CN109995763A - A kind of fingerprint head encryption method and system based on cloud lock - Google Patents

A kind of fingerprint head encryption method and system based on cloud lock Download PDF

Info

Publication number
CN109995763A
CN109995763A CN201910173176.XA CN201910173176A CN109995763A CN 109995763 A CN109995763 A CN 109995763A CN 201910173176 A CN201910173176 A CN 201910173176A CN 109995763 A CN109995763 A CN 109995763A
Authority
CN
China
Prior art keywords
fingerprint
door lock
fingerprint head
lock end
cloud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910173176.XA
Other languages
Chinese (zh)
Other versions
CN109995763B (en
Inventor
刘洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hutlon Technology Co Ltd
Foshan Hutlon Intelligent Technology Co Ltd
Original Assignee
Guangdong Hutlon Technology Co Ltd
Foshan Hutlon Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hutlon Technology Co Ltd, Foshan Hutlon Intelligent Technology Co Ltd filed Critical Guangdong Hutlon Technology Co Ltd
Priority to CN201910173176.XA priority Critical patent/CN109995763B/en
Publication of CN109995763A publication Critical patent/CN109995763A/en
Application granted granted Critical
Publication of CN109995763B publication Critical patent/CN109995763B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Abstract

The present invention relates to a kind of fingerprint head encryption methods and system based on cloud lock, include the following steps: step 1, and PC host computer sends the instruction of encrypting fingerprint to door lock end;Step 2, door lock end generates key information after being connected to the instruction of encrypting fingerprint of PC host computer, and sends the key information at fingerprint head;Step 3, the fingerprint head establish unique corresponding binding relationship according to the received key information and the door lock end data encryption communication relationship, the fingerprint head and door lock end;Step 4, after binding success, binding information is uploaded to cloud server and recorded by the door lock end.Lock end and fingerprint head carry out the foundation of unique coded communication binding relationship to the present invention on the door in the production process that intelligent cloud is locked, to guarantee that fingerprint head cannot be replaced at will, to guarantee the safe and reliable of door lock, the improper operation for preventing user is also possible to prevent the personation production phenomenon of door lock fittings.

Description

A kind of fingerprint head encryption method and system based on cloud lock
Technical field
The present invention relates to the technical field of biometric identification of cloud lock, and in particular to a kind of fingerprint head encryption method based on cloud lock And system.
Background technique
With the continuous development of society with progress, biological identification technology development is with rapid changepl. never-ending changes and improvements, and cloud is locked as smart home Entrance is one of important security barriers.While cloud lock offers convenience with people's routine life, safety is also more next More it is valued by people.And fingerprint head encryption method and system based on cloud lock, then to the communications setting of cloud lock and fingerprint head The interactive instruction of encryption rule, cloud lock and fingerprint head must then be encrypted according to this encryption rule, be allowed for so every One cloud lock and fingerprint head are exactly unique binding relationship, and user cannot arbitrarily replace fingerprint head, and safety greatly improves.
Summary of the invention
It is an object of the invention to aiming at the deficiencies in the prior art, provide a kind of fingerprint head encryption based on cloud lock Method and system.
To achieve this purpose, the present invention adopts the following technical scheme:
A kind of fingerprint head encryption method based on cloud lock, which comprises the steps of:
Step 1, PC host computer send the instruction of encrypting fingerprint to door lock end;
Step 2, door lock end generate key information after being connected to the instruction of encrypting fingerprint of PC host computer, and will be described secret Key information is sent at fingerprint head;
Step 3, the fingerprint head according to the received key information and the door lock end data encryption communication relationship, Unique corresponding binding relationship is established at the fingerprint head and door lock end;
Step 4, after binding success, binding information is uploaded to cloud server and recorded by the door lock end.
Further description sends the fingerprint letter encrypted through key information to cloud server when the fingerprint head works Ciphertext is ceased, if the key information sent of fingerprint hair and the key information that cloud server records are inconsistent, cloud server is refused Establish the communication of the fingerprint head Yu the door lock end absolutely, and to door lock end have the user terminal of communication connection sound an alarm or Prompt is given a warning on the display panel at door lock end;If the key information that fingerprint hair is sent and the code key of cloud server record are believed Breath is consistent, then fingerprint head starts to acquire the fingerprint of user and identify.
Further description, when fingerprint head break down when, if failure can repair, between fingerprint head and door lock end after It is continuous to use original code key;If failure unrepairable, the record in cloud server is removed, and carries out step 1 to step 4 Step re-establishes the binding connection relationship between fingerprint head and door lock end.
Further description, after replacing fingerprint head, user need to use new fingerprint head to carry out fingerprint amendment, user couple The fingerprint of typing is verified again, and the fingerprint of authentication failed is labeled, and user is prompted to re-type accordingly Fingerprint, the finger print information re-typed covers original finger print information, will compare successful information by the cloud server Continue to retain.
Further description, the key information are the 16 byte key informations generated at random, the fingerprint head and door RC4 data encryption is carried out between lock end.
A kind of fingerprint head encryption system based on cloud lock, including cloud server, PC host computer, door lock end and fingerprint head; The cloud server, PC host computer, door lock end and fingerprint head are connected by communication network;
The PC host computer is used to send the instruction of encrypting fingerprint to the door lock end;
The door lock end is used for after being connected to the instruction of encrypting fingerprint of PC host computer, generates key information, and will be described Key information is sent at fingerprint head, and is carried out encrypted data communications with the fingerprint head for setting up corresponding relationship and controlled lock It opens;
The fingerprint head, which is used to obtain the key information at the door lock end and establishes unique corresponding binding with door lock end, to be added Close correspondence is communicated with the door lock end;The fingerprint head is also used to the fingerprint collecting in normal use;
The server is used to record the binding information of fingerprint head and door lock end and the finger print information of user's typing.
Further description further includes the user terminal with cloud server communication connection;The user terminal is used for fingerprint When the key information recorded in the key information and cloud server of head is inconsistent, the warning information of cloud server is received;Institute State the key information of the display panel at door lock end for being recorded in the key information and cloud server of fingerprint head it is inconsistent when, connect Receive and show the warning information of cloud server.
Further description, the cloud server further include finger print information correction module, the finger print information amendment Module is used for after having replaced the fingerprint head, is verified the finger print information of typing and is covered the finger print information re-typed former Some finger print informations.
Beneficial effects of the present invention: lock end and fingerprint head are uniquely encrypted on the door in the production process of intelligent cloud lock The foundation of communication bindings relationship, thus guarantee that fingerprint head cannot be replaced at will, nothing replacing the fingerprint head of same model Method is communicatively coupled with original door lock end, to guarantee the safe and reliable of door lock, prevents the improper operation of user, can also be to prevent Only the personation of door lock fittings produces phenomenon.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples.
Fig. 1 is the flow chart of one embodiment of the present of invention.
Specific embodiment
To further illustrate the technical scheme of the present invention below with reference to the accompanying drawings and specific embodiments.
As shown in Figure 1, a kind of fingerprint head encryption method based on cloud lock, includes the following steps:
Step 1, PC host computer send the instruction of encrypting fingerprint to door lock end;
Step 2, door lock end generate key information after being connected to the instruction of encrypting fingerprint of PC host computer, and will be described secret Key information is sent at fingerprint head;
Step 3, the fingerprint head according to the received key information and the door lock end data encryption communication relationship, Unique corresponding binding relationship is established at the fingerprint head and door lock end;
Step 4, after binding success, binding information is uploaded to cloud server and recorded by the door lock end.
In the fingerprint head of automated production cloud lock, if not guaranteeing unique corresponding pass of each fingerprint head with door lock end System, can generate security risk, while also not can guarantee the safety problem in the maintenance replacement process of subsequent fingerprint head.In this hair In bright, since the encrypting fingerprint instruction that door lock end receives is sent by PC host computer, added with back door lock end according to this fingerprint Close instruction generates key information and is simultaneously sent to fingerprint head, to set up the unique of fingerprint head and door lock end by this key information Correspondence, and recorded in server beyond the clouds, therefore can directly ensure door lock in the production process of automation End and fingerprint head just have absolute safety before factory, in addition, if will generate fingerprint head after user's replacement fingerprint head and mention The key information of confession and the information that cloud records are inconsistent, therefore also just destroy normal logical between door lock end and fingerprint head News relationship, therefore door lock end can not just carry out the acquisition and verifying of biological fingerprint, certain door lock end can not just open, to protect Demonstrate,prove the safety of fingerprint head.The corresponding binding at the not modifiable door lock end and fingerprint head that are set in this way since door lock brings out factory The situation that relationship also avoids personation imitated to a certain extent.
Further description sends the fingerprint letter encrypted through key information to cloud server when the fingerprint head works Ciphertext is ceased, if the key information sent of fingerprint hair and the key information that cloud server records are inconsistent, cloud server is refused Establish the communication of the fingerprint head Yu the door lock end absolutely, and to door lock end have the user terminal of communication connection sound an alarm or Prompt is given a warning on the display panel at door lock end;If the key information that fingerprint hair is sent and the code key of cloud server record are believed Breath is consistent, then fingerprint head starts to acquire the fingerprint of user and identify.
For user when needing to open the door, what is verified is the matching relationship of fingerprint head and door lock end, this is door lock end The identification of qualification factory and door lock end are always maintained at the mark of original-pack state in use.Because if fingerprint head midway quilt After people's malice is replaced, if maintenance provider's family property is from having replaced fingerprint head when repairing for fingerprint head, fingerprint head is just in this case Its due security performance is lost, cloud server will be different according to the key information between fingerprint head and door lock end at this time It causes this error information to give user's prompt, by the mobile terminal of user or is directly mentioned on the display panel at door lock end Show, to prompt user fingerprints head, there are problems.It is on this basis to guarantee equipment itself in the acquisition verifying for carrying out fingerprint It is carried out on the basis of safety and stability, therefore twice security protection, existing door lock end can be provided to the safety detection entered Product, no matter its use fingerprint authentication or additionally using other auth methods enhance detection safety means be all from The improvement carried out in the method for Information Authentication, and can not guarantee the safe and reliable of itself product itself, if door lock end is verified With regard to unreliable, the reliability of other authentications carried out on this basis is also just difficult to ensure the check system of itself.
Further description, when fingerprint head break down when, if failure can repair, between fingerprint head and door lock end after It is continuous to use original code key;If failure unrepairable, the record in cloud server is removed, and carries out step 1 to step 4 Step re-establishes the binding connection relationship between fingerprint head and door lock end.
Fingerprint head needs repairing if there is failure, if failure can repair, continues to use that there is no problem after repairing;Such as Fruit failure unrepairable when needing replacing fingerprint head, then needs to remove what original fingerprint head and cloud lock in cloud server were established Correspondence re-establishes unique encryption communication relationship, because not can guarantee fingerprint head is script producer after replacement fingerprint head The replacement component of offer is just difficult to ensure the safety of fingerprint head if it is imitation or the production of other producers fingerprint head, because The communication relations between fingerprint head and door lock end must be just re-established after this replacement fingerprint head, to guarantee that user is using newly The security performance of fingerprint head.
Further description, after replacing fingerprint head, user need to use new fingerprint head to carry out fingerprint amendment, user couple The fingerprint of typing is verified again, and the fingerprint of authentication failed is labeled, and user is prompted to re-type accordingly Fingerprint, the finger print information re-typed covers original finger print information, will compare successful information by the cloud server Continue to retain.
Under normal circumstances because fingerprint head might have individual difference when because dispatching from the factory, the testing result meeting to fingerprint There is different, if user has replaced fingerprint head, and the multiple fingerprints for enabling of typing before user, then using Family just needs to re-type fingerprint, since the process of typing fingerprint needs repeatedly pressing finger to be acquired, brings very much It is inconvenient.And if user after having replaced fingerprint head, is when first used first verifying the fingerprint of typing, only will it not test It demonstrate,proves the fingerprint passed through to re-type, thus can largely simplify the operating procedure of user, the use of convenient user.
Further description, the key information are the 16 byte key informations generated at random, the fingerprint head and door RC4 data encryption is carried out between lock end.
The characteristics of RC4 algorithm is that algorithm is simple, and the speed of service is fast, and the speed of the algorithm can achieve 10 times of des encryption Left and right, and have very high level non-linear.It is applied to the purpose that fast reaction unlocking may be implemented on door lock end.
A kind of fingerprint head encryption system based on cloud lock, including cloud server, PC host computer, door lock end and fingerprint head; The cloud server, PC host computer, door lock end and fingerprint head are connected by communication network;
The PC host computer is used to send the instruction of encrypting fingerprint to the door lock end;
The door lock end is used for after being connected to the instruction of encrypting fingerprint of PC host computer, generates key information, and will be described Key information is sent at fingerprint head, and is carried out encrypted data communications with the fingerprint head for setting up corresponding relationship and controlled lock It opens;
The fingerprint head, which is used to obtain the key information at the door lock end and establishes unique corresponding binding with door lock end, to be added Close correspondence is communicated with the door lock end;The fingerprint head is also used to the fingerprint collecting in normal use;
The server is used to record the binding information of fingerprint head and door lock end and the finger print information of user's typing.
Further description further includes the user terminal with cloud server communication connection;The user terminal is used for fingerprint When the key information recorded in the key information and cloud server of head is inconsistent, the warning information of cloud server is received;Institute State the key information of the display panel at door lock end for being recorded in the key information and cloud server of fingerprint head it is inconsistent when, connect Receive and show the warning information of cloud server.
Further description, the cloud server further include finger print information correction module, the finger print information amendment Module is used for after having replaced the fingerprint head, is verified the finger print information of typing and is covered the finger print information re-typed former Some finger print informations.
The above is only a preferred embodiment of the present invention, for those of ordinary skill in the art, according to the present invention Thought, there will be changes in the specific implementation manner and application range, and the content of the present specification should not be construed as to the present invention Limitation.

Claims (8)

1. a kind of fingerprint head encryption method based on cloud lock, which comprises the steps of:
Step 1, PC host computer send the instruction of encrypting fingerprint to door lock end;
Step 2, door lock end generates key information after being connected to the instruction of encrypting fingerprint of PC host computer, and the code key is believed Breath is sent at fingerprint head;
Step 3, the fingerprint head are described according to the received key information and the door lock end data encryption communication relationship Unique corresponding binding relationship is established at fingerprint head and door lock end;
Step 4, after binding success, binding information is uploaded to cloud server and recorded by the door lock end.
2. a kind of fingerprint head encryption method based on cloud lock according to claim 1, it is characterised in that: the fingerprint head work The finger print information ciphertext that encrypts through key information is sent to cloud server when making, if key information that fingerprint hair is sent and cloud The key information of server record is inconsistent, then cloud server refusal establishes the communication of the fingerprint head Yu the door lock end, And there is the user terminal of communication connection to sound an alarm or give a warning on the display panel at door lock end prompt to door lock end;If referring to The key information that line hair is sent is consistent with the key information that cloud server records, then fingerprint head starts the fingerprint of acquisition user simultaneously It is identified.
3. a kind of fingerprint head encryption method based on cloud lock according to claim 1, it is characterised in that: when fingerprint head occurs When failure, if failure can repair, original code key is continued to use between fingerprint head and door lock end;If failure unrepairable, clearly Except the record in cloud server, and the step of carrying out step 1 to step 4, it re-establishes between fingerprint head and door lock end Bind connection relationship.
4. a kind of fingerprint head encryption method based on cloud lock according to claim 3, it is characterised in that: when replacement fingerprint head Afterwards, user need to use new fingerprint head to carry out fingerprint amendment, and user verifies the fingerprint of typing again, will verify The fingerprint of failure is labeled, and user is prompted to re-type corresponding fingerprint, the finger that the cloud server will re-type Line information covers original finger print information, will compare successful information and continues to retain.
5. a kind of fingerprint head encryption method based on cloud lock according to claim 1, it is characterised in that: the key information For the 16 byte key informations generated at random, RC4 data encryption is carried out between the fingerprint head and door lock end.
6. a kind of fingerprint head encryption system based on cloud lock, it is characterised in that: including cloud server, PC host computer, door lock end With fingerprint head;The cloud server, PC host computer, door lock end and fingerprint head are connected by communication network;
The PC host computer is used to send the instruction of encrypting fingerprint to the door lock end;
The door lock end is used for after being connected to the instruction of encrypting fingerprint of PC host computer, generates key information, and by the code key Information is sent at fingerprint head, and is carried out encrypted data communications with the fingerprint head for setting up corresponding relationship and controlled beating for lock It opens;
The fingerprint head, which is used to obtain the key information at the door lock end and establishes unique corresponding binding encryption with door lock end, to be led to Gateway system is communicated with the door lock end;The fingerprint head is also used to the fingerprint collecting in normal use;
The server is used to record the binding information of fingerprint head and door lock end and the finger print information of user's typing.
7. a kind of fingerprint head encryption system based on cloud lock according to claim 6, it is characterised in that: further include and cloud The user terminal of server communication connection;Code key of the user terminal for being recorded in the key information and cloud server of fingerprint head When information is inconsistent, the warning information of cloud server is received;Code key of the display panel at the door lock end for fingerprint head is believed When the key information recorded in breath and cloud server is inconsistent, the warning information of cloud server is received and shown.
8. a kind of fingerprint head encryption system based on cloud lock according to claim 6, it is characterised in that: the cloud service Device further includes finger print information correction module, and the finger print information correction module is used for after having replaced the fingerprint head, verifying record The finger print information re-typed is simultaneously covered original finger print information by the finger print information that entered.
CN201910173176.XA 2019-03-07 2019-03-07 Fingerprint head encryption method and system based on cloud lock Active CN109995763B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910173176.XA CN109995763B (en) 2019-03-07 2019-03-07 Fingerprint head encryption method and system based on cloud lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910173176.XA CN109995763B (en) 2019-03-07 2019-03-07 Fingerprint head encryption method and system based on cloud lock

Publications (2)

Publication Number Publication Date
CN109995763A true CN109995763A (en) 2019-07-09
CN109995763B CN109995763B (en) 2022-03-29

Family

ID=67130299

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910173176.XA Active CN109995763B (en) 2019-03-07 2019-03-07 Fingerprint head encryption method and system based on cloud lock

Country Status (1)

Country Link
CN (1) CN109995763B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111444051A (en) * 2020-03-26 2020-07-24 杭州涂鸦信息技术有限公司 Complete machine production testing method and system for product
CN111768527A (en) * 2020-06-30 2020-10-13 惠州拓邦电气技术有限公司 Method and device for inputting user fingerprint of intelligent lock, intelligent lock and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2787785Y (en) * 2005-04-30 2006-06-14 罗蕾蕾 Encryption fingerprint lock for automobile
CN104802754A (en) * 2015-05-20 2015-07-29 张彬彬 Fingerprint identification type automobile burglar alarm
CN106296933A (en) * 2016-08-23 2017-01-04 宁波力芯科信息科技有限公司 The implementation method of a kind of smart lock and smart lock
US20170142589A1 (en) * 2015-11-18 2017-05-18 Samsung Electronics Co., Ltd Method for adjusting usage policy and electronic device for supporting the same
CN106991748A (en) * 2017-05-11 2017-07-28 广东汇泰龙科技有限公司 A kind of household scene interlock method and its system that fingerprint recognition is locked based on cloud
US20170374047A1 (en) * 2016-06-28 2017-12-28 Toyota Jidosha Kabushiki Kaisha Locking and unlocking system and key unit
CN108109242A (en) * 2017-12-21 2018-06-01 广东汇泰龙科技有限公司 A kind of hardware encryption method unlocked based on fingerprint, system, intelligent cloud lock
CN108266061A (en) * 2017-12-29 2018-07-10 武汉九万里科技有限公司 Fingerprint lock

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2787785Y (en) * 2005-04-30 2006-06-14 罗蕾蕾 Encryption fingerprint lock for automobile
CN104802754A (en) * 2015-05-20 2015-07-29 张彬彬 Fingerprint identification type automobile burglar alarm
US20170142589A1 (en) * 2015-11-18 2017-05-18 Samsung Electronics Co., Ltd Method for adjusting usage policy and electronic device for supporting the same
US20170374047A1 (en) * 2016-06-28 2017-12-28 Toyota Jidosha Kabushiki Kaisha Locking and unlocking system and key unit
CN106296933A (en) * 2016-08-23 2017-01-04 宁波力芯科信息科技有限公司 The implementation method of a kind of smart lock and smart lock
CN106991748A (en) * 2017-05-11 2017-07-28 广东汇泰龙科技有限公司 A kind of household scene interlock method and its system that fingerprint recognition is locked based on cloud
CN108109242A (en) * 2017-12-21 2018-06-01 广东汇泰龙科技有限公司 A kind of hardware encryption method unlocked based on fingerprint, system, intelligent cloud lock
CN108266061A (en) * 2017-12-29 2018-07-10 武汉九万里科技有限公司 Fingerprint lock

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ROHITH R ET AL: "IoT Based Embedded Smart Lock Control System", 《IJESC》 *
张信: "智能指纹锁的研究与实现", 《中国优秀硕士论文全文库信息科技辑》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111444051A (en) * 2020-03-26 2020-07-24 杭州涂鸦信息技术有限公司 Complete machine production testing method and system for product
CN111444051B (en) * 2020-03-26 2023-10-20 杭州涂鸦信息技术有限公司 Whole machine yield testing method and system for product
CN111768527A (en) * 2020-06-30 2020-10-13 惠州拓邦电气技术有限公司 Method and device for inputting user fingerprint of intelligent lock, intelligent lock and system

Also Published As

Publication number Publication date
CN109995763B (en) 2022-03-29

Similar Documents

Publication Publication Date Title
CN109150541B (en) Authentication system and working method thereof
CN105554035B (en) A kind of electronic lock system and its control method
CN104125226B (en) A kind of method, apparatus and system for locking and unlocking application
CN202003425U (en) Central management system for monitoring intelligent lock
CN106488452B (en) Mobile terminal safety access authentication method combining fingerprint
CN105933280A (en) Identity authentication method and system
KR100341147B1 (en) A user Authentication system and control method using Bio-Information in Internet/Intranet environment
CN105632002B (en) A kind of multiple confirmation method for safely carrying out of identification and running fix based on Internet of Things
CN107733636A (en) Authentication method and Verification System
CN108965294A (en) A kind of user name and cipher protection system
CN110768973A (en) Signaling safety evaluation system and method based on GB35114 standard
CN107911224A (en) The continuous card method and system of universal embedded integrated circuit card
CN109285256A (en) Computer room based on block chain authentication enter permission give method
CN111435390A (en) Safety protection method for operation and maintenance tool of power distribution terminal
CN109995763A (en) A kind of fingerprint head encryption method and system based on cloud lock
CN110445805A (en) A kind of false-proof authentication system and method for two dimensional code
CN109829722A (en) A kind of user identity real name identification method of electronic fare payment system
CN111435389A (en) Power distribution terminal operation and maintenance tool safety protection system
CN104703180A (en) Implicit multiple authentication method based on mobile Internet and intelligent terminal
CN104883260B (en) Certificate information processing and verification method, processing terminal and authentication server
CN107566048B (en) A method of two step of optical module, which is carried out, using data-interface demonstrate,proves
CN104134294B (en) Authorization authentication method based on business hall self-service terminal
CN109041055A (en) A kind of mobile terminal for financial secure environment and gateway server transmission method
CN109584421A (en) A kind of intelligent door lock authentication administrative system based on domestic safety chip
CN102332066B (en) Authentication management system and method of code jumping chip identification codes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: No.1 Dongtai Road, Eastern Industrial Park, Lishui Town, Nanhai District, Foshan City, Guangdong Province

Applicant after: Guangdong Huitailong Technology Co.,Ltd.

Applicant after: Foshan huitailong Intelligent Technology Co., Ltd

Address before: No.1 Dongtai Road, Eastern Industrial Park, Lishui Town, Nanhai District, Foshan City, Guangdong Province

Applicant before: GUANGDONG HUTLON TECHNOLOGY Co.,Ltd.

Applicant before: Foshan huitailong Intelligent Technology Co., Ltd

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant