CN109754505A - A kind of method for unlocking and device based on IC card - Google Patents

A kind of method for unlocking and device based on IC card Download PDF

Info

Publication number
CN109754505A
CN109754505A CN201811558799.0A CN201811558799A CN109754505A CN 109754505 A CN109754505 A CN 109754505A CN 201811558799 A CN201811558799 A CN 201811558799A CN 109754505 A CN109754505 A CN 109754505A
Authority
CN
China
Prior art keywords
card
read
target
unlocking
write equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811558799.0A
Other languages
Chinese (zh)
Other versions
CN109754505B (en
Inventor
苏浩伟
谢振东
顾裕波
温晓丽
袁勇
邹大毕
李靖凯
李泽城
叶少华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Yang Cheng Tong Co Ltd
Original Assignee
Guangzhou Yang Cheng Tong Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Yang Cheng Tong Co Ltd filed Critical Guangzhou Yang Cheng Tong Co Ltd
Priority to CN201811558799.0A priority Critical patent/CN109754505B/en
Publication of CN109754505A publication Critical patent/CN109754505A/en
Application granted granted Critical
Publication of CN109754505B publication Critical patent/CN109754505B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a kind of method for unlocking and device based on IC card, wherein the method for unlocking based on IC card includes: when detecting the unlocking request of user's triggering, and read-write equipment identifies target IC card according to unlockings request;The read-write equipment verifies the target IC card according to preset proof rule, and after being proved to be successful, the read-write equipment verifies the target IC card according to preset business rule;When verifying successfully, the read-write equipment control locking device is opened.The present invention can realize the process for simplifying user and unlocking based on IC card, consequently facilitating user unlocks, at the same time, since IC card is relatively privately owned, and then avoid such issues that broken the carrier privatization of unlocking apparatus caused by ring because of two dimensional code.

Description

A kind of method for unlocking and device based on IC card
Technical field
The present invention relates to Internet technical field more particularly to a kind of method for unlocking and device based on IC card.
Background technique
With the development of society, there are a series of sharing articles, usual sharing articles are equipped with locking device and locking device Unlocking code, when user needs using sharing articles, user needs to scan the unlocking code of locking device, and then makes read-write equipment.So And in actual use, user has found that this unlocking mode not enough simplifies, and needs to consume a longer time, for example, working as user When the network signal of mobile phone is poor, it will lead to user using the unlocking mode and consume a longer time that waiting locking device is unlocked.Separately On the one hand, this unlocking mode relies on unlocking code, once unlocking code is by malicious sabotage, then locking device can not be opened normally, into And user is not available sharing articles, results even in sharing articles by privatization.
Summary of the invention
The technical problem to be solved by the embodiment of the invention is that a kind of method for unlocking and device based on IC card is provided, For solving to realize locking device not by privatization while realizing using IC card convenient for user's unlocking.
In order to solve the above-mentioned technical problem, first aspect of the embodiment of the present invention discloses a kind of unlocking side based on IC card Method, this method comprises:
When detecting the unlocking request of user's triggering, read-write equipment requests identification target IC card according to the unlocking;
The read-write equipment verifies the target IC card according to preset proof rule, after being proved to be successful, institute It states read-write equipment and the target IC card is verified according to preset business rule;
When verifying successfully, the read-write equipment control locking device is opened.
Optionally, the read-write equipment identification target IC card may comprise steps of:
The read-write equipment judges whether there is the target IC according to unlocking request within the scope of its wireless identification Card;
When judging that the read-write equipment reads the relevant information of the target IC card, institute there are when the target IC card State the use initial time and the target IC card that relevant information includes the mark ID of the target IC card, the target IC card Use the end time.
Optionally, the read-write equipment according to preset proof rule to the target IC card carry out verifying may include with Lower step:
The read-write equipment is randomly generated an identifying code and keeps in the identifying code;
The identifying code is written in the target IC card by the read-write equipment, so that the target IC card is according to first Default generating mode, the relevant information and the identifying code generate the first MAC code;
The read-write equipment generates second according to the described first default generating mode, the identifying code and the relevant information MAC code;
The read-write equipment receives the first MAC code that the target IC card is sent, and judges that the first MAC code is It is no consistent with the 2nd MAC code;
When judging that the first MAC code and the 2nd MAC code are consistent, the read-write equipment is determined to the target IC card is proved to be successful.
Optionally, the read-write equipment according to preset business rule to the target IC card carry out verification may include with Lower operation:
The read-write equipment is looked into forbidding unlocking ID list using the mark ID of the target IC card as querying condition Forbid whether unlocking ID list includes the mark ID described in inquiry;
When query result forbids unlocking ID list not include the mark ID for described in, the read-write equipment is according to When the use starting of target IC card, the use end time of the target IC card, preset service life judgment rule Judge whether the service life of the target IC card expires, if judging result is no, it is determined that verify to the target IC card logical It crosses, if the determination result is YES, it is determined that target IC card verification is not passed through.
Optionally, the method also includes:
When query result forbids unlocking ID list to include the mark ID for described in, the read-write equipment generates refusal and opens Lock information.
Optionally, the method also includes:
When the read-write equipment determines that the target IC card verification is obstructed out-of-date, the read-write equipment is initiated to the target IC card renews operation, wherein read-write equipment initiation may include: to the operation that renews of the target IC card
The read-write equipment obtains the target IC card generates at random first and renews code and obtain the target IC card The 3rd MAC code of code generation is renewed according to the second default generating mode, the relevant information and described first;
The read-write equipment renews code, the 3rd MAC code and the relevant information for described first and is sent to operation clothes It is engaged in device, so that the Operation Server generates the 4th MAC code and second renews code, judging the 3rd MAC code and described the The 5th MAC code is generated when four MAC codes are identical;
What the read-write equipment received that the Operation Server sends described renews information, the 5th MAC code and described Second renews code;
The read-write equipment renews code, the 5th MAC code and the information that renews for described second and is written to the mesh It marks in IC card, so that the target IC card generates the 6th MAC code and when the 6th MAC code is identical as the 5th MAC code Information is renewed described in enabling, the information that renews includes the new use end time using initial time and newly.
Optionally, the method also includes:
What the read-write equipment received that the target IC card sends renews successfully prompting message, and described renew successfully is mentioned Show that message is sent to the Operation Server.
Optionally, the relevant information of the target IC card further includes certification sub-key;
It is described to open and before the read-write equipment identifies target IC card and reads the relevant information of the target IC card Locking method further includes that the read-write equipment executes initialization operation.
Optionally, the read-write equipment execution initialization operation includes:
The read-write equipment receives certification master key that write-in terminal is sent, generating according to preset-key create-rule, The relationship between the certification sub-key in the certification master key and the relevant information is dispersion relation.
Optionally, after the read-write equipment control locking device is opened, the method for unlocking further include:
The read-write equipment records unlocking information, wherein the unlocking information includes the mark ID with the target IC card There are at least one of the User ID of binding relationship, uncaging time, lockset position of coupler.
Optionally, the method for unlocking further include:
When detecting the locking request of user's triggering, the read-write equipment controls the locking device and locks and record The read-write equipment shuts information, wherein the information that shuts includes shutting the time, shutting location information and the use At least one of family ID;
The read-write equipment shuts information and the unlocking information is sent to Operation Server for described, so that the fortune Battalion's server shuts information according to and the unlocking information calculate cost of use that the user needs to pay and will described in Cost of use is sent to user terminal.
Optionally, the method for unlocking further include:
The read-write equipment, which is sent according to default access frequency to Operation Server, forbids unlocking ID list for described Request is updated, so that the Operation Server is forbidden out after receiving the update request to read-write equipment return is updated Lock ID table;
The read-write equipment receive it is described it is updated forbid unlocking ID table, and forbid unlocking ID list to replace with for described It is described updated to forbid unlocking ID table.
A kind of unlocking apparatus based on IC card is also disclosed in second aspect of the present invention, which includes:
Identification module, for identifying target IC card and reading the phase of the target IC card when user triggers and unlocks request Information is closed, the relevant information includes the mark ID of the target IC card;
Authentication module, for when the identification module identification target IC card and read the target IC card relevant information it Afterwards, the relevant information is verified according to preset proof rule;
Correction verification module, for the authentication module according to preset proof rule to the relevant information carry out verifying and After the relevant information is proved to be successful, the relevant information is verified according to preset business rule;
Drive module, for after the correction verification module verifies relevant information success, control locking device to be opened.
Optionally, identification module may include:
First judging submodule, it is described for being judged whether there is within the scope of its wireless identification according to unlocking request Target IC card;
Reading submodule reads the target there are when the target IC card for judging in the first judging submodule The relevant information of IC card, when the relevant information includes that the use of the mark ID, the target IC card of the target IC card originate Between and the target IC card use the end time.
Optionally, authentication module may include:
Identifying code generates submodule, for an identifying code to be randomly generated and keeps in the identifying code;
Be written submodule, for identifying code generate submodule an identifying code is randomly generated and keep in the identifying code it Afterwards, the identifying code is written in the target IC card, so that the target IC card is according to the first default generating mode, described Relevant information and the identifying code generate the first MAC;
MAC generates submodule, for raw according to the described first default generating mode, the identifying code and the relevant information At the 2nd MAC code;
First receiving submodule, the first MAC code sent for receiving the target IC card;
Second judgment submodule receives the first MAC that the target IC card is sent for the first receiving submodule After code, judge the first MAC code whether with the 2nd MAC code unanimously, when judging the first MAC code and described the When two MAC codes are consistent, the read-write equipment determination is proved to be successful the target IC card.
Optionally, correction verification module may include:
It inquires submodule and is forbidding unlocking ID list for the mark ID using the target IC card as querying condition Middle inquiry, to forbid whether unlocking ID list includes the mark ID and generate query result described in judgement;
Third judging submodule, for forbidding unlocking ID list not include the mark ID to be described when the query result When, when originating according to the use of the target IC card, the use end time of the target IC card, preset validity period Limit judgment rule judges whether the service life of the target IC card expires, if judging result is no, it is determined that the target IC card verification passes through, if the determination result is YES, it is determined that the target IC card verification does not pass through;
Submodule is renewed, for determining that the target IC card verification is obstructed out-of-date in third judging submodule, is initiated to institute That states target IC card renews operation;
First cue module, for forbidding unlocking ID list to include the mark to be described when inquiry submodule query result When ID, refusal unlocking information is generated.
Optionally, renewing that submodule initiates can be with to the concrete mode for renewing operation of the target IC card are as follows:
It obtains the target IC card generates at random first and renews code and to obtain the target IC card default according to second Generating mode, the relevant information and described first renew the 3rd MAC code of code generation;
Code, the 3rd MAC code and the relevant information are renewed by first and is sent to Operation Server, so that the fortune Battalion's server generates the 4th MAC code and second renews code, the generation when judging that the 3rd MAC code is identical as the 4th MAC code 5th MAC code
Receive that the Operation Server sends it is described renew information, the 5th MAC code and described second renews code;
Code, the 5th MAC code and the information that renews is renewed by described second to be written in the target IC card, so that The target IC card generates the 6th MAC code and renews letter described in enabling when the 6th MAC code is identical as the 5th MAC code Breath, the information that renews includes the new use end time using initial time and newly;
Receive the transmission of target IC card renews successfully prompt information, and the prompt information that renews successfully is sent to operation Server.
Optionally, a kind of unlocking apparatus based on IC card disclosed in second aspect of the present invention further include:
Initialization module, for identification module identify target IC card and read the target IC card relevant information it Before, execute initialization operation, wherein initialization operation may include step:
The read-write equipment receives certification master key that write-in terminal is sent, generating according to preset-key create-rule, The relationship between the certification sub-key in the certification master key and the relevant information is dispersion relation.
Optionally, a kind of unlocking apparatus based on IC card disclosed in second aspect of the present invention further include:
Logging modle, for recording unlocking information, wherein the unlocking letter after drive module control locking device is opened Breath may include that there are at least one in the User ID of binding relationship, uncaging time, lockset position of coupler with the mark ID of target IC card Kind.
Optionally, logging modle is also used to when detecting the locking request of user's triggering, and record shuts information, In, this shut information may include shut the time, shut position, there are in the User ID of binding relationship by the mark ID of target IC card It is at least one.
Optionally, a kind of unlocking apparatus based on IC card disclosed in second aspect of the present invention further include:
Settlement module, for logging modle record the read-write equipment shut information after, will shut information, unlock letter Breath be sent to Operation Server so that the Operation Server according to shut information and the unlocking information calculating user's needs The cost of use is simultaneously sent to user terminal by the cost of use of payment.
Optionally, initialization module is also used to send according to default access frequency to Operation Server and forbid out for described The update request of ID list is locked, so that the Operation Server updates after receiving the update request to read-write equipment return Afterwards forbid unlocking ID table;
The read-write equipment receive it is described it is updated forbid unlocking ID table, and forbid unlocking ID list to replace with for described It is described updated to forbid unlocking ID table.
Another unlocking apparatus based on IC card is also disclosed in third aspect present invention, which includes:
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes first aspect present invention The disclosed method for unlocking based on IC card.
A kind of computer readable storage medium is also disclosed in fourth aspect present invention, includes in the computer readable storage medium Unlocking program based on IC card when the unlocking program based on IC card is executed by processor, executes such as first aspect present invention The method for unlocking based on IC card.
As it can be seen that the present invention can realize the process for simplifying user and unlocking based on IC card, consequently facilitating user unlocks, it is same with this When, since IC card is relatively privately owned, and then avoid because two dimensional code is broken the carrier privatization of unlocking apparatus caused by ring Such issues that.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ability For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is the flow diagram of the method for unlocking based on IC card disclosed in the embodiment of the present invention one;
Fig. 2 is the flow diagram of the method for unlocking based on IC card disclosed in the embodiment of the present invention two;
Fig. 3 is that the structure of the unlocking apparatus based on IC card disclosed in the embodiment of the present invention three shows schematic diagram;
Fig. 4 is that the structure of the unlocking apparatus based on IC card disclosed in the embodiment of the present invention four shows schematic diagram;
Fig. 5 is that the structure of the unlocking apparatus based on IC card disclosed in the embodiment of the present invention five shows schematic diagram.
Specific embodiment
In order to better understand and implement, following will be combined with the drawings in the embodiments of the present invention, in the embodiment of the present invention Technical solution be clearly and completely described, it is clear that the described embodiment is only a part of the embodiment of the present invention, without It is whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
With China's expanding economy, large quantities of sharing articles have been emerged in large numbers on the market, for example, shared bicycle, shared electromagnetism Furnace etc., generally for the shared of sharing articles is realized, sharing articles are equipped with locking device and two dimensional code or number.When user needs reality When with sharing articles, user, which needs to scan the two-dimensional code or number, obtains unlocking cipher, and unlocking cipher is then inputted on locking device, So that locking device verifying unlocking cipher is unlocked after passing through, and then realize the practical of sharing articles.In such a scenario, user makes It is needed to be implemented when with sharing articles using a series of comparatively laborious movements such as mobile scanning terminal two dimensional code, input two dimensional codes, And then cause user experience poor.At the same time, since the method for unlocking of existing sharing articles depends on two dimensional code or number, And when two dimensional code or number are by some user's malicious damage, other users can not just obtain unlocking cipher, and sharing articles are just It can not share and by privatization.For this scene, the embodiment of the invention discloses a kind of method for unlocking and dress based on IC card Set, due to IC card generally with user account bind, and then may be implemented a people one card unlocking mode, thus avoid two dimensional code or Caused by number is damaged the problem of sharing articles privatization.In the following, by opening in conjunction with specific embodiment based on IC card Locking method and device are described in detail.
Embodiment one
Referring to Fig. 1, Fig. 1 is the flow diagram of the method for unlocking based on IC card disclosed in the embodiment of the present invention one.Such as Shown in Fig. 1, being somebody's turn to do the method for unlocking based on IC card be may comprise steps of:
101, when detecting the unlocking request of user's triggering, read-write equipment requests identification target IC card according to unlocking;
102, read-write equipment verifies target IC card according to preset proof rule, after being proved to be successful, read-write dress It sets and target IC card is verified according to preset business rule;
103, when verifying successfully, read-write equipment controls locking device and opens.
In embodiments of the present invention, optionally, read-write equipment can be frequency read/write, and wherein frequency read/write includes penetrating Frequency module, network communication module, SAM module, antenna, central controller, driving motor, I/O port.Wherein, radio-frequency module is for sending out The radiofrequency signal of predeterminated frequency is sent, antenna is used to receive the radiofrequency signal of predeterminated frequency.SAM module includes SAM chip, optional , SAM chip may include pre-stored certification master key, and central controller can be single-chip microcontroller, driving motor with set The locking device connection in sharing articles is set, so, read-write equipment can detect within the scope of the wireless identification of antenna With the presence or absence of target IC card, carry out when detecting target IC card, radio-frequency module emit radiofrequency signal realize with target IC card it Between communication, and then central controller controls drive module according to the data of the data of SAM chip and target IC card, so that driving Motor drives locking device to unlock, final to realize that article is shared.Further alternative, frequency read/write can also include network communication Module, wherein network communication module can be 2G communication module, be also possible to 3G communication module, 4G communication module or other can Realize the communication module of telecommunication, network communication module can be communicated with remote server, for example, logical with Operation Server Letter.
In embodiments of the present invention, optionally, read-write equipment can also include display screen, buzzer, wherein display screen is used In display reminding information, for example, display screen can when target IC card is identified by reading radio-frequency module and read service life therein To show service life information, so, user can know the remaining access times of target IC card in time, so that User supplements with money in time in the case where the remaining access times of target IC card are few.
In embodiments of the present invention, optionally, read-write equipment can be there are two types of working condition, the first working condition is low Power consumption state is for second operating status, and the default conditions of read-write equipment are low power consumpting state.When some user needs to open When lock or locking, which, which can press, opens key so that read-write equipment is converted to operating status from low power consumpting state, at this point, Read-write equipment starts to identify target IC card.When not having user to need to unlock or lock, read-write equipment can will within the default time limit State is low power consumpting state by running state conversion, to reduce power consumption.It should be noted that read-write equipment can also there are three types of or Three kinds or more of working condition, this is not limited by the present invention.
In embodiments of the present invention, target IC card is that certain is just used by a user in unlocking and can be identified by read-write equipment IC card, wherein target IC card can be non-contact IC card, be also possible to Contact Type Ic Card, and this is not limited by the present invention. Preferably, the target IC card of the embodiment of the present invention selects non-contact IC card, wherein the non-contact IC card may include day Line, resonance circuit, control chip, wherein the antenna of IC card can receive the radiofrequency signal of predeterminated frequency, and resonance circuit can root Work charge is generated according to the received radiofrequency signal of the antenna of IC card, control chip can work under the driving of work charge.Into One step and it is optional, control chip includes central controller (such as EEPROM (Electrically Erasable Programmable read only memory, band electric erazable programmable read-write memory)), memory, wherein in memory It is previously stored with the program that can be executed by central controller.
The method for unlocking based on IC card of the embodiment of the present invention can be used for shared bicycle field.For example, in shared bicycle Field, each shared bicycle can install the read-write equipment that can be identified target IC card and read target IC card, and then work as Some user close to read-write equipment and when read-write equipment recognizes target IC card within the scope of wireless identification, reads target IC card Write device installs preset proof rule and verification rule verifies the information in target IC card, verifies, when verifying and school Test by when, central controller sends driving signal to driving motor, to drive the locking device of read-write equipment to unlock to real Bicycle is now shared in the form of brush IC card, and existing shared bicycle method for unlocking is usually that user is obtained and scanning the two-dimensional code The unlocking cipher of bicycle is got, then with inputting unlocking cipher on the locking device of shared bicycle, and then locking device verifying is unlocked Unlock after password success, it is this unlock realize shared method due to relying on two dimensional code or bicycle number, therefore in two dimensional code or When person's bicycle number is by malicious damage, other users can not just unlock, and can not just share bicycle, also so as to cause shared bicycle quilt Privatization.And the method for unlocking based on IC card of the present embodiment does not depend on two dimensional code or bicycle number, and use and user's account The IC card of number binding avoids the problems of the prior art as unlocking tool, simultaneously because IC card can store relevant information, When unlocking, user only needs close to read-write equipment to compile target IC card without scanning the two-dimensional code or inputting bicycle Number, a series of cumbersome operations such as unlocking cipher, input unlocking cipher are then waited, therefore the embodiment of the present invention can also simplify use The unlocking step at family, improves user experience.
The unlocking apparatus based on IC card of the embodiment of the present invention also can be applied in shared kitchen tool field, for example, in order to It realizes that kitchen tools are shared, IC card can be placed on the identification device of shared kitchen tools, identification device reads information in IC card and verifies Information in IC card, when verification passes through, user can share kitchen tools, and existing kitchen tools sharing method, and need to scan two Code is tieed up, the information of kitchen tools is got, shared kitchen tools could be used by then inputting password.So, the shared behaviour of kitchen tools is realized Make step with regard to comparatively laborious.
It should be noted that the embodiment of the present invention is to list certain applications of the method for unlocking of basic IC card, Under the premise of not departing from inventive concept of the invention, the method for unlocking of the basic IC card of the embodiment of the present invention can apply to other Utilization scene under, this is not limited by the present invention.
As it can be seen that the relevant information of unlocking can be stored in target IC by the unlocking apparatus based on IC card of the embodiment of the present invention Card and/or read-write equipment so that the unlocking information of locking device does not expose, and then are avoided because of the exposure of unlocking information, unlocking information Such issues that by sharing articles caused by malicious damage by privatization, for example, the two dimensional code because sharing bicycle is avoided to be damaged And lead to shared this problem of bicycle privatization.At the same time, it is stored with unlocking information since IC card can preselect, and reads and writes dress The information that can be read directly in IC card is set, and then user does not need to scan the two-dimensional code to obtain and open when using sharing articles Lock cipher, input unlocking cipher are with a series of operation such as unlock, therefore the unlocking apparatus based on IC card that the present invention is implemented has It is easy to operate, the high advantage of user experience.
Embodiment two
Referring to Fig. 2, Fig. 2 is the flow diagram of the method for unlocking based on IC card disclosed in the embodiment of the present invention two.Its In, as shown in Fig. 2, being somebody's turn to do the method for unlocking based on IC card may comprise steps of:
201, read-write equipment executes initialization operation;
202, when detecting the unlocking request of user's triggering, read-write equipment requests identification target IC card according to unlocking;
203, read-write equipment verifies target IC card according to preset proof rule;
204, after being proved to be successful, read-write equipment verifies target IC card according to preset business rule;
205, when verifying successfully, read-write equipment controls locking device and opens.
206, read-write equipment records unlocking information, wherein unlocking information includes existing to bind with the mark ID of target IC card At least one of the User ID of relationship, uncaging time, lockset position of coupler;
207, when detecting the locking request of user's triggering, read-write equipment control locking device locks and records read-write equipment When time use information, wherein when secondary use information includes shutting the time, shutting location information, uncaging time and User ID At least one of;
208, read-write equipment ought time use information and unlocking information be sent to Operation Server so that Operation Server According to the cost of use for working as time use information and unlocking information calculating read-write equipment and cost of use is sent to user terminal.
In embodiments of the present invention, each read-write equipment can all execute initialization operation when being mounted in sharing articles, To initialize the operating parameter and other data item of read-write equipment, optionally, the parameter of the operation of read-write equipment includes read-write dress Mark ID of the system time item, read-write equipment set, read-write equipment are slept from triggering access network item, read-write equipment It sleeps at least one of waiting time, Operation Server access address project, wherein the sleep latency table of read-write equipment Sign is waiting time of read-write equipment in the case where unattended by running state conversion at low power consumpting state, read-write equipment From triggering access network item characterization be frequency that read-write equipment independently accesses Operation Server.
In an alternative embodiment, user can register a user account, each user's account by user terminal It number is all associated with unique ID of user password He the user, user can also be by user terminal login user account, and binds IC card, in the optional embodiment, optionally, each User ID can bind an IC card, can also bind two or two Or more IC card, it is further alternative, binding IC card may include operation:
User terminal obtain user input IC card to be bound password, wherein IC card to be bound password setting to Bind the coated areas of IC card.
The password of IC card to be bound and User ID are sent to Operation Server by user terminal, so that Operation Server root According to the password of IC card to be bound according to the ID of preset matching rule IC to be bound, and the ID of IC to be bound is tied up with User ID It is fixed.
In another optional embodiment, user can be that the associated IC card of user account is filled by user terminal Value, optionally, supplement with money for the associated IC card of user account may include following operation:
When user is triggered on the subscriber terminal for wait supplement when supplementing operation with money of IC card with money, user terminal is to Operation Server Send charging request, wherein charging request includes the ID of IC card to be supplemented with money, recharge amount, first supplements verification information with money;
Operation Server receives charging request;
Operation Server is supplemented verification information with money to first according to charging information proof rule and is verified;
After supplementing verification information with money and being verified, Operation Server is looked into IC card database according to the ID of IC card to be supplemented with money Ask the ID of IC card to be supplemented with money;
Operation Server modifies the associated amount of money of ID of IC card to be supplemented with money;
Operation Server returns to successful recharging information to user terminal, and successful recharging packet second supplements verification information with money;
User terminal receives successful recharging information and supplements verification information with money to second according to charging information proof rule and carries out Verifying, after second, which supplements verification information with money, is verified, user terminal according to recharge amount generate it is new using the time started, it is new Be using the end time;
The new use end time using the time started, new is written to wait supplement with money in IC card by user terminal.
In embodiments of the present invention, in order to guarantee the Information Security in target IC card, target IC card and read-write equipment it Between communication can pass through encryption, for example, a certification sub-key can be stored in each target IC card, and each read-write It is stored with a certification master key on device, optionally, by certification master key write-in read-write equipment and sub-key write-in will be authenticated IC card can also include following operation:
Terminal is written and generates certification master key according to preset-key create-rule;
Terminal is written, certification sub-key is calculated according to decentralized algorithm according to certification master key;
Write-in terminal will authenticate master key and be written in read-write equipment and save certification sub-key;
Write-in terminal is written to sub-key is authenticated in IC card.
In embodiments of the present invention, optionally, as user by target IC card within the scope of the wireless identification of read-write equipment When, read-write equipment can automatically begin to identification target IC card, and optionally, read-write equipment identifies that target IC card may include following behaviour Make:
Read-write equipment judges whether there is target IC card according to request of unlocking within the scope of its wireless identification;
When judging there are when target IC card, read-write equipment reads the relevant information of target IC card, and relevant information includes mesh Mark the mark ID of IC card, the use end time using initial time and target IC card of target IC card.
In embodiments of the present invention, when the relevant information of target IC card can also include user name, user password, binding Between, at least one of User ID.
In embodiments of the present invention, optionally, read-write equipment verifies target IC card according to preset proof rule May include following operation:
An identifying code and temporary identifying code is randomly generated in read-write equipment;
Identifying code is written in target IC card by read-write equipment, so that target IC card is according to the first default generating mode, phase It closes information and identifying code generates the first MAC code;
Read-write equipment generates the 2nd MAC code according to the first default generating mode, identifying code and relevant information;
Read-write equipment receive target IC card send the first MAC code, and judge the first MAC code whether with the 2nd MAC code one It causes;
When judging the first MAC code and consistent the 2nd MAC code, read-write equipment determination is proved to be successful target IC card.
In embodiments of the present invention, further alternative, target IC card according to the first default generating mode, relevant information with And identifying code generates the first MAC code and may comprise steps of:
Successively relevant information, identifying code are handled and generate the sub-block that several length are a byte long;
According to DES algorithm, successively several more sub-blocks are handled, and splice the processing result of each sub-block Generate the total data block that a length is 8 bytes;
Using certification master key as encryption parameter and total data block is handled according to DES algorithm and generates the first MAC Code.
In embodiments of the present invention, optionally, read-write equipment verifies target IC card according to preset business rule Include:
Read-write equipment is inquired in forbidding unlocking ID list using the mark ID of target IC card as querying condition, to judge to prohibit Only whether unlocking ID list includes mark ID and generates query result;
When query result is that unlocking ID list is forbidden not include mark ID, read-write equipment rises according to the use of target IC card When the beginning, target IC card using end time, default service life judgment rule judge whether the service life of target IC card arrives Phase, if judging result is no, it is determined that the verification of target IC card is passed through.It is further alternative, when query result is to forbid unlocking When ID list includes mark ID, read-write equipment generates refusal unlocking information.
In embodiments of the present invention, further alternative, when read-write equipment is originated according to the use of target IC card, target When judging that the service life of target IC card has expired using end time, default service life judgment rule of IC card, then read and write Device determines that the verification of target IC card does not pass through.It is further alternative, when read-write equipment determine target IC card verification it is obstructed out-of-date, read Write device initiation operation is renewed to target IC card, wherein read-write equipment initiate include: to the operation that renews of target IC card
Read-write equipment takes first that target IC card generates at random to renew code and obtains target IC card according to the second default life The 3rd MAC code of code generation is renewed at mode, relevant information and first;
Read-write equipment renews code, the 3rd MAC code and relevant information for first and is sent to Operation Server, so that operation clothes Business device generate the 4th MAC code and second renew code, when judging that the 3rd MAC code is identical as the 4th MAC code generation the 5th MAC Code;
Read-write equipment receive Operation Server send renew information, the 5th MAC code and second renews code;
Read-write equipment renews second code, the 5th MAC code and renews information and is written in target IC card, so that target IC card It generates the 6th MAC code and is enabled when the 6th MAC code is identical as the 5th MAC code and renew information, renewing information includes new use Initial time and new use end time;
What read-write equipment reception target IC card was sent renews successfully prompting message, and will renew successfully prompting message and be sent to Operation Server.
In embodiments of the present invention, further optional, target IC card is according to the second default generating mode, relevant information And first renew code generation the 3rd MAC code may include following operation:
The subdata that code is handled and generates several length as a byte long successively is renewed to relevant information, first Block;
According to DES algorithm, successively several more sub-blocks are handled, and splice the processing result of each sub-block Generate the total data block that a length is 8 bytes;
Using certification master key as encryption parameter and total data block is handled according to DES algorithm and generates the 3rd MAC Code.
In embodiments of the present invention, it since the mark ID of every IC card and identifying code are all randomly generated, therefore produces every time Raw MAC code is all different, so that MAC can not be reused, and due to only in target IC card and read-write equipment Under the conditions of the MAC code of generation is consistent, mutual data can be just received between target IC card and read-write equipment, are so just mentioned The authentication security of high IC card.
In another optional embodiment, the method for unlocking based on IC card of the embodiment of the present invention can also include following Operation:
Read-write equipment sends to be directed to according to default access frequency to Operation Server forbids the update of unlocking ID list to request, So that Operation Server, which receives, forbids unlocking ID table to read-write equipment return is updated after update is requested;
Read-write equipment reception is updated to forbid unlocking ID table, and unlocking ID list will be forbidden to replace with updated forbid Unlocking ID table.
It is stored in the optional embodiment, in read-write equipment and forbids unlocking ID table, wherein forbid protecting in unlocking ID table There are several records for being prohibited from using IC card user, record may each comprise User ID daily.Meanwhile forbidding unlocking ID table Can be generated under a variety of occasions, and multiple terminals or multiple platforms can be shared on, for example, when some user's brush IC card into Enter subway station, and the not brush IC card in subway station out, in this case, the ticket checking terminal of subway station is into can be by the ID of the IC card It is added to and forbids in unlocking ID table, and update into Operation Server, so, read-write equipment of the invention can be from fortune It is obtained in battalion's server and forbids unlocking ID table, forbid unlocking ID table to realize and share.It is optional in the optional embodiment , it can be access per hour according to default access frequency and once, be also possible to once a day, this is not limited by the present invention.
In the optional embodiment, when some user is lost the IC card of its binding, which can be to operation Server proposes that IC card is freezed to apply, so that the ID for the IC card that the needs freeze is added to by Operation Server forbids unlocking ID Card, and then other users can not take the IC card freezed to realize unlocking operation, further alternative, Operation Server freezes IC Card may include following operation:
Operation Server receives user triggering to be freezed to apply for a certain IC card to be freezed, wherein freezes to apply Mark ID and user information including IC card to be freezed;
Operation Server inquires the authentication information of IC card to be freezed using the mark ID of IC card to be freezed as querying condition;
Whether Operation Server interpretation authentication information is consistent with user information, if so, by the mark ID of IC card to be freezed, If it is not, then returning to user information authentication failed information to the user terminal where user.
Forbid unlocking ID table as it can be seen that can update by network in the alternative embodiment, and then reads some IC After the ID of card, according to unlocking IC table is forbidden, judge that can the IC card use, so, so that it may limit non-normal use User uses sharing articles, further decreases sharing articles by privately owned risk.Meanwhile the alternative embodiment can be limited and is frozen Knot IC card continues to use, to improve the safety in utilization of IC card.
Embodiment three
Referring to Fig. 3, Fig. 3 is the structural schematic diagram of the unlocking apparatus disclosed by the embodiments of the present invention based on IC card.Such as Fig. 3 Shown, being somebody's turn to do the unlocking apparatus based on IC card may include:
Identification module 301, for identifying target IC card and reading the correlation of target IC card when user triggers and unlocks request Information, relevant information include the mark ID of target IC card;
Authentication module 302, for when identification module 301 identify target IC card and read target IC card relevant information it Afterwards, relevant information is verified according to preset proof rule;
Correction verification module 303 is for being verified and being worked as to relevant information according to preset proof rule in authentication module 302 After relevant information is proved to be successful, relevant information is verified according to preset business rule;
Drive module 304, after correction verification module 303 verifies relevant information success, control locking device is opened.
In embodiments of the present invention, identification module 301, authentication module 302, correction verification module 303, drive module 304 are A kind of program function module, the program function module can be in this kind of hardware realizations such as read-write equipment, IC card.Optionally, it reads and writes Device can be frequency read/write, wherein frequency read/write include radio-frequency module, network communication module, SAM module, antenna, in Entreat controller, driving motor, I/O port.Wherein, radio-frequency module is used to send the radiofrequency signal of predeterminated frequency, and antenna is pre- for receiving If the radiofrequency signal of frequency.SAM module includes SAM chip, and optionally, SAM chip may include pre-stored certification master Key, and central controller can be single-chip microcontroller, driving motor is connect with the locking device being arranged in sharing articles, and such one Come, read-write equipment can detect whether to carry out to detect target there are target IC card within the scope of the wireless identification of antenna When IC card, radio-frequency module emits the communication between radiofrequency signal realization and target IC card, and then central controller is according to SAM chip Data and the data of target IC card control drive module it is final to realize that article is total so that driving motor drives locking device to unlock It enjoys.Further alternative, frequency read/write can also include network communication module, wherein it is logical that network communication module can be 2G Believe module, be also possible to 3G communication module, 4G communication module or other can realize the communication module of telecommunication, network communication mould Block can be communicated with remote server, for example, communicating with Operation Server.
In embodiments of the present invention, optionally, read-write equipment can also include display screen, buzzer, wherein display screen is used In display reminding information, for example, display screen can when target IC card is identified by reading radio-frequency module and read service life therein To show service life information, so, user can know the remaining access times of target IC card in time, so that User supplements with money in time in the case where the remaining access times of target IC card are few.
In embodiments of the present invention, optionally, read-write equipment can be there are two types of working condition, the first working condition is low Power consumption state is for second operating status, and the default conditions of read-write equipment are low power consumpting state.When some user needs to open When lock or locking, which, which can press, opens key so that read-write equipment is converted to operating status from low power consumpting state, at this point, Read-write equipment starts to identify target IC card.When not having user to need to unlock or lock, read-write equipment can will within the default time limit State is low power consumpting state by running state conversion, to reduce power consumption.It should be noted that read-write equipment can also there are three types of or Three kinds or more of working condition, this is not limited by the present invention.
In embodiments of the present invention, target IC card is that certain is just used by a user in unlocking and can be identified by read-write equipment IC card, wherein IC card can be non-contact IC card, be also possible to Contact Type Ic Card, and this is not limited by the present invention.It is preferred that , the IC card of the embodiment of the present invention selects non-contact IC card, wherein the non-contact IC card may include antenna, resonance Circuit, control chip, wherein the antenna of IC card can receive the radiofrequency signal of predeterminated frequency, and resonance circuit can be according to IC card The received radiofrequency signal of antenna generate work charge, control chip can work under the driving of work charge.Further and Optionally, control chip includes central controller (such as EEPROM (Electrically Erasable Programmable Read only memory, band electric erazable programmable read-write memory)), memory, wherein being previously stored in memory can The program executed by central controller.
The unlocking apparatus based on IC card of the embodiment of the present invention can be used for shared bicycle field.For example, in shared bicycle Field, each shared bicycle can install the read-write equipment that can be identified target IC card and read target IC card, and then work as Some user close to read-write equipment and when read-write equipment recognizes target IC card within the scope of wireless identification, reads target IC card Write device installs preset proof rule and verification rule verifies the information in target IC card, verifies, when verifying and school Test by when, central controller sends driving signal to driving motor, to drive the locking device of read-write equipment to unlock to real Bicycle is now shared in the form of brush IC card, and existing shared bicycle method for unlocking is usually that user is obtained and scanning the two-dimensional code The unlocking cipher of bicycle is got, then with inputting unlocking cipher on the locking device of shared bicycle, and then locking device verifying is unlocked Unlock after password success, it is this unlock realize shared method due to relying on two dimensional code or bicycle number, therefore in two dimensional code or When person's bicycle number is by malicious damage, other users can not just unlock, and can not just share bicycle, also so as to cause shared bicycle quilt Privatization.And the method for unlocking based on IC card of the present embodiment does not depend on two dimensional code or bicycle number, and use and user's account The IC card of number binding avoids the problems of the prior art as unlocking tool, simultaneously because IC card can store relevant information, When unlocking, user only needs close to read-write equipment to compile target IC card without scanning the two-dimensional code or inputting bicycle Number, a series of cumbersome operations such as unlocking cipher, input unlocking cipher are then waited, therefore the embodiment of the present invention can also simplify use The unlocking step at family, improves user experience.
The unlocking apparatus based on IC card of the embodiment of the present invention also can be applied in shared kitchen tool field, for example, in order to It realizes that kitchen tools are shared, IC card can be placed on the identification device of shared kitchen tools, identification device reads information in IC card and verifies Information in IC card, when verification passes through, user can share kitchen tools, and existing kitchen tools sharing method, and need to scan two Code is tieed up, the information of kitchen tools is got, shared kitchen tools could be used by then inputting password.So, the shared behaviour of kitchen tools is realized Make step with regard to comparatively laborious.
It should be noted that the embodiment of the present invention is to list certain applications of the method for unlocking of basic IC card, Under the premise of not departing from inventive concept of the invention, the method for unlocking of the basic IC card of the embodiment of the present invention can apply to other Utilization scene under, this is not limited by the present invention.
As it can be seen that the relevant information of unlocking can be stored in target IC by the unlocking apparatus based on IC card of the embodiment of the present invention Card and/or read-write equipment so that the unlocking information of locking device does not expose, and then are avoided because of the exposure of unlocking information, unlocking information Such issues that by sharing articles caused by malicious damage by privatization, for example, avoid the two dimensional code of shared bicycle from being damaged and Caused shared this problem of bicycle privatization.At the same time, it is stored with unlocking information since IC card can preselect, and reads and writes dress It sets the information that can be read directly in IC card, and then user is when using sharing articles, does not need to scan the two-dimensional code and get out The a series of operations such as lock cipher, input unlocking cipher, therefore the unlocking apparatus based on IC card that the present invention is implemented has operation letter Just, the high advantage of user experience.
Example IV
Referring to Fig. 4, Fig. 4 is a kind of structural schematic diagram of unlocking apparatus based on IC card disclosed by the embodiments of the present invention. As shown in figure 4, being somebody's turn to do the unlocking apparatus based on IC card includes identification module 301, authentication module 302, correction verification module 303, driving mould It can also include initialization module 305, logging modle 306, settlement module 307 except block 304.
In embodiments of the present invention, initialization module 305 is used to identify target IC card in identification module 301 and reads target Before the relevant information of IC card, initialization operation is executed, wherein initialization operation may include step read-write equipment according to preset Initialization rule initialization operating parameter.Each read-write equipment can all execute initialization operation when being mounted in sharing articles, To initialize the operating parameter evidence of read-write equipment.Optionally, when the parameter of the operation of read-write equipment includes the system of read-write equipment Between item, read-write equipment mark ID, read-write equipment from triggering access network item, read-write equipment sleep latency At least one of item, Operation Server access address project, wherein the sleep latency characterization of read-write equipment is read-write Device is in the case where unattended by running state conversion at the waiting time of low power consumpting state, the triggering visit certainly of read-write equipment Ask network item characterization is the frequency that read-write equipment independently accesses Operation Server.
In embodiments of the present invention, further alternative, initialization operation can also include that read-write equipment receives write-in eventually Certification master key that end is sent, being generated according to preset-key create-rule, wherein the certification master key is recognized with target IC card Demonstrate,proving is dispersion relation between sub-key.Further optional, the relevant information of target IC card further includes certification sub-key.
In embodiments of the present invention, logging modle 306, for recording after drive module 304 controls locking device and opens Unlocking information, wherein the unlocking information may include that there are when the User ID of binding relationship, unlocking with the mark ID of target IC card Between, at least one of lockset position of coupler.
Logging modle 306 is also used to when detecting the locking request of user's triggering, and record shuts information, wherein the pass Lock information may include shut the time, shut position, there are in the User ID of binding relationship at least one by the mark ID of target IC card Kind.
In embodiments of the present invention, settlement module 307 is used to shut information in the record read-write equipment of logging modle 306 Afterwards, information will be shut, unlocking information is sent to Operation Server so that Operation Server is according to shutting information and unlocking information User is calculated to need the cost of use paid and cost of use is sent to user terminal.
In embodiments of the present invention, identification module 301 may include the first judging submodule 3011, reading submodule 3012, in which:
First judging submodule 3011, for judging whether there is target within the scope of its wireless identification according to request of unlocking IC card;
Reading submodule 3012 reads target there are when target IC card for judging in the first judging submodule 3011 The relevant information of IC card, relevant information include the use initial time and target IC of the mark ID of target IC card, target IC card Card uses the end time.
In embodiments of the present invention, authentication module 302 may include that identifying code generates submodule 3021, write-in submodule 3022, MAC code generates submodule 3023, the first receiving submodule 3024, second judgment submodule 3025, in which:
Identifying code generates submodule 3021, for an identifying code and temporary identifying code to be randomly generated;
Submodule 3022 is written, an identifying code and temporary verifying is randomly generated for generating submodule 3021 in identifying code Code after, identifying code is written in target IC card so that target IC card according to the first default generating mode, relevant information and Identifying code generates the first MAC code;
MAC code generates submodule 3023, for generating second according to the first default generating mode, identifying code and relevant information MAC code;
First receiving submodule 3024, for receiving the first MAC code of target IC card transmission;
Second judgment submodule 3025 receives the first MAC of target IC card transmission for the first receiving submodule 3024 After code, judge whether the first MAC code is consistent with the 2nd MAC code, when judging the first MAC code and consistent the 2nd MAC code, then Determine that target IC card is proved to be successful.
In embodiments of the present invention, further alternative, target IC card according to the first default generating mode, relevant information with And identifying code generates the first MAC code and may comprise steps of:
Successively relevant information, identifying code are handled and generate the sub-block that several length are a byte long;
According to DES algorithm, successively several more sub-blocks are handled, and splice the processing result of each sub-block Generate the total data block that a length is 8 bytes;
Using certification master key as encryption parameter and total data block is handled according to DES algorithm and generates the first MAC Code.
It should be noted that in embodiments of the present invention, identifying code is written in target IC card by write-in submodule 3022 Afterwards, MAC code can be triggered and generate the starting of submodule 3023;MAC code generate submodule 3023 according to the first default generating mode, test After demonstrate,proving code and relevant information the 2nd MAC code of generation, the execution of the first receiving submodule 3024 can be triggered.
In embodiments of the present invention, correction verification module 303 may include inquiry submodule 3031, third judging submodule 3032, submodule 3033, the first cue module 3034 are renewed, in which:
Inquiry submodule 3031 is looked into forbidding unlocking ID list for the mark ID using target IC card as querying condition It askes, forbids whether unlocking ID list includes mark ID with inquiry, if query result is that unlocking ID list is forbidden not include mark ID, Then trigger the execution of third judging submodule 3032.
Third judging submodule 3032, in inquiry submodule 3031 judging that unlocking ID list is forbidden not include mark When ID, according to being sentenced using initial time, the use end time of target IC card, default service life judgment rule for target IC card Whether the service life of disconnected target IC card expires, if judging result is no, it is determined that passes through to the verification of target IC card;If judgement knot Fruit is yes, it is determined that the verification of target IC card does not pass through.
Submodule 3033 is renewed, for determining that the verification of target IC card is obstructed out-of-date in third judging submodule 3032, is initiated Operation is renewed to target IC card;
First cue module 3034, for being that unlocking ID list is forbidden to include mark when inquiry 3031 query result of submodule When ID, refusal unlocking information is generated.
In embodiments of the present invention, renewing that submodule 3033 initiates can be with to the concrete mode for renewing operation of target IC card The following steps are included:
Obtain target IC card generate at random first renew code and obtain target IC card according to the second default generating mode, Relevant information and first renew code generation the 3rd MAC code;
Code, the 3rd MAC code and relevant information are renewed by first and is sent to Operation Server, so that Operation Server generates 4th MAC code and second renew code, when judging that the 3rd MAC code is identical as the 4th MAC code generate the 5th MAC code
Receive Operation Server send renew information, the 5th MAC code and second renews code;
It renews code, the 5th MAC code by second and renews information and be written in target IC card, so that target IC card generates the 6th MAC code and when the 6th MAC code is identical as the 5th MAC code enable renew information, renewing information includes new use initial time And the new use end time;
Receive the transmission of target IC card renews successfully prompt information, and will renew successfully prompt information and be sent to operating service Device.
In embodiments of the present invention, further optional, target IC card is according to the second default generating mode, relevant information And first renew code generation the 3rd MAC code may include following operation:
The subdata that code is handled and generates several length as a byte long successively is renewed to relevant information, first Block;
According to DES algorithm, successively several more sub-blocks are handled, and splice the processing result of each sub-block Generate the total data block that a length is 8 bytes;
Using certification master key as encryption parameter and total data block is handled according to DES algorithm and generates the 3rd MAC Code.
In the embodiment of the present invention, initialization module 305 is also used to send needle to Operation Server according to default access frequency The update for forbidding unlocking ID list is requested so that Operation Server receive update request after to read-write equipment return it is updated Forbid unlocking ID table;
Read-write equipment reception is updated to forbid unlocking ID table, and unlocking ID list will be forbidden to replace with updated forbid Unlocking ID table.
It is stored in the unlocking apparatus based on IC card of the embodiment of the present invention and forbids unlocking ID table, wherein forbid unlocking ID Several records for being prohibited from using IC card user are preserved in table, record may each comprise User ID daily.Meanwhile forbidding out Lock ID table can generate under a variety of occasions, and can be shared on multiple terminals or multiple platforms, for example, when some user brushes IC card enters subway station, and the not brush IC card in subway station out, and in this case, the ticket checking terminal of subway station is into can be by the IC The ID of card, which is added to, to be forbidden in unlocking ID table, and is updated into Operation Server, and so, read-write equipment of the invention can Forbid unlocking ID table to obtain from Operation Server, forbids unlocking ID table to realize and share.In the optional embodiment, Optionally, it can be access per hour according to default access frequency once, to be also possible to once a day, the present invention does not limit this It is fixed.
In an alternative embodiment, the unlocking apparatus based on IC card can be with user terminal, Operation Server, write-in Terminal communication, to complete data interaction, wherein user terminal can be the end PC, be also possible to mobile terminal, and the present invention does not make this It limits.
In the optional embodiment, when some user is lost the IC card of its binding, which can be to operation Server proposes that IC card is freezed to apply, so that the ID for the IC card that the needs freeze is added to by Operation Server forbids unlocking ID Card, and then other users can not take the IC card freezed to realize unlocking operation, further alternative, Operation Server freezes IC Card may include following operation:
Operation Server receives user triggering to be freezed to apply for a certain IC card to be freezed, wherein freezes to apply Mark ID and user information including IC card to be freezed;
Operation Server inquires the authentication information of IC card to be freezed using the mark ID of IC card to be freezed as querying condition;
Whether Operation Server interpretation authentication information is consistent with user information, if so, by the mark ID of IC card to be freezed, If it is not, then returning to user information authentication failed information to the user terminal where user.
In an alternative embodiment, user can register a user account, each user's account by user terminal It number is all associated with unique ID of user password He the user, user can also be by user terminal login user account, and binds IC card, in the optional embodiment, optionally, each User ID can bind an IC card, can also bind two or two Or more IC card, it is further alternative, binding IC card may include operation:
User terminal obtain user input IC card to be bound password, wherein IC card to be bound password setting to Bind the coated areas of IC card.
The password of IC card to be bound and User ID are sent to Operation Server by user terminal, so that Operation Server root According to the password of IC card to be bound according to the ID of preset matching rule IC to be bound, and the ID of IC to be bound is tied up with User ID It is fixed.
In the optional embodiment, optionally, user can by user terminal be the associated IC card of user account into Row is supplemented with money, and optionally, supplement with money for the associated IC card of user account may include following operation:
When user is triggered on the subscriber terminal for wait supplement when supplementing operation with money of IC card with money, user terminal is to Operation Server Send charging request, wherein charging request includes the ID of IC card to be supplemented with money, recharge amount, first supplements verification information with money;
Operation Server receives charging request;
Operation Server is supplemented verification information with money to first according to charging information proof rule and is verified;
After supplementing verification information with money and being verified, Operation Server is looked into IC card database according to the ID of IC card to be supplemented with money Ask the ID of IC card to be supplemented with money;
Operation Server modifies the associated amount of money of ID of IC card to be supplemented with money;
Operation Server returns to successful recharging information to user terminal, and successful recharging packet second supplements verification information with money;
User terminal receives successful recharging information and supplements verification information with money to second according to charging information proof rule and carries out Verifying, after second, which supplements verification information with money, is verified, user terminal according to recharge amount generate it is new using the time started, it is new Be using the end time;
The new use end time using the time started, new is written to wait supplement with money in IC card by user terminal.
In the optional embodiment, in order to guarantee the Information Security in target IC card, target IC card and read-write equipment Between communication can pass through encryption, for example, a certification sub-key can be stored in each target IC card, and each reading It is stored with a certification master key on write device, optionally, certification master key is written to read-write equipment and sub-key will be authenticated Be written in IC card may include following operation:
Terminal is written and generates certification master key according to preset-key create-rule;
Terminal is written, certification sub-key is calculated according to decentralized algorithm according to certification master key;
Write-in terminal will authenticate master key and be written in read-write equipment and save certification sub-key;
Write-in terminal is written to sub-key is authenticated in IC card.
Forbid unlocking ID table as it can be seen that can update by network in the alternative embodiment, and then reads some IC After the ID of card, according to unlocking IC table is forbidden, judge that can the IC card use, so, so that it may limit non-normal use User uses sharing articles, further decreases sharing articles by privately owned risk.Meanwhile the alternative embodiment can be limited and is frozen Knot IC card continues to use, to improve the safety in utilization of IC card.
Embodiment five
Referring to Fig. 5, Fig. 5 is the structural representation of another unlocking apparatus based on IC card disclosed in the embodiment of the present invention five Figure.As shown in figure 5, the unlocking apparatus based on IC card may include:
It is stored with the memory 501 of executable program code;
The processor 502 coupled with memory 501;
Processor 502 calls the executable program code stored in memory 501, executes embodiment one into embodiment two Step in method for unlocking based on IC card described in any one embodiment.
The unlocking apparatus of the embodiment of the present invention can provide a kind of behaviour by executing the method for unlocking based on IC card for user Make unlocking mode simple, that unlocking step is few, meanwhile, the embodiment of the present invention, can by executing the method for unlocking based on IC card Reduce such issues that sharing articles are by malice privatization.
Embodiment six
The embodiment of the present invention six discloses a kind of computer readable storage medium, stores based on electronic data interchange Calculation machine program, wherein the computer program makes computer execute any one the embodiment institute into embodiment two of embodiment one Step in the method for unlocking based on IC card of description.
The computer readable storage medium of the embodiment of the present invention can be user by executing the method for unlocking based on IC card A kind of unlocking mode easy to operate, unlocking step is few is provided, meanwhile, the embodiment of the present invention is by executing the unlocking based on IC card Method can reduce such issues that sharing articles are by malice privatization.
Embodiment seven
The embodiment of the invention discloses a kind of computer program product, which includes storing computer The non-transient computer readable storage medium of program, and the computer program be operable to make computer execute embodiment one to Step in embodiment two in the method for unlocking based on IC card described in any one embodiment.
The computer program product of the embodiment of the present invention can be provided by executing the method for unlocking based on IC card for user A kind of unlocking mode easy to operate, unlocking step is few, meanwhile, the embodiment of the present invention is by executing the unlocking side based on IC card Method can reduce such issues that sharing articles are by malice privatization.
Installation practice described above is only illustrative, wherein as illustrated by the separation member unit can be or Person, which may not be, to be physically separated, and component shown as a unit may or may not be physical unit With in one place, or may be distributed over multiple network units.Portion therein can be selected according to the actual needs Point or whole module achieve the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creative labor In the case where, it can it understands and implements.
By the specific descriptions of above embodiment, those skilled in the art can be understood that each embodiment It can realize by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, Substantially the part that contributes to existing technology can be embodied in the form of software products above-mentioned technical proposal in other words, The computer software product may be stored in a computer readable storage medium, and storage medium includes read-only memory (Read- Only Memory, ROM), random access memory (RandomAccess Memory, RAM), programmable read only memory (Programmable Read-only Memory, PROM), Erasable Programmable Read Only Memory EPROM (Erasable Programmable Read Only Memory, EPROM), disposable programmable read-only memory (One-time Programmable Read-Only Memory, OTPROM), the electronics formula of erasing can make carbon copies read-only memory (Electrically-Erasable Programmable Read-Only Memory, EEPROM), CD-ROM (Compact Disc Read-Only Memory, CD-ROM) or other disc memories, magnetic disk storage, magnetic tape storage or can For carrying or any other computer-readable medium of storing data.

Claims (10)

1. a kind of method for unlocking based on IC card, which is characterized in that the method for unlocking includes:
When detecting the unlocking request of user's triggering, read-write equipment requests identification target IC card according to the unlocking;
The read-write equipment verifies the target IC card according to preset proof rule, after being proved to be successful, the reading Write device verifies the target IC card according to preset business rule;
When verifying successfully, the read-write equipment control locking device is opened.
2. method for unlocking as described in claim 1, which is characterized in that the read-write equipment identifies target IC card, comprising:
The read-write equipment judges whether there is the target IC card according to unlocking request within the scope of its wireless identification;
When judging that the read-write equipment reads the relevant information of the target IC card, the phase there are when the target IC card Closing information includes that the mark ID of the target IC card, the target IC card are made using initial time and the target IC card Use the end time;
And the read-write equipment verify to the target IC card and includes: according to preset proof rule
The read-write equipment is randomly generated an identifying code and keeps in the identifying code;
The identifying code is written in the target IC card by the read-write equipment, so that the target IC card is default according to first Generating mode, the relevant information generate the first MAC code;
The read-write equipment generates the 2nd MAC according to the described first default generating mode, the identifying code and the relevant information Code;
The read-write equipment receives the first MAC code that the target IC card is sent, and judge the first MAC code whether with The 2nd MAC code is consistent;
When judging that the first MAC code and the 2nd MAC code are consistent, the read-write equipment is determined to the target IC card It is proved to be successful.
3. method for unlocking as described in claim 1, which is characterized in that the read-write equipment is according to preset business rule to institute It states target IC card and verify and include:
The read-write equipment inquires institute in forbidding unlocking ID list using the mark ID of the target IC card as querying condition It states and forbids whether unlocking ID list includes the mark ID and generate query result;
When the query result forbids unlocking ID list not include the mark ID for described in, the read-write equipment is according to When the use starting of target IC card, the use end time of the target IC card, preset service life judgment rule Judge whether the service life of the target IC card expires, if judging result is no, it is determined that verify to the target IC card logical It crosses;
Wherein, the method also includes:
When the query result forbids unlocking ID list to include the mark ID for described in, the read-write equipment generates refusal and opens Lock information;
And the method also includes:
When the read-write equipment according to the target IC card it is described using originate when, the target IC card the use terminate When time, default service life judgment rule judge that the service life of the target IC card has expired, then the read-write equipment is true The fixed target IC card verification does not pass through.
4. method for unlocking as claimed in claim 3, which is characterized in that the method also includes:
When the read-write equipment determines that the target IC card verification is obstructed out-of-date, the read-write equipment is initiated to the target IC card Renew operation, wherein read-write equipment initiation includes: to the operation that renews of the target IC card
The read-write equipment obtain the target IC card generates at random first renew code and obtain the target IC card according to Second default generating mode, the relevant information and described first renew the 3rd MAC code of code generation;
The read-write equipment renews code, the 3rd MAC code and the relevant information for described first and is sent to Operation Server, So that the Operation Server generates the 4th MAC code and second renews code, judging the 3rd MAC code and the 4th MAC The 5th MAC code is generated when code is identical;
The read-write equipment receives the described of Operation Server transmission and renews information, the 5th MAC code and described second Renew code;
The read-write equipment renews code, the 5th MAC code and the information that renews for described second and is written to the target IC In card, so that the target IC card generates the 6th MAC code and enables when the 6th MAC code is identical as the 5th MAC code Described to renew information, the information that renews includes the new use end time using initial time and newly;
The method also includes:
The read-write equipment receives the prompting message that renews successfully of the target IC card transmission, and described renew successfully is prompted to disappear Breath is sent to the Operation Server.
5. such as the described in any item method for unlocking of claim 2-4, which is characterized in that the relevant information of the target IC card It further include certification sub-key;
And before the read-write equipment identifies target IC card and reads the relevant information of the target IC card, the unlocking side Method further include:
The read-write equipment executes initialization operation, wherein the read-write equipment executes initialization operation and includes:
The read-write equipment receives certification master key that write-in terminal is sent, generating according to preset-key create-rule, described Authenticating the relationship between the certification sub-key in master key and the relevant information is dispersion relation.
6. method for unlocking as described in claim 1, which is characterized in that after the read-write equipment control locking device is opened, institute State method for unlocking further include:
The read-write equipment records unlocking information, wherein the unlocking information includes existing with the mark ID of the target IC card At least one of the User ID of binding relationship, uncaging time, lockset position of coupler;
And the method for unlocking further include:
When detecting the locking request of user's triggering, the read-write equipment controls the locking device and locks and record described Read-write equipment shuts information, wherein the information that shuts includes shutting the time, shutting location information and the User ID At least one of;
The read-write equipment shuts information and the unlocking information is sent to Operation Server for described, so that the operation takes Business device shuts information according to and the unlocking information calculates cost of use that user's needs are paid and by the use Expense is sent to user terminal.
7. method for unlocking as claimed in claim 3, which is characterized in that the method for unlocking further include:
The read-write equipment is sent to Operation Server for the update for forbidding unlocking ID list according to default access frequency Request, so that the Operation Server, which receives, forbids unlocking ID to read-write equipment return is updated after the update is requested Table;
The read-write equipment receive it is described it is updated forbid unlocking ID table, and to forbid unlocking ID list to replace with described by described It is updated to forbid unlocking ID table.
8. a kind of read-write equipment based on IC card, which is characterized in that the read-write equipment includes:
Identification module, for when user triggers and unlocks request, identifying target IC card and reading the related letter of the target IC card Breath, the relevant information includes the mark ID of the target IC card;
Authentication module, for identifying target IC card and after read the relevant information of the target IC card when the identification module, The relevant information is verified according to preset proof rule;
Correction verification module, for verify to the relevant information according to preset proof rule in the authentication module and working as institute It states after relevant information is proved to be successful, verifies the relevant information according to preset business rule;
Drive module, for after the correction verification module verifies relevant information success, control locking device to be opened.
9. a kind of read-write equipment based on IC card, which is characterized in that the read-write equipment includes:
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes as claim 1-7 is any The method for unlocking based on IC card described in.
10. a kind of computer readable storage medium, which is characterized in that include being based on IC card in the computer readable storage medium Unlocking program, when the unlocking program based on IC card is executed by processor, execute as claim 1-7 it is described in any item Method for unlocking based on IC card.
CN201811558799.0A 2018-12-19 2018-12-19 Unlocking method and device based on IC card Active CN109754505B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811558799.0A CN109754505B (en) 2018-12-19 2018-12-19 Unlocking method and device based on IC card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811558799.0A CN109754505B (en) 2018-12-19 2018-12-19 Unlocking method and device based on IC card

Publications (2)

Publication Number Publication Date
CN109754505A true CN109754505A (en) 2019-05-14
CN109754505B CN109754505B (en) 2022-07-12

Family

ID=66403739

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811558799.0A Active CN109754505B (en) 2018-12-19 2018-12-19 Unlocking method and device based on IC card

Country Status (1)

Country Link
CN (1) CN109754505B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110473329A (en) * 2019-09-25 2019-11-19 永安行科技股份有限公司 Access card approaches to IM, management system and intelligent terminal
CN111383371A (en) * 2020-04-29 2020-07-07 珠海格力电器股份有限公司 Unlocking method, door lock, server, system, storage medium and electronic device
CN113470224A (en) * 2021-06-16 2021-10-01 支付宝(杭州)信息技术有限公司 Unlocking method and system
CN114743294A (en) * 2022-03-29 2022-07-12 中汽创智科技有限公司 Unlocking device, shared device unlocking method, device and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000046955A1 (en) * 1999-02-05 2000-08-10 Australian Arrow Pty Ltd. Bi-directional coding system for remote control device security
CN101667308A (en) * 2008-09-04 2010-03-10 日电(中国)有限公司 Access control system, access control devices, access card and access control method
CN102118250A (en) * 2011-01-10 2011-07-06 上海众人网络安全技术有限公司 System and method for indentifying dynamic password based on double-interface intelligent card
EP2584541A1 (en) * 2011-10-18 2013-04-24 EVVA Sicherheitstechnologie GmbH Method for access control
CN103136819A (en) * 2011-12-01 2013-06-05 联想(北京)有限公司 Unlocking method for door control system based on mobile terminal and mobile terminal
JP2013185346A (en) * 2012-03-07 2013-09-19 Miwa Lock Co Ltd Entrance/exit management system
CN104851169A (en) * 2015-05-25 2015-08-19 惠州Tcl移动通信有限公司 Wireless smart lock and unlocking control method thereof
CN105827577A (en) * 2015-01-08 2016-08-03 阿里巴巴集团控股有限公司 Method and device for information verification
CN106850235A (en) * 2017-04-08 2017-06-13 普拉斯旺(深圳)商贸有限公司 A kind of identity identifying method
CN108320152A (en) * 2018-01-17 2018-07-24 深圳喆行科技有限公司 A kind of recharge method and system of stored value card

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000046955A1 (en) * 1999-02-05 2000-08-10 Australian Arrow Pty Ltd. Bi-directional coding system for remote control device security
CN101667308A (en) * 2008-09-04 2010-03-10 日电(中国)有限公司 Access control system, access control devices, access card and access control method
CN102118250A (en) * 2011-01-10 2011-07-06 上海众人网络安全技术有限公司 System and method for indentifying dynamic password based on double-interface intelligent card
EP2584541A1 (en) * 2011-10-18 2013-04-24 EVVA Sicherheitstechnologie GmbH Method for access control
CN103136819A (en) * 2011-12-01 2013-06-05 联想(北京)有限公司 Unlocking method for door control system based on mobile terminal and mobile terminal
JP2013185346A (en) * 2012-03-07 2013-09-19 Miwa Lock Co Ltd Entrance/exit management system
CN105827577A (en) * 2015-01-08 2016-08-03 阿里巴巴集团控股有限公司 Method and device for information verification
CN104851169A (en) * 2015-05-25 2015-08-19 惠州Tcl移动通信有限公司 Wireless smart lock and unlocking control method thereof
CN106850235A (en) * 2017-04-08 2017-06-13 普拉斯旺(深圳)商贸有限公司 A kind of identity identifying method
CN108320152A (en) * 2018-01-17 2018-07-24 深圳喆行科技有限公司 A kind of recharge method and system of stored value card

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110473329A (en) * 2019-09-25 2019-11-19 永安行科技股份有限公司 Access card approaches to IM, management system and intelligent terminal
CN110473329B (en) * 2019-09-25 2021-08-20 永安行科技股份有限公司 Access control card information management method, management system and intelligent terminal
CN111383371A (en) * 2020-04-29 2020-07-07 珠海格力电器股份有限公司 Unlocking method, door lock, server, system, storage medium and electronic device
CN113470224A (en) * 2021-06-16 2021-10-01 支付宝(杭州)信息技术有限公司 Unlocking method and system
CN114743294A (en) * 2022-03-29 2022-07-12 中汽创智科技有限公司 Unlocking device, shared device unlocking method, device and storage medium

Also Published As

Publication number Publication date
CN109754505B (en) 2022-07-12

Similar Documents

Publication Publication Date Title
CN109754505A (en) A kind of method for unlocking and device based on IC card
JP7194847B2 (en) A method for authenticating the identity of digital keys, terminal devices, and media
CN100533427C (en) Remote access system
CN108881167A (en) A kind of intelligent contract of finite field block catenary system
JP2018074205A (en) Program, information processing device, information processing system, and information processing method
JP2003177938A (en) Electronic device and its debugging authentication method
CN207264475U (en) A kind of intelligent lock control system based on eID certifications
CN109328444B (en) Protection device and dongle and method of use thereof
CN106127906A (en) The unlocking method of a kind of door-control lock, Apparatus and system
CN103095659A (en) Account login method and system in internet
US9111084B2 (en) Authentication platform and related method of operation
CN109067881A (en) Remote-authorization method and its device, equipment and storage medium
CN110163998A (en) A kind of intelligent door lock application method of intelligent door lock system and offline authentication
CN109451496A (en) Connection authentication method and authentication system thereof
CN106027249B (en) Identity card card reading method and system
CN106027457A (en) Identity card information transmission method and system
CN106878122A (en) A kind of method for network access and system
CN107423609B (en) Authorization system, method and card
CN116669888A (en) Method for suspending protection of an object by a protection device
US20210279307A1 (en) Method for the secure interaction of a user with a mobile terminal and a further entity
CN103944731A (en) Data security interactive method
CN104361304A (en) Method and device for downloading application program of smart card
CN109859349A (en) A kind of entrance guard authentication method and system based on data SMS technology
US20090286511A1 (en) Granting And Use Of Rights Over A Telecommunications Network
TW201104053A (en) Digital key control system and management method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant