CN110322600A - The control method and electronic lock of electronic lock - Google Patents

The control method and electronic lock of electronic lock Download PDF

Info

Publication number
CN110322600A
CN110322600A CN201910485598.0A CN201910485598A CN110322600A CN 110322600 A CN110322600 A CN 110322600A CN 201910485598 A CN201910485598 A CN 201910485598A CN 110322600 A CN110322600 A CN 110322600A
Authority
CN
China
Prior art keywords
electronic lock
subsystem
split type
key factor
type control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910485598.0A
Other languages
Chinese (zh)
Other versions
CN110322600B (en
Inventor
孙吉平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Senseshield Technology Co Ltd
Original Assignee
Beijing Senseshield Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Senseshield Technology Co Ltd filed Critical Beijing Senseshield Technology Co Ltd
Priority to CN201910485598.0A priority Critical patent/CN110322600B/en
Publication of CN110322600A publication Critical patent/CN110322600A/en
Application granted granted Critical
Publication of CN110322600B publication Critical patent/CN110322600B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication

Abstract

The invention discloses a kind of control method of electronic lock and electronic locks, are related to electronic lock technical field.Present invention mainly solves the low problems of electronic lock safety in the prior art.Electronic lock of the invention includes electronic lock subsystem and split type control subsystem, and method includes: to establish secure communication channel between the electronic lock subsystem and the split type control subsystem;Cryptographic key factor is exchanged between the electronic lock subsystem and the split type control subsystem;When the electronic lock subsystem and the split type control subsystem pass through the secure communication channel interaction data, using the session key generated based on the cryptographic key factor to interaction data encryption and decryption.It the composite can be widely applied in the scene of control electronic lock.

Description

The control method and electronic lock of electronic lock
Technical field
The present invention relates to electronic lock technical field more particularly to the control methods and electronic lock of a kind of electronic lock.
Background technique
Electronic lock be it is a kind of mechanical switch is opened by control circuit or chip, is closed control, come complete unlocking, The electronic product of locking task.Since it can identify disengaging personnel when unlocking by modes such as input passwords, phase Than having higher safety in traditional mechanical lock, electronic lock has replaced mechanical lock to become the lock that user's mainstream selects now Has type.
However, due to the volumetric constraint of electronic lock itself, cause user's operation space it is smaller, it is inconvenient be managed operation, It is smaller to also result in battery capacity, being easy power-off when in use causes electronic lock to fail, and increases the security risk of electronic lock.
Summary of the invention
In view of the above problems, the present invention provides the control method and electronic lock of a kind of electronic lock, and main purpose is to solve The low problem of the electronic lock safety of the prior art.
In order to solve the above technical problems, in a first aspect, the present invention provides a kind of control method of electronic lock, the electronics Lock includes electronic lock subsystem and split type control subsystem, which comprises
Secure communication channel is established between the electronic lock subsystem and the split type control subsystem;
Cryptographic key factor is exchanged between the electronic lock subsystem and the split type control subsystem;
When the electronic lock subsystem and the split type control subsystem pass through secure communication channel interaction number According to when, using the session key generated based on the cryptographic key factor to interaction data encryption and decryption.
Optionally, cryptographic key factor is exchanged between the electronic lock subsystem and the split type control subsystem, comprising:
The first key factor that the electronic lock subsystem generates, uses the public key pair of the split type control subsystem The first key factor is encrypted, and is sent to the split type control subsystem by the secure communication channel;
The second cryptographic key factor that the split type control subsystem generates, uses the public key pair of the electronic lock subsystem Second cryptographic key factor is encrypted, and is sent to by the secure communication channel and described is divided electronic lock subsystem;
The electronic lock subsystem uses electronic lock subsystem after receiving encrypted second cryptographic key factor Private key is decrypted and stores to encrypted second cryptographic key factor;
The split type control subsystem uses split type control subsystem after receiving the encrypted first key factor The private key of system is decrypted and stores to the encrypted first key factor.
Optionally, using the session key generated based on the cryptographic key factor to interaction data encryption and decryption, comprising:
Using the first session key based on the first key factor and second cryptographic key factor generation, to be sent Interaction data encryption;
The second session key is generated using based on the first key factor and second cryptographic key factor, to what is received Interaction data decryption.
Optionally, the method also includes:
The electronic lock subsystem and the split type control subsystem are private using itself to sent interaction data Key signature;
The electronic lock subsystem and the split type control subsystem use sender to the interaction data received Public key sign test.
Optionally, the method also includes:
The electronic lock subsystem and the split type control subsystem are added currently in interaction data to be sent The timestamp of time;
The time in interaction data that the electronic lock subsystem and the split type control subsystem verifying receive Whether stamp is greater than the timestamp in last received interaction data.
Second aspect, the present invention provides a kind of electronic lock, which includes:
Electronic lock subsystem and split type control subsystem, the electronic lock subsystem include the first security module, The split type control subsystem includes the second security module;
First security module and second security module are for establishing the electronic lock subsystem and described point Secure communication channel between body formula control subsystem;
The electronic lock subsystem and the split type control subsystem are used to exchange based on the secure communication channel Cryptographic key factor;
First security module and second security module are also used to by secure communication channel interaction number According to when, using the session key generated based on the cryptographic key factor to interaction data encryption and decryption.
Optionally, first security module is also used to generate the first key factor, uses the split type control subsystem The public key of system encrypts the first key factor, and is sent the first key factor of encryption by secure communication channel To second security module;Second security module is also used to generate the second cryptographic key factor, uses electronic lock The public key of system encrypts second cryptographic key factor, and is sent out the second cryptographic key factor of encryption by secure communication channel Give first security module;
After first security module receives encrypted second cryptographic key factor, the private key of electronic lock subsystem is used Encrypted second cryptographic key factor is decrypted and is stored;It is close that second security module receives encrypted first After the key factor, the encrypted first key factor is decrypted and is stored using the private key of split type control subsystem.
Optionally, first security module and second security module are also used to by the secure communication channel When interaction data, using the first session key based on the first key factor and second cryptographic key factor generation, treat The interaction data of transmission encrypts;And use second based on the first key factor and second cryptographic key factor generation Session key decrypts the interaction data received.
Optionally, first security module is also used to use the private of electronic lock subsystem to sent interaction data Key signature, uses the interaction data received the public key sign test of sender;
Second security module is also used to use the private key label of split type control subsystem to sent interaction data Name uses the interaction data received the public key sign test of sender.
Optionally, first security module and second security module are also used to add in interaction data to be sent Add the timestamp of current time;
First security module and second security module are also used to verify the time in the interaction data received Whether stamp is greater than the timestamp in last received interaction data.
By above-mentioned technical proposal, the control method and electronic lock of electronic lock provided by the invention, in the prior art Electronic lock is easy the technological deficiency that failure generates security risk, improves to electronic lock, by control system and electronics lock body It is separated, the operating space of Lai Zengjia control system and the space of setting battery.And the present invention is to electronic lock subsystem After system and split type control subsystem partial installation, secure communication channel can be also established in-between and is mutually known with completing identity, and And the interaction data for ensuring that electronic lock subsystem and split type control subsystem are sent to other side is believed in the secure communication It is transmitted in road.Before transmitting the data, two subsystems will do it the exchange of cryptographic key factor, by the key based on exchange The session key that the factor generates jointly carries out encryption and decryption to interaction data, to ensure that the two subsystems of only electronic lock can be right Interaction data is correctly encrypted and is decrypted, and the safety of electronic lock is improved.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows a kind of flow chart of the control method of electronic lock provided in an embodiment of the present invention;
Fig. 2 shows the flow charts of the control method of another electronic lock provided in an embodiment of the present invention;
Fig. 3 shows a kind of structural block diagram of electronic lock provided in an embodiment of the present invention;
Fig. 4 shows the structural block diagram of another electronic lock provided in an embodiment of the present invention.
Specific embodiment
The exemplary embodiment that the present invention will be described in more detail below with reference to accompanying drawings.Although showing the present invention in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the present invention without should be by embodiments set forth here It is limited.It is to be able to thoroughly understand the present invention on the contrary, providing these embodiments, and can be by the scope of the present invention It is fully disclosed to those skilled in the art.
In order to improve the safety of electronic lock, the embodiment of the invention provides a kind of control methods of electronic lock, such as Fig. 1 institute Show, this method comprises:
101, secure communication channel is established between electronic lock subsystem and split type control subsystem.
Electronics lock body and its control system are carried out split settings by the present invention, and making separated electronic lock includes split type control Subsystem and electronic lock subsystem.Using electronic door lock system and corresponding split type control subsystem interaction data it Before, for the safety for improving the transmission of its data, need to identify corresponding two subsystems mutually, so as to Subsequent electronic door Lock subsystem and the seperated interaction data for issuing control subsystem only for the subsystem mutually known respond.In electronic lock Exclusive secure communication channel is established between subsystem and corresponding split type control subsystem, make electronic lock subsystem and is divided Between body formula control subsystem the data of interaction in need transmitted using the secure communication channel, to guarantee data Safety.
102, cryptographic key factor is exchanged between electronic lock subsystem and split type control subsystem.
Electronic lock subsystem and corresponding split type control subsystem both sides can lead to after having carried out identity and mutually having known Cross the exchange that the secure communication channel established carries out cryptographic key factor.The cryptographic key factor only has sender and recipient to know, therefore Calculating the session key generated by cryptographic key factor, also just only corresponding electronic lock subsystem and split type control subsystem has Have.Cryptographic key factor can be identifying code, mark, random number of representative capacity etc..The present embodiment is not made cryptographic key factor specifically Limitation.
103, it when electronic lock subsystem and split type control subsystem pass through secure communication channel interaction data, uses Session key based on cryptographic key factor generation is to interaction data encryption and decryption.
When passing through secure communication channel interaction data between electronic lock subsystem and split type control subsystem, as hair The subsystem for the side of sending is based on cryptographic key factor and generates session key and encrypted using session key to sent interaction data, is added Interaction data after close is sent to the subsystem as recipient by secure communication channel.Subsystem as recipient passes through When secure communication channel receives interaction data, using the session key generated based on cryptographic key factor to the interaction data received It is decrypted, explanation has received the interaction data that the subsystem mutually known is sent if successful decryption, can be according to the interaction number According to further being operated.
Further, electronic lock subsystem and the split type control subsystem are decrypted correctly to interaction data Afterwards, i.e., the operations such as corresponding unlocking, information collection or information reading can be carried out according to the interaction data received.For example, seperated Formula control subsystem is generated to unlock and be ordered and using the session generated based on cryptographic key factor after the unlocking request for receiving user The key pair unlocking order is encrypted, then sends encrypted unlocking life to electronic lock subsystem by secure communication channel It enables.Electronic lock subsystem is after receiving the unlocking order sent by secure communication channel, according to raw based on cryptographic key factor At session key the unlocking order is decrypted, if successful decryption, unlocked according to the order.In another example electronics Door lock subsystem can control fingerprint recognition after the finger print information acquisition sent to split type control subsystem is decrypted correctly Sensor acquires the current finger print information of user.In another example split type control subsystem is sending electronic lock subsystem After finger print information is decrypted correctly, the finger print information can be received and stored or identified.In another example electronic lock subsystem is right After the reading access card message command that split type control subsystem is sent is decrypted correctly, radio-frequency card reader can be controlled and read currently Gate inhibition's card information.In another example electronic lock subsystem is after the unlocking order sent to split type control subsystem is decrypted correctly, It can driving motor opening door lock.In another example split type control subsystem refers in the face recognition sent to electronic lock subsystem After order is decrypted correctly, starting optical camera identifies the face-image of active user.In another example split type control subsystem It unites after the iris recognition instruction sent to electronic lock subsystem is decrypted correctly, face of the starting infrared camera to active user Portion's image is identified.
Further, in the present embodiment, split type control subsystem can priori after receiving the request such as unlocking of user The identity for demonstrate,proving user, after authentication passes through, split type control subsystem sends corresponding friendship to electronic lock subsystem again Mutual data.For example, user needs to input password in electronic lock subsystem, electronic lock subsystem is close to this when unlocking Code is verified, and after being verified, the ID number of the user is sent to split type control subsystem by secure communication channel System requests split type control subsystem to carry out further identification to active user.Split type control subsystem is receiving To after request, man face image acquiring and/or iris image acquiring can be carried out to user, to the facial image and/or iris of acquisition Image and the identity identification information of storage are matched, and judge whether active user has unlocking authority according to matching result, i.e., Whether the request of active user is legal.When being judged as legal, split type control subsystem is again by the unlocking including matching result Order is encrypted by session key, and is sent to electronic lock subsystem, order electronic lock by secure communication channel Subsystem is unlocked.
Further, in the present embodiment, user account is added by split type control subsystem, and set in account Set corresponding identity identification information.For example, electronic lock needs to be the use for having permission unlocking before receiving the unlocking request of user Account is established at family.Specifically, the account of user is sent to electronic lock by secure communication channel by split type control subsystem Subsystem, and send fingerprint collecting order control electronic lock subsystem and finger print information acquisition is carried out to user;Electronic lock The information of acquisition is sent to split type control subsystem by secure communication channel after completing finger print information acquisition by system, The finger print information received is saved in corresponding account by split type control subsystem, to complete the setting of user account.Again For example, split type control subsystem sends gate inhibition's card information that card reading order control electronic lock subsystem reads user;Electronics After door lock subsystem completes the reading of gate inhibition's card information again, which is sent to by split type control by secure communication channel Subsystem, split type control subsystem by the access card information preservation received into corresponding account, to complete user's account Number setting.Further for example, split type control subsystem when adding the account of user, can also acquire user's by camera Then face-image and/or iris image store the face-image and/or iris image to complete the setting of user account.Into One step, user can complete the addition of account in split type control subsystem by operation on the touch screen.Upper During stating addition user account, all interaction datas all make between electronic lock subsystem and split type control subsystem It is transmitted with secure communication channel, and carries out encryption and decryption using the session key generated based on cryptographic key factor, to ensure user The safety of the data of account.
The control method of electronic lock provided by the invention is easy failure for electronic lock in the prior art and generates security risk Technological deficiency, to improved separated electronic lock control, to electronic lock subsystem and split type control subsystem After partial installation, secure communication channel can be also established in-between and is mutually known with completing identity, and ensures electronic lock subsystem The interaction data for being sent to other side with split type control subsystem is transmitted in the secure communication channel.It is transmitting Before data, two subsystems will do it the exchange of cryptographic key factor, and the session generated jointly by the cryptographic key factor based on exchange is close Key carries out encryption and decryption to interaction data, to ensure that the two subsystems of only electronic lock can carry out interaction data correctly to add Close and decryption.
Further, as the refinement and extension to embodiment illustrated in fig. 1, the embodiment of the invention also provides another electricity The control method of son lock, as shown in Fig. 2, wherein, the specific steps are as follows:
201, secure communication channel is established between electronic lock subsystem and split type control subsystem.
The implementation of step 201 and the implementation of the step 101 of above-described embodiment are identical, and details are not described herein.
202, the first key factor that electronic lock subsystem generates, using the public key of split type control subsystem to first Cryptographic key factor is encrypted, and is sent to split type control subsystem by secure communication channel.
203, split type control subsystem uses split type control subsystem after receiving the encrypted first key factor The first key factor after the private key pair encryption of system is decrypted and stores.
204, the second cryptographic key factor that split type control subsystem generates, using the public key of electronic lock subsystem to second Cryptographic key factor is encrypted, and is divided electronic lock subsystem by secure communication channel.
205, electronic lock subsystem uses electronic lock subsystem after receiving encrypted second cryptographic key factor The second cryptographic key factor after private key pair encryption is decrypted and stores.
The two subsystems of separated electronic lock are carrying out after identity mutually knows, each self-generating cryptographic key factor, and by key because Son swaps, make two subsystems be owned by oneself cryptographic key factor and other side cryptographic key factor, and only corresponding electricity Cervical orifice of uterus lock subsystem and split type control subsystem can possess the cryptographic key factor of oneself and other side.
Further, the concrete mode for exchanging cryptographic key factor can be electronic lock subsystem and split type control subsystem Exchange the random number (i.e. cryptographic key factor) generated.Electronic lock subsystem and split type control subsystem first obtain mutually other side's Public key, electronic lock subsystem generate random number R ND1 (i.e. the first key factor), and split type control subsystem generates random number RND2 (i.e. the second cryptographic key factor).The public key PubB of the split type control subsystem of electronic lock subsystem to random number R ND1 into Row encryption, the public key PubA of split type control subsystem electronic lock subsystem encrypt random number R ND2.Electronic gate It locks subsystem and encrypted random number R ND1 is sent to split type control subsystem, split type control subsystem will be encrypted Random number R ND2 is sent to electronic lock subsystem.Electronic lock subsystem uses oneself after receiving encrypted data Private key PriA carries out data deciphering, obtains the random number R ND2 of split type control subsystem;Split type control subsystem is receiving Data deciphering is carried out using the private key PriB of oneself after to encrypted data, obtains the random number of electronic lock subsystem RND1.Last electronic lock subsystem and split type control subsystem store the random number that other side generates, and are completed with this The identity of two subsystems mutually knows and the exchange of random number.
It should be noted that step 202-203 is between electronic lock subsystem and split type control subsystem to first The transmitting step of cryptographic key factor, step 204-205 are close to second between electronic lock subsystem and split type control subsystem The transmitting step of the key factor, step 202-203 and step 204-205 can be executed successively, can also be executed side by side, be executed suitable Sequence does not influence implementing result.The present embodiment is not construed as limiting the execution sequence of step 202-203 and step 204-205, shows in Fig. 2 What is shown is only that the present embodiment one of which executes sequence.
206, it when electronic lock subsystem and split type control subsystem pass through secure communication channel interaction data, uses Based on the first session key that the first key factor and the second cryptographic key factor generate, encrypted to sent interaction data.
Due to being easy to be stolen and replace using clear-text way transmission data and order, data, the data to communication are needed It is encrypted, it is ensured that the electronic lock of split-type design can reach the safety of the electronic lock of unitary design.And in order to guarantee to set The password set is merely able to be calculated by electronic lock subsystem and split type control subsystem, therefore uses the cryptographic key factor of exchange Generate session key.The first session key and the second session key generated may be the same or different.Specifically it can be, Based on the first key factor and the second cryptographic key factor, the first session key and the second session key are generated by a calculation method, First session key and the second session key are identical, and electronic lock subsystem and the split type control subsystem are close with the session Key is to interaction data encryption and decryption;Or, be based on the first key factor and the second cryptographic key factor, the is generated by different calculation method One session key and the second session key, the first session key and the second session key are different, electronic lock subsystem and described Split type control subsystem is encrypted with the first session key to sent interaction data, electronic lock subsystem and split type control Subsystem decrypts the interaction data received with the second session key;Or, the first key factor and the second cryptographic key factor are equal Have it is multiple, be based on the different pairs of first key factor and the second cryptographic key factor, pass through a calculation method generate the first session key With the second session key, the first session key and the second session key are different, electronic lock subsystem and the split type control Subsystem is encrypted with the first session key to sent interaction data, and electronic lock subsystem and split type control subsystem are used Second session key decrypts the interaction data received;Or, the first key factor and the second cryptographic key factor have multiple, it is based on The different pairs of first key factor and the second cryptographic key factor generate the first session key and the second meeting by different calculation methods Key is talked about, the first session key and the second session key are different, and electronic lock subsystem and the split type control subsystem are used First session key is encrypted to sent interaction data, the second session of electronic lock subsystem and split type control subsystem The interaction data decryption that key pair receives.For example, being intercoursed in electronic lock subsystem and split type control subsystem After the random number R ND1 and RND2 of generation, is calculated according to RND1 and RND2 and generate session key KeyS1 (i.e. the first session key) With session key KeyS2 (i.e. the second session key), agreement needs to decrypt using KeyS2 using the data that KeyS1 is encrypted. Electronic lock subsystem and split type control subsystem encrypt interaction data to be sent using KeyS1 in interaction data, The interaction data received is decrypted using KeyS2.
207, electronic lock subsystem and split type control subsystem add current time in interaction data to be sent Timestamp.
The interaction data of playback, electronic lock subsystem and split type control subsystem are received in order to prevent is sending friendship The timestamp that 4 bytes are used to store current time can be increased on the head of the interaction data before mutual data, recipient is made to exist When receiving the interaction data, corresponding transmission time can be obtained, the interaction data being currently received is determined according to the time It whether is the interaction data reset.
208, electronic lock subsystem and split type control subsystem use own private key label to sent interaction data Name.
Electronic lock subsystem and split type control subsystem will use the private key pair of itself before sending interaction data Data are digitally signed, and are reflected so that recipient passes through the digital signature after receiving the data to the identity of sender Not.
Further, in the digital signature of the tail portion of interaction data addition sender, for verifying the legal of interaction data Property and integrality.For example, electronic lock subsystem is based on RSA Algorithm or SM2 algorithm, using PriA to sent interaction data It signs;Split type control subsystem is based on RSA Algorithm or SM2 algorithm, is carried out using PriB to sent communication data Signature;To ensure that communication data cannot be tampered and forge.
It should be noted that being encrypted to interaction data, increase digital signature, increasing timestamp is holding of being independent of each other Row step, for the present embodiment to the execution of step 206,207 and 208 sequentially and without specifically limiting, what is shown in Fig. 2 is only it It is middle a kind of to execute sequence.The execution sequence of step 206,207 and 208 can be following a variety of:
The first executes sequence: to sent interaction data, first being encrypted using the first session key, then adds hair Then the digital signature for the side of sending adds the timestamp of current time again.
It executes sequence second: to sent interaction data, first being encrypted using the first session key, then add and work as Then the timestamp of preceding time adds the digital signature of sender again.
The third executes sequence: to sent interaction data, when first adding the digital signature of sender, then adding current Between timestamp, then reuse the first session key and encrypted.
4th kind executes sequence: to sent interaction data, first adding the digital signature of sender, reuses the first meeting Words key is encrypted, and then adds the timestamp of current time again.
5th kind executes sequence: to sent interaction data, first adding the timestamp of current time, then adds sender Digital signature, then reuse the first session key and encrypted.
6th kind executes sequence: to sent interaction data, first adding the timestamp of current time, reuses the first meeting Words key is encrypted, and then adds the digital signature of sender again.
209, the timestamp in the interaction data that electronic lock subsystem and the verifying of split type control subsystem receive is The no timestamp being greater than in last received interaction data.
Electronic lock subsystem and split type control subsystem after the interaction data received by secure communication channel, It needs to continue to carry out anti-replay detection to interaction data.Specific implementation are as follows: the timestamp carried in the interaction data is obtained, And compare the timestamp with the timestamp obtained when last reception interaction data, if the timestamp currently obtained is later than The timestamp that last time obtains, then illustrate that currently received interaction data is not played out, can continue to carry out the interaction data into One step is demonstrate,proved or executes operation according to the interaction data;If the timestamp currently obtained is earlier than or equal to the last time obtained Stamp, then illustrate that currently received interaction data is played out, no longer need to further verify the interaction data or according to the friendship Mutual data execute operation.
210, electronic lock subsystem and split type control subsystem use the interaction data received the public affairs of sender Key sign test.
Electronic lock subsystem and split type control subsystem after the interaction data received by secure communication channel, The identity for needing to continue to carry out interaction data sender identifies and completeness check.Specific implementation are as follows: electronic lock Using the public key PubB of split type control subsystem to the interaction data sign test received, split type control subsystem uses system The public key PubA of electronic lock subsystem is to the interaction data sign test received.If sign test passes through, which is carried out It further verifies or operation is executed according to the interaction data;If sign test fails, no longer need to further verify the interaction data Or operation is executed according to the interaction data.
211, electronic lock subsystem and split type control subsystem use based on the first key factor and the second key because Son generates the second session key, decrypts to the interaction data received.
Corresponding step 206, electronic lock subsystem and split type control subsystem after receiving interaction data, using with Corresponding second session key of the first session key for encrypting the interaction data, is decrypted the interaction data, and decrypting Corresponding operating is executed according to the interaction data after success.
It should be noted that step 209 and step 207 correspondence, step 210 and step 208 correspondence, step 211 and step 206 is corresponding, thus step 209,210,211 execution sequence depend on the sequences that executes of step 206,207 and 208, it is aobvious in Fig. 2 What is shown is only one of to execute sequence.The execution sequence of step 209,210 and 211 can be following a variety of:
The first executes sequence: to sent interaction data, being first decrypted using the second session key, then to number Signature is verified, and then the reduced time stabs again.
Execute sequence second: to the interaction data received, when being first decrypted, then comparing using the second session key Between stab, then digital signature is verified again.
The third executes sequence: to the interaction data received, first digital signature is verified, then reduced time stamp, Then the second session key is reused to be decrypted.
4th kind executes sequence: to the interaction data received, first verifying to digital signature, reuses the second session Key is decrypted, and then the reduced time stabs again.
5th kind executes sequence: to the interaction data received, first reduced time stamp, then digital signature is verified, Then the second session key is reused to be decrypted.
6th kind executes sequence: to the interaction data received, first reduced time stamp reuses the progress of the second session key Decryption, then again verifies digital signature.
The control method of separated electronic lock provided in an embodiment of the present invention, electronic lock subsystem and split type control System is generated according to the cryptographic key factor of exchange for encrypting the first session key of interaction data and for decrypting interaction data Second session key makes electronic lock subsystem and split type control subsystem be able to use the key that only other side knows to add Decrypt interaction data, it is ensured that safety of the data in transmission.Also, in order to make the information content of transmission meet integrality school It tests, the safety requirements that sender's identity identifies, it includes electronic lock subsystem and split type control that the present embodiment, which is used in electronic lock, Increase the mode of sender's digital signature in the data of subsystem transmission to realize that completeness check and sender's identity identify. In order to make the information content of transmission meet the safety requirements of anti-playback, the present embodiment is used in electronic lock subsystem and split type Increase the mode of the timestamp of transmission current time in the data of control subsystem transmission to realize anti-playback.Therefore logical in safety Believe in channel, the forgery of transmission, the data of playback are all invalid.
Further, as the realization to method shown in above-mentioned Fig. 1, the embodiment of the invention also provides a kind of electronic lock, For being realized to above-mentioned method shown in FIG. 1.The Installation practice is corresponding with preceding method embodiment, to be easy to read, Present apparatus embodiment no longer repeats the detail content in preceding method embodiment one by one, it should be understood that the present embodiment In device can correspond to realize preceding method embodiment in full content.
As shown in figure 3, the electronic lock includes electronic lock subsystem 31 and split type control subsystem 32, electronic lock System 31 includes the first security module 311, and split type control subsystem 32 includes the second security module 321.First security module 311 and second security module 321 for establishing secure communication channel, electronic lock subsystem 31 and split type control subsystem 32 Cryptographic key factor is exchanged based on the secure communication channel, and passes through secure communication channel interaction data.
In a kind of optional design, above-mentioned first security module 311 and/or distribution in electronic lock subsystem 31 The second security module 321 in control subsystem 32 can be the functional module that is integrated in control chip based on code, can also be with For special safety chip, such as encryption chip, operated for storage, encryption and decryption, the safety verification etc. to important interaction data.
Electronic lock subsystem 31 sends interaction data to the second security module 321 by the first security module 311, seperated Formula control subsystem 32 sends interaction data to the first security module 311 by the second security module 321.Further, first Security module 311 and the second security module 321 are in interaction data, using the session key generated based on cryptographic key factor to interaction Data encrypting and deciphering.
Optionally, the first security module 311 in electronic lock subsystem 31 is split type for generating the first key factor For the second security module 321 in control subsystem 32 for generating the second cryptographic key factor, first key factor R ND1 and second is close Key factor R ND2 is interchangeable, specifically: the first security module 311 is using PubB pairs of public key of split type control subsystem 32 After RND1 encryption, encrypted RND1 is sent to the second security module 321;Second security module 321 uses electronic lock After the public key PubA of system 31 encrypts RND2, encrypted RND2 is sent to the first security module 311.First security module 311 couples of encrypted RND2 received are decrypted using the private key PriA of oneself, are obtained RND2 and are stored;Second safe mould The encrypted RND1 received is decrypted using the private key PriB of oneself for block 321, obtains RND1 and stores;It is completed with this The exchange of two subsystems cryptographic key factor.The first key factor can be electronic lock subsystem 31 by the random number of generation, the The random number that two cryptographic key factors can generate for split type control subsystem 32;But the present embodiment does not limit cryptographic key factor specifically It is fixed.
Optionally, the first security module 311 and the second security module 321 are according to RND1 and RND2 generation session key KeyS uses all interaction datas sent between the first security module 311 and the second security module 321 and only knows mutually KeyS encrypted.For example, when electronic lock subsystem 31 sends interaction data to split type control subsystem 32, the first peace Full module 311 is based on RND1 and RND2 and generates the first session key KeyS1, is carried out by KeyS1 to sent interaction data Encryption, is then sent to the second security module 321 for encrypted interaction data.Second security module 321 be based on RND1 and RND2 generates the second session key KeyS2, and the interaction data received is decrypted by KeyS2.Split type control Subsystem 32 similarly also uses session key encryption and decryption to the process that electronic lock subsystem sends interaction data, repeats no more.
Optionally, the first security module 311 is also used to add in interaction data to be sent before sending interaction data Add the digital signature of electronic lock subsystem 31.Second security module 321 is also used to before sending interaction data to be sent Interaction data in add the digital signature of split type control subsystem 32.
First security module 311 is also used for the public key PubB of split type control subsystem to the interaction data received Sign test, the second security module 321 are also used for the public key PubA of electronic lock subsystem to the interaction data sign test received.
Optionally, the first security module 311 is also used to add in interaction data to be sent before sending interaction data Add the timestamp of the current time of electronic lock subsystem 31.Second security module 321 is also used to before sending interaction data The timestamp of current time is added in interaction data to be sent.
First security module 311 and the second security module 321 are also used to verify the timestamp in the interaction data received The timestamp whether being greater than in last received interaction data.
Optionally, as shown in figure 4, electronic lock subsystem fission 31 further includes the first control module 312, action drives mould Block 313.First control module 312 is for executing set code and strategy, to modules other in electronic lock subsystem 31 Carry out control and data interaction.For example, the first security module 311 after determining that the unlocking order that receives is legal, is notified that the One control module 312, the first control module 312 can be according to portions such as 313 driving motor of order control action drive module, electromagnet Part is completed to unlock;It, can directly and action drives alternatively, the first security module 311 is after determining that the unlocking order that receives is legal Module communication 313 makes action drives module communication 313 complete unlocking operation according to order.
Optionally, electronic lock subsystem 31 further includes input module, first communication module.Input module includes entity key Disk, touch keyboard, fingerprint Identification sensor, radio-frequency card reader wherein at least one.Physical keyboard and touch keyboard are for building When vertical user account or user's progress unlocking operation, the password of user's input is received, fingerprint Identification sensor is used to establish use When family account or user carry out unlocking operation, acquire the finger print information of user, radio-frequency card reader be used for establish user account or When user carries out unlocking operation, the information for the access card that acquisition user shows.First communication module be used for include split type control Other external equipments of subsystem are communicatively coupled, and communication mode includes wired/WIFI/ bluetooth/Zigbee/2.4G/ The modes such as RS232/RS485/ mobile network.
Optionally, split type control subsystem 32 includes image capture module, display screen, second communication module, second Control module.Image capture module include optical camera, infrared camera, visible light illuminator, in infrared illuminator At least one of.Optical camera is used to acquire the face-image of user when establishing user account or user carries out unlocking operation; Infrared camera is used to acquire the iris image of user when establishing user account or user carries out unlocking operation;Visible light shines Bright device improves the quality of the image of acquisition for providing additional light source for optical camera;Infrared illuminator is for being Infrared camera provides additional light source, improves the quality of the image of acquisition.Second communication module be used for include split type control Other external equipments of subsystem are communicatively coupled, and communication mode includes wired/WIFI/ bluetooth/Zigbee/2.4G/ The modes such as RS232/RS485/ mobile network.Second control module is for executing set code and strategy, to split type control Other modules carry out control and data interaction in subsystem 32.
By above-mentioned technical proposal, electronic lock provided in an embodiment of the present invention is easy to lose for electronic lock in the prior art Effect generates the technological deficiency of security risk, improves to electronic lock, by electronic lock subsystem 31 and split type control subsystem System 32 is separated, the operating space of Lai Zengjia control system and the space of setting battery.And the present invention is to electronic lock After subsystem and split type control subsystem partial installation, the first security module 311 of electronic lock subsystem 31 can be also utilized Secure communication channel is established with the second security module 321 of split type control subsystem 32, make electronic lock subsystem 31 and is divided The data that body formula control subsystem 32 is sent to other side are transmitted in the secure communication channel.It is sent receiving other side Order before, two subsystems will do it cryptographic key factor exchange, the session key generated jointly by the key exchanged is to interaction Data carry out encryption and decryption, are conciliate with ensuring that the two subsystems of only electronic lock can carry out correctly encryption to interaction data It is close.Also, electronic lock subsystem 31 and split type control subsystem 32 generate close for encrypting the first session of interaction data Key and the second session key for decrypting interaction data, are able to use the password that only other side knows to encrypt and decrypt interaction Data, it is ensured that safety of the data in transmission.Moreover, the first security module 311 and the second security module 321 are used in interaction number The identity of completeness check and sender that data are realized according to the middle mode for increasing sender's digital signature identifies.First safety Module 311 and the second security module 321, which are also used in, increases the mode for transmitting the timestamp of current time to realize in interaction data The safety requirements of the anti-playback of data.Therefore in secure communication channel, the forgery of transmission, the data of playback are all invalid.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, reference can be made to the related descriptions of other embodiments.
It is understood that the correlated characteristic in above-mentioned apparatus can be referred to mutually.In addition, in above-described embodiment " the One ", " second " etc. is and not represent the superiority and inferiority of each embodiment for distinguishing each embodiment.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention Example can be practiced without these specific details.In some instances, well known structure and skill is not been shown in detail Art, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects, Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the device of the disclosure should not be construed to reflect an intention that i.e. required guarantor Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the component in the device in embodiment Change and they are arranged in one or more devices unlike this embodiment.It can be the component combination in embodiment At a component, and furthermore, they can be divided into multiple subassemblies.In addition at least some of such feature is mutual It, can be using any combination to institute disclosed in this specification (including adjoint claim, abstract and attached drawing) except repulsion There are feature and all components of so disclosed any device to be combined.Unless expressly stated otherwise, this specification (including Adjoint the claims, abstract and drawings) disclosed in each feature can by provide identical, equivalent, or similar purpose substitute it is special Sign is to replace.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed Meaning one of can in any combination mode come using.Various component embodiments of the invention can be implemented in hardware, or It is implemented in a combination thereof.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Component or component listed in the claims.Word "a" or "an" before component or component does not exclude the presence of multiple Such component or component.The present invention can be realized by means of including the device of several different components.It is several listing In the claim of component, several in these components, which can be through the same component item, to be embodied.Word first, Second and the use of third etc. do not indicate any sequence.These words can be construed to title.
The above described is only a preferred embodiment of the present invention, be not intended to limit the present invention in any form, according to According to technical spirit any simple modification, equivalent change and modification to the above embodiments of the invention, this hair is still fallen within In the range of bright technical solution.

Claims (10)

1. a kind of control method of electronic lock, which is characterized in that the electronic lock includes electronic lock subsystem and split type control Subsystem, which comprises
Secure communication channel is established between the electronic lock subsystem and the split type control subsystem;
Cryptographic key factor is exchanged between the electronic lock subsystem and the split type control subsystem;
When the electronic lock subsystem and the split type control subsystem pass through the secure communication channel interaction data, Using the session key generated based on the cryptographic key factor to interaction data encryption and decryption.
2. the method according to claim 1, wherein the electronic lock subsystem and split type control Cryptographic key factor is exchanged between system, comprising:
The first key factor that the electronic lock subsystem generates, using the public key of the split type control subsystem to described The first key factor is encrypted, and is sent to the split type control subsystem by the secure communication channel;
The second cryptographic key factor that the split type control subsystem generates, using the public key of the electronic lock subsystem to described Second cryptographic key factor is encrypted, and is sent to by the secure communication channel and described is divided electronic lock subsystem;
The electronic lock subsystem uses the private key of electronic lock subsystem after receiving encrypted second cryptographic key factor Encrypted second cryptographic key factor is decrypted and is stored;
The split type control subsystem uses split type control subsystem after receiving the encrypted first key factor Private key is decrypted and stores to the encrypted first key factor.
3. according to the method described in claim 2, it is characterized in that, using the session key pair generated based on the cryptographic key factor Interaction data encryption and decryption, comprising:
Using the first session key based on the first key factor and second cryptographic key factor generation, to sent friendship Mutual data encryption;
The second session key is generated using based on the first key factor and second cryptographic key factor, the interaction to receiving Data deciphering.
4. the method according to claim 1, wherein the method also includes:
The electronic lock subsystem and the split type control subsystem use own private key label to sent interaction data Name;
The electronic lock subsystem and the split type control subsystem use the interaction data received the public affairs of sender Key sign test.
5. the method according to claim 1, wherein the method also includes:
The electronic lock subsystem and the split type control subsystem add current time in interaction data to be sent Timestamp;
The timestamp in interaction data that the electronic lock subsystem and split type control subsystem verifying receive is The no timestamp being greater than in last received interaction data.
6. a kind of electronic lock, which is characterized in that the electronic lock includes:
Electronic lock subsystem and split type control subsystem, the electronic lock subsystem includes the first security module, described Split type control subsystem includes the second security module;
First security module and second security module are for establishing the electronic lock subsystem and described split type Secure communication channel between control subsystem;
The electronic lock subsystem and the split type control subsystem are based on the secure communication channel and exchange cryptographic key factor;
First security module and second security module are also used to when through the secure communication channel interaction data, Using the session key generated based on the cryptographic key factor to interaction data encryption and decryption.
7. electronic lock according to claim 6, which is characterized in that
First security module is also used to generate the first key factor, using the public key of the split type control subsystem to institute It states the first key factor to be encrypted, and the first key factor of encryption is sent to by second peace by secure communication channel Full module;
Second security module is also used to generate the second cryptographic key factor, using the public key of the electronic lock subsystem to described Second cryptographic key factor is encrypted, and the second cryptographic key factor of encryption is sent to first safety by secure communication channel Module;
After first security module receives encrypted second cryptographic key factor, using the private key of electronic lock subsystem to institute Encrypted second cryptographic key factor is stated to be decrypted and store;
After second security module receives the encrypted first key factor, the private key pair of split type control subsystem is used The encrypted first key factor is decrypted and stores.
8. electronic lock according to claim 7, which is characterized in that
First security module and second security module are also used to when through the secure communication channel interaction data, Using the first session key based on the first key factor and second cryptographic key factor generation, to sent interaction number According to encryption;And use the second session key based on the first key factor and second cryptographic key factor generation, docking The interaction data decryption received.
9. electronic lock according to claim 6, which is characterized in that
First security module is also used to use the private key signature of electronic lock subsystem, docking to sent interaction data The interaction data received uses the public key sign test of sender;
Second security module is also used to use the private key signature of split type control subsystem to sent interaction data, right The interaction data received uses the public key sign test of sender.
10. electronic lock according to claim 6, which is characterized in that
First security module and second security module are also used to add current time in interaction data to be sent Timestamp;
The timestamp that first security module and second security module are also used to verify in the interaction data that receives is The no timestamp being greater than in last received interaction data.
CN201910485598.0A 2019-06-05 2019-06-05 Control method of electronic lock and electronic lock Active CN110322600B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910485598.0A CN110322600B (en) 2019-06-05 2019-06-05 Control method of electronic lock and electronic lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910485598.0A CN110322600B (en) 2019-06-05 2019-06-05 Control method of electronic lock and electronic lock

Publications (2)

Publication Number Publication Date
CN110322600A true CN110322600A (en) 2019-10-11
CN110322600B CN110322600B (en) 2021-02-26

Family

ID=68120269

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910485598.0A Active CN110322600B (en) 2019-06-05 2019-06-05 Control method of electronic lock and electronic lock

Country Status (1)

Country Link
CN (1) CN110322600B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110762007A (en) * 2019-10-31 2020-02-07 上海斯可络压缩机有限公司 Automatic identification system for variable-frequency screw compressor controller
CN111147452A (en) * 2019-12-10 2020-05-12 珠海格力电器股份有限公司 Door lock instruction response method and device, door lock and storage medium
CN111508114A (en) * 2020-04-17 2020-08-07 上海钧正网络科技有限公司 Bicycle unlocking method and device, storage medium and hub lock
CN112232363A (en) * 2020-11-05 2021-01-15 北京三维天地科技股份有限公司 5G-based non-contact sample information acquisition equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102324127A (en) * 2011-09-28 2012-01-18 成都方程式电子有限公司 Split-type electronic fingerprint safety lock
CN106682459A (en) * 2017-02-28 2017-05-17 北京深思数盾科技股份有限公司 Information safety device production method, information safety device production equipment and information safety device production system
CN106712962A (en) * 2016-12-23 2017-05-24 西安电子科技大学 Mobile RFID system bidirectional authentication method and system
CN106936588A (en) * 2017-04-13 2017-07-07 北京深思数盾科技股份有限公司 A kind of trustship method, the apparatus and system of hardware controls lock
CN107978047A (en) * 2017-12-04 2018-05-01 北京深思数盾科技股份有限公司 Use the methods, devices and systems of password unlocking
CN109712278A (en) * 2018-11-27 2019-05-03 深圳市小石安防科技有限公司 Intelligent door lock identity identifying method, system, readable storage medium storing program for executing and mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102324127A (en) * 2011-09-28 2012-01-18 成都方程式电子有限公司 Split-type electronic fingerprint safety lock
CN106712962A (en) * 2016-12-23 2017-05-24 西安电子科技大学 Mobile RFID system bidirectional authentication method and system
CN106682459A (en) * 2017-02-28 2017-05-17 北京深思数盾科技股份有限公司 Information safety device production method, information safety device production equipment and information safety device production system
CN106936588A (en) * 2017-04-13 2017-07-07 北京深思数盾科技股份有限公司 A kind of trustship method, the apparatus and system of hardware controls lock
CN107978047A (en) * 2017-12-04 2018-05-01 北京深思数盾科技股份有限公司 Use the methods, devices and systems of password unlocking
CN109712278A (en) * 2018-11-27 2019-05-03 深圳市小石安防科技有限公司 Intelligent door lock identity identifying method, system, readable storage medium storing program for executing and mobile terminal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110762007A (en) * 2019-10-31 2020-02-07 上海斯可络压缩机有限公司 Automatic identification system for variable-frequency screw compressor controller
CN111147452A (en) * 2019-12-10 2020-05-12 珠海格力电器股份有限公司 Door lock instruction response method and device, door lock and storage medium
CN111508114A (en) * 2020-04-17 2020-08-07 上海钧正网络科技有限公司 Bicycle unlocking method and device, storage medium and hub lock
CN111508114B (en) * 2020-04-17 2022-04-22 上海钧正网络科技有限公司 Bicycle unlocking method and device, storage medium and hub lock
CN112232363A (en) * 2020-11-05 2021-01-15 北京三维天地科技股份有限公司 5G-based non-contact sample information acquisition equipment

Also Published As

Publication number Publication date
CN110322600B (en) 2021-02-26

Similar Documents

Publication Publication Date Title
US10154021B1 (en) Securitization of temporal digital communications with authentication and validation of user and access devices
CN110322600A (en) The control method and electronic lock of electronic lock
CN108055235B (en) Control method of intelligent lock, related equipment and system
CN105827576B (en) Method for unlocking and system based on dynamic puzzle-lock
US8070061B2 (en) Card credential method and system
CN201181472Y (en) Hardware key device and movable memory system
ES2960397T3 (en) Procedure to verify biometric authentication
CN105245341A (en) Remote identity authentication method and system and remote account opening method and system
CA2320221C (en) Secure one-way authentication communication system
CN106603484A (en) Virtual key method and apparatus using the same, background system, and user terminal
CN106683245B (en) NFC mobile intelligent terminal safety access control system and control method thereof
CN106067205B (en) A kind of gate inhibition's method for authenticating and device
CN107978047A (en) Use the methods, devices and systems of password unlocking
CN101300808A (en) Method and arrangement for secure autentication
CN106789024B (en) A kind of remote de-locking method, device and system
CN107004077A (en) Method and system for providing safe and independently operable biological characteristic authentication
CN103929308B (en) Information Authentication method applied to rfid card
CN108868367B (en) Intelligent lock device
CN109035519A (en) A kind of biometric devices and method
CN109936552A (en) A kind of cipher key authentication method, server and system
CN108462696A (en) A kind of block chain intelligent identity identification system of decentralization
CN110011812A (en) A kind of card method for anti-counterfeit suitable for airport security
CN104881595B (en) The self-help remote unlocking method managed based on PIN code
CN104123777A (en) Access control remote authorization method
CN103368736B (en) Business information encryption, decryption method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee after: Beijing Shendun Technology Co.,Ltd.

Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder