CN110379052A - Unlocking method, method, authorization method and the management system of application unlock - Google Patents
Unlocking method, method, authorization method and the management system of application unlock Download PDFInfo
- Publication number
- CN110379052A CN110379052A CN201910593075.8A CN201910593075A CN110379052A CN 110379052 A CN110379052 A CN 110379052A CN 201910593075 A CN201910593075 A CN 201910593075A CN 110379052 A CN110379052 A CN 110379052A
- Authority
- CN
- China
- Prior art keywords
- intelligent key
- unlocking
- client service
- encoded information
- duration
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/08—With time considerations, e.g. temporary activation, valid time window or time limitations
Abstract
This application involves a kind of unlocking methods, method, authorization method and the management system of application unlock.Unlocking method includes: the identity code that Intelligent key receives applicant, and judges whether the identity code is effective;If the identity code is effective, whether the Intelligent key detects itself in the unlocked state;If being not at the unlocked state, then the request of the encoded information of the Intelligent key and the Intelligent key is sent to after client service using duration and generates test application of unlocking by the Intelligent key, and is tested application according to the unlocking by controlling terminal and generated authorization message;The Intelligent key enters unlocked state after receiving the authorization message, and executes the unlocking operation to equipment, and records the unlocking operation simultaneously and generate the unlocking record of the Intelligent key.The problem of method provided by the present application can solve the misoperation fault that traditional scheme easily causes equipment in the method presence unlocked using Intelligent key, endanger power grid operation.
Description
Technical field
Field is managed this application involves power equipment, and special standby is to be related to a kind of unlocking method, the method for application unlock, authorization
Method and management system.
Background technique
Substation equipment in use, commonly using microcomputer anti-misoperation system prevent inoperative personnel operate substation set
It is standby.And an equipment being commonly used in microcomputer anti-misoperation system is exactly Intelligent key, i.e., installation and Intelligent key in equipment
Matched lockset.When needing the equipment using substation, operations staff needs to open lockset using Intelligent key.In order to
Matching and debugging is carried out when equipment is installed, and also facilitates installation and debugging and the equipment-patrolling of lockset, therefore Intelligent key
Unlocking test function is all had in conventional func, staff only needs to input simple fixed password on Intelligent key
Unlock unlocking test function.
However, in the actual use of Intelligent key, often there is operations staff and directly adopt the mode of input password making
Unlocking operation is carried out with Intelligent key, and to the equipment of substation.This has been resulted in operations staff and has arbitrarily been opened using Intelligent key
Lock device.This way easily causes the misoperation fault of equipment departing from the control of microcomputer anti-misoperation system, gives power grid operation
Bring security risk.
Therefore, there is the misoperation fault for easily causing equipment in traditional scheme using the method that Intelligent key is unlocked,
The problem of endangering power grid operation.
Summary of the invention
There is the misoperation fault for easily causing equipment, harm electricity in traditional scheme using the method that Intelligent key is unlocked
The problem of net stable operation.Based on this, the application provides method, authorization method and the management of a kind of unlocking method, application unlock
System.
A kind of unlocking method, for unlocking Intelligent key characterized by comprising
S100, Intelligent key receive the identity code of applicant, and judge whether the identity code is effective;
S120, if the identity code is effective, whether the Intelligent key detects itself in the unlocked state;
S130, if in the unlocked state, the Intelligent key matches corresponding equipment, and the unlocking executed to equipment is grasped
Make;
S140, if being not at the unlocked state, the Intelligent key is by the encoded information of the Intelligent key and institute
The request for stating Intelligent key is sent to after client service using duration generates test application of unlocking, and by controlling terminal according to institute
It states unlocking test application and generates authorization message, the authorization message makes at the Intelligent key for activating the Intelligent key
In the unlocked state;
S150, the Intelligent key enters unlocked state after receiving the authorization message, and the unlocking executed to equipment is grasped
Make, and records the unlocking operation simultaneously and generate the unlocking record of the Intelligent key.
The unlocking method provided by the present application, is executed by Intelligent key.Firstly, if what the Intelligent key received
Whether the identity code of applicant is effective, then start to detect the Intelligent key itself in the unlocked state.If the intelligence
Key is in the unlocked state, then the Intelligent key executes the unlocking operation to equipment.If the Intelligent key is not at described
Unlocked state, then by the Intelligent key send the Intelligent key encoded information and the Intelligent key request use when
Length is generated test application of unlocking by the client service to client service.Then, controlling terminal can survey the unlocking
Examination application is audited, if unlocking test application, by audit, the controlling terminal generates the authorization message.It is described
Intelligent key enters unlocked state after receiving the authorization message, and executes the unlocking operation to equipment.
The unlocking method provided by the present application can verify the identity of applicant, and audit institute by controlling terminal
The encoded information of Intelligent key is stated, and after adjusting the up time of the Intelligent key, generates authorization message.There is described award
After weighing information, the Intelligent key can just carry out the unlocking operation to equipment.So the unlocking method can prevent non-work
Make personnel arbitrarily to unlock using the Intelligent key, in turn results in the maloperation of equipment, endanger power grid operation.Cause
This, the unlocking method provided by the present application can solve to be existed in scheme using the method that Intelligent key is unlocked and easily cause
The misoperation fault of equipment, the problem of endangering power grid operation.
In one of them embodiment, after the S150, the method also includes:
Unlocking record is sent to the controlling terminal by S160, and removes the unlocking record of itself.
In one of them embodiment, the S140 includes:
S141 generates image using duration and believes according to the encoded information of the Intelligent key and the request of the Intelligent key
Breath, and described image information is sent to after the client service and generates the unlocking test application, and eventually by the control
End tests application according to the unlocking and generates the authorization message.
In one of them embodiment, the S150 further include:
S151, while judging whether there is violation operation in unlocking record, the violation operation refer to unlock again by
The equipment of unlocking;
S152 executes alarm operation by the Intelligent key if having violation operation in unlocking record.
In one of them embodiment, after the S100, the method also includes:
S101 does not execute any operation if the identity code is invalid.
A kind of authorization method, for unlocking Intelligent key, comprising:
S300 receives test application of unlocking, and the test application of unlocking includes the encoded information of Intelligent key ready for use,
And the request of the Intelligent key uses duration;
S310 audits the unlocking test application, and whether the encoded information for verifying the Intelligent key ready for use is correct,
And judge whether the request of the Intelligent key using duration is more than limitation duration;
S320, if the encoded information of the Intelligent key is correct, and the request of the Intelligent key is no more than using duration
The limitation duration, then generate authorization message, and the authorization message is used to unlock the access right of the Intelligent key;
S330, if the encoded information of the Intelligent key is correct, but the request of the Intelligent key is more than institute using duration
Limitation duration is stated, then adjusts the request of the Intelligent key using generating the authorization message after duration, and feed back to client's clothes
It is engaged in end, feeding back to the Intelligent key by the client service;
S340 generates not authorization message if the encoded information of the Intelligent key is incorrect, and feeds back to the client
Server-side feeds back to the Intelligent key by the client service.
The application also provides a kind of authorization method, is executed by controlling terminal.The authorization method includes receiving test of unlocking
Apply, audit the unlocking test application, and generates authorization message.Wherein, auditing the unlocking test application includes verifying
Whether the encoded information of Intelligent key ready for use is correct, and judges whether the request of the Intelligent key using duration is more than limit
Duration processed.If the encoded information of the Intelligent key is correct, and the use duration of the Intelligent key be no more than the limitation when
It is long, then it is immediately generated authorization message and the Intelligent key is fed back to by the client service.If the Intelligent key
Encoded information is correct but the request using duration is more than limitation duration, then adjusts request use by the controlling terminal
Duration, and then authorization message is generated, and the Intelligent key is fed back to by the client service.
The authorization method provided by the present application can audit the encoded information of the Intelligent key, and control
The use duration of the Intelligent key.After using duration, it need to apply again using the Intelligent key, and by the control
Terminal processed is audited again.Therefore, the authorization method provided by the present application can prevent the unlimited use of the Intelligent key,
And application can be tested to the unlocking and be audited and adjusted, enhance the safety in utilization of the Intelligent key.Therefore, originally
The authorization method that application provides can solve to be existed in traditional scheme using the method that Intelligent key is unlocked and easily cause
The misoperation fault of equipment, the problem of endangering power grid operation.
In one of them embodiment, after the S330, the method also includes:
S331, receives the unlocking record of the Intelligent key, and stores the unlocking record of the Intelligent key, the intelligence
The unlocking record of key includes all unlocking operations of the Intelligent key for equipment.
A method of application unlock, comprising:
S200, client service receives the encoded information of Intelligent key and the request of the Intelligent key uses duration, and
Judge whether the encoded information of the Intelligent key is correct;;
S210, if the encoded information of the Intelligent key is correct, according to the encoded information of the Intelligent key and described
The request of Intelligent key uses duration, generates test application of unlocking;
Unlocking test application is sent to controlling terminal by S220, the client service, and by the controlling terminal
Application is tested according to the unlocking and generates authorization message, and the authorization message makes the intelligence for activating the Intelligent key
Key is in the unlocked state;
S230, the client service receives the authorization message, and the authorization message is fed back to the intelligent key
Spoon.
The application also provides a kind of method of application unlock, is executed by client service.The client service receives intelligence
The encoded information of energy key and the request of the Intelligent key use duration, and confirm that the encoded information of the Intelligent key is correct
Afterwards, test application of unlocking is generated.Unlocking test application is sent to controlling terminal by the client service, and eventually by control
End tests application according to the unlocking and generates authorization message, and feeds back to the client service.The client service receives
The Intelligent key is fed back to after to the authorization message, so that the Intelligent key enters the solution according to the authorization message
Lock status.It is provided by the present application it is described application unlock method can the encoded information to Intelligent key carry out audit confirmation, because
This, can prevent the random use of the Intelligent key.Therefore, the method for the application unlock provided by the present application can solve
There is the misoperation fault for easily causing equipment in traditional scheme using the method that Intelligent key is unlocked, endangers stabilization of power grids fortune
Capable problem.
In one of them embodiment, the method also includes:
S240, the client service receive the unlocking record of the Intelligent key, and by the unlocking of the Intelligent key
Record is sent to the controlling terminal.
In one of them embodiment, the S210 includes:
S211, the client service generate test information of unlocking according to image information, wherein described image information is by institute
Intelligent key is stated to be generated according to the request of the encoded information and the Intelligent key of the Intelligent key using duration.
In one of them embodiment, the S200 includes:
S201, the client service obtain the encoded information of the Intelligent key after analyzing described image information;
S202, whether the client service verifies the encoded information correct.
S203, if the encoded information is correct, the client service generation has accepted information;
S205, if the encoded information is incorrect, the client service generation does not accept information.
A kind of management system, for managing Intelligent key, comprising:
Controlling terminal tests application for receiving and auditing test application of unlocking, and according to by the unlocking of audit
Generate authorization message;
Client service is communicated to connect with the controlling terminal, and whether the encoded information for judging Intelligent key is correct,
And the unlocking is generated using duration according to the request of the encoded information of the correct Intelligent key and Intelligent key and tests Shen
Please, and to the controlling terminal unlocking test application is sent, and,
The authorization message is sent to the Intelligent key;
Intelligent key is communicated to connect with the client service, for sending the intelligent key to the client service
The encoded information of spoon and the request of the Intelligent key use duration;
Communications adapter, with the Intelligent key be wirelessly connected, and with the client service wired connection, for receiving
The unlocking of the Intelligent key records, and unlocking record is sent to the client service.
The application also provides a kind of management system, including the controlling terminal, the client service, the Intelligent key
With the communications adapter.The Intelligent key sends the encoded information of the Intelligent key and described to the client service
The request of Intelligent key uses duration.The client service can judge the encoded information of the Intelligent key, and
The unlocking test application is generated using duration according to the request of the encoded information of the correct Intelligent key and Intelligent key.
The controlling terminal is applied for receiving and auditing the unlocking test, and is given birth to according to the unlocking test application by audit
At authorization message.The authorization message can be fed back to the intelligent key by the client service by the controlling terminal
Spoon, the Intelligent key enter unlocked state according to the authorization message.
The management system provided by the present application can manage the Intelligent key, prevent the Intelligent key
Behaviour in service lack of standardization.Therefore, the management system provided by the present application can solve in traditional scheme using Intelligent key into
The problem of there is the misoperation fault for easily causing equipment in the method that row is unlocked, endanger power grid operation.
Detailed description of the invention
Fig. 1 is the flow diagram for the unlocking method that one embodiment of the application provides.
Fig. 2 is the flow diagram for the authorization method that one embodiment of the application provides.
Fig. 3 is the flow diagram of the method for the application unlock that one embodiment of the application provides.
Fig. 4 is the flow diagram of the method for the application unlock that another embodiment of the application provides.
Fig. 5 is the flow diagram for the authorization method that one embodiment of the application provides.
Drawing reference numeral explanation
Management system 10
Controlling terminal 100
Client service 200
Intelligent key 300
Communications adapter 400
Specific embodiment
In order to make the above objects, features, and advantages of the present application more apparent, with reference to the accompanying drawing to the application
Specific embodiment be described in detail.Many details are explained in the following description in order to fully understand this Shen
Please.But the application can be implemented with being much different from other way described herein, those skilled in the art can be not
Similar improvement is done in the case where violating the application intension, therefore the application is not limited by following public specific implementation.
It should be noted that it can directly on the other element when element is referred to as " being fixed on " another element
Or there may also be elements placed in the middle.When an element is considered as " connection " another element, it, which can be, is directly connected to
To another element or it may be simultaneously present centering elements.
Unless otherwise defined, all technical and scientific terms used herein and the technical field for belonging to the application
The normally understood meaning of technical staff is identical.The term used in the description of the present application is intended merely to description tool herein
The purpose of the embodiment of body, it is not intended that in limitation the application.Term " and or " used herein includes one or more phases
Any and all combinations of the listed item of pass.
Referring to FIG. 1, the application provides a kind of unlocking method, for unlocking Intelligent key, comprising:
S100, Intelligent key receive the identity code of applicant, and judge whether the identity code is effective.
Staff can shift to an earlier date inputs all applicants that the Intelligent key can be used on the Intelligent key
Identity code, form the information bank of applicant.When some applicant needs using the Intelligent key, first have to
The identity code of applicant is inputted on the Intelligent key.After the Intelligent key identifies the identity code, body is judged
Whether part identification code is effective.The identity code effectively refers to that the Intelligent key can be in the information bank of the applicant
In be matched to the same identity code.
S120, if the identity code is effective, whether the Intelligent key detects itself in the unlocked state.
Wherein, the unlocked state refers to that the Intelligent key is in the state that can be used, it can to equipment into
Row unlocking operation.
S130, if in the unlocked state, the Intelligent key matches corresponding equipment, and the unlocking executed to equipment is grasped
Make.
The Intelligent key can be with corresponding equipment physical connection, to realize the unlocking operation to equipment.
S140, if being not at the unlocked state, the Intelligent key is by the encoded information of the Intelligent key and institute
The request for stating Intelligent key is sent to after client service using duration generates test application of unlocking, and by controlling terminal according to institute
It states unlocking test application and generates authorization message, the authorization message makes at the Intelligent key for activating the Intelligent key
In the unlocked state;
When the Intelligent key is not at unlocked state, at this time applicant cannot use the Intelligent key to equipment into
Row unlocking operation.Applicant needs to send the request of the encoded information of the Intelligent key and the Intelligent key using duration
Test of unlocking is generated using duration according to the encoded information and the request to client service, and by the client service
Application.
S150, the Intelligent key enters unlocked state after receiving the authorization message, and the unlocking executed to equipment is grasped
Make, and records the unlocking operation simultaneously and generate the unlocking record of the Intelligent key.
After the Intelligent key receives the authorization message, into unlocked state.At this point, the Intelligent key can with set
Standby upper lock physical connection, to open the equipment.
It the present embodiment provides a kind of unlocking method, is executed by Intelligent key.Firstly, if what the Intelligent key received
Whether the identity code of applicant is effective, then start to detect the Intelligent key itself in the unlocked state.If the intelligence
Key is in the unlocked state, then the Intelligent key executes the unlocking operation to equipment.If the Intelligent key is not at described
Unlocked state, then by the Intelligent key send the Intelligent key encoded information and the Intelligent key request use when
Length is generated test application of unlocking by the client service to client service.Then, controlling terminal can survey the unlocking
Examination application is audited, if unlocking test application, by audit, the controlling terminal generates the authorization message.It is described
Intelligent key enters unlocked state after receiving the authorization message, and executes the unlocking operation to equipment.
The unlocking method provided in this embodiment can verify the identity of applicant, and be audited by controlling terminal
The encoded information of the Intelligent key, and after adjusting the up time of the Intelligent key, generate authorization message.Have described
After authorization message, the Intelligent key can just carry out the unlocking operation to equipment.So the unlocking method can prevent it is non-
Staff is arbitrarily unlocked using the Intelligent key, is in turn resulted in the maloperation of equipment, is endangered power grid operation.Cause
This, the unlocking method provided in this embodiment can solve to be existed in scheme using the method that Intelligent key is unlocked and easily make
The misoperation fault of forming apparatus, the problem of endangering power grid operation.
In one embodiment of the application, after the S150, the method also includes:
Unlocking record is sent to the controlling terminal by S160, and removes the unlocking record of itself.
The Intelligent key can by communications adapter or other can carry out the intermediary of information transmission, by the unlocking
Record is sent to the controlling terminal.The record of unlocking includes the unlocking amount and Lock-Picking Devices number of the Intelligent key.Example
Such as, there are three equipment that number is 1,2 and 3, the Intelligent key, which has been unlocked, numbers the equipment for being 1 and 2, then the intelligence key
It is 2 that the unlocking record of spoon, which includes: unlocking amount, and Lock-Picking Devices number is 1 and 2.The i.e. described Intelligent key has been unlocked two equipment, institute
The number for stating two equipment is 1 and 2.
The unlocking of the Intelligent key can be recorded and be sent to the control by the S160 provided in this embodiment
Terminal is monitored and is recorded to unlocking record by the controlling terminal.Therefore, can be convenient staff check it is described
It unlocks and records.And the Intelligent key removes the operation of the unlocking record of itself, can keep depositing for the Intelligent key
Storage capacity is not reduced, and guarantees the speed of service of the Intelligent key.
In one embodiment of the application, the S140 includes:
S141 generates image using duration and believes according to the encoded information of the Intelligent key and the request of the Intelligent key
Breath, and described image information is sent to after the client service and generates the unlocking test application, and eventually by the control
End tests application according to the unlocking and generates the authorization message.
In one embodiment, described image information is image in 2 D code, and the client service is mobile terminal, such as
Mobile phone.The client service can obtain encoded information and the institute of the Intelligent key by scanning the image in 2 D code
The request for stating Intelligent key uses duration.In turn, the client service can according to the encoded information of the Intelligent key and
The request of the Intelligent key generates the unlocking test application using duration.The controlling terminal can be surveyed according to the unlocking
Examination application generates the authorization message.Specifically, the controlling terminal can verify the Intelligent key encoded information whether
Correctly, and according to the actual situation the request of the Intelligent key is adjusted using duration.In one embodiment, if it is described
The encoded information of Intelligent key is correct, but the request of the Intelligent key is more than limitation duration using duration, then by the control
Terminal processed adjusts the request of the Intelligent key using after duration, exports the authorization message.The authorization message, which can be, awards
Weighted code, after the authorization code is inputted on the Intelligent key, the Intelligent key can enter unlocked state.
In one embodiment of the application, the S150 includes:
S151, while judging whether the unlocking record has violation operation, the violation operation refers to unlock again is opened
The equipment of lock.
S152 executes alarm operation by the Intelligent key if having violation operation in unlocking record.
For example, there is two equipment that number is 1 and 2, the equipment that the Intelligent key has been 1 to number understands
Lock, but applicant used it is described number be 1 equipment after, when needing to be unlocked again using the Intelligent key,
Just belong to the violation operation.The Intelligent key can record the Intelligent key when applicant operates simultaneously
It unlocks and records, if there are violation operations in unlocking record, alarm operation is executed by the Intelligent key.The alarm behaviour
Work may include acoustic alarm, light alarm or other alarm forms, can specifically select according to actual needs, the application does not limit
It is fixed.The alarm operation can remind applicant in time, and to stop the current violation operation, therefore alarm operation can
It is risk of damage to reducing to unlocker device or Intelligent key.
In one embodiment of the application, after the S100, the method also includes:
S101 does not execute any operation if the identity code is invalid.
If the Intelligent key is not matched to the identity code in the database of itself, assert that the identity is known
Other code is invalid.Wherein, the database of the Intelligent key is all identity codes that staff has inputted.The identity is known
Other code can not then make the Intelligent key enter operation in next step in vain, that is, detect whether the Intelligent key itself is in unlock
State also just sends the step of unlocking test is applied to the client service without the Intelligent key.
Fig. 2 is referred to, the application also provides a kind of authorization method, for unlocking Intelligent key, comprising:
S300 receives test application of unlocking, and the test application of unlocking includes the encoded information of Intelligent key ready for use,
And the request of the Intelligent key uses duration.
In one embodiment, the S300 is that controlling terminal receives the unlocking test application, and Shen is tested in the unlocking
It please include that the encoded information of Intelligent key ready for use and the request of the Intelligent key use duration.In one embodiment
In, the unlocking test application is sent to the controlling terminal by client service.And the Intelligent key ready for use
Encoded information and the Intelligent key request use duration, the client service is sent to by the Intelligent key.
The encoded information of the Intelligent key and the request of the Intelligent key are sent to the client service in the Intelligent key
Before duration, the Intelligent key also needs to receive the identity code of applicant, and judges that the identity code is
It is no effective.If the identity code is effective, whether the Intelligent key first detects itself in the unlocked state.If in solution
Lock status, then the Intelligent key matches corresponding equipment, and executes the unlocking operation to equipment, at this time the client service
The encoded information for the Intelligent key that the Intelligent key is sent and the use duration of the Intelligent key will not be received again.Into
And the controlling terminal will not receive the unlocking test information.If the identity code is effective, but the intelligent key
Spoon is not at the unlocked state, then the Intelligent key sends the coding of the Intelligent key to the client service
The request of information and the Intelligent key uses duration.Encoded information and institute of the client service according to the Intelligent key
The request for stating Intelligent key generates the unlocking test application using duration, and unlocking test application is sent to the control
Terminal processed.
S310 audits the unlocking test application, and whether the encoded information for verifying the Intelligent key ready for use is correct,
And judge whether the request of the Intelligent key using duration is more than limitation duration.
After the S300, the controlling terminal audits the unlocking test application, and verifies the intelligence ready for use
Whether the encoded information of key is correct, and judges whether the request of the Intelligent key using duration is more than limitation duration.
If inputted identity code in the Intelligent key, all of Intelligent key are also had input in the controlling terminal
Encoded information.Whether the encoded information of the verifying Intelligent key ready for use is correct, i.e., the described controlling terminal is in data
The encoded information of the Intelligent key ready for use is matched in library.The controlling terminal can also judge the intelligence
Whether the request of energy key is more than limitation duration using duration, this step can be in the volume for verifying the Intelligent key ready for use
It is carried out before or after the whether correct step of code information, the application is without limitation.The limitation duration can be according to practical need
It is set, the application is without limitation.
S320, if the encoded information of the Intelligent key is correct, and the request of the Intelligent key is no more than using duration
The limitation duration, then generate authorization message, and the authorization message is used to unlock the access right of the Intelligent key.
If the encoded information of the Intelligent key of the controlling terminal verifying is correct, and the request of the Intelligent key makes
It is no more than the limitation duration with duration, then the controlling terminal generates authorization message, and the authorization message is described for unlocking
The access right of Intelligent key.The authorization message can be authorization code, applicant inputted on the Intelligent key described in award
Weighted code can unlock the Intelligent key.The authorization message can also be the authorization message of other forms, as long as can make to apply
People unlocks the Intelligent key according to the authorization message.It is understood that the authorization message is according to the intelligence
What the encoded information of energy key and the request of the Intelligent key were generated using duration, therefore, the authorization message is including described in
Intelligent key allows using duration, described to allow to be to be generated using duration according to the request of the Intelligent key using duration
's.
S330, if the encoded information of the Intelligent key is correct, but the request of the Intelligent key is more than institute using duration
Limitation duration is stated, then adjusts the request of the Intelligent key using generating the authorization message after duration, and feed back to client's clothes
It is engaged in end, feeding back to the Intelligent key by the client service.
In one embodiment, if it is more than the limitation duration that the request of the Intelligent key, which uses duration, by described
Controlling terminal adjusts the request of the Intelligent key using generating the authorization message after duration.The authorization message includes described
Intelligent key allows using duration.After the controlling terminal generates the authorization message, the authorization message is sent to institute
Client service is stated, and the Intelligent key is fed back to by the client service.In one embodiment, the controlling terminal
With the client service by network connection, the client service and the Intelligent key pass through wireless connection.The visitor
Family server-side can also be by wired connection communications adapter, and then the communications adapter is wirelessly connected the Intelligent key,
To achieve the purpose that the client service feeds back the authorization message to the Intelligent key.In one embodiment, described
It can be carried out data transmission by bluetooth between communications adapter and the Intelligent key.
S340 generates not authorization message if the encoded information of the Intelligent key is incorrect, and feeds back to the client
Server-side feeds back to the Intelligent key by the client service.
If the encoded information of the Intelligent key is incorrect, the controlling terminal generates not authorization message, and passes through institute
It states client service and feeds back to the Intelligent key.In one embodiment, display interface, Shen are provided on the Intelligent key
It asks someone that the authorization message or the not authorization message can be obtained from the display interface.
The authorization method provided in this embodiment, is executed by the controlling terminal.The authorization method includes receiving to open
Lock test application audits the unlocking test application, and generates authorization message.Wherein, the unlocking test application packet is audited
Include verify the Intelligent key ready for use encoded information it is whether correct, and judge that the request of the Intelligent key uses duration
It whether is more than limitation duration.If the encoded information of the Intelligent key is correct, and the use duration of the Intelligent key is no more than
The limitation duration is then immediately generated authorization message and feeds back to the Intelligent key by the client service.If described
The encoded information of Intelligent key it is correct but it is described request using duration be more than limitation duration, then by the controlling terminal adjust institute
Request is stated using duration, and then generates authorization message, and the Intelligent key is fed back to by the client service.
The authorization method provided in this embodiment can audit the encoded information of the Intelligent key, and control
Make the use duration of the Intelligent key.After using duration, applicant need to apply again using the Intelligent key, and
It is audited again by the controlling terminal.Therefore, the authorization method provided by the present application can prevent the Intelligent key by nothing
Limit time use, and can to unlockings test apply be audited and be adjusted, enhance the Intelligent key using safe
Property.Therefore, the authorization method provided in this embodiment can solve the side unlocked in traditional scheme using Intelligent key
The problem of there is the misoperation fault for easily causing equipment in method, endanger power grid operation.
In one embodiment of the application, after the S330, the method also includes:
S331, receives the unlocking record of the Intelligent key, and stores the unlocking record of the Intelligent key, the intelligence
The unlocking record of key includes all unlocking operations of the Intelligent key for equipment.
Such as the description of embodiment in step S160, in one embodiment, the unlocking record includes the Intelligent key
Unlocking amount and Lock-Picking Devices number.When the Intelligent key is executed to the unlocking operation of equipment, the Intelligent key can be with
It is synchronous to generate the unlocking record, and the unlocking recording synchronism is sent to eventually by the control by the client service
End.The Intelligent key is removed described in the Intelligent key after unlocking record is sent to the controlling terminal
It unlocks and records, to prevent the storage for unlocking record from the Intelligent key being caused to run slow problem.The controlling terminal connects
Receive the unlocking record of the Intelligent key, and store the unlocking record of the Intelligent key, check so as to staff and
Save the unlocking record.
Fig. 3 is referred to, the application also provides a kind of method of application unlock, comprising:
S200, client service receives the encoded information of Intelligent key and the request of the Intelligent key uses duration, and
Judge whether the encoded information of the Intelligent key is correct.
It is understood that staff's also typing encoded information of the Intelligent key on the client service
Database.The client service can carry out preliminary audit survey to the encoded information of the Intelligent key.
S210, if the encoded information of the Intelligent key is correct, according to the encoded information of the Intelligent key and described
The request of Intelligent key uses duration, generates test application of unlocking.
If the client service detects that the encoded information of the Intelligent key is correct, the client service according to
The request of the encoded information of the Intelligent key and the Intelligent key uses duration, generates test application of unlocking.
Unlocking test application is sent to controlling terminal by S220, the client service, and by the controlling terminal
Application is tested according to the unlocking and generates authorization message, and the authorization message makes the intelligence for activating the Intelligent key
Key is in the unlocked state.
In one embodiment, the client service and the controlling terminal pass through network connection.The controlling terminal
Application can be tested the unlocking and carry out second of audit, that is, whether just to reaffirm the encoded information of the Intelligent key
Really.The process that the client service and the controlling terminal verify the encoded information of the Intelligent key can increase
The reliability of the encoded information verifying of the Intelligent key, prevents the Input of Data mistake of the controlling terminal, and leads to institute
State the encoded information authentication error of Intelligent key.
S230, the client service receives the authorization message, and the authorization message is fed back to the intelligent key
Spoon.
In one embodiment, the client service wired connection has a communications adapter, the communications adapter again with
The Intelligent key wireless communication connection.The communications adapter can play the role of information flow, i.e., take from the client
Business end receives the authorization message, and the authorization message is sent to the Intelligent key.
The present embodiment provides a kind of methods of application unlock, are executed by client service.The client service receives institute
The encoded information of Intelligent key and the request of the Intelligent key are stated using duration, and confirms the encoded information of the Intelligent key
After correct, test application of unlocking is generated.Unlocking test application is sent to controlling terminal by the client service, and by institute
It states controlling terminal and application generation authorization message is tested according to the unlocking, and feed back to the client service.Client's clothes
Business termination receive the authorization message after feed back to the Intelligent key so that the Intelligent key according to the authorization message into
Enter the unlocked state.The method of the application unlock provided by the present application can audit the encoded information of Intelligent key
Confirmation, accordingly it is possible to prevent the random use of the Intelligent key.Therefore, the side of the application unlock provided in this embodiment
Method can solve the misoperation fault for existing in traditional scheme using the method that Intelligent key is unlocked and easily causing equipment, harm
The problem of power grid operation.
In one embodiment of the application, the method also includes:
S240, the client service receive the unlocking record of the Intelligent key, and by the unlocking of the Intelligent key
Record is sent to the controlling terminal.
In one embodiment, the communications adapter can receive the unlocking record that the Intelligent key is sent,
The record of unlocking includes the unlocking amount and Lock-Picking Devices number of the Intelligent key.
In one embodiment of the application, the S210 further include:
S211, the client service generate test information of unlocking according to image information, wherein described image information is by institute
Intelligent key is stated to be generated according to the request of the encoded information and the Intelligent key of the Intelligent key using duration.
In one embodiment, described image information is image in 2 D code, and the Intelligent key is according to the Intelligent key
The request of encoded information and the Intelligent key generate the image in 2 D code using duration.
Fig. 5 is referred to, in one embodiment of the application, the S200 includes:
S201, the client service obtain the encoded information of the Intelligent key after analyzing described image information;
S202, whether the client service verifies the encoded information correct.
S203, if the encoded information is correct, the client service generation has accepted information;
S205, if the encoded information is incorrect, the client service generation does not accept information.
In one embodiment, described image information can be image in 2 D code, and the client service can be by sweeping
When obtaining the encoded information of the Intelligent key after retouching described image information, and obtaining the request use of the Intelligent key
It is long.Whether the client service can verify the encoded information correct, if the encoded information is correct, client's clothes
Business end, which generates, has accepted information, and has accepted information by described and be sent to the Intelligent key by the communications adapter, by
Display interface on the Intelligent key is shown.If the encoded information is incorrect, the client service is generated not
It accepts information, and does not accept information by described the Intelligent key is sent to by the communications adapter, by the intelligent key
Display interface on spoon is shown.The client service to the Intelligent key send it is described accepted information and it is described not
Whether correct the encoded information that information can help applicant to obtain the Intelligent key in time is accepted, thus in time described in replacement
Intelligent key.
Fig. 5 is referred to, the application also provides a kind of management system, and for managing Intelligent key, the management system 10 is wrapped
Include controlling terminal 100, client service 200, Intelligent key 300 and communications adapter 400.
The controlling terminal 100 is surveyed for receiving and auditing unlocking test application, and according to by the unlocking of audit
Examination application generates authorization message.The client service 200 is communicated to connect with the controlling terminal 100, for judging intelligent key
Whether the encoded information of spoon is correct, and when being used according to the request of the encoded information of the correct Intelligent key and Intelligent key
It is long to generate the unlocking test application, and the unlocking test application is sent to the controlling terminal 100, and, Xiang Suoshu intelligence
It can the key transmission authorization message.The Intelligent key 300 is communicated to connect with the client service 200, is used for described
Client service 200 sends the encoded information of the Intelligent key 300 and the request of the Intelligent key 300 uses duration.Institute
Communications adapter 400 and the Intelligent key 300 is stated to be wirelessly connected, and with 200 wired connection of client service, for connecing
The unlocking record of the Intelligent key 300 is received, and unlocking record is sent to the client service 200.
In one embodiment, staff can also inquire on the client service 200 and trace-back operation records,
The operation note includes that the client service receives the unlocking test application, the customer service end receives the authorization
The record of information etc..In one embodiment, the client service 200 can also will be received from the controlling terminal 100
The authorization message be sent to the communications adapter 400, and then the communications adapter 400 sends the authorization message
To the Intelligent key 300.In one embodiment, pass through indigo plant between the communications adapter 400 and the Intelligent key 300
Tooth is communicatively coupled.In one embodiment, the communications adapter 400 is also used to fill the Intelligent key 300
Electricity.It should be noted that the controlling terminal 100 or mobile terminal, the client service 200 or movement
Client service can specifically select according to actual needs, and the application is without limitation.
The management system 10 provided in this embodiment, including the controlling terminal 100, the client service 200, institute
State Intelligent key 300 and the communications adapter 400.The Intelligent key 300 sends the intelligence to the client service 200
The encoded information of energy key and the request of the Intelligent key use duration.The client service 200 can be to the intelligence
The encoded information of key is judged, and is used according to the encoded information of the correct Intelligent key and the request of Intelligent key
Duration generates the unlocking test application.The controlling terminal 100 is used to receive and audit the unlocking test and applies, and according to
Authorization message is generated by the unlocking test application of audit.The controlling terminal 100 can pass through the client service
The authorization message is fed back to the Intelligent key by 200, and the Intelligent key 300 enters unlock shape according to the authorization message
State.
The management system 10 provided by the present application can manage the Intelligent key 300, prevent the intelligence
The behaviour in service lack of standardization of key 300.Therefore, the management system 10 provided by the present application, which can solve in traditional scheme, uses
The problem of there is the misoperation fault for easily causing equipment in the method that Intelligent key is unlocked, endanger power grid operation.
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality
It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited
In contradiction, all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
The limitation to claim therefore cannot be interpreted as.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (12)
1. a kind of unlocking method, for unlocking Intelligent key characterized by comprising
S100, Intelligent key receive the identity code of applicant, and judge whether the identity code is effective;
S120, if the identity code is effective, whether the Intelligent key detects itself in the unlocked state;
S130, if in the unlocked state, the Intelligent key matches corresponding equipment, and executes the unlocking operation to equipment;
S140, if being not at the unlocked state, the Intelligent key is by the encoded information of the Intelligent key and the intelligence
The request of energy key is sent to after client service using duration and generates test application of unlocking, and is opened according to as controlling terminal
Lock test application generates authorization message, and the authorization message makes the Intelligent key be in institute for activating the Intelligent key
State unlocked state;
S150, the Intelligent key enters unlocked state after receiving the authorization message, and executes the unlocking operation to equipment, and
The unlocking operation is recorded simultaneously and generates the unlocking record of the Intelligent key.
2. the method as described in claim 1, which is characterized in that after the S150, the method also includes:
Unlocking record is sent to the controlling terminal by S160, and removes the unlocking record of itself.
3. the method as described in claim 1, which is characterized in that the S140 includes:
S141 generates image information using duration according to the encoded information of the Intelligent key and the request of the Intelligent key,
And described image information is sent to after the client service and generates the unlocking test application, and by the controlling terminal root
Application, which is tested, according to the unlocking generates the authorization message.
4. the method as described in claim 1, which is characterized in that the S150 further include:
S151, while judging whether there is violation operation in the unlocking record, the violation operation, which refers to unlock again, to be unlocked
Equipment;
S152 executes alarm operation by the Intelligent key if having violation operation in unlocking record.
5. the method as described in claim 1, which is characterized in that after the S100, the method also includes:
S101 does not execute any operation if the identity code is invalid.
6. a kind of authorization method, for unlocking Intelligent key characterized by comprising
S300 receives test application of unlocking, and the test application of unlocking includes the encoded information of Intelligent key ready for use, and
The request of the Intelligent key uses duration;
S310 audits the unlocking test application, and whether the encoded information for verifying the Intelligent key ready for use is correct, and sentences
Whether the request of the Intelligent key of breaking using duration is more than limitation duration;
S320, if the encoded information of the Intelligent key is correct, and the request of the Intelligent key uses duration no more than described
Duration is limited, then generates authorization message, the authorization message is used to unlock the access right of the Intelligent key;
S330, if the encoded information of the Intelligent key is correct, but the request of the Intelligent key is more than the limit using duration
Duration processed then adjusts the request of the Intelligent key using generating the authorization message after duration, and feeds back to client service,
The Intelligent key is fed back to by the client service;
S340 generates not authorization message if the encoded information of the Intelligent key is incorrect, and feeds back to the customer service
End, feeds back to the Intelligent key by the client service.
7. method as claimed in claim 6, which is characterized in that after the S330, the method also includes:
S331, receives the unlocking record of the Intelligent key, and stores the unlocking record of the Intelligent key, the Intelligent key
Unlocking record include all unlocking operations of the Intelligent key for equipment.
8. a kind of method of application unlock characterized by comprising
S200, client service receives the encoded information of Intelligent key and the request of the Intelligent key uses duration, and judges
Whether the encoded information of the Intelligent key is correct;
S210, if the encoded information of the Intelligent key is correct, according to the encoded information of the Intelligent key and the intelligence
The request of key uses duration, generates test application of unlocking;
Unlocking test application is sent to controlling terminal by S220, the client service, and by the controlling terminal according to
The unlocking test application generates authorization message, and the authorization message makes the Intelligent key for activating the Intelligent key
In the unlocked state;
S230, the client service receives the authorization message, and the authorization message is fed back to the Intelligent key.
9. method according to claim 8, which is characterized in that the method also includes:
S240, the client service receive the unlocking record of the Intelligent key, and the unlocking of the Intelligent key is recorded
It is sent to the controlling terminal.
10. method according to claim 8, which is characterized in that the S210 includes:
S211, the client service generate test information of unlocking according to image information, wherein described image information is by the intelligence
Energy key is generated according to the request of the encoded information and the Intelligent key of the Intelligent key using duration.
11. method as claimed in claim 10, which is characterized in that the S200 includes:
S201, the client service obtain the encoded information of the Intelligent key after analyzing described image information;
S202, whether the client service verifies the encoded information correct;
S203, if the encoded information is correct, the client service generation has accepted information;
S205, if the encoded information is incorrect, the client service generation does not accept information.
12. a kind of management system, for managing Intelligent key characterized by comprising
Controlling terminal (100) tests application for receiving and auditing test application of unlocking, and according to by the unlocking of audit
Generate authorization message;
Client service (200) is communicated to connect with the controlling terminal (100), for judging that the encoded information of Intelligent key is
It is no correct, and the unlocking is generated using duration according to the correct encoded information of the Intelligent key and the request of Intelligent key
Test application, and the unlocking test application is sent to the controlling terminal (100), and,
The authorization message is sent to the Intelligent key;
Intelligent key (300) is communicated to connect with the client service (200), for sending to the client service (200)
The encoded information of the Intelligent key (300) and the request of the Intelligent key (300) use duration;
Communications adapter (400), with the Intelligent key (300) be wirelessly connected, and with the client service (200) wired company
It connects, the unlocking for receiving the Intelligent key (300) records, and unlocking record is sent to the client service
(200)。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910593075.8A CN110379052A (en) | 2019-07-03 | 2019-07-03 | Unlocking method, method, authorization method and the management system of application unlock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910593075.8A CN110379052A (en) | 2019-07-03 | 2019-07-03 | Unlocking method, method, authorization method and the management system of application unlock |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110379052A true CN110379052A (en) | 2019-10-25 |
Family
ID=68251720
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910593075.8A Pending CN110379052A (en) | 2019-07-03 | 2019-07-03 | Unlocking method, method, authorization method and the management system of application unlock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110379052A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114241639A (en) * | 2021-12-22 | 2022-03-25 | 北京罗克维尔斯科技有限公司 | Bluetooth key test method, device, robot, equipment and medium |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202003425U (en) * | 2011-03-31 | 2011-10-05 | 上海圣兆信息技术有限公司 | Central management system for monitoring intelligent lock |
CN103475480A (en) * | 2013-09-05 | 2013-12-25 | 北京星网锐捷网络技术有限公司 | Certificate authority method and device |
CN106097514A (en) * | 2016-06-24 | 2016-11-09 | 杭州咸亨国际科研中心有限公司 | The communication verification method of a kind of chargeable smart lock and unlocking apparatus thereof |
CN106600794A (en) * | 2016-12-28 | 2017-04-26 | 深圳市正拓盛世精密设备有限公司 | Intelligent Bluetooth electronic lock |
KR20170136902A (en) * | 2016-06-02 | 2017-12-12 | (주)가드텍 | Controlling method for doorlock apparatus using mobile terminal |
CN107492163A (en) * | 2017-06-22 | 2017-12-19 | 阜阳万瑞斯电子锁业有限公司 | Control method for electronic lock and system based on electron key and Quick Response Code under a kind of outage condition |
CN107742339A (en) * | 2017-09-30 | 2018-02-27 | 泉州国光软件开发有限责任公司 | A kind of management method of the passive electronic lockset based on platform |
CN107886601A (en) * | 2017-09-27 | 2018-04-06 | 湖南文理学院 | A kind of office door access control system and its open method |
CN107945331A (en) * | 2017-11-21 | 2018-04-20 | 广州思加特科技有限公司 | A kind of access control method, apparatus and system |
CN108512313A (en) * | 2018-05-17 | 2018-09-07 | 长园共创电力安全技术股份有限公司 | A kind of power distribution network temporary grounding wire management system and control method |
CN108682063A (en) * | 2018-05-11 | 2018-10-19 | 戴天智能科技(上海)有限公司 | A kind of authoring system of smart lock |
CN108884975A (en) * | 2015-10-09 | 2018-11-23 | 沃尔玛阿波罗有限责任公司 | Method and apparatus for being protected using optics lock & key commodity |
-
2019
- 2019-07-03 CN CN201910593075.8A patent/CN110379052A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202003425U (en) * | 2011-03-31 | 2011-10-05 | 上海圣兆信息技术有限公司 | Central management system for monitoring intelligent lock |
CN103475480A (en) * | 2013-09-05 | 2013-12-25 | 北京星网锐捷网络技术有限公司 | Certificate authority method and device |
CN108884975A (en) * | 2015-10-09 | 2018-11-23 | 沃尔玛阿波罗有限责任公司 | Method and apparatus for being protected using optics lock & key commodity |
KR20170136902A (en) * | 2016-06-02 | 2017-12-12 | (주)가드텍 | Controlling method for doorlock apparatus using mobile terminal |
CN106097514A (en) * | 2016-06-24 | 2016-11-09 | 杭州咸亨国际科研中心有限公司 | The communication verification method of a kind of chargeable smart lock and unlocking apparatus thereof |
CN106600794A (en) * | 2016-12-28 | 2017-04-26 | 深圳市正拓盛世精密设备有限公司 | Intelligent Bluetooth electronic lock |
CN107492163A (en) * | 2017-06-22 | 2017-12-19 | 阜阳万瑞斯电子锁业有限公司 | Control method for electronic lock and system based on electron key and Quick Response Code under a kind of outage condition |
CN107886601A (en) * | 2017-09-27 | 2018-04-06 | 湖南文理学院 | A kind of office door access control system and its open method |
CN107742339A (en) * | 2017-09-30 | 2018-02-27 | 泉州国光软件开发有限责任公司 | A kind of management method of the passive electronic lockset based on platform |
CN107945331A (en) * | 2017-11-21 | 2018-04-20 | 广州思加特科技有限公司 | A kind of access control method, apparatus and system |
CN108682063A (en) * | 2018-05-11 | 2018-10-19 | 戴天智能科技(上海)有限公司 | A kind of authoring system of smart lock |
CN108512313A (en) * | 2018-05-17 | 2018-09-07 | 长园共创电力安全技术股份有限公司 | A kind of power distribution network temporary grounding wire management system and control method |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114241639A (en) * | 2021-12-22 | 2022-03-25 | 北京罗克维尔斯科技有限公司 | Bluetooth key test method, device, robot, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103312676B (en) | Terminal, server and terminal safety management method | |
CN108986278A (en) | A kind of intelligent door lock off-line cipher authorization method and authoring system | |
CN103793960B (en) | Method for mobile key service | |
CN107508619B (en) | Mobile power based on Bluetooth technology rents self-help serving system | |
CN104125226B (en) | A kind of method, apparatus and system for locking and unlocking application | |
CN109074682A (en) | System and method for remotely accessing permission and verifying | |
CN104011612B (en) | Control system for managing program and control the variation of program | |
CN106785146A (en) | The charging method and system of the electric automobile charging pile with bluetooth | |
CN103473844A (en) | Intelligent control method and intelligent control system for public rental housing | |
CN108470313A (en) | A kind of operation operation overall process management-control method and system based on mobile internet | |
CN109272606A (en) | A kind of smart lock monitoring equipment, method and storage medium based on block chain | |
CN104318650A (en) | Dynamic coded lock management and control system | |
CN101127133A (en) | Door access remote management method | |
CN105378804A (en) | Secure electronic lock | |
CN103745536A (en) | Cabinet management system based on dynamic passwords | |
US20110167477A1 (en) | Method and apparatus for providing controlled access to a computer system/facility resource for remote equipment monitoring and diagnostics | |
CN204390320U (en) | A kind of dynamic puzzle-lock system | |
CN110379052A (en) | Unlocking method, method, authorization method and the management system of application unlock | |
CN106504370B (en) | Plant stand security management and control system and control method | |
CN206224488U (en) | Mobile terminal, server, controller based on device authorization management | |
CN106652233A (en) | Control method of shared experimental apparatus | |
CN107370605A (en) | One kind is based on SHA256 challenge response certification bluetooth lock management methods | |
CN111680978A (en) | Unlocking key authorization method, using method and returning method | |
CN108460870B (en) | Intelligent unlocking method and system | |
CN104103107A (en) | Time-varying password and time-varying password lock |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191025 |
|
RJ01 | Rejection of invention patent application after publication |