CN110086864A - A method of it is managed offline using lockset dual key - Google Patents
A method of it is managed offline using lockset dual key Download PDFInfo
- Publication number
- CN110086864A CN110086864A CN201910329496.XA CN201910329496A CN110086864A CN 110086864 A CN110086864 A CN 110086864A CN 201910329496 A CN201910329496 A CN 201910329496A CN 110086864 A CN110086864 A CN 110086864A
- Authority
- CN
- China
- Prior art keywords
- lockset
- mobile terminal
- terminal app
- unlocking device
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Mobile Radio Communication Systems (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention relates to a kind of methods managed offline using lockset dual key, it include the registration of lockset, the off-line operation authorization of user, lockset three parts of off-line operation, wherein, the registration of lockset uses RSA asymmetric encryption techniques, it ensure that reliable, the safety of key agreement, meanwhile, the different locksets level-one AES key that server issues in registration is different, the uniqueness that ensure that lockset communication encryption strengthens the reliability of entire lockset communication.The off-line operation of lockset is not connected in mobile terminal APP and server, and user is with the unlock or lock operation carried out under the premise of off-line operation authorization, in the off-line operation of lockset, mobile terminal APP user need to obtain off-line operation authorization from server, and server is the authorization for carrying out permission controlled range to mobile terminal APP user using second level AES key, if in the case where the second level AES key leakage of mobile terminal APP user, the removing that level-one AES key carries out second level AES key can be used in server, to guarantee the safe and reliable of lock system.
Description
Technical field
The present invention relates to locksets to manage field, and in particular to a method of it is managed offline using lockset dual key.
Background technique
As people increasingly increase the intelligence of lockset, information-based demand, current lockset is generally intelligent lock.
But the encryption method of current lockset is fairly simple, once the key of lockset will be cracked, it is most likely that influence entire lock system
Safety.
In view of this, the designer's deep design for the existing problems of current lockset control and defect, in turn
Develop the present invention.
Summary of the invention
In view of the above-mentioned problems, the purpose of the present invention is to provide a kind of sides managed offline using lockset dual key
Method can improve the safety of lock system.
To achieve the above object, the technical solution adopted by the present invention is that:
A method of it is managed offline using lockset dual key, based on by server, mobile terminal APP, unlocking device and lock
The lock system of tool composition realizes that the server and mobile terminal APP are communicated to connect, and mobile terminal APP and unlocking device communicate to connect,
And unlocking device is communicatively coupled with lockset, it is characterised in that: the method specifically includes the following steps:
The registration of step 1, lockset
Step 1.1, when unlocking device contacts with lockset communication, lockset judges whether it has registered in the server, if lockset is not
It is registered, lockset will generate 128 public and private keys of RSA at random, while corresponding with the lockset to unlocking device transmission lockset ID
RSA public key;
After step 1.2, unlocking device receive lockset ID and corresponding RSA public key, judge whether it connects with mobile terminal APP
It connects, if the two is not connected, unlocking device registers mistake to lockset response;If the two has been established communication connection, unlocking device is to shifting
Moved end APP sends unlocking device ID and received lockset ID and RSA public key;
After step 1.3, mobile terminal APP receive unlocking device ID, lockset ID and RSA public key, its whether online (i.e. judgement movement is judged
Whether end APP connect with server communication), if not online, mobile terminal APP registers mistake to lockset response by unlocking device;If
Online, mobile terminal APP then sends User ID and its received unlocking device ID, lockset ID and RSA public key to server;
After step 1.4, server receive User ID, unlocking device ID, lockset ID and RSA public key, User ID and unlocking device are judged
Whether ID is legal, if User ID or unlocking device ID are illegal, lockset registration failure;If User ID and unlocking device ID are legal,
Server then generates 128 level-one AES keys at random, and is added using received RSA public key to level-one AES key
It is close, encryption data is formed, then, server sends the encryption data to mobile terminal APP, and via mobile terminal APP and unlock
The encryption data is sent to lockset by device;Lockset is decrypted using RSA private key pair encryption data, is obtained and is recorded level-one AES
Key completes lockset registration;
Step 2, mobile terminal APP user obtain off-line operation permission
After the completion of lockset is registered in the server, user passes through mobile terminal APP to server application off-line operation permission, or
Server actively assigns user's off-line operation permission, then server judges whether User ID, unlocking device ID legal, if User ID and
Unlocking device ID is legal, and server then generates 128 second level AES keys at random, then using level-one AES key to second level AES
Key and corresponding lockset ID are encrypted, and authorization ciphertext is formed;Server will authorize ciphertext, second level AES key and correspondence
Lockset ID be sent to mobile terminal APP, mobile terminal APP receives and stores the authorization ciphertext, second level AES key and corresponding lockset
ID completes the off-line operation authorization of user;
The off-line operation of step 3, lockset
Step 3.1 contacts unlocking device with lockset, and lockset judges whether it has registered in the server, if lockset is not servicing
It is registered in device, then carries out the registration operation of lockset;If lockset is registered in the server, lockset sends lockset to unlocking device
ID;
Step 3.2, unlocking device judge whether it connect with mobile terminal APP after receiving lockset ID, if the two is not connected, unlocking device
To lockset response mistake;If the two has connected, unlocking device sends unlocking device ID and lockset ID to mobile terminal APP;
Step 3.3, mobile terminal APP judge whether it is online, if mobile terminal APP does not exist after receiving unlocking device ID and lockset ID
Line then enters step 3.4;
Step 3.4, mobile terminal APP judge whether user has off-line operation permission, that is, judge whether the user has comprising awarding
Ciphertext, second level AES key and corresponding lockset ID are weighed, when user has authorization ciphertext, then it is offline to be judged as that user has
Operating right;Mobile terminal APP further judges whether it to corresponding lockset is transmitted across authorization ciphertext, if nothing, enters step
3.5;If so, then entering step 3.6;
Step 3.5, the unlocked device of mobile terminal APP send authorization ciphertext to lockset, and level-one AES when unlocking device is according to its registration is close
Authorization ciphertext is decrypted in key, obtains second level AES key and is simultaneously temporarily stored, then via unlocking device to mobile terminal APP
Response success, after mobile terminal APP receives the response of lockset, enters step 3.6;
Step 3.6, mobile terminal APP generate locking operation instruction according to user right, and are grasped using second level AES key to the lockset
Make instruction to be encrypted, which is sent to unlocking device by formation operation ciphertext, mobile terminal APP, and unlocking device is then by the behaviour
Lockset is sent to as ciphertext;
Step 3.7, lockset are parsed after receiving operation ciphertext using second level AES key, and corresponding locking operation instruction is obtained
And the movement responded according to locking operation instruction execution, lockset monitoring operation is as a result, and via unlocking device to mobile terminal APP response
Implementing result, mobile terminal APP receive and record relevant operating result, once mobile terminal APP and server are established and are communicated to connect,
The operating result is just uploaded to server by mobile terminal APP;
Step 3.8 terminates.
After adopting the above scheme, the present invention includes the registration of lockset, the off-line operation authorization of user, the off-line operation of lockset
Three parts, wherein the registration of lockset uses RSA asymmetric encryption techniques, ensure that reliable, the safety of key agreement, meanwhile,
The different locksets level-one AES key that server issues in registration is different, ensure that the uniqueness of lockset communication encryption, even if a
Other lockset AES key is cracked, and can still guarantee the safety of other locksets in lock system, strengthens entire lockset communication
Reliability.
Before the off-line operation of lockset is not connected in mobile terminal APP and server, and user has off-line operation authorization
Put the unlock or lock operation of progress;Under off-line operation, the operational order of lockset is close using second level AES in the APP of mobile terminal
Key is encrypted, and is then transmitted to lockset from by unlocking device, executes unlock or lock operation after lockset decryption.In lockset
Off-line operation in, mobile terminal APP user need to obtain off-line operation authorization from server, and server is using second level AES
Key pair mobile terminal APP user carries out the authorization of permission controlled range, if what the second level AES key of mobile terminal APP user leaked
In the case of, the removing that level-one AES key carries out second level AES key can be used in server, to guarantee that the safety of lock system can
It leans on.
Detailed description of the invention
Fig. 1 is system flow chart of the invention;
Fig. 2 is lockset register flow path figure of the invention;
Fig. 3 is that level-one AES key when lockset of the present invention is registered negotiates functional block diagram;
Fig. 4 is the flow chart that mobile terminal APP user of the present invention obtains offline authorization operation;
Fig. 5 is the functional block diagram of mobile terminal APP user of the present invention authorization;
Fig. 6 is that second level AES key when mobile terminal APP user of the present invention authorizes negotiates flow chart;
Fig. 7 is lockset off-line operation flow chart of the invention;
Fig. 8 is the functional block diagram of the second level AES key coded communication of lockset off-line operation of the present invention.
Specific embodiment
As shown in Figures 1 to 7, present invention discloses a kind of method managed offline using lockset dual key, the party
Method is realized based on the lock system being made of server, mobile terminal APP, unlocking device and lockset, wherein server and mobile terminal
APP communication connection, mobile terminal APP and unlocking device communicate to connect, and unlocking device is communicatively coupled with lockset.The present invention manages offline
The method of control is specific as follows:
The registration of step 1, lockset
Step 1.1, when unlocking device contacts with lockset communication, lockset judges whether it has registered in the server, if lockset is not
It is registered, lockset will generate 128 public and private keys of RSA at random, while corresponding with the lockset to unlocking device transmission lockset ID
RSA public key, wherein unique random lockset identification code lockset ID built-in when being produced for lockset.
After step 1.2, unlocking device receive lockset ID and corresponding RSA public key, judge its with mobile terminal APP whether
Connection, if the two is not connected, unlocking device registers mistake to lockset response;If the two has been established communication connection, unlocking device to
Mobile terminal APP sends unlocking device ID and received lockset ID and RSA public key.
After step 1.3, mobile terminal APP receive unlocking device ID, lockset ID and RSA public key, judge whether it (judges online
Whether mobile terminal APP connect with server communication), if not online, mobile terminal APP is registered by unlocking device to lockset response wrong
Accidentally;If online, mobile terminal APP sends User ID and its received unlocking device ID, lockset ID and RSA public key to server.
After step 1.4, server receive User ID, unlocking device ID, lockset ID and RSA public key, judge that User ID is conciliate
Whether legal lock device ID, if User ID or unlocking device ID are illegal, lockset registration failure;If User ID and unlocking device ID are closed
Method, server then generate 128 AES keys (level-one AES key) at random, and using received RSA public key to level-one AES
Key is encrypted, and encryption data is formed, and then, server sends the encryption data to mobile terminal APP, and via mobile terminal
The encryption data is sent to lockset by APP and unlocking device;Lockset is decrypted using RSA private key pair encryption data, is obtained and is remembered
Level-one AES key is recorded, lockset registration is completed.
At this point, establishing a common AES key between lockset and server, the negotiation of key, lockset and clothes are completed
AES key progress can be used in subsequent communications between business device.
Lockset uses RSA asymmetric encryption techniques when server end is registered, and ensure that reliable, the peace of key agreement
Entirely.Meanwhile the AES key of different locksets is different, even if there is the case where individual lockset AES keys are cracked, can still protect
Demonstrate,prove the safety of entire lock system.
Step 2, mobile terminal APP user obtain off-line operation permission
After the completion of lockset is registered in the server, user passes through mobile terminal APP to server application off-line operation permission, or
Server actively assigns user's off-line operation permission, then server judges whether User ID, unlocking device ID legal, if User ID and
Unlocking device ID is legal, and server then generates 128 temporary Authorization codes (i.e. second level AES key) at random, then uses level-one AES
Key pair second level AES key and corresponding lockset ID are encrypted, and authorization ciphertext is formed;Server will authorize ciphertext, second level
AES key and corresponding lockset ID are sent to mobile terminal APP, and it is close that mobile terminal APP receives and stores the authorization ciphertext, second level AES
Key and corresponding lockset ID, that is, complete the off-line operation authorization of user.
The off-line operation of step 3, lockset
Step 3.1 contacts unlocking device with lockset, and lockset judges whether it has registered in the server, if lockset is not servicing
It is registered in device, then carries out the registration operation of lockset;If lockset is registered in the server, lockset sends lockset to unlocking device
ID。
Step 3.2, unlocking device judge whether it connect with mobile terminal APP after receiving lockset ID, if the two is not connected, solve
Device is locked to lockset response mistake;If the two has connected, unlocking device sends unlocking device ID and lockset ID to mobile terminal APP.
Step 3.3, mobile terminal APP after receiving unlocking device ID and lockset ID, judge whether it online (i.e. whether with clothes
Business device establishes communication connection), if mobile terminal APP is not online, enter step 3.4;
Step 3.4, mobile terminal APP judge whether user has off-line operation permission, that is, judge whether the user has comprising awarding
Ciphertext, second level AES key and corresponding lockset ID are weighed, when user has authorization ciphertext, then it is offline to be judged as that user has
Operating right;Mobile terminal APP further judges whether it to corresponding lockset is transmitted across authorization ciphertext, if nothing, enters step
3.5;If so, then entering step 3.6;
Step 3.5, the unlocked device of mobile terminal APP send authorization ciphertext to lockset, and level-one AES when unlocking device is according to its registration is close
Authorization ciphertext is decrypted in key, obtains second level AES key and is simultaneously temporarily stored, then via unlocking device to mobile terminal APP
Response success, after mobile terminal APP receives the response of lockset, enters step 3.6;
Step 3.6, mobile terminal APP generate locking operation instruction according to user right, and are grasped using second level AES key to the lockset
Make instruction to be encrypted, which is sent to unlocking device by formation operation ciphertext, mobile terminal APP, and unlocking device is then by the behaviour
Lockset is sent to as ciphertext.
Step 3.7, lockset are parsed after receiving operation ciphertext using second level AES key, and corresponding locking operation is obtained
It instructs and (unlocks or be latched) according to the movement of locking operation instruction execution response, lockset monitoring operation is as a result, and via unlock
Device receives and records relevant operating result to mobile terminal APP response implementing result, mobile terminal APP, once mobile terminal APP and clothes
Business device establishes communication connection, which is just uploaded to server by mobile terminal APP.
Step 3.8 terminates.
It is of the invention it is critical that the present invention includes the registration of lockset, the off-line operation authorization of user, the operation three of lockset
A part.Wherein, the registration of lockset uses RSA asymmetric encryption techniques, ensure that reliable, the safety of key agreement, meanwhile, no
It is different with the lockset level-one AES key that server issues in registration, it ensure that the uniqueness of lockset communication encryption, even if individually
Lockset AES key is cracked, and can still guarantee the safety of other locksets in lock system, and strengthen the communication of entire lockset can
By property.Under the premise of the off-line operation of lockset is not connected in mobile terminal APP and server, and user has off-line operation authorization
To unlock or lock operation that lockset carries out, under off-line operation, the operational order of lockset utilizes second level AES in the APP of mobile terminal
Key is encrypted, and is then transmitted to lockset from by unlocking device, executes unlock or lock operation after lockset decryption.It is locking
In the off-line operation of tool, mobile terminal APP user need to obtain off-line operation authorization from server, and server is using second level
AES key carries out the authorization of permission controlled range to mobile terminal APP user, if the second level AES key of mobile terminal APP user leaks
In the case where, server can be used level-one AES key and carry out the clear of second level AES key, to guarantee the safety of lock system
Reliably.
The above is only the embodiment of the present invention, is not intended to limit the scope of the present invention, therefore all
Any subtle modifications, equivalent variations and modifications to the above embodiments according to the technical essence of the invention still fall within this
In the range of inventive technique scheme.
Claims (1)
1. a kind of method managed offline using lockset dual key, based on by server, mobile terminal APP, unlocking device and
The lock system of lockset composition realizes that the server and mobile terminal APP are communicated to connect, mobile terminal APP and unlocking device communication link
Connect, and unlocking device is communicatively coupled with lockset, it is characterised in that: the method specifically includes the following steps:
The registration of step 1, lockset
Step 1.1, when unlocking device contacts with lockset communication, lockset judges whether it has registered in the server, if lockset is not
It is registered, lockset will generate 128 public and private keys of RSA at random, while corresponding with the lockset to unlocking device transmission lockset ID
RSA public key;
After step 1.2, unlocking device receive lockset ID and corresponding RSA public key, judge whether it connects with mobile terminal APP
It connects, if the two is not connected, unlocking device registers mistake to lockset response;If the two has been established communication connection, unlocking device is to shifting
Moved end APP sends unlocking device ID and received lockset ID and RSA public key;
After step 1.3, mobile terminal APP receive unlocking device ID, lockset ID and RSA public key, its whether online (i.e. judgement movement is judged
Whether end APP connect with server communication), if not online, mobile terminal APP registers mistake to lockset response by unlocking device;If
Online, mobile terminal APP then sends User ID and its received unlocking device ID, lockset ID and RSA public key to server;
After step 1.4, server receive User ID, unlocking device ID, lockset ID and RSA public key, User ID and unlocking device are judged
Whether ID is legal, if User ID or unlocking device ID are illegal, lockset registration failure;If User ID and unlocking device ID are legal,
Server then generates 128 level-one AES keys at random, and is added using received RSA public key to level-one AES key
It is close, encryption data is formed, then, server sends the encryption data to mobile terminal APP, and via mobile terminal APP and unlock
The encryption data is sent to lockset by device;Lockset is decrypted using RSA private key pair encryption data, is obtained and is recorded level-one AES
Key completes lockset registration;
Step 2, mobile terminal APP user obtain off-line operation permission
After the completion of lockset is registered in the server, user passes through mobile terminal APP to server application off-line operation permission, or
Server actively assigns user's off-line operation permission, then server judges whether User ID, unlocking device ID legal, if User ID and
Unlocking device ID is legal, and server then generates 128 second level AES keys at random, then using level-one AES key to second level AES
Key and corresponding lockset ID are encrypted, and authorization ciphertext is formed;Server will authorize ciphertext, second level AES key and correspondence
Lockset ID be sent to mobile terminal APP, mobile terminal APP receives and stores the authorization ciphertext, second level AES key and corresponding lockset
ID completes the off-line operation authorization of user;
The off-line operation of step 3, lockset
Step 3.1 contacts unlocking device with lockset, and lockset judges whether it has registered in the server, if lockset is not servicing
It is registered in device, then carries out the registration operation of lockset;If lockset is registered in the server, lockset sends lockset to unlocking device
ID;
Step 3.2, unlocking device judge whether it connect with mobile terminal APP after receiving lockset ID, if the two is not connected, unlocking device
To lockset response mistake;If the two has connected, unlocking device sends unlocking device ID and lockset ID to mobile terminal APP;
Step 3.3, mobile terminal APP judge whether it is online, if mobile terminal APP does not exist after receiving unlocking device ID and lockset ID
Line then enters step 3.4;
Step 3.4, mobile terminal APP judge whether user has off-line operation permission, that is, judge whether the user has comprising awarding
Ciphertext, second level AES key and corresponding lockset ID are weighed, when user has authorization ciphertext, then it is offline to be judged as that user has
Operating right;Mobile terminal APP further judges whether it to corresponding lockset is transmitted across authorization ciphertext, if nothing, enters step
3.5;If so, then entering step 3.6;
Step 3.5, the unlocked device of mobile terminal APP send authorization ciphertext to lockset, and level-one AES when unlocking device is according to its registration is close
Authorization ciphertext is decrypted in key, obtains second level AES key and is simultaneously temporarily stored, then via unlocking device to mobile terminal APP
Response success, after mobile terminal APP receives the response of lockset, enters step 3.6;
Step 3.6, mobile terminal APP generate locking operation instruction according to user right, and are grasped using second level AES key to the lockset
Make instruction to be encrypted, which is sent to unlocking device by formation operation ciphertext, mobile terminal APP, and unlocking device is then by the behaviour
Lockset is sent to as ciphertext;
Step 3.7, lockset are parsed after receiving operation ciphertext using second level AES key, and corresponding locking operation instruction is obtained
And the movement responded according to locking operation instruction execution, lockset monitoring operation is as a result, and via unlocking device to mobile terminal APP response
Implementing result, mobile terminal APP receive and record relevant operating result, once mobile terminal APP and server are established and are communicated to connect,
The operating result is just uploaded to server by mobile terminal APP;
Step 3.8 terminates.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910329496.XA CN110086864B (en) | 2019-04-23 | 2019-04-23 | Method for offline management and control by using double keys of lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910329496.XA CN110086864B (en) | 2019-04-23 | 2019-04-23 | Method for offline management and control by using double keys of lock |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110086864A true CN110086864A (en) | 2019-08-02 |
CN110086864B CN110086864B (en) | 2021-10-08 |
Family
ID=67416247
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910329496.XA Active CN110086864B (en) | 2019-04-23 | 2019-04-23 | Method for offline management and control by using double keys of lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110086864B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110992524A (en) * | 2019-10-29 | 2020-04-10 | 广东纬德信息科技有限公司 | Intelligent lock control method and system based on USB |
CN112565213A (en) * | 2020-11-25 | 2021-03-26 | 青岛海尔科技有限公司 | Authentication method and device, storage medium, and electronic device |
CN113345130A (en) * | 2020-02-18 | 2021-09-03 | 佛山市云米电器科技有限公司 | Control method of intelligent door, intelligent door and computer readable storage medium |
CN114826620A (en) * | 2022-05-16 | 2022-07-29 | 深圳指芯物联技术有限公司 | Method and system for safely binding intelligent door lock and intelligent door lock |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101793115A (en) * | 2009-12-20 | 2010-08-04 | 姜君凯 | Electronic lock and key and workflow control |
CN203271358U (en) * | 2013-04-09 | 2013-11-06 | 杨晓飞 | Remote-authorization intelligent unlocking device |
US20150040205A1 (en) * | 2013-03-14 | 2015-02-05 | Brivo Systems, Inc. | System and Method for Physical Access Control |
CN105321236A (en) * | 2014-07-30 | 2016-02-10 | 许加庆 | Bluetooth bidirectional communication intelligent lock |
KR101648000B1 (en) * | 2015-11-16 | 2016-08-12 | (주)영신인포텍 | Management system for document file in cabinet using smart panel |
CN105931330A (en) * | 2016-04-19 | 2016-09-07 | 北京奇虎科技有限公司 | Intelligent unlocking method and intelligent lock |
EP3096296A2 (en) * | 2015-05-18 | 2016-11-23 | Samsung Electronics Co., Ltd. | Binding device with embedded smart key and method for controlling object using the same |
CN109523665A (en) * | 2018-11-02 | 2019-03-26 | 上海蓝芝麻智能科技有限公司 | The intelligent door lock key hair fastener platform realized based on blue-tooth technology |
-
2019
- 2019-04-23 CN CN201910329496.XA patent/CN110086864B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101793115A (en) * | 2009-12-20 | 2010-08-04 | 姜君凯 | Electronic lock and key and workflow control |
US20150040205A1 (en) * | 2013-03-14 | 2015-02-05 | Brivo Systems, Inc. | System and Method for Physical Access Control |
CN203271358U (en) * | 2013-04-09 | 2013-11-06 | 杨晓飞 | Remote-authorization intelligent unlocking device |
CN105321236A (en) * | 2014-07-30 | 2016-02-10 | 许加庆 | Bluetooth bidirectional communication intelligent lock |
EP3096296A2 (en) * | 2015-05-18 | 2016-11-23 | Samsung Electronics Co., Ltd. | Binding device with embedded smart key and method for controlling object using the same |
KR101648000B1 (en) * | 2015-11-16 | 2016-08-12 | (주)영신인포텍 | Management system for document file in cabinet using smart panel |
CN105931330A (en) * | 2016-04-19 | 2016-09-07 | 北京奇虎科技有限公司 | Intelligent unlocking method and intelligent lock |
CN109523665A (en) * | 2018-11-02 | 2019-03-26 | 上海蓝芝麻智能科技有限公司 | The intelligent door lock key hair fastener platform realized based on blue-tooth technology |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110992524A (en) * | 2019-10-29 | 2020-04-10 | 广东纬德信息科技有限公司 | Intelligent lock control method and system based on USB |
CN113345130A (en) * | 2020-02-18 | 2021-09-03 | 佛山市云米电器科技有限公司 | Control method of intelligent door, intelligent door and computer readable storage medium |
CN112565213A (en) * | 2020-11-25 | 2021-03-26 | 青岛海尔科技有限公司 | Authentication method and device, storage medium, and electronic device |
CN114826620A (en) * | 2022-05-16 | 2022-07-29 | 深圳指芯物联技术有限公司 | Method and system for safely binding intelligent door lock and intelligent door lock |
CN114826620B (en) * | 2022-05-16 | 2024-02-06 | 深圳指芯物联技术有限公司 | Safe method and system for binding intelligent door lock and intelligent door lock |
Also Published As
Publication number | Publication date |
---|---|
CN110086864B (en) | 2021-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110086864A (en) | A method of it is managed offline using lockset dual key | |
CN104125226B (en) | A kind of method, apparatus and system for locking and unlocking application | |
CN103227776B (en) | Configuration method, configuration device, computer program product and control system | |
CN103748831B (en) | Safety certification device and method in machine-to-machine communication between the device based on PUF | |
CN108055235A (en) | A kind of control method of smart lock, relevant device and system | |
CN105871874A (en) | Mobile Internet virtual key authorizing system and hardware door lock control method thereof | |
CN105279832A (en) | Intelligent door lock system and control method thereof | |
US20080303630A1 (en) | DigiKey and DigiLock | |
CN104680630A (en) | Method and system for controlling door locks | |
CN108989318A (en) | A kind of lightweight safety certification and key exchange method towards narrowband Internet of Things | |
CN105069864A (en) | Door lock control secure communication scheme based on NFC (near field communication) function of smart phone | |
CN208335313U (en) | The controllable permission blue-tooth intelligence door lock of cell phone application | |
CN104583028B (en) | One-way key fob and vehicle pairing | |
CN103973437B (en) | The method, apparatus and system of RSA key mandate are obtained when a kind of terminal locking | |
CN109840975A (en) | Remote authorization unlocking system and method without networking | |
CN102903167A (en) | Management system for renting and selling houses | |
CN107180464A (en) | A kind of smart lock method for unlocking and the system using this method | |
CN104123768A (en) | Safety intelligent lock system and unlocking and locking control method | |
CN105303651A (en) | Bluetooth based two-way communication automatic locking system and method | |
CN104123769B (en) | The unblanking of a kind of safety intelligent lock, close lock control method | |
CN107154847A (en) | Towards the method for generating cipher code, verification method and its smart machine of offline environment | |
CN104052817A (en) | Intelligent door and intelligent door control method and system | |
CN108961501A (en) | A kind of intelligent door lock control method, relevant device and system | |
CN106789024A (en) | A kind of remote de-locking method, device and system | |
CN109035515A (en) | The control method and door-locking system of smart lock |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |