CN109995763A - A kind of fingerprint head encryption method and system based on cloud lock - Google Patents
A kind of fingerprint head encryption method and system based on cloud lock Download PDFInfo
- Publication number
- CN109995763A CN109995763A CN201910173176.XA CN201910173176A CN109995763A CN 109995763 A CN109995763 A CN 109995763A CN 201910173176 A CN201910173176 A CN 201910173176A CN 109995763 A CN109995763 A CN 109995763A
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- door lock
- fingerprint head
- lock end
- cloud
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Abstract
The present invention relates to a kind of fingerprint head encryption methods and system based on cloud lock, include the following steps: step 1, and PC host computer sends the instruction of encrypting fingerprint to door lock end;Step 2, door lock end generates key information after being connected to the instruction of encrypting fingerprint of PC host computer, and sends the key information at fingerprint head;Step 3, the fingerprint head establish unique corresponding binding relationship according to the received key information and the door lock end data encryption communication relationship, the fingerprint head and door lock end;Step 4, after binding success, binding information is uploaded to cloud server and recorded by the door lock end.Lock end and fingerprint head carry out the foundation of unique coded communication binding relationship to the present invention on the door in the production process that intelligent cloud is locked, to guarantee that fingerprint head cannot be replaced at will, to guarantee the safe and reliable of door lock, the improper operation for preventing user is also possible to prevent the personation production phenomenon of door lock fittings.
Description
Technical field
The present invention relates to the technical field of biometric identification of cloud lock, and in particular to a kind of fingerprint head encryption method based on cloud lock
And system.
Background technique
With the continuous development of society with progress, biological identification technology development is with rapid changepl. never-ending changes and improvements, and cloud is locked as smart home
Entrance is one of important security barriers.While cloud lock offers convenience with people's routine life, safety is also more next
More it is valued by people.And fingerprint head encryption method and system based on cloud lock, then to the communications setting of cloud lock and fingerprint head
The interactive instruction of encryption rule, cloud lock and fingerprint head must then be encrypted according to this encryption rule, be allowed for so every
One cloud lock and fingerprint head are exactly unique binding relationship, and user cannot arbitrarily replace fingerprint head, and safety greatly improves.
Summary of the invention
It is an object of the invention to aiming at the deficiencies in the prior art, provide a kind of fingerprint head encryption based on cloud lock
Method and system.
To achieve this purpose, the present invention adopts the following technical scheme:
A kind of fingerprint head encryption method based on cloud lock, which comprises the steps of:
Step 1, PC host computer send the instruction of encrypting fingerprint to door lock end;
Step 2, door lock end generate key information after being connected to the instruction of encrypting fingerprint of PC host computer, and will be described secret
Key information is sent at fingerprint head;
Step 3, the fingerprint head according to the received key information and the door lock end data encryption communication relationship,
Unique corresponding binding relationship is established at the fingerprint head and door lock end;
Step 4, after binding success, binding information is uploaded to cloud server and recorded by the door lock end.
Further description sends the fingerprint letter encrypted through key information to cloud server when the fingerprint head works
Ciphertext is ceased, if the key information sent of fingerprint hair and the key information that cloud server records are inconsistent, cloud server is refused
Establish the communication of the fingerprint head Yu the door lock end absolutely, and to door lock end have the user terminal of communication connection sound an alarm or
Prompt is given a warning on the display panel at door lock end;If the key information that fingerprint hair is sent and the code key of cloud server record are believed
Breath is consistent, then fingerprint head starts to acquire the fingerprint of user and identify.
Further description, when fingerprint head break down when, if failure can repair, between fingerprint head and door lock end after
It is continuous to use original code key;If failure unrepairable, the record in cloud server is removed, and carries out step 1 to step 4
Step re-establishes the binding connection relationship between fingerprint head and door lock end.
Further description, after replacing fingerprint head, user need to use new fingerprint head to carry out fingerprint amendment, user couple
The fingerprint of typing is verified again, and the fingerprint of authentication failed is labeled, and user is prompted to re-type accordingly
Fingerprint, the finger print information re-typed covers original finger print information, will compare successful information by the cloud server
Continue to retain.
Further description, the key information are the 16 byte key informations generated at random, the fingerprint head and door
RC4 data encryption is carried out between lock end.
A kind of fingerprint head encryption system based on cloud lock, including cloud server, PC host computer, door lock end and fingerprint head;
The cloud server, PC host computer, door lock end and fingerprint head are connected by communication network;
The PC host computer is used to send the instruction of encrypting fingerprint to the door lock end;
The door lock end is used for after being connected to the instruction of encrypting fingerprint of PC host computer, generates key information, and will be described
Key information is sent at fingerprint head, and is carried out encrypted data communications with the fingerprint head for setting up corresponding relationship and controlled lock
It opens;
The fingerprint head, which is used to obtain the key information at the door lock end and establishes unique corresponding binding with door lock end, to be added
Close correspondence is communicated with the door lock end;The fingerprint head is also used to the fingerprint collecting in normal use;
The server is used to record the binding information of fingerprint head and door lock end and the finger print information of user's typing.
Further description further includes the user terminal with cloud server communication connection;The user terminal is used for fingerprint
When the key information recorded in the key information and cloud server of head is inconsistent, the warning information of cloud server is received;Institute
State the key information of the display panel at door lock end for being recorded in the key information and cloud server of fingerprint head it is inconsistent when, connect
Receive and show the warning information of cloud server.
Further description, the cloud server further include finger print information correction module, the finger print information amendment
Module is used for after having replaced the fingerprint head, is verified the finger print information of typing and is covered the finger print information re-typed former
Some finger print informations.
Beneficial effects of the present invention: lock end and fingerprint head are uniquely encrypted on the door in the production process of intelligent cloud lock
The foundation of communication bindings relationship, thus guarantee that fingerprint head cannot be replaced at will, nothing replacing the fingerprint head of same model
Method is communicatively coupled with original door lock end, to guarantee the safe and reliable of door lock, prevents the improper operation of user, can also be to prevent
Only the personation of door lock fittings produces phenomenon.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples.
Fig. 1 is the flow chart of one embodiment of the present of invention.
Specific embodiment
To further illustrate the technical scheme of the present invention below with reference to the accompanying drawings and specific embodiments.
As shown in Figure 1, a kind of fingerprint head encryption method based on cloud lock, includes the following steps:
Step 1, PC host computer send the instruction of encrypting fingerprint to door lock end;
Step 2, door lock end generate key information after being connected to the instruction of encrypting fingerprint of PC host computer, and will be described secret
Key information is sent at fingerprint head;
Step 3, the fingerprint head according to the received key information and the door lock end data encryption communication relationship,
Unique corresponding binding relationship is established at the fingerprint head and door lock end;
Step 4, after binding success, binding information is uploaded to cloud server and recorded by the door lock end.
In the fingerprint head of automated production cloud lock, if not guaranteeing unique corresponding pass of each fingerprint head with door lock end
System, can generate security risk, while also not can guarantee the safety problem in the maintenance replacement process of subsequent fingerprint head.In this hair
In bright, since the encrypting fingerprint instruction that door lock end receives is sent by PC host computer, added with back door lock end according to this fingerprint
Close instruction generates key information and is simultaneously sent to fingerprint head, to set up the unique of fingerprint head and door lock end by this key information
Correspondence, and recorded in server beyond the clouds, therefore can directly ensure door lock in the production process of automation
End and fingerprint head just have absolute safety before factory, in addition, if will generate fingerprint head after user's replacement fingerprint head and mention
The key information of confession and the information that cloud records are inconsistent, therefore also just destroy normal logical between door lock end and fingerprint head
News relationship, therefore door lock end can not just carry out the acquisition and verifying of biological fingerprint, certain door lock end can not just open, to protect
Demonstrate,prove the safety of fingerprint head.The corresponding binding at the not modifiable door lock end and fingerprint head that are set in this way since door lock brings out factory
The situation that relationship also avoids personation imitated to a certain extent.
Further description sends the fingerprint letter encrypted through key information to cloud server when the fingerprint head works
Ciphertext is ceased, if the key information sent of fingerprint hair and the key information that cloud server records are inconsistent, cloud server is refused
Establish the communication of the fingerprint head Yu the door lock end absolutely, and to door lock end have the user terminal of communication connection sound an alarm or
Prompt is given a warning on the display panel at door lock end;If the key information that fingerprint hair is sent and the code key of cloud server record are believed
Breath is consistent, then fingerprint head starts to acquire the fingerprint of user and identify.
For user when needing to open the door, what is verified is the matching relationship of fingerprint head and door lock end, this is door lock end
The identification of qualification factory and door lock end are always maintained at the mark of original-pack state in use.Because if fingerprint head midway quilt
After people's malice is replaced, if maintenance provider's family property is from having replaced fingerprint head when repairing for fingerprint head, fingerprint head is just in this case
Its due security performance is lost, cloud server will be different according to the key information between fingerprint head and door lock end at this time
It causes this error information to give user's prompt, by the mobile terminal of user or is directly mentioned on the display panel at door lock end
Show, to prompt user fingerprints head, there are problems.It is on this basis to guarantee equipment itself in the acquisition verifying for carrying out fingerprint
It is carried out on the basis of safety and stability, therefore twice security protection, existing door lock end can be provided to the safety detection entered
Product, no matter its use fingerprint authentication or additionally using other auth methods enhance detection safety means be all from
The improvement carried out in the method for Information Authentication, and can not guarantee the safe and reliable of itself product itself, if door lock end is verified
With regard to unreliable, the reliability of other authentications carried out on this basis is also just difficult to ensure the check system of itself.
Further description, when fingerprint head break down when, if failure can repair, between fingerprint head and door lock end after
It is continuous to use original code key;If failure unrepairable, the record in cloud server is removed, and carries out step 1 to step 4
Step re-establishes the binding connection relationship between fingerprint head and door lock end.
Fingerprint head needs repairing if there is failure, if failure can repair, continues to use that there is no problem after repairing;Such as
Fruit failure unrepairable when needing replacing fingerprint head, then needs to remove what original fingerprint head and cloud lock in cloud server were established
Correspondence re-establishes unique encryption communication relationship, because not can guarantee fingerprint head is script producer after replacement fingerprint head
The replacement component of offer is just difficult to ensure the safety of fingerprint head if it is imitation or the production of other producers fingerprint head, because
The communication relations between fingerprint head and door lock end must be just re-established after this replacement fingerprint head, to guarantee that user is using newly
The security performance of fingerprint head.
Further description, after replacing fingerprint head, user need to use new fingerprint head to carry out fingerprint amendment, user couple
The fingerprint of typing is verified again, and the fingerprint of authentication failed is labeled, and user is prompted to re-type accordingly
Fingerprint, the finger print information re-typed covers original finger print information, will compare successful information by the cloud server
Continue to retain.
Under normal circumstances because fingerprint head might have individual difference when because dispatching from the factory, the testing result meeting to fingerprint
There is different, if user has replaced fingerprint head, and the multiple fingerprints for enabling of typing before user, then using
Family just needs to re-type fingerprint, since the process of typing fingerprint needs repeatedly pressing finger to be acquired, brings very much
It is inconvenient.And if user after having replaced fingerprint head, is when first used first verifying the fingerprint of typing, only will it not test
It demonstrate,proves the fingerprint passed through to re-type, thus can largely simplify the operating procedure of user, the use of convenient user.
Further description, the key information are the 16 byte key informations generated at random, the fingerprint head and door
RC4 data encryption is carried out between lock end.
The characteristics of RC4 algorithm is that algorithm is simple, and the speed of service is fast, and the speed of the algorithm can achieve 10 times of des encryption
Left and right, and have very high level non-linear.It is applied to the purpose that fast reaction unlocking may be implemented on door lock end.
A kind of fingerprint head encryption system based on cloud lock, including cloud server, PC host computer, door lock end and fingerprint head;
The cloud server, PC host computer, door lock end and fingerprint head are connected by communication network;
The PC host computer is used to send the instruction of encrypting fingerprint to the door lock end;
The door lock end is used for after being connected to the instruction of encrypting fingerprint of PC host computer, generates key information, and will be described
Key information is sent at fingerprint head, and is carried out encrypted data communications with the fingerprint head for setting up corresponding relationship and controlled lock
It opens;
The fingerprint head, which is used to obtain the key information at the door lock end and establishes unique corresponding binding with door lock end, to be added
Close correspondence is communicated with the door lock end;The fingerprint head is also used to the fingerprint collecting in normal use;
The server is used to record the binding information of fingerprint head and door lock end and the finger print information of user's typing.
Further description further includes the user terminal with cloud server communication connection;The user terminal is used for fingerprint
When the key information recorded in the key information and cloud server of head is inconsistent, the warning information of cloud server is received;Institute
State the key information of the display panel at door lock end for being recorded in the key information and cloud server of fingerprint head it is inconsistent when, connect
Receive and show the warning information of cloud server.
Further description, the cloud server further include finger print information correction module, the finger print information amendment
Module is used for after having replaced the fingerprint head, is verified the finger print information of typing and is covered the finger print information re-typed former
Some finger print informations.
The above is only a preferred embodiment of the present invention, for those of ordinary skill in the art, according to the present invention
Thought, there will be changes in the specific implementation manner and application range, and the content of the present specification should not be construed as to the present invention
Limitation.
Claims (8)
1. a kind of fingerprint head encryption method based on cloud lock, which comprises the steps of:
Step 1, PC host computer send the instruction of encrypting fingerprint to door lock end;
Step 2, door lock end generates key information after being connected to the instruction of encrypting fingerprint of PC host computer, and the code key is believed
Breath is sent at fingerprint head;
Step 3, the fingerprint head are described according to the received key information and the door lock end data encryption communication relationship
Unique corresponding binding relationship is established at fingerprint head and door lock end;
Step 4, after binding success, binding information is uploaded to cloud server and recorded by the door lock end.
2. a kind of fingerprint head encryption method based on cloud lock according to claim 1, it is characterised in that: the fingerprint head work
The finger print information ciphertext that encrypts through key information is sent to cloud server when making, if key information that fingerprint hair is sent and cloud
The key information of server record is inconsistent, then cloud server refusal establishes the communication of the fingerprint head Yu the door lock end,
And there is the user terminal of communication connection to sound an alarm or give a warning on the display panel at door lock end prompt to door lock end;If referring to
The key information that line hair is sent is consistent with the key information that cloud server records, then fingerprint head starts the fingerprint of acquisition user simultaneously
It is identified.
3. a kind of fingerprint head encryption method based on cloud lock according to claim 1, it is characterised in that: when fingerprint head occurs
When failure, if failure can repair, original code key is continued to use between fingerprint head and door lock end;If failure unrepairable, clearly
Except the record in cloud server, and the step of carrying out step 1 to step 4, it re-establishes between fingerprint head and door lock end
Bind connection relationship.
4. a kind of fingerprint head encryption method based on cloud lock according to claim 3, it is characterised in that: when replacement fingerprint head
Afterwards, user need to use new fingerprint head to carry out fingerprint amendment, and user verifies the fingerprint of typing again, will verify
The fingerprint of failure is labeled, and user is prompted to re-type corresponding fingerprint, the finger that the cloud server will re-type
Line information covers original finger print information, will compare successful information and continues to retain.
5. a kind of fingerprint head encryption method based on cloud lock according to claim 1, it is characterised in that: the key information
For the 16 byte key informations generated at random, RC4 data encryption is carried out between the fingerprint head and door lock end.
6. a kind of fingerprint head encryption system based on cloud lock, it is characterised in that: including cloud server, PC host computer, door lock end
With fingerprint head;The cloud server, PC host computer, door lock end and fingerprint head are connected by communication network;
The PC host computer is used to send the instruction of encrypting fingerprint to the door lock end;
The door lock end is used for after being connected to the instruction of encrypting fingerprint of PC host computer, generates key information, and by the code key
Information is sent at fingerprint head, and is carried out encrypted data communications with the fingerprint head for setting up corresponding relationship and controlled beating for lock
It opens;
The fingerprint head, which is used to obtain the key information at the door lock end and establishes unique corresponding binding encryption with door lock end, to be led to
Gateway system is communicated with the door lock end;The fingerprint head is also used to the fingerprint collecting in normal use;
The server is used to record the binding information of fingerprint head and door lock end and the finger print information of user's typing.
7. a kind of fingerprint head encryption system based on cloud lock according to claim 6, it is characterised in that: further include and cloud
The user terminal of server communication connection;Code key of the user terminal for being recorded in the key information and cloud server of fingerprint head
When information is inconsistent, the warning information of cloud server is received;Code key of the display panel at the door lock end for fingerprint head is believed
When the key information recorded in breath and cloud server is inconsistent, the warning information of cloud server is received and shown.
8. a kind of fingerprint head encryption system based on cloud lock according to claim 6, it is characterised in that: the cloud service
Device further includes finger print information correction module, and the finger print information correction module is used for after having replaced the fingerprint head, verifying record
The finger print information re-typed is simultaneously covered original finger print information by the finger print information that entered.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910173176.XA CN109995763B (en) | 2019-03-07 | 2019-03-07 | Fingerprint head encryption method and system based on cloud lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910173176.XA CN109995763B (en) | 2019-03-07 | 2019-03-07 | Fingerprint head encryption method and system based on cloud lock |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109995763A true CN109995763A (en) | 2019-07-09 |
CN109995763B CN109995763B (en) | 2022-03-29 |
Family
ID=67130299
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910173176.XA Active CN109995763B (en) | 2019-03-07 | 2019-03-07 | Fingerprint head encryption method and system based on cloud lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109995763B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111444051A (en) * | 2020-03-26 | 2020-07-24 | 杭州涂鸦信息技术有限公司 | Complete machine production testing method and system for product |
CN111768527A (en) * | 2020-06-30 | 2020-10-13 | 惠州拓邦电气技术有限公司 | Method and device for inputting user fingerprint of intelligent lock, intelligent lock and system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2787785Y (en) * | 2005-04-30 | 2006-06-14 | 罗蕾蕾 | Encryption fingerprint lock for automobile |
CN104802754A (en) * | 2015-05-20 | 2015-07-29 | 张彬彬 | Fingerprint identification type automobile burglar alarm |
CN106296933A (en) * | 2016-08-23 | 2017-01-04 | 宁波力芯科信息科技有限公司 | The implementation method of a kind of smart lock and smart lock |
US20170142589A1 (en) * | 2015-11-18 | 2017-05-18 | Samsung Electronics Co., Ltd | Method for adjusting usage policy and electronic device for supporting the same |
CN106991748A (en) * | 2017-05-11 | 2017-07-28 | 广东汇泰龙科技有限公司 | A kind of household scene interlock method and its system that fingerprint recognition is locked based on cloud |
US20170374047A1 (en) * | 2016-06-28 | 2017-12-28 | Toyota Jidosha Kabushiki Kaisha | Locking and unlocking system and key unit |
CN108109242A (en) * | 2017-12-21 | 2018-06-01 | 广东汇泰龙科技有限公司 | A kind of hardware encryption method unlocked based on fingerprint, system, intelligent cloud lock |
CN108266061A (en) * | 2017-12-29 | 2018-07-10 | 武汉九万里科技有限公司 | Fingerprint lock |
-
2019
- 2019-03-07 CN CN201910173176.XA patent/CN109995763B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2787785Y (en) * | 2005-04-30 | 2006-06-14 | 罗蕾蕾 | Encryption fingerprint lock for automobile |
CN104802754A (en) * | 2015-05-20 | 2015-07-29 | 张彬彬 | Fingerprint identification type automobile burglar alarm |
US20170142589A1 (en) * | 2015-11-18 | 2017-05-18 | Samsung Electronics Co., Ltd | Method for adjusting usage policy and electronic device for supporting the same |
US20170374047A1 (en) * | 2016-06-28 | 2017-12-28 | Toyota Jidosha Kabushiki Kaisha | Locking and unlocking system and key unit |
CN106296933A (en) * | 2016-08-23 | 2017-01-04 | 宁波力芯科信息科技有限公司 | The implementation method of a kind of smart lock and smart lock |
CN106991748A (en) * | 2017-05-11 | 2017-07-28 | 广东汇泰龙科技有限公司 | A kind of household scene interlock method and its system that fingerprint recognition is locked based on cloud |
CN108109242A (en) * | 2017-12-21 | 2018-06-01 | 广东汇泰龙科技有限公司 | A kind of hardware encryption method unlocked based on fingerprint, system, intelligent cloud lock |
CN108266061A (en) * | 2017-12-29 | 2018-07-10 | 武汉九万里科技有限公司 | Fingerprint lock |
Non-Patent Citations (2)
Title |
---|
ROHITH R ET AL: "IoT Based Embedded Smart Lock Control System", 《IJESC》 * |
张信: "智能指纹锁的研究与实现", 《中国优秀硕士论文全文库信息科技辑》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111444051A (en) * | 2020-03-26 | 2020-07-24 | 杭州涂鸦信息技术有限公司 | Complete machine production testing method and system for product |
CN111444051B (en) * | 2020-03-26 | 2023-10-20 | 杭州涂鸦信息技术有限公司 | Whole machine yield testing method and system for product |
CN111768527A (en) * | 2020-06-30 | 2020-10-13 | 惠州拓邦电气技术有限公司 | Method and device for inputting user fingerprint of intelligent lock, intelligent lock and system |
Also Published As
Publication number | Publication date |
---|---|
CN109995763B (en) | 2022-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109150541B (en) | Authentication system and working method thereof | |
CN105554035B (en) | A kind of electronic lock system and its control method | |
CN104125226B (en) | A kind of method, apparatus and system for locking and unlocking application | |
CN202003425U (en) | Central management system for monitoring intelligent lock | |
CN106488452B (en) | Mobile terminal safety access authentication method combining fingerprint | |
CN105933280A (en) | Identity authentication method and system | |
KR100341147B1 (en) | A user Authentication system and control method using Bio-Information in Internet/Intranet environment | |
CN105632002B (en) | A kind of multiple confirmation method for safely carrying out of identification and running fix based on Internet of Things | |
CN107733636A (en) | Authentication method and Verification System | |
CN108965294A (en) | A kind of user name and cipher protection system | |
CN110768973A (en) | Signaling safety evaluation system and method based on GB35114 standard | |
CN107911224A (en) | The continuous card method and system of universal embedded integrated circuit card | |
CN109285256A (en) | Computer room based on block chain authentication enter permission give method | |
CN111435390A (en) | Safety protection method for operation and maintenance tool of power distribution terminal | |
CN109995763A (en) | A kind of fingerprint head encryption method and system based on cloud lock | |
CN110445805A (en) | A kind of false-proof authentication system and method for two dimensional code | |
CN109829722A (en) | A kind of user identity real name identification method of electronic fare payment system | |
CN111435389A (en) | Power distribution terminal operation and maintenance tool safety protection system | |
CN104703180A (en) | Implicit multiple authentication method based on mobile Internet and intelligent terminal | |
CN104883260B (en) | Certificate information processing and verification method, processing terminal and authentication server | |
CN107566048B (en) | A method of two step of optical module, which is carried out, using data-interface demonstrate,proves | |
CN104134294B (en) | Authorization authentication method based on business hall self-service terminal | |
CN109041055A (en) | A kind of mobile terminal for financial secure environment and gateway server transmission method | |
CN109584421A (en) | A kind of intelligent door lock authentication administrative system based on domestic safety chip | |
CN102332066B (en) | Authentication management system and method of code jumping chip identification codes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: No.1 Dongtai Road, Eastern Industrial Park, Lishui Town, Nanhai District, Foshan City, Guangdong Province Applicant after: Guangdong Huitailong Technology Co.,Ltd. Applicant after: Foshan huitailong Intelligent Technology Co., Ltd Address before: No.1 Dongtai Road, Eastern Industrial Park, Lishui Town, Nanhai District, Foshan City, Guangdong Province Applicant before: GUANGDONG HUTLON TECHNOLOGY Co.,Ltd. Applicant before: Foshan huitailong Intelligent Technology Co., Ltd |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |