CN110322600A - The control method and electronic lock of electronic lock - Google Patents
The control method and electronic lock of electronic lock Download PDFInfo
- Publication number
- CN110322600A CN110322600A CN201910485598.0A CN201910485598A CN110322600A CN 110322600 A CN110322600 A CN 110322600A CN 201910485598 A CN201910485598 A CN 201910485598A CN 110322600 A CN110322600 A CN 110322600A
- Authority
- CN
- China
- Prior art keywords
- electronic lock
- subsystem
- split type
- key factor
- type control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
Abstract
The invention discloses a kind of control method of electronic lock and electronic locks, are related to electronic lock technical field.Present invention mainly solves the low problems of electronic lock safety in the prior art.Electronic lock of the invention includes electronic lock subsystem and split type control subsystem, and method includes: to establish secure communication channel between the electronic lock subsystem and the split type control subsystem;Cryptographic key factor is exchanged between the electronic lock subsystem and the split type control subsystem;When the electronic lock subsystem and the split type control subsystem pass through the secure communication channel interaction data, using the session key generated based on the cryptographic key factor to interaction data encryption and decryption.It the composite can be widely applied in the scene of control electronic lock.
Description
Technical field
The present invention relates to electronic lock technical field more particularly to the control methods and electronic lock of a kind of electronic lock.
Background technique
Electronic lock be it is a kind of mechanical switch is opened by control circuit or chip, is closed control, come complete unlocking,
The electronic product of locking task.Since it can identify disengaging personnel when unlocking by modes such as input passwords, phase
Than having higher safety in traditional mechanical lock, electronic lock has replaced mechanical lock to become the lock that user's mainstream selects now
Has type.
However, due to the volumetric constraint of electronic lock itself, cause user's operation space it is smaller, it is inconvenient be managed operation,
It is smaller to also result in battery capacity, being easy power-off when in use causes electronic lock to fail, and increases the security risk of electronic lock.
Summary of the invention
In view of the above problems, the present invention provides the control method and electronic lock of a kind of electronic lock, and main purpose is to solve
The low problem of the electronic lock safety of the prior art.
In order to solve the above technical problems, in a first aspect, the present invention provides a kind of control method of electronic lock, the electronics
Lock includes electronic lock subsystem and split type control subsystem, which comprises
Secure communication channel is established between the electronic lock subsystem and the split type control subsystem;
Cryptographic key factor is exchanged between the electronic lock subsystem and the split type control subsystem;
When the electronic lock subsystem and the split type control subsystem pass through secure communication channel interaction number
According to when, using the session key generated based on the cryptographic key factor to interaction data encryption and decryption.
Optionally, cryptographic key factor is exchanged between the electronic lock subsystem and the split type control subsystem, comprising:
The first key factor that the electronic lock subsystem generates, uses the public key pair of the split type control subsystem
The first key factor is encrypted, and is sent to the split type control subsystem by the secure communication channel;
The second cryptographic key factor that the split type control subsystem generates, uses the public key pair of the electronic lock subsystem
Second cryptographic key factor is encrypted, and is sent to by the secure communication channel and described is divided electronic lock subsystem;
The electronic lock subsystem uses electronic lock subsystem after receiving encrypted second cryptographic key factor
Private key is decrypted and stores to encrypted second cryptographic key factor;
The split type control subsystem uses split type control subsystem after receiving the encrypted first key factor
The private key of system is decrypted and stores to the encrypted first key factor.
Optionally, using the session key generated based on the cryptographic key factor to interaction data encryption and decryption, comprising:
Using the first session key based on the first key factor and second cryptographic key factor generation, to be sent
Interaction data encryption;
The second session key is generated using based on the first key factor and second cryptographic key factor, to what is received
Interaction data decryption.
Optionally, the method also includes:
The electronic lock subsystem and the split type control subsystem are private using itself to sent interaction data
Key signature;
The electronic lock subsystem and the split type control subsystem use sender to the interaction data received
Public key sign test.
Optionally, the method also includes:
The electronic lock subsystem and the split type control subsystem are added currently in interaction data to be sent
The timestamp of time;
The time in interaction data that the electronic lock subsystem and the split type control subsystem verifying receive
Whether stamp is greater than the timestamp in last received interaction data.
Second aspect, the present invention provides a kind of electronic lock, which includes:
Electronic lock subsystem and split type control subsystem, the electronic lock subsystem include the first security module,
The split type control subsystem includes the second security module;
First security module and second security module are for establishing the electronic lock subsystem and described point
Secure communication channel between body formula control subsystem;
The electronic lock subsystem and the split type control subsystem are used to exchange based on the secure communication channel
Cryptographic key factor;
First security module and second security module are also used to by secure communication channel interaction number
According to when, using the session key generated based on the cryptographic key factor to interaction data encryption and decryption.
Optionally, first security module is also used to generate the first key factor, uses the split type control subsystem
The public key of system encrypts the first key factor, and is sent the first key factor of encryption by secure communication channel
To second security module;Second security module is also used to generate the second cryptographic key factor, uses electronic lock
The public key of system encrypts second cryptographic key factor, and is sent out the second cryptographic key factor of encryption by secure communication channel
Give first security module;
After first security module receives encrypted second cryptographic key factor, the private key of electronic lock subsystem is used
Encrypted second cryptographic key factor is decrypted and is stored;It is close that second security module receives encrypted first
After the key factor, the encrypted first key factor is decrypted and is stored using the private key of split type control subsystem.
Optionally, first security module and second security module are also used to by the secure communication channel
When interaction data, using the first session key based on the first key factor and second cryptographic key factor generation, treat
The interaction data of transmission encrypts;And use second based on the first key factor and second cryptographic key factor generation
Session key decrypts the interaction data received.
Optionally, first security module is also used to use the private of electronic lock subsystem to sent interaction data
Key signature, uses the interaction data received the public key sign test of sender;
Second security module is also used to use the private key label of split type control subsystem to sent interaction data
Name uses the interaction data received the public key sign test of sender.
Optionally, first security module and second security module are also used to add in interaction data to be sent
Add the timestamp of current time;
First security module and second security module are also used to verify the time in the interaction data received
Whether stamp is greater than the timestamp in last received interaction data.
By above-mentioned technical proposal, the control method and electronic lock of electronic lock provided by the invention, in the prior art
Electronic lock is easy the technological deficiency that failure generates security risk, improves to electronic lock, by control system and electronics lock body
It is separated, the operating space of Lai Zengjia control system and the space of setting battery.And the present invention is to electronic lock subsystem
After system and split type control subsystem partial installation, secure communication channel can be also established in-between and is mutually known with completing identity, and
And the interaction data for ensuring that electronic lock subsystem and split type control subsystem are sent to other side is believed in the secure communication
It is transmitted in road.Before transmitting the data, two subsystems will do it the exchange of cryptographic key factor, by the key based on exchange
The session key that the factor generates jointly carries out encryption and decryption to interaction data, to ensure that the two subsystems of only electronic lock can be right
Interaction data is correctly encrypted and is decrypted, and the safety of electronic lock is improved.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention,
And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can
It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field
Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention
Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows a kind of flow chart of the control method of electronic lock provided in an embodiment of the present invention;
Fig. 2 shows the flow charts of the control method of another electronic lock provided in an embodiment of the present invention;
Fig. 3 shows a kind of structural block diagram of electronic lock provided in an embodiment of the present invention;
Fig. 4 shows the structural block diagram of another electronic lock provided in an embodiment of the present invention.
Specific embodiment
The exemplary embodiment that the present invention will be described in more detail below with reference to accompanying drawings.Although showing the present invention in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the present invention without should be by embodiments set forth here
It is limited.It is to be able to thoroughly understand the present invention on the contrary, providing these embodiments, and can be by the scope of the present invention
It is fully disclosed to those skilled in the art.
In order to improve the safety of electronic lock, the embodiment of the invention provides a kind of control methods of electronic lock, such as Fig. 1 institute
Show, this method comprises:
101, secure communication channel is established between electronic lock subsystem and split type control subsystem.
Electronics lock body and its control system are carried out split settings by the present invention, and making separated electronic lock includes split type control
Subsystem and electronic lock subsystem.Using electronic door lock system and corresponding split type control subsystem interaction data it
Before, for the safety for improving the transmission of its data, need to identify corresponding two subsystems mutually, so as to Subsequent electronic door
Lock subsystem and the seperated interaction data for issuing control subsystem only for the subsystem mutually known respond.In electronic lock
Exclusive secure communication channel is established between subsystem and corresponding split type control subsystem, make electronic lock subsystem and is divided
Between body formula control subsystem the data of interaction in need transmitted using the secure communication channel, to guarantee data
Safety.
102, cryptographic key factor is exchanged between electronic lock subsystem and split type control subsystem.
Electronic lock subsystem and corresponding split type control subsystem both sides can lead to after having carried out identity and mutually having known
Cross the exchange that the secure communication channel established carries out cryptographic key factor.The cryptographic key factor only has sender and recipient to know, therefore
Calculating the session key generated by cryptographic key factor, also just only corresponding electronic lock subsystem and split type control subsystem has
Have.Cryptographic key factor can be identifying code, mark, random number of representative capacity etc..The present embodiment is not made cryptographic key factor specifically
Limitation.
103, it when electronic lock subsystem and split type control subsystem pass through secure communication channel interaction data, uses
Session key based on cryptographic key factor generation is to interaction data encryption and decryption.
When passing through secure communication channel interaction data between electronic lock subsystem and split type control subsystem, as hair
The subsystem for the side of sending is based on cryptographic key factor and generates session key and encrypted using session key to sent interaction data, is added
Interaction data after close is sent to the subsystem as recipient by secure communication channel.Subsystem as recipient passes through
When secure communication channel receives interaction data, using the session key generated based on cryptographic key factor to the interaction data received
It is decrypted, explanation has received the interaction data that the subsystem mutually known is sent if successful decryption, can be according to the interaction number
According to further being operated.
Further, electronic lock subsystem and the split type control subsystem are decrypted correctly to interaction data
Afterwards, i.e., the operations such as corresponding unlocking, information collection or information reading can be carried out according to the interaction data received.For example, seperated
Formula control subsystem is generated to unlock and be ordered and using the session generated based on cryptographic key factor after the unlocking request for receiving user
The key pair unlocking order is encrypted, then sends encrypted unlocking life to electronic lock subsystem by secure communication channel
It enables.Electronic lock subsystem is after receiving the unlocking order sent by secure communication channel, according to raw based on cryptographic key factor
At session key the unlocking order is decrypted, if successful decryption, unlocked according to the order.In another example electronics
Door lock subsystem can control fingerprint recognition after the finger print information acquisition sent to split type control subsystem is decrypted correctly
Sensor acquires the current finger print information of user.In another example split type control subsystem is sending electronic lock subsystem
After finger print information is decrypted correctly, the finger print information can be received and stored or identified.In another example electronic lock subsystem is right
After the reading access card message command that split type control subsystem is sent is decrypted correctly, radio-frequency card reader can be controlled and read currently
Gate inhibition's card information.In another example electronic lock subsystem is after the unlocking order sent to split type control subsystem is decrypted correctly,
It can driving motor opening door lock.In another example split type control subsystem refers in the face recognition sent to electronic lock subsystem
After order is decrypted correctly, starting optical camera identifies the face-image of active user.In another example split type control subsystem
It unites after the iris recognition instruction sent to electronic lock subsystem is decrypted correctly, face of the starting infrared camera to active user
Portion's image is identified.
Further, in the present embodiment, split type control subsystem can priori after receiving the request such as unlocking of user
The identity for demonstrate,proving user, after authentication passes through, split type control subsystem sends corresponding friendship to electronic lock subsystem again
Mutual data.For example, user needs to input password in electronic lock subsystem, electronic lock subsystem is close to this when unlocking
Code is verified, and after being verified, the ID number of the user is sent to split type control subsystem by secure communication channel
System requests split type control subsystem to carry out further identification to active user.Split type control subsystem is receiving
To after request, man face image acquiring and/or iris image acquiring can be carried out to user, to the facial image and/or iris of acquisition
Image and the identity identification information of storage are matched, and judge whether active user has unlocking authority according to matching result, i.e.,
Whether the request of active user is legal.When being judged as legal, split type control subsystem is again by the unlocking including matching result
Order is encrypted by session key, and is sent to electronic lock subsystem, order electronic lock by secure communication channel
Subsystem is unlocked.
Further, in the present embodiment, user account is added by split type control subsystem, and set in account
Set corresponding identity identification information.For example, electronic lock needs to be the use for having permission unlocking before receiving the unlocking request of user
Account is established at family.Specifically, the account of user is sent to electronic lock by secure communication channel by split type control subsystem
Subsystem, and send fingerprint collecting order control electronic lock subsystem and finger print information acquisition is carried out to user;Electronic lock
The information of acquisition is sent to split type control subsystem by secure communication channel after completing finger print information acquisition by system,
The finger print information received is saved in corresponding account by split type control subsystem, to complete the setting of user account.Again
For example, split type control subsystem sends gate inhibition's card information that card reading order control electronic lock subsystem reads user;Electronics
After door lock subsystem completes the reading of gate inhibition's card information again, which is sent to by split type control by secure communication channel
Subsystem, split type control subsystem by the access card information preservation received into corresponding account, to complete user's account
Number setting.Further for example, split type control subsystem when adding the account of user, can also acquire user's by camera
Then face-image and/or iris image store the face-image and/or iris image to complete the setting of user account.Into
One step, user can complete the addition of account in split type control subsystem by operation on the touch screen.Upper
During stating addition user account, all interaction datas all make between electronic lock subsystem and split type control subsystem
It is transmitted with secure communication channel, and carries out encryption and decryption using the session key generated based on cryptographic key factor, to ensure user
The safety of the data of account.
The control method of electronic lock provided by the invention is easy failure for electronic lock in the prior art and generates security risk
Technological deficiency, to improved separated electronic lock control, to electronic lock subsystem and split type control subsystem
After partial installation, secure communication channel can be also established in-between and is mutually known with completing identity, and ensures electronic lock subsystem
The interaction data for being sent to other side with split type control subsystem is transmitted in the secure communication channel.It is transmitting
Before data, two subsystems will do it the exchange of cryptographic key factor, and the session generated jointly by the cryptographic key factor based on exchange is close
Key carries out encryption and decryption to interaction data, to ensure that the two subsystems of only electronic lock can carry out interaction data correctly to add
Close and decryption.
Further, as the refinement and extension to embodiment illustrated in fig. 1, the embodiment of the invention also provides another electricity
The control method of son lock, as shown in Fig. 2, wherein, the specific steps are as follows:
201, secure communication channel is established between electronic lock subsystem and split type control subsystem.
The implementation of step 201 and the implementation of the step 101 of above-described embodiment are identical, and details are not described herein.
202, the first key factor that electronic lock subsystem generates, using the public key of split type control subsystem to first
Cryptographic key factor is encrypted, and is sent to split type control subsystem by secure communication channel.
203, split type control subsystem uses split type control subsystem after receiving the encrypted first key factor
The first key factor after the private key pair encryption of system is decrypted and stores.
204, the second cryptographic key factor that split type control subsystem generates, using the public key of electronic lock subsystem to second
Cryptographic key factor is encrypted, and is divided electronic lock subsystem by secure communication channel.
205, electronic lock subsystem uses electronic lock subsystem after receiving encrypted second cryptographic key factor
The second cryptographic key factor after private key pair encryption is decrypted and stores.
The two subsystems of separated electronic lock are carrying out after identity mutually knows, each self-generating cryptographic key factor, and by key because
Son swaps, make two subsystems be owned by oneself cryptographic key factor and other side cryptographic key factor, and only corresponding electricity
Cervical orifice of uterus lock subsystem and split type control subsystem can possess the cryptographic key factor of oneself and other side.
Further, the concrete mode for exchanging cryptographic key factor can be electronic lock subsystem and split type control subsystem
Exchange the random number (i.e. cryptographic key factor) generated.Electronic lock subsystem and split type control subsystem first obtain mutually other side's
Public key, electronic lock subsystem generate random number R ND1 (i.e. the first key factor), and split type control subsystem generates random number
RND2 (i.e. the second cryptographic key factor).The public key PubB of the split type control subsystem of electronic lock subsystem to random number R ND1 into
Row encryption, the public key PubA of split type control subsystem electronic lock subsystem encrypt random number R ND2.Electronic gate
It locks subsystem and encrypted random number R ND1 is sent to split type control subsystem, split type control subsystem will be encrypted
Random number R ND2 is sent to electronic lock subsystem.Electronic lock subsystem uses oneself after receiving encrypted data
Private key PriA carries out data deciphering, obtains the random number R ND2 of split type control subsystem;Split type control subsystem is receiving
Data deciphering is carried out using the private key PriB of oneself after to encrypted data, obtains the random number of electronic lock subsystem
RND1.Last electronic lock subsystem and split type control subsystem store the random number that other side generates, and are completed with this
The identity of two subsystems mutually knows and the exchange of random number.
It should be noted that step 202-203 is between electronic lock subsystem and split type control subsystem to first
The transmitting step of cryptographic key factor, step 204-205 are close to second between electronic lock subsystem and split type control subsystem
The transmitting step of the key factor, step 202-203 and step 204-205 can be executed successively, can also be executed side by side, be executed suitable
Sequence does not influence implementing result.The present embodiment is not construed as limiting the execution sequence of step 202-203 and step 204-205, shows in Fig. 2
What is shown is only that the present embodiment one of which executes sequence.
206, it when electronic lock subsystem and split type control subsystem pass through secure communication channel interaction data, uses
Based on the first session key that the first key factor and the second cryptographic key factor generate, encrypted to sent interaction data.
Due to being easy to be stolen and replace using clear-text way transmission data and order, data, the data to communication are needed
It is encrypted, it is ensured that the electronic lock of split-type design can reach the safety of the electronic lock of unitary design.And in order to guarantee to set
The password set is merely able to be calculated by electronic lock subsystem and split type control subsystem, therefore uses the cryptographic key factor of exchange
Generate session key.The first session key and the second session key generated may be the same or different.Specifically it can be,
Based on the first key factor and the second cryptographic key factor, the first session key and the second session key are generated by a calculation method,
First session key and the second session key are identical, and electronic lock subsystem and the split type control subsystem are close with the session
Key is to interaction data encryption and decryption;Or, be based on the first key factor and the second cryptographic key factor, the is generated by different calculation method
One session key and the second session key, the first session key and the second session key are different, electronic lock subsystem and described
Split type control subsystem is encrypted with the first session key to sent interaction data, electronic lock subsystem and split type control
Subsystem decrypts the interaction data received with the second session key;Or, the first key factor and the second cryptographic key factor are equal
Have it is multiple, be based on the different pairs of first key factor and the second cryptographic key factor, pass through a calculation method generate the first session key
With the second session key, the first session key and the second session key are different, electronic lock subsystem and the split type control
Subsystem is encrypted with the first session key to sent interaction data, and electronic lock subsystem and split type control subsystem are used
Second session key decrypts the interaction data received;Or, the first key factor and the second cryptographic key factor have multiple, it is based on
The different pairs of first key factor and the second cryptographic key factor generate the first session key and the second meeting by different calculation methods
Key is talked about, the first session key and the second session key are different, and electronic lock subsystem and the split type control subsystem are used
First session key is encrypted to sent interaction data, the second session of electronic lock subsystem and split type control subsystem
The interaction data decryption that key pair receives.For example, being intercoursed in electronic lock subsystem and split type control subsystem
After the random number R ND1 and RND2 of generation, is calculated according to RND1 and RND2 and generate session key KeyS1 (i.e. the first session key)
With session key KeyS2 (i.e. the second session key), agreement needs to decrypt using KeyS2 using the data that KeyS1 is encrypted.
Electronic lock subsystem and split type control subsystem encrypt interaction data to be sent using KeyS1 in interaction data,
The interaction data received is decrypted using KeyS2.
207, electronic lock subsystem and split type control subsystem add current time in interaction data to be sent
Timestamp.
The interaction data of playback, electronic lock subsystem and split type control subsystem are received in order to prevent is sending friendship
The timestamp that 4 bytes are used to store current time can be increased on the head of the interaction data before mutual data, recipient is made to exist
When receiving the interaction data, corresponding transmission time can be obtained, the interaction data being currently received is determined according to the time
It whether is the interaction data reset.
208, electronic lock subsystem and split type control subsystem use own private key label to sent interaction data
Name.
Electronic lock subsystem and split type control subsystem will use the private key pair of itself before sending interaction data
Data are digitally signed, and are reflected so that recipient passes through the digital signature after receiving the data to the identity of sender
Not.
Further, in the digital signature of the tail portion of interaction data addition sender, for verifying the legal of interaction data
Property and integrality.For example, electronic lock subsystem is based on RSA Algorithm or SM2 algorithm, using PriA to sent interaction data
It signs;Split type control subsystem is based on RSA Algorithm or SM2 algorithm, is carried out using PriB to sent communication data
Signature;To ensure that communication data cannot be tampered and forge.
It should be noted that being encrypted to interaction data, increase digital signature, increasing timestamp is holding of being independent of each other
Row step, for the present embodiment to the execution of step 206,207 and 208 sequentially and without specifically limiting, what is shown in Fig. 2 is only it
It is middle a kind of to execute sequence.The execution sequence of step 206,207 and 208 can be following a variety of:
The first executes sequence: to sent interaction data, first being encrypted using the first session key, then adds hair
Then the digital signature for the side of sending adds the timestamp of current time again.
It executes sequence second: to sent interaction data, first being encrypted using the first session key, then add and work as
Then the timestamp of preceding time adds the digital signature of sender again.
The third executes sequence: to sent interaction data, when first adding the digital signature of sender, then adding current
Between timestamp, then reuse the first session key and encrypted.
4th kind executes sequence: to sent interaction data, first adding the digital signature of sender, reuses the first meeting
Words key is encrypted, and then adds the timestamp of current time again.
5th kind executes sequence: to sent interaction data, first adding the timestamp of current time, then adds sender
Digital signature, then reuse the first session key and encrypted.
6th kind executes sequence: to sent interaction data, first adding the timestamp of current time, reuses the first meeting
Words key is encrypted, and then adds the digital signature of sender again.
209, the timestamp in the interaction data that electronic lock subsystem and the verifying of split type control subsystem receive is
The no timestamp being greater than in last received interaction data.
Electronic lock subsystem and split type control subsystem after the interaction data received by secure communication channel,
It needs to continue to carry out anti-replay detection to interaction data.Specific implementation are as follows: the timestamp carried in the interaction data is obtained,
And compare the timestamp with the timestamp obtained when last reception interaction data, if the timestamp currently obtained is later than
The timestamp that last time obtains, then illustrate that currently received interaction data is not played out, can continue to carry out the interaction data into
One step is demonstrate,proved or executes operation according to the interaction data;If the timestamp currently obtained is earlier than or equal to the last time obtained
Stamp, then illustrate that currently received interaction data is played out, no longer need to further verify the interaction data or according to the friendship
Mutual data execute operation.
210, electronic lock subsystem and split type control subsystem use the interaction data received the public affairs of sender
Key sign test.
Electronic lock subsystem and split type control subsystem after the interaction data received by secure communication channel,
The identity for needing to continue to carry out interaction data sender identifies and completeness check.Specific implementation are as follows: electronic lock
Using the public key PubB of split type control subsystem to the interaction data sign test received, split type control subsystem uses system
The public key PubA of electronic lock subsystem is to the interaction data sign test received.If sign test passes through, which is carried out
It further verifies or operation is executed according to the interaction data;If sign test fails, no longer need to further verify the interaction data
Or operation is executed according to the interaction data.
211, electronic lock subsystem and split type control subsystem use based on the first key factor and the second key because
Son generates the second session key, decrypts to the interaction data received.
Corresponding step 206, electronic lock subsystem and split type control subsystem after receiving interaction data, using with
Corresponding second session key of the first session key for encrypting the interaction data, is decrypted the interaction data, and decrypting
Corresponding operating is executed according to the interaction data after success.
It should be noted that step 209 and step 207 correspondence, step 210 and step 208 correspondence, step 211 and step
206 is corresponding, thus step 209,210,211 execution sequence depend on the sequences that executes of step 206,207 and 208, it is aobvious in Fig. 2
What is shown is only one of to execute sequence.The execution sequence of step 209,210 and 211 can be following a variety of:
The first executes sequence: to sent interaction data, being first decrypted using the second session key, then to number
Signature is verified, and then the reduced time stabs again.
Execute sequence second: to the interaction data received, when being first decrypted, then comparing using the second session key
Between stab, then digital signature is verified again.
The third executes sequence: to the interaction data received, first digital signature is verified, then reduced time stamp,
Then the second session key is reused to be decrypted.
4th kind executes sequence: to the interaction data received, first verifying to digital signature, reuses the second session
Key is decrypted, and then the reduced time stabs again.
5th kind executes sequence: to the interaction data received, first reduced time stamp, then digital signature is verified,
Then the second session key is reused to be decrypted.
6th kind executes sequence: to the interaction data received, first reduced time stamp reuses the progress of the second session key
Decryption, then again verifies digital signature.
The control method of separated electronic lock provided in an embodiment of the present invention, electronic lock subsystem and split type control
System is generated according to the cryptographic key factor of exchange for encrypting the first session key of interaction data and for decrypting interaction data
Second session key makes electronic lock subsystem and split type control subsystem be able to use the key that only other side knows to add
Decrypt interaction data, it is ensured that safety of the data in transmission.Also, in order to make the information content of transmission meet integrality school
It tests, the safety requirements that sender's identity identifies, it includes electronic lock subsystem and split type control that the present embodiment, which is used in electronic lock,
Increase the mode of sender's digital signature in the data of subsystem transmission to realize that completeness check and sender's identity identify.
In order to make the information content of transmission meet the safety requirements of anti-playback, the present embodiment is used in electronic lock subsystem and split type
Increase the mode of the timestamp of transmission current time in the data of control subsystem transmission to realize anti-playback.Therefore logical in safety
Believe in channel, the forgery of transmission, the data of playback are all invalid.
Further, as the realization to method shown in above-mentioned Fig. 1, the embodiment of the invention also provides a kind of electronic lock,
For being realized to above-mentioned method shown in FIG. 1.The Installation practice is corresponding with preceding method embodiment, to be easy to read,
Present apparatus embodiment no longer repeats the detail content in preceding method embodiment one by one, it should be understood that the present embodiment
In device can correspond to realize preceding method embodiment in full content.
As shown in figure 3, the electronic lock includes electronic lock subsystem 31 and split type control subsystem 32, electronic lock
System 31 includes the first security module 311, and split type control subsystem 32 includes the second security module 321.First security module
311 and second security module 321 for establishing secure communication channel, electronic lock subsystem 31 and split type control subsystem 32
Cryptographic key factor is exchanged based on the secure communication channel, and passes through secure communication channel interaction data.
In a kind of optional design, above-mentioned first security module 311 and/or distribution in electronic lock subsystem 31
The second security module 321 in control subsystem 32 can be the functional module that is integrated in control chip based on code, can also be with
For special safety chip, such as encryption chip, operated for storage, encryption and decryption, the safety verification etc. to important interaction data.
Electronic lock subsystem 31 sends interaction data to the second security module 321 by the first security module 311, seperated
Formula control subsystem 32 sends interaction data to the first security module 311 by the second security module 321.Further, first
Security module 311 and the second security module 321 are in interaction data, using the session key generated based on cryptographic key factor to interaction
Data encrypting and deciphering.
Optionally, the first security module 311 in electronic lock subsystem 31 is split type for generating the first key factor
For the second security module 321 in control subsystem 32 for generating the second cryptographic key factor, first key factor R ND1 and second is close
Key factor R ND2 is interchangeable, specifically: the first security module 311 is using PubB pairs of public key of split type control subsystem 32
After RND1 encryption, encrypted RND1 is sent to the second security module 321;Second security module 321 uses electronic lock
After the public key PubA of system 31 encrypts RND2, encrypted RND2 is sent to the first security module 311.First security module
311 couples of encrypted RND2 received are decrypted using the private key PriA of oneself, are obtained RND2 and are stored;Second safe mould
The encrypted RND1 received is decrypted using the private key PriB of oneself for block 321, obtains RND1 and stores;It is completed with this
The exchange of two subsystems cryptographic key factor.The first key factor can be electronic lock subsystem 31 by the random number of generation, the
The random number that two cryptographic key factors can generate for split type control subsystem 32;But the present embodiment does not limit cryptographic key factor specifically
It is fixed.
Optionally, the first security module 311 and the second security module 321 are according to RND1 and RND2 generation session key
KeyS uses all interaction datas sent between the first security module 311 and the second security module 321 and only knows mutually
KeyS encrypted.For example, when electronic lock subsystem 31 sends interaction data to split type control subsystem 32, the first peace
Full module 311 is based on RND1 and RND2 and generates the first session key KeyS1, is carried out by KeyS1 to sent interaction data
Encryption, is then sent to the second security module 321 for encrypted interaction data.Second security module 321 be based on RND1 and
RND2 generates the second session key KeyS2, and the interaction data received is decrypted by KeyS2.Split type control
Subsystem 32 similarly also uses session key encryption and decryption to the process that electronic lock subsystem sends interaction data, repeats no more.
Optionally, the first security module 311 is also used to add in interaction data to be sent before sending interaction data
Add the digital signature of electronic lock subsystem 31.Second security module 321 is also used to before sending interaction data to be sent
Interaction data in add the digital signature of split type control subsystem 32.
First security module 311 is also used for the public key PubB of split type control subsystem to the interaction data received
Sign test, the second security module 321 are also used for the public key PubA of electronic lock subsystem to the interaction data sign test received.
Optionally, the first security module 311 is also used to add in interaction data to be sent before sending interaction data
Add the timestamp of the current time of electronic lock subsystem 31.Second security module 321 is also used to before sending interaction data
The timestamp of current time is added in interaction data to be sent.
First security module 311 and the second security module 321 are also used to verify the timestamp in the interaction data received
The timestamp whether being greater than in last received interaction data.
Optionally, as shown in figure 4, electronic lock subsystem fission 31 further includes the first control module 312, action drives mould
Block 313.First control module 312 is for executing set code and strategy, to modules other in electronic lock subsystem 31
Carry out control and data interaction.For example, the first security module 311 after determining that the unlocking order that receives is legal, is notified that the
One control module 312, the first control module 312 can be according to portions such as 313 driving motor of order control action drive module, electromagnet
Part is completed to unlock;It, can directly and action drives alternatively, the first security module 311 is after determining that the unlocking order that receives is legal
Module communication 313 makes action drives module communication 313 complete unlocking operation according to order.
Optionally, electronic lock subsystem 31 further includes input module, first communication module.Input module includes entity key
Disk, touch keyboard, fingerprint Identification sensor, radio-frequency card reader wherein at least one.Physical keyboard and touch keyboard are for building
When vertical user account or user's progress unlocking operation, the password of user's input is received, fingerprint Identification sensor is used to establish use
When family account or user carry out unlocking operation, acquire the finger print information of user, radio-frequency card reader be used for establish user account or
When user carries out unlocking operation, the information for the access card that acquisition user shows.First communication module be used for include split type control
Other external equipments of subsystem are communicatively coupled, and communication mode includes wired/WIFI/ bluetooth/Zigbee/2.4G/
The modes such as RS232/RS485/ mobile network.
Optionally, split type control subsystem 32 includes image capture module, display screen, second communication module, second
Control module.Image capture module include optical camera, infrared camera, visible light illuminator, in infrared illuminator
At least one of.Optical camera is used to acquire the face-image of user when establishing user account or user carries out unlocking operation;
Infrared camera is used to acquire the iris image of user when establishing user account or user carries out unlocking operation;Visible light shines
Bright device improves the quality of the image of acquisition for providing additional light source for optical camera;Infrared illuminator is for being
Infrared camera provides additional light source, improves the quality of the image of acquisition.Second communication module be used for include split type control
Other external equipments of subsystem are communicatively coupled, and communication mode includes wired/WIFI/ bluetooth/Zigbee/2.4G/
The modes such as RS232/RS485/ mobile network.Second control module is for executing set code and strategy, to split type control
Other modules carry out control and data interaction in subsystem 32.
By above-mentioned technical proposal, electronic lock provided in an embodiment of the present invention is easy to lose for electronic lock in the prior art
Effect generates the technological deficiency of security risk, improves to electronic lock, by electronic lock subsystem 31 and split type control subsystem
System 32 is separated, the operating space of Lai Zengjia control system and the space of setting battery.And the present invention is to electronic lock
After subsystem and split type control subsystem partial installation, the first security module 311 of electronic lock subsystem 31 can be also utilized
Secure communication channel is established with the second security module 321 of split type control subsystem 32, make electronic lock subsystem 31 and is divided
The data that body formula control subsystem 32 is sent to other side are transmitted in the secure communication channel.It is sent receiving other side
Order before, two subsystems will do it cryptographic key factor exchange, the session key generated jointly by the key exchanged is to interaction
Data carry out encryption and decryption, are conciliate with ensuring that the two subsystems of only electronic lock can carry out correctly encryption to interaction data
It is close.Also, electronic lock subsystem 31 and split type control subsystem 32 generate close for encrypting the first session of interaction data
Key and the second session key for decrypting interaction data, are able to use the password that only other side knows to encrypt and decrypt interaction
Data, it is ensured that safety of the data in transmission.Moreover, the first security module 311 and the second security module 321 are used in interaction number
The identity of completeness check and sender that data are realized according to the middle mode for increasing sender's digital signature identifies.First safety
Module 311 and the second security module 321, which are also used in, increases the mode for transmitting the timestamp of current time to realize in interaction data
The safety requirements of the anti-playback of data.Therefore in secure communication channel, the forgery of transmission, the data of playback are all invalid.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, reference can be made to the related descriptions of other embodiments.
It is understood that the correlated characteristic in above-mentioned apparatus can be referred to mutually.In addition, in above-described embodiment " the
One ", " second " etc. is and not represent the superiority and inferiority of each embodiment for distinguishing each embodiment.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention
Example can be practiced without these specific details.In some instances, well known structure and skill is not been shown in detail
Art, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects,
Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the device of the disclosure should not be construed to reflect an intention that i.e. required guarantor
Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following
Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself
All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the component in the device in embodiment
Change and they are arranged in one or more devices unlike this embodiment.It can be the component combination in embodiment
At a component, and furthermore, they can be divided into multiple subassemblies.In addition at least some of such feature is mutual
It, can be using any combination to institute disclosed in this specification (including adjoint claim, abstract and attached drawing) except repulsion
There are feature and all components of so disclosed any device to be combined.Unless expressly stated otherwise, this specification (including
Adjoint the claims, abstract and drawings) disclosed in each feature can by provide identical, equivalent, or similar purpose substitute it is special
Sign is to replace.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments
In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention
Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed
Meaning one of can in any combination mode come using.Various component embodiments of the invention can be implemented in hardware, or
It is implemented in a combination thereof.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability
Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Component or component listed in the claims.Word "a" or "an" before component or component does not exclude the presence of multiple
Such component or component.The present invention can be realized by means of including the device of several different components.It is several listing
In the claim of component, several in these components, which can be through the same component item, to be embodied.Word first,
Second and the use of third etc. do not indicate any sequence.These words can be construed to title.
The above described is only a preferred embodiment of the present invention, be not intended to limit the present invention in any form, according to
According to technical spirit any simple modification, equivalent change and modification to the above embodiments of the invention, this hair is still fallen within
In the range of bright technical solution.
Claims (10)
1. a kind of control method of electronic lock, which is characterized in that the electronic lock includes electronic lock subsystem and split type control
Subsystem, which comprises
Secure communication channel is established between the electronic lock subsystem and the split type control subsystem;
Cryptographic key factor is exchanged between the electronic lock subsystem and the split type control subsystem;
When the electronic lock subsystem and the split type control subsystem pass through the secure communication channel interaction data,
Using the session key generated based on the cryptographic key factor to interaction data encryption and decryption.
2. the method according to claim 1, wherein the electronic lock subsystem and split type control
Cryptographic key factor is exchanged between system, comprising:
The first key factor that the electronic lock subsystem generates, using the public key of the split type control subsystem to described
The first key factor is encrypted, and is sent to the split type control subsystem by the secure communication channel;
The second cryptographic key factor that the split type control subsystem generates, using the public key of the electronic lock subsystem to described
Second cryptographic key factor is encrypted, and is sent to by the secure communication channel and described is divided electronic lock subsystem;
The electronic lock subsystem uses the private key of electronic lock subsystem after receiving encrypted second cryptographic key factor
Encrypted second cryptographic key factor is decrypted and is stored;
The split type control subsystem uses split type control subsystem after receiving the encrypted first key factor
Private key is decrypted and stores to the encrypted first key factor.
3. according to the method described in claim 2, it is characterized in that, using the session key pair generated based on the cryptographic key factor
Interaction data encryption and decryption, comprising:
Using the first session key based on the first key factor and second cryptographic key factor generation, to sent friendship
Mutual data encryption;
The second session key is generated using based on the first key factor and second cryptographic key factor, the interaction to receiving
Data deciphering.
4. the method according to claim 1, wherein the method also includes:
The electronic lock subsystem and the split type control subsystem use own private key label to sent interaction data
Name;
The electronic lock subsystem and the split type control subsystem use the interaction data received the public affairs of sender
Key sign test.
5. the method according to claim 1, wherein the method also includes:
The electronic lock subsystem and the split type control subsystem add current time in interaction data to be sent
Timestamp;
The timestamp in interaction data that the electronic lock subsystem and split type control subsystem verifying receive is
The no timestamp being greater than in last received interaction data.
6. a kind of electronic lock, which is characterized in that the electronic lock includes:
Electronic lock subsystem and split type control subsystem, the electronic lock subsystem includes the first security module, described
Split type control subsystem includes the second security module;
First security module and second security module are for establishing the electronic lock subsystem and described split type
Secure communication channel between control subsystem;
The electronic lock subsystem and the split type control subsystem are based on the secure communication channel and exchange cryptographic key factor;
First security module and second security module are also used to when through the secure communication channel interaction data,
Using the session key generated based on the cryptographic key factor to interaction data encryption and decryption.
7. electronic lock according to claim 6, which is characterized in that
First security module is also used to generate the first key factor, using the public key of the split type control subsystem to institute
It states the first key factor to be encrypted, and the first key factor of encryption is sent to by second peace by secure communication channel
Full module;
Second security module is also used to generate the second cryptographic key factor, using the public key of the electronic lock subsystem to described
Second cryptographic key factor is encrypted, and the second cryptographic key factor of encryption is sent to first safety by secure communication channel
Module;
After first security module receives encrypted second cryptographic key factor, using the private key of electronic lock subsystem to institute
Encrypted second cryptographic key factor is stated to be decrypted and store;
After second security module receives the encrypted first key factor, the private key pair of split type control subsystem is used
The encrypted first key factor is decrypted and stores.
8. electronic lock according to claim 7, which is characterized in that
First security module and second security module are also used to when through the secure communication channel interaction data,
Using the first session key based on the first key factor and second cryptographic key factor generation, to sent interaction number
According to encryption;And use the second session key based on the first key factor and second cryptographic key factor generation, docking
The interaction data decryption received.
9. electronic lock according to claim 6, which is characterized in that
First security module is also used to use the private key signature of electronic lock subsystem, docking to sent interaction data
The interaction data received uses the public key sign test of sender;
Second security module is also used to use the private key signature of split type control subsystem to sent interaction data, right
The interaction data received uses the public key sign test of sender.
10. electronic lock according to claim 6, which is characterized in that
First security module and second security module are also used to add current time in interaction data to be sent
Timestamp;
The timestamp that first security module and second security module are also used to verify in the interaction data that receives is
The no timestamp being greater than in last received interaction data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910485598.0A CN110322600B (en) | 2019-06-05 | 2019-06-05 | Control method of electronic lock and electronic lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910485598.0A CN110322600B (en) | 2019-06-05 | 2019-06-05 | Control method of electronic lock and electronic lock |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110322600A true CN110322600A (en) | 2019-10-11 |
CN110322600B CN110322600B (en) | 2021-02-26 |
Family
ID=68120269
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910485598.0A Active CN110322600B (en) | 2019-06-05 | 2019-06-05 | Control method of electronic lock and electronic lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110322600B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110762007A (en) * | 2019-10-31 | 2020-02-07 | 上海斯可络压缩机有限公司 | Automatic identification system for variable-frequency screw compressor controller |
CN111147452A (en) * | 2019-12-10 | 2020-05-12 | 珠海格力电器股份有限公司 | Door lock instruction response method and device, door lock and storage medium |
CN111508114A (en) * | 2020-04-17 | 2020-08-07 | 上海钧正网络科技有限公司 | Bicycle unlocking method and device, storage medium and hub lock |
CN112232363A (en) * | 2020-11-05 | 2021-01-15 | 北京三维天地科技股份有限公司 | 5G-based non-contact sample information acquisition equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102324127A (en) * | 2011-09-28 | 2012-01-18 | 成都方程式电子有限公司 | Split-type electronic fingerprint safety lock |
CN106682459A (en) * | 2017-02-28 | 2017-05-17 | 北京深思数盾科技股份有限公司 | Information safety device production method, information safety device production equipment and information safety device production system |
CN106712962A (en) * | 2016-12-23 | 2017-05-24 | 西安电子科技大学 | Mobile RFID system bidirectional authentication method and system |
CN106936588A (en) * | 2017-04-13 | 2017-07-07 | 北京深思数盾科技股份有限公司 | A kind of trustship method, the apparatus and system of hardware controls lock |
CN107978047A (en) * | 2017-12-04 | 2018-05-01 | 北京深思数盾科技股份有限公司 | Use the methods, devices and systems of password unlocking |
CN109712278A (en) * | 2018-11-27 | 2019-05-03 | 深圳市小石安防科技有限公司 | Intelligent door lock identity identifying method, system, readable storage medium storing program for executing and mobile terminal |
-
2019
- 2019-06-05 CN CN201910485598.0A patent/CN110322600B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102324127A (en) * | 2011-09-28 | 2012-01-18 | 成都方程式电子有限公司 | Split-type electronic fingerprint safety lock |
CN106712962A (en) * | 2016-12-23 | 2017-05-24 | 西安电子科技大学 | Mobile RFID system bidirectional authentication method and system |
CN106682459A (en) * | 2017-02-28 | 2017-05-17 | 北京深思数盾科技股份有限公司 | Information safety device production method, information safety device production equipment and information safety device production system |
CN106936588A (en) * | 2017-04-13 | 2017-07-07 | 北京深思数盾科技股份有限公司 | A kind of trustship method, the apparatus and system of hardware controls lock |
CN107978047A (en) * | 2017-12-04 | 2018-05-01 | 北京深思数盾科技股份有限公司 | Use the methods, devices and systems of password unlocking |
CN109712278A (en) * | 2018-11-27 | 2019-05-03 | 深圳市小石安防科技有限公司 | Intelligent door lock identity identifying method, system, readable storage medium storing program for executing and mobile terminal |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110762007A (en) * | 2019-10-31 | 2020-02-07 | 上海斯可络压缩机有限公司 | Automatic identification system for variable-frequency screw compressor controller |
CN111147452A (en) * | 2019-12-10 | 2020-05-12 | 珠海格力电器股份有限公司 | Door lock instruction response method and device, door lock and storage medium |
CN111508114A (en) * | 2020-04-17 | 2020-08-07 | 上海钧正网络科技有限公司 | Bicycle unlocking method and device, storage medium and hub lock |
CN111508114B (en) * | 2020-04-17 | 2022-04-22 | 上海钧正网络科技有限公司 | Bicycle unlocking method and device, storage medium and hub lock |
CN112232363A (en) * | 2020-11-05 | 2021-01-15 | 北京三维天地科技股份有限公司 | 5G-based non-contact sample information acquisition equipment |
Also Published As
Publication number | Publication date |
---|---|
CN110322600B (en) | 2021-02-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10154021B1 (en) | Securitization of temporal digital communications with authentication and validation of user and access devices | |
CN110322600A (en) | The control method and electronic lock of electronic lock | |
CN108055235B (en) | Control method of intelligent lock, related equipment and system | |
CN105827576B (en) | Method for unlocking and system based on dynamic puzzle-lock | |
US8070061B2 (en) | Card credential method and system | |
CN201181472Y (en) | Hardware key device and movable memory system | |
ES2960397T3 (en) | Procedure to verify biometric authentication | |
CN105245341A (en) | Remote identity authentication method and system and remote account opening method and system | |
CA2320221C (en) | Secure one-way authentication communication system | |
CN106603484A (en) | Virtual key method and apparatus using the same, background system, and user terminal | |
CN106683245B (en) | NFC mobile intelligent terminal safety access control system and control method thereof | |
CN106067205B (en) | A kind of gate inhibition's method for authenticating and device | |
CN107978047A (en) | Use the methods, devices and systems of password unlocking | |
CN101300808A (en) | Method and arrangement for secure autentication | |
CN106789024B (en) | A kind of remote de-locking method, device and system | |
CN107004077A (en) | Method and system for providing safe and independently operable biological characteristic authentication | |
CN103929308B (en) | Information Authentication method applied to rfid card | |
CN108868367B (en) | Intelligent lock device | |
CN109035519A (en) | A kind of biometric devices and method | |
CN109936552A (en) | A kind of cipher key authentication method, server and system | |
CN108462696A (en) | A kind of block chain intelligent identity identification system of decentralization | |
CN110011812A (en) | A kind of card method for anti-counterfeit suitable for airport security | |
CN104881595B (en) | The self-help remote unlocking method managed based on PIN code | |
CN104123777A (en) | Access control remote authorization method | |
CN103368736B (en) | Business information encryption, decryption method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing Patentee after: Beijing Shendun Technology Co.,Ltd. Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd. |
|
CP01 | Change in the name or title of a patent holder |