CN109754505A - A kind of method for unlocking and device based on IC card - Google Patents
A kind of method for unlocking and device based on IC card Download PDFInfo
- Publication number
- CN109754505A CN109754505A CN201811558799.0A CN201811558799A CN109754505A CN 109754505 A CN109754505 A CN 109754505A CN 201811558799 A CN201811558799 A CN 201811558799A CN 109754505 A CN109754505 A CN 109754505A
- Authority
- CN
- China
- Prior art keywords
- card
- read
- target
- unlocking
- write equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a kind of method for unlocking and device based on IC card, wherein the method for unlocking based on IC card includes: when detecting the unlocking request of user's triggering, and read-write equipment identifies target IC card according to unlockings request;The read-write equipment verifies the target IC card according to preset proof rule, and after being proved to be successful, the read-write equipment verifies the target IC card according to preset business rule;When verifying successfully, the read-write equipment control locking device is opened.The present invention can realize the process for simplifying user and unlocking based on IC card, consequently facilitating user unlocks, at the same time, since IC card is relatively privately owned, and then avoid such issues that broken the carrier privatization of unlocking apparatus caused by ring because of two dimensional code.
Description
Technical field
The present invention relates to Internet technical field more particularly to a kind of method for unlocking and device based on IC card.
Background technique
With the development of society, there are a series of sharing articles, usual sharing articles are equipped with locking device and locking device
Unlocking code, when user needs using sharing articles, user needs to scan the unlocking code of locking device, and then makes read-write equipment.So
And in actual use, user has found that this unlocking mode not enough simplifies, and needs to consume a longer time, for example, working as user
When the network signal of mobile phone is poor, it will lead to user using the unlocking mode and consume a longer time that waiting locking device is unlocked.Separately
On the one hand, this unlocking mode relies on unlocking code, once unlocking code is by malicious sabotage, then locking device can not be opened normally, into
And user is not available sharing articles, results even in sharing articles by privatization.
Summary of the invention
The technical problem to be solved by the embodiment of the invention is that a kind of method for unlocking and device based on IC card is provided,
For solving to realize locking device not by privatization while realizing using IC card convenient for user's unlocking.
In order to solve the above-mentioned technical problem, first aspect of the embodiment of the present invention discloses a kind of unlocking side based on IC card
Method, this method comprises:
When detecting the unlocking request of user's triggering, read-write equipment requests identification target IC card according to the unlocking;
The read-write equipment verifies the target IC card according to preset proof rule, after being proved to be successful, institute
It states read-write equipment and the target IC card is verified according to preset business rule;
When verifying successfully, the read-write equipment control locking device is opened.
Optionally, the read-write equipment identification target IC card may comprise steps of:
The read-write equipment judges whether there is the target IC according to unlocking request within the scope of its wireless identification
Card;
When judging that the read-write equipment reads the relevant information of the target IC card, institute there are when the target IC card
State the use initial time and the target IC card that relevant information includes the mark ID of the target IC card, the target IC card
Use the end time.
Optionally, the read-write equipment according to preset proof rule to the target IC card carry out verifying may include with
Lower step:
The read-write equipment is randomly generated an identifying code and keeps in the identifying code;
The identifying code is written in the target IC card by the read-write equipment, so that the target IC card is according to first
Default generating mode, the relevant information and the identifying code generate the first MAC code;
The read-write equipment generates second according to the described first default generating mode, the identifying code and the relevant information
MAC code;
The read-write equipment receives the first MAC code that the target IC card is sent, and judges that the first MAC code is
It is no consistent with the 2nd MAC code;
When judging that the first MAC code and the 2nd MAC code are consistent, the read-write equipment is determined to the target
IC card is proved to be successful.
Optionally, the read-write equipment according to preset business rule to the target IC card carry out verification may include with
Lower operation:
The read-write equipment is looked into forbidding unlocking ID list using the mark ID of the target IC card as querying condition
Forbid whether unlocking ID list includes the mark ID described in inquiry;
When query result forbids unlocking ID list not include the mark ID for described in, the read-write equipment is according to
When the use starting of target IC card, the use end time of the target IC card, preset service life judgment rule
Judge whether the service life of the target IC card expires, if judging result is no, it is determined that verify to the target IC card logical
It crosses, if the determination result is YES, it is determined that target IC card verification is not passed through.
Optionally, the method also includes:
When query result forbids unlocking ID list to include the mark ID for described in, the read-write equipment generates refusal and opens
Lock information.
Optionally, the method also includes:
When the read-write equipment determines that the target IC card verification is obstructed out-of-date, the read-write equipment is initiated to the target
IC card renews operation, wherein read-write equipment initiation may include: to the operation that renews of the target IC card
The read-write equipment obtains the target IC card generates at random first and renews code and obtain the target IC card
The 3rd MAC code of code generation is renewed according to the second default generating mode, the relevant information and described first;
The read-write equipment renews code, the 3rd MAC code and the relevant information for described first and is sent to operation clothes
It is engaged in device, so that the Operation Server generates the 4th MAC code and second renews code, judging the 3rd MAC code and described the
The 5th MAC code is generated when four MAC codes are identical;
What the read-write equipment received that the Operation Server sends described renews information, the 5th MAC code and described
Second renews code;
The read-write equipment renews code, the 5th MAC code and the information that renews for described second and is written to the mesh
It marks in IC card, so that the target IC card generates the 6th MAC code and when the 6th MAC code is identical as the 5th MAC code
Information is renewed described in enabling, the information that renews includes the new use end time using initial time and newly.
Optionally, the method also includes:
What the read-write equipment received that the target IC card sends renews successfully prompting message, and described renew successfully is mentioned
Show that message is sent to the Operation Server.
Optionally, the relevant information of the target IC card further includes certification sub-key;
It is described to open and before the read-write equipment identifies target IC card and reads the relevant information of the target IC card
Locking method further includes that the read-write equipment executes initialization operation.
Optionally, the read-write equipment execution initialization operation includes:
The read-write equipment receives certification master key that write-in terminal is sent, generating according to preset-key create-rule,
The relationship between the certification sub-key in the certification master key and the relevant information is dispersion relation.
Optionally, after the read-write equipment control locking device is opened, the method for unlocking further include:
The read-write equipment records unlocking information, wherein the unlocking information includes the mark ID with the target IC card
There are at least one of the User ID of binding relationship, uncaging time, lockset position of coupler.
Optionally, the method for unlocking further include:
When detecting the locking request of user's triggering, the read-write equipment controls the locking device and locks and record
The read-write equipment shuts information, wherein the information that shuts includes shutting the time, shutting location information and the use
At least one of family ID;
The read-write equipment shuts information and the unlocking information is sent to Operation Server for described, so that the fortune
Battalion's server shuts information according to and the unlocking information calculate cost of use that the user needs to pay and will described in
Cost of use is sent to user terminal.
Optionally, the method for unlocking further include:
The read-write equipment, which is sent according to default access frequency to Operation Server, forbids unlocking ID list for described
Request is updated, so that the Operation Server is forbidden out after receiving the update request to read-write equipment return is updated
Lock ID table;
The read-write equipment receive it is described it is updated forbid unlocking ID table, and forbid unlocking ID list to replace with for described
It is described updated to forbid unlocking ID table.
A kind of unlocking apparatus based on IC card is also disclosed in second aspect of the present invention, which includes:
Identification module, for identifying target IC card and reading the phase of the target IC card when user triggers and unlocks request
Information is closed, the relevant information includes the mark ID of the target IC card;
Authentication module, for when the identification module identification target IC card and read the target IC card relevant information it
Afterwards, the relevant information is verified according to preset proof rule;
Correction verification module, for the authentication module according to preset proof rule to the relevant information carry out verifying and
After the relevant information is proved to be successful, the relevant information is verified according to preset business rule;
Drive module, for after the correction verification module verifies relevant information success, control locking device to be opened.
Optionally, identification module may include:
First judging submodule, it is described for being judged whether there is within the scope of its wireless identification according to unlocking request
Target IC card;
Reading submodule reads the target there are when the target IC card for judging in the first judging submodule
The relevant information of IC card, when the relevant information includes that the use of the mark ID, the target IC card of the target IC card originate
Between and the target IC card use the end time.
Optionally, authentication module may include:
Identifying code generates submodule, for an identifying code to be randomly generated and keeps in the identifying code;
Be written submodule, for identifying code generate submodule an identifying code is randomly generated and keep in the identifying code it
Afterwards, the identifying code is written in the target IC card, so that the target IC card is according to the first default generating mode, described
Relevant information and the identifying code generate the first MAC;
MAC generates submodule, for raw according to the described first default generating mode, the identifying code and the relevant information
At the 2nd MAC code;
First receiving submodule, the first MAC code sent for receiving the target IC card;
Second judgment submodule receives the first MAC that the target IC card is sent for the first receiving submodule
After code, judge the first MAC code whether with the 2nd MAC code unanimously, when judging the first MAC code and described the
When two MAC codes are consistent, the read-write equipment determination is proved to be successful the target IC card.
Optionally, correction verification module may include:
It inquires submodule and is forbidding unlocking ID list for the mark ID using the target IC card as querying condition
Middle inquiry, to forbid whether unlocking ID list includes the mark ID and generate query result described in judgement;
Third judging submodule, for forbidding unlocking ID list not include the mark ID to be described when the query result
When, when originating according to the use of the target IC card, the use end time of the target IC card, preset validity period
Limit judgment rule judges whether the service life of the target IC card expires, if judging result is no, it is determined that the target
IC card verification passes through, if the determination result is YES, it is determined that the target IC card verification does not pass through;
Submodule is renewed, for determining that the target IC card verification is obstructed out-of-date in third judging submodule, is initiated to institute
That states target IC card renews operation;
First cue module, for forbidding unlocking ID list to include the mark to be described when inquiry submodule query result
When ID, refusal unlocking information is generated.
Optionally, renewing that submodule initiates can be with to the concrete mode for renewing operation of the target IC card are as follows:
It obtains the target IC card generates at random first and renews code and to obtain the target IC card default according to second
Generating mode, the relevant information and described first renew the 3rd MAC code of code generation;
Code, the 3rd MAC code and the relevant information are renewed by first and is sent to Operation Server, so that the fortune
Battalion's server generates the 4th MAC code and second renews code, the generation when judging that the 3rd MAC code is identical as the 4th MAC code
5th MAC code
Receive that the Operation Server sends it is described renew information, the 5th MAC code and described second renews code;
Code, the 5th MAC code and the information that renews is renewed by described second to be written in the target IC card, so that
The target IC card generates the 6th MAC code and renews letter described in enabling when the 6th MAC code is identical as the 5th MAC code
Breath, the information that renews includes the new use end time using initial time and newly;
Receive the transmission of target IC card renews successfully prompt information, and the prompt information that renews successfully is sent to operation
Server.
Optionally, a kind of unlocking apparatus based on IC card disclosed in second aspect of the present invention further include:
Initialization module, for identification module identify target IC card and read the target IC card relevant information it
Before, execute initialization operation, wherein initialization operation may include step:
The read-write equipment receives certification master key that write-in terminal is sent, generating according to preset-key create-rule,
The relationship between the certification sub-key in the certification master key and the relevant information is dispersion relation.
Optionally, a kind of unlocking apparatus based on IC card disclosed in second aspect of the present invention further include:
Logging modle, for recording unlocking information, wherein the unlocking letter after drive module control locking device is opened
Breath may include that there are at least one in the User ID of binding relationship, uncaging time, lockset position of coupler with the mark ID of target IC card
Kind.
Optionally, logging modle is also used to when detecting the locking request of user's triggering, and record shuts information,
In, this shut information may include shut the time, shut position, there are in the User ID of binding relationship by the mark ID of target IC card
It is at least one.
Optionally, a kind of unlocking apparatus based on IC card disclosed in second aspect of the present invention further include:
Settlement module, for logging modle record the read-write equipment shut information after, will shut information, unlock letter
Breath be sent to Operation Server so that the Operation Server according to shut information and the unlocking information calculating user's needs
The cost of use is simultaneously sent to user terminal by the cost of use of payment.
Optionally, initialization module is also used to send according to default access frequency to Operation Server and forbid out for described
The update request of ID list is locked, so that the Operation Server updates after receiving the update request to read-write equipment return
Afterwards forbid unlocking ID table;
The read-write equipment receive it is described it is updated forbid unlocking ID table, and forbid unlocking ID list to replace with for described
It is described updated to forbid unlocking ID table.
Another unlocking apparatus based on IC card is also disclosed in third aspect present invention, which includes:
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes first aspect present invention
The disclosed method for unlocking based on IC card.
A kind of computer readable storage medium is also disclosed in fourth aspect present invention, includes in the computer readable storage medium
Unlocking program based on IC card when the unlocking program based on IC card is executed by processor, executes such as first aspect present invention
The method for unlocking based on IC card.
As it can be seen that the present invention can realize the process for simplifying user and unlocking based on IC card, consequently facilitating user unlocks, it is same with this
When, since IC card is relatively privately owned, and then avoid because two dimensional code is broken the carrier privatization of unlocking apparatus caused by ring
Such issues that.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ability
For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 is the flow diagram of the method for unlocking based on IC card disclosed in the embodiment of the present invention one;
Fig. 2 is the flow diagram of the method for unlocking based on IC card disclosed in the embodiment of the present invention two;
Fig. 3 is that the structure of the unlocking apparatus based on IC card disclosed in the embodiment of the present invention three shows schematic diagram;
Fig. 4 is that the structure of the unlocking apparatus based on IC card disclosed in the embodiment of the present invention four shows schematic diagram;
Fig. 5 is that the structure of the unlocking apparatus based on IC card disclosed in the embodiment of the present invention five shows schematic diagram.
Specific embodiment
In order to better understand and implement, following will be combined with the drawings in the embodiments of the present invention, in the embodiment of the present invention
Technical solution be clearly and completely described, it is clear that the described embodiment is only a part of the embodiment of the present invention, without
It is whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work
Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
With China's expanding economy, large quantities of sharing articles have been emerged in large numbers on the market, for example, shared bicycle, shared electromagnetism
Furnace etc., generally for the shared of sharing articles is realized, sharing articles are equipped with locking device and two dimensional code or number.When user needs reality
When with sharing articles, user, which needs to scan the two-dimensional code or number, obtains unlocking cipher, and unlocking cipher is then inputted on locking device,
So that locking device verifying unlocking cipher is unlocked after passing through, and then realize the practical of sharing articles.In such a scenario, user makes
It is needed to be implemented when with sharing articles using a series of comparatively laborious movements such as mobile scanning terminal two dimensional code, input two dimensional codes,
And then cause user experience poor.At the same time, since the method for unlocking of existing sharing articles depends on two dimensional code or number,
And when two dimensional code or number are by some user's malicious damage, other users can not just obtain unlocking cipher, and sharing articles are just
It can not share and by privatization.For this scene, the embodiment of the invention discloses a kind of method for unlocking and dress based on IC card
Set, due to IC card generally with user account bind, and then may be implemented a people one card unlocking mode, thus avoid two dimensional code or
Caused by number is damaged the problem of sharing articles privatization.In the following, by opening in conjunction with specific embodiment based on IC card
Locking method and device are described in detail.
Embodiment one
Referring to Fig. 1, Fig. 1 is the flow diagram of the method for unlocking based on IC card disclosed in the embodiment of the present invention one.Such as
Shown in Fig. 1, being somebody's turn to do the method for unlocking based on IC card be may comprise steps of:
101, when detecting the unlocking request of user's triggering, read-write equipment requests identification target IC card according to unlocking;
102, read-write equipment verifies target IC card according to preset proof rule, after being proved to be successful, read-write dress
It sets and target IC card is verified according to preset business rule;
103, when verifying successfully, read-write equipment controls locking device and opens.
In embodiments of the present invention, optionally, read-write equipment can be frequency read/write, and wherein frequency read/write includes penetrating
Frequency module, network communication module, SAM module, antenna, central controller, driving motor, I/O port.Wherein, radio-frequency module is for sending out
The radiofrequency signal of predeterminated frequency is sent, antenna is used to receive the radiofrequency signal of predeterminated frequency.SAM module includes SAM chip, optional
, SAM chip may include pre-stored certification master key, and central controller can be single-chip microcontroller, driving motor with set
The locking device connection in sharing articles is set, so, read-write equipment can detect within the scope of the wireless identification of antenna
With the presence or absence of target IC card, carry out when detecting target IC card, radio-frequency module emit radiofrequency signal realize with target IC card it
Between communication, and then central controller controls drive module according to the data of the data of SAM chip and target IC card, so that driving
Motor drives locking device to unlock, final to realize that article is shared.Further alternative, frequency read/write can also include network communication
Module, wherein network communication module can be 2G communication module, be also possible to 3G communication module, 4G communication module or other can
Realize the communication module of telecommunication, network communication module can be communicated with remote server, for example, logical with Operation Server
Letter.
In embodiments of the present invention, optionally, read-write equipment can also include display screen, buzzer, wherein display screen is used
In display reminding information, for example, display screen can when target IC card is identified by reading radio-frequency module and read service life therein
To show service life information, so, user can know the remaining access times of target IC card in time, so that
User supplements with money in time in the case where the remaining access times of target IC card are few.
In embodiments of the present invention, optionally, read-write equipment can be there are two types of working condition, the first working condition is low
Power consumption state is for second operating status, and the default conditions of read-write equipment are low power consumpting state.When some user needs to open
When lock or locking, which, which can press, opens key so that read-write equipment is converted to operating status from low power consumpting state, at this point,
Read-write equipment starts to identify target IC card.When not having user to need to unlock or lock, read-write equipment can will within the default time limit
State is low power consumpting state by running state conversion, to reduce power consumption.It should be noted that read-write equipment can also there are three types of or
Three kinds or more of working condition, this is not limited by the present invention.
In embodiments of the present invention, target IC card is that certain is just used by a user in unlocking and can be identified by read-write equipment
IC card, wherein target IC card can be non-contact IC card, be also possible to Contact Type Ic Card, and this is not limited by the present invention.
Preferably, the target IC card of the embodiment of the present invention selects non-contact IC card, wherein the non-contact IC card may include day
Line, resonance circuit, control chip, wherein the antenna of IC card can receive the radiofrequency signal of predeterminated frequency, and resonance circuit can root
Work charge is generated according to the received radiofrequency signal of the antenna of IC card, control chip can work under the driving of work charge.Into
One step and it is optional, control chip includes central controller (such as EEPROM (Electrically Erasable
Programmable read only memory, band electric erazable programmable read-write memory)), memory, wherein in memory
It is previously stored with the program that can be executed by central controller.
The method for unlocking based on IC card of the embodiment of the present invention can be used for shared bicycle field.For example, in shared bicycle
Field, each shared bicycle can install the read-write equipment that can be identified target IC card and read target IC card, and then work as
Some user close to read-write equipment and when read-write equipment recognizes target IC card within the scope of wireless identification, reads target IC card
Write device installs preset proof rule and verification rule verifies the information in target IC card, verifies, when verifying and school
Test by when, central controller sends driving signal to driving motor, to drive the locking device of read-write equipment to unlock to real
Bicycle is now shared in the form of brush IC card, and existing shared bicycle method for unlocking is usually that user is obtained and scanning the two-dimensional code
The unlocking cipher of bicycle is got, then with inputting unlocking cipher on the locking device of shared bicycle, and then locking device verifying is unlocked
Unlock after password success, it is this unlock realize shared method due to relying on two dimensional code or bicycle number, therefore in two dimensional code or
When person's bicycle number is by malicious damage, other users can not just unlock, and can not just share bicycle, also so as to cause shared bicycle quilt
Privatization.And the method for unlocking based on IC card of the present embodiment does not depend on two dimensional code or bicycle number, and use and user's account
The IC card of number binding avoids the problems of the prior art as unlocking tool, simultaneously because IC card can store relevant information,
When unlocking, user only needs close to read-write equipment to compile target IC card without scanning the two-dimensional code or inputting bicycle
Number, a series of cumbersome operations such as unlocking cipher, input unlocking cipher are then waited, therefore the embodiment of the present invention can also simplify use
The unlocking step at family, improves user experience.
The unlocking apparatus based on IC card of the embodiment of the present invention also can be applied in shared kitchen tool field, for example, in order to
It realizes that kitchen tools are shared, IC card can be placed on the identification device of shared kitchen tools, identification device reads information in IC card and verifies
Information in IC card, when verification passes through, user can share kitchen tools, and existing kitchen tools sharing method, and need to scan two
Code is tieed up, the information of kitchen tools is got, shared kitchen tools could be used by then inputting password.So, the shared behaviour of kitchen tools is realized
Make step with regard to comparatively laborious.
It should be noted that the embodiment of the present invention is to list certain applications of the method for unlocking of basic IC card,
Under the premise of not departing from inventive concept of the invention, the method for unlocking of the basic IC card of the embodiment of the present invention can apply to other
Utilization scene under, this is not limited by the present invention.
As it can be seen that the relevant information of unlocking can be stored in target IC by the unlocking apparatus based on IC card of the embodiment of the present invention
Card and/or read-write equipment so that the unlocking information of locking device does not expose, and then are avoided because of the exposure of unlocking information, unlocking information
Such issues that by sharing articles caused by malicious damage by privatization, for example, the two dimensional code because sharing bicycle is avoided to be damaged
And lead to shared this problem of bicycle privatization.At the same time, it is stored with unlocking information since IC card can preselect, and reads and writes dress
The information that can be read directly in IC card is set, and then user does not need to scan the two-dimensional code to obtain and open when using sharing articles
Lock cipher, input unlocking cipher are with a series of operation such as unlock, therefore the unlocking apparatus based on IC card that the present invention is implemented has
It is easy to operate, the high advantage of user experience.
Embodiment two
Referring to Fig. 2, Fig. 2 is the flow diagram of the method for unlocking based on IC card disclosed in the embodiment of the present invention two.Its
In, as shown in Fig. 2, being somebody's turn to do the method for unlocking based on IC card may comprise steps of:
201, read-write equipment executes initialization operation;
202, when detecting the unlocking request of user's triggering, read-write equipment requests identification target IC card according to unlocking;
203, read-write equipment verifies target IC card according to preset proof rule;
204, after being proved to be successful, read-write equipment verifies target IC card according to preset business rule;
205, when verifying successfully, read-write equipment controls locking device and opens.
206, read-write equipment records unlocking information, wherein unlocking information includes existing to bind with the mark ID of target IC card
At least one of the User ID of relationship, uncaging time, lockset position of coupler;
207, when detecting the locking request of user's triggering, read-write equipment control locking device locks and records read-write equipment
When time use information, wherein when secondary use information includes shutting the time, shutting location information, uncaging time and User ID
At least one of;
208, read-write equipment ought time use information and unlocking information be sent to Operation Server so that Operation Server
According to the cost of use for working as time use information and unlocking information calculating read-write equipment and cost of use is sent to user terminal.
In embodiments of the present invention, each read-write equipment can all execute initialization operation when being mounted in sharing articles,
To initialize the operating parameter and other data item of read-write equipment, optionally, the parameter of the operation of read-write equipment includes read-write dress
Mark ID of the system time item, read-write equipment set, read-write equipment are slept from triggering access network item, read-write equipment
It sleeps at least one of waiting time, Operation Server access address project, wherein the sleep latency table of read-write equipment
Sign is waiting time of read-write equipment in the case where unattended by running state conversion at low power consumpting state, read-write equipment
From triggering access network item characterization be frequency that read-write equipment independently accesses Operation Server.
In an alternative embodiment, user can register a user account, each user's account by user terminal
It number is all associated with unique ID of user password He the user, user can also be by user terminal login user account, and binds
IC card, in the optional embodiment, optionally, each User ID can bind an IC card, can also bind two or two
Or more IC card, it is further alternative, binding IC card may include operation:
User terminal obtain user input IC card to be bound password, wherein IC card to be bound password setting to
Bind the coated areas of IC card.
The password of IC card to be bound and User ID are sent to Operation Server by user terminal, so that Operation Server root
According to the password of IC card to be bound according to the ID of preset matching rule IC to be bound, and the ID of IC to be bound is tied up with User ID
It is fixed.
In another optional embodiment, user can be that the associated IC card of user account is filled by user terminal
Value, optionally, supplement with money for the associated IC card of user account may include following operation:
When user is triggered on the subscriber terminal for wait supplement when supplementing operation with money of IC card with money, user terminal is to Operation Server
Send charging request, wherein charging request includes the ID of IC card to be supplemented with money, recharge amount, first supplements verification information with money;
Operation Server receives charging request;
Operation Server is supplemented verification information with money to first according to charging information proof rule and is verified;
After supplementing verification information with money and being verified, Operation Server is looked into IC card database according to the ID of IC card to be supplemented with money
Ask the ID of IC card to be supplemented with money;
Operation Server modifies the associated amount of money of ID of IC card to be supplemented with money;
Operation Server returns to successful recharging information to user terminal, and successful recharging packet second supplements verification information with money;
User terminal receives successful recharging information and supplements verification information with money to second according to charging information proof rule and carries out
Verifying, after second, which supplements verification information with money, is verified, user terminal according to recharge amount generate it is new using the time started, it is new
Be using the end time;
The new use end time using the time started, new is written to wait supplement with money in IC card by user terminal.
In embodiments of the present invention, in order to guarantee the Information Security in target IC card, target IC card and read-write equipment it
Between communication can pass through encryption, for example, a certification sub-key can be stored in each target IC card, and each read-write
It is stored with a certification master key on device, optionally, by certification master key write-in read-write equipment and sub-key write-in will be authenticated
IC card can also include following operation:
Terminal is written and generates certification master key according to preset-key create-rule;
Terminal is written, certification sub-key is calculated according to decentralized algorithm according to certification master key;
Write-in terminal will authenticate master key and be written in read-write equipment and save certification sub-key;
Write-in terminal is written to sub-key is authenticated in IC card.
In embodiments of the present invention, optionally, as user by target IC card within the scope of the wireless identification of read-write equipment
When, read-write equipment can automatically begin to identification target IC card, and optionally, read-write equipment identifies that target IC card may include following behaviour
Make:
Read-write equipment judges whether there is target IC card according to request of unlocking within the scope of its wireless identification;
When judging there are when target IC card, read-write equipment reads the relevant information of target IC card, and relevant information includes mesh
Mark the mark ID of IC card, the use end time using initial time and target IC card of target IC card.
In embodiments of the present invention, when the relevant information of target IC card can also include user name, user password, binding
Between, at least one of User ID.
In embodiments of the present invention, optionally, read-write equipment verifies target IC card according to preset proof rule
May include following operation:
An identifying code and temporary identifying code is randomly generated in read-write equipment;
Identifying code is written in target IC card by read-write equipment, so that target IC card is according to the first default generating mode, phase
It closes information and identifying code generates the first MAC code;
Read-write equipment generates the 2nd MAC code according to the first default generating mode, identifying code and relevant information;
Read-write equipment receive target IC card send the first MAC code, and judge the first MAC code whether with the 2nd MAC code one
It causes;
When judging the first MAC code and consistent the 2nd MAC code, read-write equipment determination is proved to be successful target IC card.
In embodiments of the present invention, further alternative, target IC card according to the first default generating mode, relevant information with
And identifying code generates the first MAC code and may comprise steps of:
Successively relevant information, identifying code are handled and generate the sub-block that several length are a byte long;
According to DES algorithm, successively several more sub-blocks are handled, and splice the processing result of each sub-block
Generate the total data block that a length is 8 bytes;
Using certification master key as encryption parameter and total data block is handled according to DES algorithm and generates the first MAC
Code.
In embodiments of the present invention, optionally, read-write equipment verifies target IC card according to preset business rule
Include:
Read-write equipment is inquired in forbidding unlocking ID list using the mark ID of target IC card as querying condition, to judge to prohibit
Only whether unlocking ID list includes mark ID and generates query result;
When query result is that unlocking ID list is forbidden not include mark ID, read-write equipment rises according to the use of target IC card
When the beginning, target IC card using end time, default service life judgment rule judge whether the service life of target IC card arrives
Phase, if judging result is no, it is determined that the verification of target IC card is passed through.It is further alternative, when query result is to forbid unlocking
When ID list includes mark ID, read-write equipment generates refusal unlocking information.
In embodiments of the present invention, further alternative, when read-write equipment is originated according to the use of target IC card, target
When judging that the service life of target IC card has expired using end time, default service life judgment rule of IC card, then read and write
Device determines that the verification of target IC card does not pass through.It is further alternative, when read-write equipment determine target IC card verification it is obstructed out-of-date, read
Write device initiation operation is renewed to target IC card, wherein read-write equipment initiate include: to the operation that renews of target IC card
Read-write equipment takes first that target IC card generates at random to renew code and obtains target IC card according to the second default life
The 3rd MAC code of code generation is renewed at mode, relevant information and first;
Read-write equipment renews code, the 3rd MAC code and relevant information for first and is sent to Operation Server, so that operation clothes
Business device generate the 4th MAC code and second renew code, when judging that the 3rd MAC code is identical as the 4th MAC code generation the 5th MAC
Code;
Read-write equipment receive Operation Server send renew information, the 5th MAC code and second renews code;
Read-write equipment renews second code, the 5th MAC code and renews information and is written in target IC card, so that target IC card
It generates the 6th MAC code and is enabled when the 6th MAC code is identical as the 5th MAC code and renew information, renewing information includes new use
Initial time and new use end time;
What read-write equipment reception target IC card was sent renews successfully prompting message, and will renew successfully prompting message and be sent to
Operation Server.
In embodiments of the present invention, further optional, target IC card is according to the second default generating mode, relevant information
And first renew code generation the 3rd MAC code may include following operation:
The subdata that code is handled and generates several length as a byte long successively is renewed to relevant information, first
Block;
According to DES algorithm, successively several more sub-blocks are handled, and splice the processing result of each sub-block
Generate the total data block that a length is 8 bytes;
Using certification master key as encryption parameter and total data block is handled according to DES algorithm and generates the 3rd MAC
Code.
In embodiments of the present invention, it since the mark ID of every IC card and identifying code are all randomly generated, therefore produces every time
Raw MAC code is all different, so that MAC can not be reused, and due to only in target IC card and read-write equipment
Under the conditions of the MAC code of generation is consistent, mutual data can be just received between target IC card and read-write equipment, are so just mentioned
The authentication security of high IC card.
In another optional embodiment, the method for unlocking based on IC card of the embodiment of the present invention can also include following
Operation:
Read-write equipment sends to be directed to according to default access frequency to Operation Server forbids the update of unlocking ID list to request,
So that Operation Server, which receives, forbids unlocking ID table to read-write equipment return is updated after update is requested;
Read-write equipment reception is updated to forbid unlocking ID table, and unlocking ID list will be forbidden to replace with updated forbid
Unlocking ID table.
It is stored in the optional embodiment, in read-write equipment and forbids unlocking ID table, wherein forbid protecting in unlocking ID table
There are several records for being prohibited from using IC card user, record may each comprise User ID daily.Meanwhile forbidding unlocking ID table
Can be generated under a variety of occasions, and multiple terminals or multiple platforms can be shared on, for example, when some user's brush IC card into
Enter subway station, and the not brush IC card in subway station out, in this case, the ticket checking terminal of subway station is into can be by the ID of the IC card
It is added to and forbids in unlocking ID table, and update into Operation Server, so, read-write equipment of the invention can be from fortune
It is obtained in battalion's server and forbids unlocking ID table, forbid unlocking ID table to realize and share.It is optional in the optional embodiment
, it can be access per hour according to default access frequency and once, be also possible to once a day, this is not limited by the present invention.
In the optional embodiment, when some user is lost the IC card of its binding, which can be to operation
Server proposes that IC card is freezed to apply, so that the ID for the IC card that the needs freeze is added to by Operation Server forbids unlocking ID
Card, and then other users can not take the IC card freezed to realize unlocking operation, further alternative, Operation Server freezes IC
Card may include following operation:
Operation Server receives user triggering to be freezed to apply for a certain IC card to be freezed, wherein freezes to apply
Mark ID and user information including IC card to be freezed;
Operation Server inquires the authentication information of IC card to be freezed using the mark ID of IC card to be freezed as querying condition;
Whether Operation Server interpretation authentication information is consistent with user information, if so, by the mark ID of IC card to be freezed,
If it is not, then returning to user information authentication failed information to the user terminal where user.
Forbid unlocking ID table as it can be seen that can update by network in the alternative embodiment, and then reads some IC
After the ID of card, according to unlocking IC table is forbidden, judge that can the IC card use, so, so that it may limit non-normal use
User uses sharing articles, further decreases sharing articles by privately owned risk.Meanwhile the alternative embodiment can be limited and is frozen
Knot IC card continues to use, to improve the safety in utilization of IC card.
Embodiment three
Referring to Fig. 3, Fig. 3 is the structural schematic diagram of the unlocking apparatus disclosed by the embodiments of the present invention based on IC card.Such as Fig. 3
Shown, being somebody's turn to do the unlocking apparatus based on IC card may include:
Identification module 301, for identifying target IC card and reading the correlation of target IC card when user triggers and unlocks request
Information, relevant information include the mark ID of target IC card;
Authentication module 302, for when identification module 301 identify target IC card and read target IC card relevant information it
Afterwards, relevant information is verified according to preset proof rule;
Correction verification module 303 is for being verified and being worked as to relevant information according to preset proof rule in authentication module 302
After relevant information is proved to be successful, relevant information is verified according to preset business rule;
Drive module 304, after correction verification module 303 verifies relevant information success, control locking device is opened.
In embodiments of the present invention, identification module 301, authentication module 302, correction verification module 303, drive module 304 are
A kind of program function module, the program function module can be in this kind of hardware realizations such as read-write equipment, IC card.Optionally, it reads and writes
Device can be frequency read/write, wherein frequency read/write include radio-frequency module, network communication module, SAM module, antenna, in
Entreat controller, driving motor, I/O port.Wherein, radio-frequency module is used to send the radiofrequency signal of predeterminated frequency, and antenna is pre- for receiving
If the radiofrequency signal of frequency.SAM module includes SAM chip, and optionally, SAM chip may include pre-stored certification master
Key, and central controller can be single-chip microcontroller, driving motor is connect with the locking device being arranged in sharing articles, and such one
Come, read-write equipment can detect whether to carry out to detect target there are target IC card within the scope of the wireless identification of antenna
When IC card, radio-frequency module emits the communication between radiofrequency signal realization and target IC card, and then central controller is according to SAM chip
Data and the data of target IC card control drive module it is final to realize that article is total so that driving motor drives locking device to unlock
It enjoys.Further alternative, frequency read/write can also include network communication module, wherein it is logical that network communication module can be 2G
Believe module, be also possible to 3G communication module, 4G communication module or other can realize the communication module of telecommunication, network communication mould
Block can be communicated with remote server, for example, communicating with Operation Server.
In embodiments of the present invention, optionally, read-write equipment can also include display screen, buzzer, wherein display screen is used
In display reminding information, for example, display screen can when target IC card is identified by reading radio-frequency module and read service life therein
To show service life information, so, user can know the remaining access times of target IC card in time, so that
User supplements with money in time in the case where the remaining access times of target IC card are few.
In embodiments of the present invention, optionally, read-write equipment can be there are two types of working condition, the first working condition is low
Power consumption state is for second operating status, and the default conditions of read-write equipment are low power consumpting state.When some user needs to open
When lock or locking, which, which can press, opens key so that read-write equipment is converted to operating status from low power consumpting state, at this point,
Read-write equipment starts to identify target IC card.When not having user to need to unlock or lock, read-write equipment can will within the default time limit
State is low power consumpting state by running state conversion, to reduce power consumption.It should be noted that read-write equipment can also there are three types of or
Three kinds or more of working condition, this is not limited by the present invention.
In embodiments of the present invention, target IC card is that certain is just used by a user in unlocking and can be identified by read-write equipment
IC card, wherein IC card can be non-contact IC card, be also possible to Contact Type Ic Card, and this is not limited by the present invention.It is preferred that
, the IC card of the embodiment of the present invention selects non-contact IC card, wherein the non-contact IC card may include antenna, resonance
Circuit, control chip, wherein the antenna of IC card can receive the radiofrequency signal of predeterminated frequency, and resonance circuit can be according to IC card
The received radiofrequency signal of antenna generate work charge, control chip can work under the driving of work charge.Further and
Optionally, control chip includes central controller (such as EEPROM (Electrically Erasable Programmable
Read only memory, band electric erazable programmable read-write memory)), memory, wherein being previously stored in memory can
The program executed by central controller.
The unlocking apparatus based on IC card of the embodiment of the present invention can be used for shared bicycle field.For example, in shared bicycle
Field, each shared bicycle can install the read-write equipment that can be identified target IC card and read target IC card, and then work as
Some user close to read-write equipment and when read-write equipment recognizes target IC card within the scope of wireless identification, reads target IC card
Write device installs preset proof rule and verification rule verifies the information in target IC card, verifies, when verifying and school
Test by when, central controller sends driving signal to driving motor, to drive the locking device of read-write equipment to unlock to real
Bicycle is now shared in the form of brush IC card, and existing shared bicycle method for unlocking is usually that user is obtained and scanning the two-dimensional code
The unlocking cipher of bicycle is got, then with inputting unlocking cipher on the locking device of shared bicycle, and then locking device verifying is unlocked
Unlock after password success, it is this unlock realize shared method due to relying on two dimensional code or bicycle number, therefore in two dimensional code or
When person's bicycle number is by malicious damage, other users can not just unlock, and can not just share bicycle, also so as to cause shared bicycle quilt
Privatization.And the method for unlocking based on IC card of the present embodiment does not depend on two dimensional code or bicycle number, and use and user's account
The IC card of number binding avoids the problems of the prior art as unlocking tool, simultaneously because IC card can store relevant information,
When unlocking, user only needs close to read-write equipment to compile target IC card without scanning the two-dimensional code or inputting bicycle
Number, a series of cumbersome operations such as unlocking cipher, input unlocking cipher are then waited, therefore the embodiment of the present invention can also simplify use
The unlocking step at family, improves user experience.
The unlocking apparatus based on IC card of the embodiment of the present invention also can be applied in shared kitchen tool field, for example, in order to
It realizes that kitchen tools are shared, IC card can be placed on the identification device of shared kitchen tools, identification device reads information in IC card and verifies
Information in IC card, when verification passes through, user can share kitchen tools, and existing kitchen tools sharing method, and need to scan two
Code is tieed up, the information of kitchen tools is got, shared kitchen tools could be used by then inputting password.So, the shared behaviour of kitchen tools is realized
Make step with regard to comparatively laborious.
It should be noted that the embodiment of the present invention is to list certain applications of the method for unlocking of basic IC card,
Under the premise of not departing from inventive concept of the invention, the method for unlocking of the basic IC card of the embodiment of the present invention can apply to other
Utilization scene under, this is not limited by the present invention.
As it can be seen that the relevant information of unlocking can be stored in target IC by the unlocking apparatus based on IC card of the embodiment of the present invention
Card and/or read-write equipment so that the unlocking information of locking device does not expose, and then are avoided because of the exposure of unlocking information, unlocking information
Such issues that by sharing articles caused by malicious damage by privatization, for example, avoid the two dimensional code of shared bicycle from being damaged and
Caused shared this problem of bicycle privatization.At the same time, it is stored with unlocking information since IC card can preselect, and reads and writes dress
It sets the information that can be read directly in IC card, and then user is when using sharing articles, does not need to scan the two-dimensional code and get out
The a series of operations such as lock cipher, input unlocking cipher, therefore the unlocking apparatus based on IC card that the present invention is implemented has operation letter
Just, the high advantage of user experience.
Example IV
Referring to Fig. 4, Fig. 4 is a kind of structural schematic diagram of unlocking apparatus based on IC card disclosed by the embodiments of the present invention.
As shown in figure 4, being somebody's turn to do the unlocking apparatus based on IC card includes identification module 301, authentication module 302, correction verification module 303, driving mould
It can also include initialization module 305, logging modle 306, settlement module 307 except block 304.
In embodiments of the present invention, initialization module 305 is used to identify target IC card in identification module 301 and reads target
Before the relevant information of IC card, initialization operation is executed, wherein initialization operation may include step read-write equipment according to preset
Initialization rule initialization operating parameter.Each read-write equipment can all execute initialization operation when being mounted in sharing articles,
To initialize the operating parameter evidence of read-write equipment.Optionally, when the parameter of the operation of read-write equipment includes the system of read-write equipment
Between item, read-write equipment mark ID, read-write equipment from triggering access network item, read-write equipment sleep latency
At least one of item, Operation Server access address project, wherein the sleep latency characterization of read-write equipment is read-write
Device is in the case where unattended by running state conversion at the waiting time of low power consumpting state, the triggering visit certainly of read-write equipment
Ask network item characterization is the frequency that read-write equipment independently accesses Operation Server.
In embodiments of the present invention, further alternative, initialization operation can also include that read-write equipment receives write-in eventually
Certification master key that end is sent, being generated according to preset-key create-rule, wherein the certification master key is recognized with target IC card
Demonstrate,proving is dispersion relation between sub-key.Further optional, the relevant information of target IC card further includes certification sub-key.
In embodiments of the present invention, logging modle 306, for recording after drive module 304 controls locking device and opens
Unlocking information, wherein the unlocking information may include that there are when the User ID of binding relationship, unlocking with the mark ID of target IC card
Between, at least one of lockset position of coupler.
Logging modle 306 is also used to when detecting the locking request of user's triggering, and record shuts information, wherein the pass
Lock information may include shut the time, shut position, there are in the User ID of binding relationship at least one by the mark ID of target IC card
Kind.
In embodiments of the present invention, settlement module 307 is used to shut information in the record read-write equipment of logging modle 306
Afterwards, information will be shut, unlocking information is sent to Operation Server so that Operation Server is according to shutting information and unlocking information
User is calculated to need the cost of use paid and cost of use is sent to user terminal.
In embodiments of the present invention, identification module 301 may include the first judging submodule 3011, reading submodule
3012, in which:
First judging submodule 3011, for judging whether there is target within the scope of its wireless identification according to request of unlocking
IC card;
Reading submodule 3012 reads target there are when target IC card for judging in the first judging submodule 3011
The relevant information of IC card, relevant information include the use initial time and target IC of the mark ID of target IC card, target IC card
Card uses the end time.
In embodiments of the present invention, authentication module 302 may include that identifying code generates submodule 3021, write-in submodule
3022, MAC code generates submodule 3023, the first receiving submodule 3024, second judgment submodule 3025, in which:
Identifying code generates submodule 3021, for an identifying code and temporary identifying code to be randomly generated;
Submodule 3022 is written, an identifying code and temporary verifying is randomly generated for generating submodule 3021 in identifying code
Code after, identifying code is written in target IC card so that target IC card according to the first default generating mode, relevant information and
Identifying code generates the first MAC code;
MAC code generates submodule 3023, for generating second according to the first default generating mode, identifying code and relevant information
MAC code;
First receiving submodule 3024, for receiving the first MAC code of target IC card transmission;
Second judgment submodule 3025 receives the first MAC of target IC card transmission for the first receiving submodule 3024
After code, judge whether the first MAC code is consistent with the 2nd MAC code, when judging the first MAC code and consistent the 2nd MAC code, then
Determine that target IC card is proved to be successful.
In embodiments of the present invention, further alternative, target IC card according to the first default generating mode, relevant information with
And identifying code generates the first MAC code and may comprise steps of:
Successively relevant information, identifying code are handled and generate the sub-block that several length are a byte long;
According to DES algorithm, successively several more sub-blocks are handled, and splice the processing result of each sub-block
Generate the total data block that a length is 8 bytes;
Using certification master key as encryption parameter and total data block is handled according to DES algorithm and generates the first MAC
Code.
It should be noted that in embodiments of the present invention, identifying code is written in target IC card by write-in submodule 3022
Afterwards, MAC code can be triggered and generate the starting of submodule 3023;MAC code generate submodule 3023 according to the first default generating mode, test
After demonstrate,proving code and relevant information the 2nd MAC code of generation, the execution of the first receiving submodule 3024 can be triggered.
In embodiments of the present invention, correction verification module 303 may include inquiry submodule 3031, third judging submodule
3032, submodule 3033, the first cue module 3034 are renewed, in which:
Inquiry submodule 3031 is looked into forbidding unlocking ID list for the mark ID using target IC card as querying condition
It askes, forbids whether unlocking ID list includes mark ID with inquiry, if query result is that unlocking ID list is forbidden not include mark ID,
Then trigger the execution of third judging submodule 3032.
Third judging submodule 3032, in inquiry submodule 3031 judging that unlocking ID list is forbidden not include mark
When ID, according to being sentenced using initial time, the use end time of target IC card, default service life judgment rule for target IC card
Whether the service life of disconnected target IC card expires, if judging result is no, it is determined that passes through to the verification of target IC card;If judgement knot
Fruit is yes, it is determined that the verification of target IC card does not pass through.
Submodule 3033 is renewed, for determining that the verification of target IC card is obstructed out-of-date in third judging submodule 3032, is initiated
Operation is renewed to target IC card;
First cue module 3034, for being that unlocking ID list is forbidden to include mark when inquiry 3031 query result of submodule
When ID, refusal unlocking information is generated.
In embodiments of the present invention, renewing that submodule 3033 initiates can be with to the concrete mode for renewing operation of target IC card
The following steps are included:
Obtain target IC card generate at random first renew code and obtain target IC card according to the second default generating mode,
Relevant information and first renew code generation the 3rd MAC code;
Code, the 3rd MAC code and relevant information are renewed by first and is sent to Operation Server, so that Operation Server generates
4th MAC code and second renew code, when judging that the 3rd MAC code is identical as the 4th MAC code generate the 5th MAC code
Receive Operation Server send renew information, the 5th MAC code and second renews code;
It renews code, the 5th MAC code by second and renews information and be written in target IC card, so that target IC card generates the 6th
MAC code and when the 6th MAC code is identical as the 5th MAC code enable renew information, renewing information includes new use initial time
And the new use end time;
Receive the transmission of target IC card renews successfully prompt information, and will renew successfully prompt information and be sent to operating service
Device.
In embodiments of the present invention, further optional, target IC card is according to the second default generating mode, relevant information
And first renew code generation the 3rd MAC code may include following operation:
The subdata that code is handled and generates several length as a byte long successively is renewed to relevant information, first
Block;
According to DES algorithm, successively several more sub-blocks are handled, and splice the processing result of each sub-block
Generate the total data block that a length is 8 bytes;
Using certification master key as encryption parameter and total data block is handled according to DES algorithm and generates the 3rd MAC
Code.
In the embodiment of the present invention, initialization module 305 is also used to send needle to Operation Server according to default access frequency
The update for forbidding unlocking ID list is requested so that Operation Server receive update request after to read-write equipment return it is updated
Forbid unlocking ID table;
Read-write equipment reception is updated to forbid unlocking ID table, and unlocking ID list will be forbidden to replace with updated forbid
Unlocking ID table.
It is stored in the unlocking apparatus based on IC card of the embodiment of the present invention and forbids unlocking ID table, wherein forbid unlocking ID
Several records for being prohibited from using IC card user are preserved in table, record may each comprise User ID daily.Meanwhile forbidding out
Lock ID table can generate under a variety of occasions, and can be shared on multiple terminals or multiple platforms, for example, when some user brushes
IC card enters subway station, and the not brush IC card in subway station out, and in this case, the ticket checking terminal of subway station is into can be by the IC
The ID of card, which is added to, to be forbidden in unlocking ID table, and is updated into Operation Server, and so, read-write equipment of the invention can
Forbid unlocking ID table to obtain from Operation Server, forbids unlocking ID table to realize and share.In the optional embodiment,
Optionally, it can be access per hour according to default access frequency once, to be also possible to once a day, the present invention does not limit this
It is fixed.
In an alternative embodiment, the unlocking apparatus based on IC card can be with user terminal, Operation Server, write-in
Terminal communication, to complete data interaction, wherein user terminal can be the end PC, be also possible to mobile terminal, and the present invention does not make this
It limits.
In the optional embodiment, when some user is lost the IC card of its binding, which can be to operation
Server proposes that IC card is freezed to apply, so that the ID for the IC card that the needs freeze is added to by Operation Server forbids unlocking ID
Card, and then other users can not take the IC card freezed to realize unlocking operation, further alternative, Operation Server freezes IC
Card may include following operation:
Operation Server receives user triggering to be freezed to apply for a certain IC card to be freezed, wherein freezes to apply
Mark ID and user information including IC card to be freezed;
Operation Server inquires the authentication information of IC card to be freezed using the mark ID of IC card to be freezed as querying condition;
Whether Operation Server interpretation authentication information is consistent with user information, if so, by the mark ID of IC card to be freezed,
If it is not, then returning to user information authentication failed information to the user terminal where user.
In an alternative embodiment, user can register a user account, each user's account by user terminal
It number is all associated with unique ID of user password He the user, user can also be by user terminal login user account, and binds
IC card, in the optional embodiment, optionally, each User ID can bind an IC card, can also bind two or two
Or more IC card, it is further alternative, binding IC card may include operation:
User terminal obtain user input IC card to be bound password, wherein IC card to be bound password setting to
Bind the coated areas of IC card.
The password of IC card to be bound and User ID are sent to Operation Server by user terminal, so that Operation Server root
According to the password of IC card to be bound according to the ID of preset matching rule IC to be bound, and the ID of IC to be bound is tied up with User ID
It is fixed.
In the optional embodiment, optionally, user can by user terminal be the associated IC card of user account into
Row is supplemented with money, and optionally, supplement with money for the associated IC card of user account may include following operation:
When user is triggered on the subscriber terminal for wait supplement when supplementing operation with money of IC card with money, user terminal is to Operation Server
Send charging request, wherein charging request includes the ID of IC card to be supplemented with money, recharge amount, first supplements verification information with money;
Operation Server receives charging request;
Operation Server is supplemented verification information with money to first according to charging information proof rule and is verified;
After supplementing verification information with money and being verified, Operation Server is looked into IC card database according to the ID of IC card to be supplemented with money
Ask the ID of IC card to be supplemented with money;
Operation Server modifies the associated amount of money of ID of IC card to be supplemented with money;
Operation Server returns to successful recharging information to user terminal, and successful recharging packet second supplements verification information with money;
User terminal receives successful recharging information and supplements verification information with money to second according to charging information proof rule and carries out
Verifying, after second, which supplements verification information with money, is verified, user terminal according to recharge amount generate it is new using the time started, it is new
Be using the end time;
The new use end time using the time started, new is written to wait supplement with money in IC card by user terminal.
In the optional embodiment, in order to guarantee the Information Security in target IC card, target IC card and read-write equipment
Between communication can pass through encryption, for example, a certification sub-key can be stored in each target IC card, and each reading
It is stored with a certification master key on write device, optionally, certification master key is written to read-write equipment and sub-key will be authenticated
Be written in IC card may include following operation:
Terminal is written and generates certification master key according to preset-key create-rule;
Terminal is written, certification sub-key is calculated according to decentralized algorithm according to certification master key;
Write-in terminal will authenticate master key and be written in read-write equipment and save certification sub-key;
Write-in terminal is written to sub-key is authenticated in IC card.
Forbid unlocking ID table as it can be seen that can update by network in the alternative embodiment, and then reads some IC
After the ID of card, according to unlocking IC table is forbidden, judge that can the IC card use, so, so that it may limit non-normal use
User uses sharing articles, further decreases sharing articles by privately owned risk.Meanwhile the alternative embodiment can be limited and is frozen
Knot IC card continues to use, to improve the safety in utilization of IC card.
Embodiment five
Referring to Fig. 5, Fig. 5 is the structural representation of another unlocking apparatus based on IC card disclosed in the embodiment of the present invention five
Figure.As shown in figure 5, the unlocking apparatus based on IC card may include:
It is stored with the memory 501 of executable program code;
The processor 502 coupled with memory 501;
Processor 502 calls the executable program code stored in memory 501, executes embodiment one into embodiment two
Step in method for unlocking based on IC card described in any one embodiment.
The unlocking apparatus of the embodiment of the present invention can provide a kind of behaviour by executing the method for unlocking based on IC card for user
Make unlocking mode simple, that unlocking step is few, meanwhile, the embodiment of the present invention, can by executing the method for unlocking based on IC card
Reduce such issues that sharing articles are by malice privatization.
Embodiment six
The embodiment of the present invention six discloses a kind of computer readable storage medium, stores based on electronic data interchange
Calculation machine program, wherein the computer program makes computer execute any one the embodiment institute into embodiment two of embodiment one
Step in the method for unlocking based on IC card of description.
The computer readable storage medium of the embodiment of the present invention can be user by executing the method for unlocking based on IC card
A kind of unlocking mode easy to operate, unlocking step is few is provided, meanwhile, the embodiment of the present invention is by executing the unlocking based on IC card
Method can reduce such issues that sharing articles are by malice privatization.
Embodiment seven
The embodiment of the invention discloses a kind of computer program product, which includes storing computer
The non-transient computer readable storage medium of program, and the computer program be operable to make computer execute embodiment one to
Step in embodiment two in the method for unlocking based on IC card described in any one embodiment.
The computer program product of the embodiment of the present invention can be provided by executing the method for unlocking based on IC card for user
A kind of unlocking mode easy to operate, unlocking step is few, meanwhile, the embodiment of the present invention is by executing the unlocking side based on IC card
Method can reduce such issues that sharing articles are by malice privatization.
Installation practice described above is only illustrative, wherein as illustrated by the separation member unit can be or
Person, which may not be, to be physically separated, and component shown as a unit may or may not be physical unit
With in one place, or may be distributed over multiple network units.Portion therein can be selected according to the actual needs
Point or whole module achieve the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creative labor
In the case where, it can it understands and implements.
By the specific descriptions of above embodiment, those skilled in the art can be understood that each embodiment
It can realize by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding,
Substantially the part that contributes to existing technology can be embodied in the form of software products above-mentioned technical proposal in other words,
The computer software product may be stored in a computer readable storage medium, and storage medium includes read-only memory (Read-
Only Memory, ROM), random access memory (RandomAccess Memory, RAM), programmable read only memory
(Programmable Read-only Memory, PROM), Erasable Programmable Read Only Memory EPROM (Erasable
Programmable Read Only Memory, EPROM), disposable programmable read-only memory (One-time
Programmable Read-Only Memory, OTPROM), the electronics formula of erasing can make carbon copies read-only memory
(Electrically-Erasable Programmable Read-Only Memory, EEPROM), CD-ROM (Compact
Disc Read-Only Memory, CD-ROM) or other disc memories, magnetic disk storage, magnetic tape storage or can
For carrying or any other computer-readable medium of storing data.
Claims (10)
1. a kind of method for unlocking based on IC card, which is characterized in that the method for unlocking includes:
When detecting the unlocking request of user's triggering, read-write equipment requests identification target IC card according to the unlocking;
The read-write equipment verifies the target IC card according to preset proof rule, after being proved to be successful, the reading
Write device verifies the target IC card according to preset business rule;
When verifying successfully, the read-write equipment control locking device is opened.
2. method for unlocking as described in claim 1, which is characterized in that the read-write equipment identifies target IC card, comprising:
The read-write equipment judges whether there is the target IC card according to unlocking request within the scope of its wireless identification;
When judging that the read-write equipment reads the relevant information of the target IC card, the phase there are when the target IC card
Closing information includes that the mark ID of the target IC card, the target IC card are made using initial time and the target IC card
Use the end time;
And the read-write equipment verify to the target IC card and includes: according to preset proof rule
The read-write equipment is randomly generated an identifying code and keeps in the identifying code;
The identifying code is written in the target IC card by the read-write equipment, so that the target IC card is default according to first
Generating mode, the relevant information generate the first MAC code;
The read-write equipment generates the 2nd MAC according to the described first default generating mode, the identifying code and the relevant information
Code;
The read-write equipment receives the first MAC code that the target IC card is sent, and judge the first MAC code whether with
The 2nd MAC code is consistent;
When judging that the first MAC code and the 2nd MAC code are consistent, the read-write equipment is determined to the target IC card
It is proved to be successful.
3. method for unlocking as described in claim 1, which is characterized in that the read-write equipment is according to preset business rule to institute
It states target IC card and verify and include:
The read-write equipment inquires institute in forbidding unlocking ID list using the mark ID of the target IC card as querying condition
It states and forbids whether unlocking ID list includes the mark ID and generate query result;
When the query result forbids unlocking ID list not include the mark ID for described in, the read-write equipment is according to
When the use starting of target IC card, the use end time of the target IC card, preset service life judgment rule
Judge whether the service life of the target IC card expires, if judging result is no, it is determined that verify to the target IC card logical
It crosses;
Wherein, the method also includes:
When the query result forbids unlocking ID list to include the mark ID for described in, the read-write equipment generates refusal and opens
Lock information;
And the method also includes:
When the read-write equipment according to the target IC card it is described using originate when, the target IC card the use terminate
When time, default service life judgment rule judge that the service life of the target IC card has expired, then the read-write equipment is true
The fixed target IC card verification does not pass through.
4. method for unlocking as claimed in claim 3, which is characterized in that the method also includes:
When the read-write equipment determines that the target IC card verification is obstructed out-of-date, the read-write equipment is initiated to the target IC card
Renew operation, wherein read-write equipment initiation includes: to the operation that renews of the target IC card
The read-write equipment obtain the target IC card generates at random first renew code and obtain the target IC card according to
Second default generating mode, the relevant information and described first renew the 3rd MAC code of code generation;
The read-write equipment renews code, the 3rd MAC code and the relevant information for described first and is sent to Operation Server,
So that the Operation Server generates the 4th MAC code and second renews code, judging the 3rd MAC code and the 4th MAC
The 5th MAC code is generated when code is identical;
The read-write equipment receives the described of Operation Server transmission and renews information, the 5th MAC code and described second
Renew code;
The read-write equipment renews code, the 5th MAC code and the information that renews for described second and is written to the target IC
In card, so that the target IC card generates the 6th MAC code and enables when the 6th MAC code is identical as the 5th MAC code
Described to renew information, the information that renews includes the new use end time using initial time and newly;
The method also includes:
The read-write equipment receives the prompting message that renews successfully of the target IC card transmission, and described renew successfully is prompted to disappear
Breath is sent to the Operation Server.
5. such as the described in any item method for unlocking of claim 2-4, which is characterized in that the relevant information of the target IC card
It further include certification sub-key;
And before the read-write equipment identifies target IC card and reads the relevant information of the target IC card, the unlocking side
Method further include:
The read-write equipment executes initialization operation, wherein the read-write equipment executes initialization operation and includes:
The read-write equipment receives certification master key that write-in terminal is sent, generating according to preset-key create-rule, described
Authenticating the relationship between the certification sub-key in master key and the relevant information is dispersion relation.
6. method for unlocking as described in claim 1, which is characterized in that after the read-write equipment control locking device is opened, institute
State method for unlocking further include:
The read-write equipment records unlocking information, wherein the unlocking information includes existing with the mark ID of the target IC card
At least one of the User ID of binding relationship, uncaging time, lockset position of coupler;
And the method for unlocking further include:
When detecting the locking request of user's triggering, the read-write equipment controls the locking device and locks and record described
Read-write equipment shuts information, wherein the information that shuts includes shutting the time, shutting location information and the User ID
At least one of;
The read-write equipment shuts information and the unlocking information is sent to Operation Server for described, so that the operation takes
Business device shuts information according to and the unlocking information calculates cost of use that user's needs are paid and by the use
Expense is sent to user terminal.
7. method for unlocking as claimed in claim 3, which is characterized in that the method for unlocking further include:
The read-write equipment is sent to Operation Server for the update for forbidding unlocking ID list according to default access frequency
Request, so that the Operation Server, which receives, forbids unlocking ID to read-write equipment return is updated after the update is requested
Table;
The read-write equipment receive it is described it is updated forbid unlocking ID table, and to forbid unlocking ID list to replace with described by described
It is updated to forbid unlocking ID table.
8. a kind of read-write equipment based on IC card, which is characterized in that the read-write equipment includes:
Identification module, for when user triggers and unlocks request, identifying target IC card and reading the related letter of the target IC card
Breath, the relevant information includes the mark ID of the target IC card;
Authentication module, for identifying target IC card and after read the relevant information of the target IC card when the identification module,
The relevant information is verified according to preset proof rule;
Correction verification module, for verify to the relevant information according to preset proof rule in the authentication module and working as institute
It states after relevant information is proved to be successful, verifies the relevant information according to preset business rule;
Drive module, for after the correction verification module verifies relevant information success, control locking device to be opened.
9. a kind of read-write equipment based on IC card, which is characterized in that the read-write equipment includes:
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes as claim 1-7 is any
The method for unlocking based on IC card described in.
10. a kind of computer readable storage medium, which is characterized in that include being based on IC card in the computer readable storage medium
Unlocking program, when the unlocking program based on IC card is executed by processor, execute as claim 1-7 it is described in any item
Method for unlocking based on IC card.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811558799.0A CN109754505B (en) | 2018-12-19 | 2018-12-19 | Unlocking method and device based on IC card |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811558799.0A CN109754505B (en) | 2018-12-19 | 2018-12-19 | Unlocking method and device based on IC card |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109754505A true CN109754505A (en) | 2019-05-14 |
CN109754505B CN109754505B (en) | 2022-07-12 |
Family
ID=66403739
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811558799.0A Active CN109754505B (en) | 2018-12-19 | 2018-12-19 | Unlocking method and device based on IC card |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109754505B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110473329A (en) * | 2019-09-25 | 2019-11-19 | 永安行科技股份有限公司 | Access card approaches to IM, management system and intelligent terminal |
CN111383371A (en) * | 2020-04-29 | 2020-07-07 | 珠海格力电器股份有限公司 | Unlocking method, door lock, server, system, storage medium and electronic device |
CN113470224A (en) * | 2021-06-16 | 2021-10-01 | 支付宝(杭州)信息技术有限公司 | Unlocking method and system |
CN114743294A (en) * | 2022-03-29 | 2022-07-12 | 中汽创智科技有限公司 | Unlocking device, shared device unlocking method, device and storage medium |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000046955A1 (en) * | 1999-02-05 | 2000-08-10 | Australian Arrow Pty Ltd. | Bi-directional coding system for remote control device security |
CN101667308A (en) * | 2008-09-04 | 2010-03-10 | 日电(中国)有限公司 | Access control system, access control devices, access card and access control method |
CN102118250A (en) * | 2011-01-10 | 2011-07-06 | 上海众人网络安全技术有限公司 | System and method for indentifying dynamic password based on double-interface intelligent card |
EP2584541A1 (en) * | 2011-10-18 | 2013-04-24 | EVVA Sicherheitstechnologie GmbH | Method for access control |
CN103136819A (en) * | 2011-12-01 | 2013-06-05 | 联想(北京)有限公司 | Unlocking method for door control system based on mobile terminal and mobile terminal |
JP2013185346A (en) * | 2012-03-07 | 2013-09-19 | Miwa Lock Co Ltd | Entrance/exit management system |
CN104851169A (en) * | 2015-05-25 | 2015-08-19 | 惠州Tcl移动通信有限公司 | Wireless smart lock and unlocking control method thereof |
CN105827577A (en) * | 2015-01-08 | 2016-08-03 | 阿里巴巴集团控股有限公司 | Method and device for information verification |
CN106850235A (en) * | 2017-04-08 | 2017-06-13 | 普拉斯旺(深圳)商贸有限公司 | A kind of identity identifying method |
CN108320152A (en) * | 2018-01-17 | 2018-07-24 | 深圳喆行科技有限公司 | A kind of recharge method and system of stored value card |
-
2018
- 2018-12-19 CN CN201811558799.0A patent/CN109754505B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000046955A1 (en) * | 1999-02-05 | 2000-08-10 | Australian Arrow Pty Ltd. | Bi-directional coding system for remote control device security |
CN101667308A (en) * | 2008-09-04 | 2010-03-10 | 日电(中国)有限公司 | Access control system, access control devices, access card and access control method |
CN102118250A (en) * | 2011-01-10 | 2011-07-06 | 上海众人网络安全技术有限公司 | System and method for indentifying dynamic password based on double-interface intelligent card |
EP2584541A1 (en) * | 2011-10-18 | 2013-04-24 | EVVA Sicherheitstechnologie GmbH | Method for access control |
CN103136819A (en) * | 2011-12-01 | 2013-06-05 | 联想(北京)有限公司 | Unlocking method for door control system based on mobile terminal and mobile terminal |
JP2013185346A (en) * | 2012-03-07 | 2013-09-19 | Miwa Lock Co Ltd | Entrance/exit management system |
CN105827577A (en) * | 2015-01-08 | 2016-08-03 | 阿里巴巴集团控股有限公司 | Method and device for information verification |
CN104851169A (en) * | 2015-05-25 | 2015-08-19 | 惠州Tcl移动通信有限公司 | Wireless smart lock and unlocking control method thereof |
CN106850235A (en) * | 2017-04-08 | 2017-06-13 | 普拉斯旺(深圳)商贸有限公司 | A kind of identity identifying method |
CN108320152A (en) * | 2018-01-17 | 2018-07-24 | 深圳喆行科技有限公司 | A kind of recharge method and system of stored value card |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110473329A (en) * | 2019-09-25 | 2019-11-19 | 永安行科技股份有限公司 | Access card approaches to IM, management system and intelligent terminal |
CN110473329B (en) * | 2019-09-25 | 2021-08-20 | 永安行科技股份有限公司 | Access control card information management method, management system and intelligent terminal |
CN111383371A (en) * | 2020-04-29 | 2020-07-07 | 珠海格力电器股份有限公司 | Unlocking method, door lock, server, system, storage medium and electronic device |
CN113470224A (en) * | 2021-06-16 | 2021-10-01 | 支付宝(杭州)信息技术有限公司 | Unlocking method and system |
CN114743294A (en) * | 2022-03-29 | 2022-07-12 | 中汽创智科技有限公司 | Unlocking device, shared device unlocking method, device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109754505B (en) | 2022-07-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109754505A (en) | A kind of method for unlocking and device based on IC card | |
JP7194847B2 (en) | A method for authenticating the identity of digital keys, terminal devices, and media | |
CN100533427C (en) | Remote access system | |
CN108881167A (en) | A kind of intelligent contract of finite field block catenary system | |
JP2018074205A (en) | Program, information processing device, information processing system, and information processing method | |
JP2003177938A (en) | Electronic device and its debugging authentication method | |
CN207264475U (en) | A kind of intelligent lock control system based on eID certifications | |
CN109328444B (en) | Protection device and dongle and method of use thereof | |
CN106127906A (en) | The unlocking method of a kind of door-control lock, Apparatus and system | |
CN103095659A (en) | Account login method and system in internet | |
US9111084B2 (en) | Authentication platform and related method of operation | |
CN109067881A (en) | Remote-authorization method and its device, equipment and storage medium | |
CN110163998A (en) | A kind of intelligent door lock application method of intelligent door lock system and offline authentication | |
CN109451496A (en) | Connection authentication method and authentication system thereof | |
CN106027249B (en) | Identity card card reading method and system | |
CN106027457A (en) | Identity card information transmission method and system | |
CN106878122A (en) | A kind of method for network access and system | |
CN107423609B (en) | Authorization system, method and card | |
CN116669888A (en) | Method for suspending protection of an object by a protection device | |
US20210279307A1 (en) | Method for the secure interaction of a user with a mobile terminal and a further entity | |
CN103944731A (en) | Data security interactive method | |
CN104361304A (en) | Method and device for downloading application program of smart card | |
CN109859349A (en) | A kind of entrance guard authentication method and system based on data SMS technology | |
US20090286511A1 (en) | Granting And Use Of Rights Over A Telecommunications Network | |
TW201104053A (en) | Digital key control system and management method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |