-26 南京东屋电气有限公司 A kind of setting of dynamic puzzle-lock OTC key and update method

Also Published As

Publication number Publication date
CN109741495A (en) 2019-05-10

Similar Documents

Publication Publication Date Title
CN111478917B (en) Background system for providing network service for access control device and user terminal
CN109741505B (en) Box opening method, box sealing method and box opening and sealing system for depositing tail boxes
CN101038619B (en) Radio frequency recognition system privacy identification method
CN105933113A (en) Secret key backup recovering method and system, and related devices
EP3120525A2 (en) Systems and methods for decryption as a service
CN109741495B (en) Method and system for sealing and opening storage tail box
US20180041520A1 (en) Data access method based on cloud computing platform, and user terminal
CN102291268A (en) Safety domain name server and hostile domain name monitoring system and method based on same
CN111311840B (en) Logistics password box, logistics management system and method
CA2481577A1 (en) A secure information storage system using data splitting and separate storage
CN103281189A (en) Light weight class safe protocol certification system and method for radio frequency identification equipment
CN106357679B (en) Method, system and the client of cipher authentication, server and smart machine
US20200402333A1 (en) Automated physical package delivery with end-to-end package security
CN104852913A (en) Dynamic password electronic coded lock
CN109831463A (en) Intelligent terminal security protection system for operating system login authentication
CN104796534A (en) Method and device for processing information contents
CN106934886A (en) A kind of dynamic puzzle-lock OTC keys are set and update method
CN104123769A (en) Locking and unlocking control method of safe smart lock
Prada-Delgado et al. A blockchain-based crypto-anchor platform for interoperable product authentication
US9602284B1 (en) Secure offline authentication
CN108765230A (en) A kind of resident's household register approaches to IM and server
CN112699987A (en) Method and system for monitoring work task by using lock
CN115511019A (en) Anti-counterfeiting verification method for binding RFID (radio frequency identification) label and article bar code
CN111008400A (en) Data processing method, device and system
US10990978B2 (en) Method of transaction without physical support of a security identifier and without token, secured by the structural decoupling of the personal and service identifiers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant