CN110675543B - Method for configuring access card, control method of door lock and door lock - Google Patents

Method for configuring access card, control method of door lock and door lock Download PDF

Info

Publication number
CN110675543B
CN110675543B CN201911019534.8A CN201911019534A CN110675543B CN 110675543 B CN110675543 B CN 110675543B CN 201911019534 A CN201911019534 A CN 201911019534A CN 110675543 B CN110675543 B CN 110675543B
Authority
CN
China
Prior art keywords
card
door lock
access
identification data
access card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911019534.8A
Other languages
Chinese (zh)
Other versions
CN110675543A (en
Inventor
李昱
唐杰
陈道远
杨苗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201911019534.8A priority Critical patent/CN110675543B/en
Publication of CN110675543A publication Critical patent/CN110675543A/en
Application granted granted Critical
Publication of CN110675543B publication Critical patent/CN110675543B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/40Indexing scheme relating to groups G07C9/20 - G07C9/29
    • G07C2209/41Indexing scheme relating to groups G07C9/20 - G07C9/29 with means for the generation of identity documents

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a method for configuring an access card, the access card, a control method of a door lock and the door lock, wherein the method for configuring the access card comprises the following steps: selecting at least one piece of identification data from a plurality of pieces of identification data pre-stored in a door lock; and writing the effective information of the access control card and at least one piece of identification data into the access control card, wherein the at least one piece of identification data is used for enabling the access control card to be bound with the door lock. At least one piece of identification data is selected from a plurality of pieces of identification data pre-stored in a door lock; the card issuing time, the effective period, the secret key for unlocking the door lock and at least one piece of identification data are written into the door lock card, so that the door lock can successfully configure the access authority and the effective period of the door lock card under the condition that the door lock is offline with a server.

Description

Method for configuring access card, control method of door lock and door lock
Technical Field
The invention belongs to the technical field of communication, and particularly relates to a method for configuring an access card, the access card, a door lock control method and a door lock.
Background
At present, along with the acceleration of the urban process, a large amount of floating population is rushed into the city, so that the number of the pub-rent houses, the short rent houses, the hotel-type talent apartments and the like which meet the market demands is increasingly increased, and most of the pub-rent houses, the short rent houses, the hotel-type talent apartments and the like are the same as the entrance guard mode of hotel rooms in the traditional hotel management, and the specific process is as follows: the foreground registers tenant information, the foreground issues access control cards such as NFC house cards, and the tenant uses the NFC house cards to swipe cards into corresponding rooms, wherein most of the NFC house cards adopt non-contact logic encryption smart cards supporting reading and writing, such as MIFARE S50 or S70 cards.
The specific process of configuring the NFC house card is as follows: the information of the NFC room card (generally comprising the serial number of the NFC room card and the special content stored by the NFC room card) is read by the card writing machine at the front stage, the service life of the NFC room card is set, the NFC room card is issued to the corresponding room door lock together through the hotel server, the information and the service life of the NFC room card are stored in the room door lock, the card information stored before the door lock is deleted after the service life is exceeded, and the door lock cannot be matched for opening the door again when the card is swiped.
However, the method for configuring the NFC room card has a disadvantage that the door lock and the server must be always connected when the card is written, and once the door lock is offline when the card is written, the information and the valid period of the NFC room card cannot be issued to the door lock, so that when the door lock is disconnected from the server, the access authority and the valid period of the room NFC room card cannot be configured, and the card must be written again after the door lock is online connected with the server, thereby limiting the configuration of the NFC room card and being very inconvenient.
There is a need for a method for configuring an access card, a door lock control method, and a door lock.
Disclosure of Invention
The invention aims to solve the technical problems that when a room card is configured for a door lock in the prior art, a server is required to send information of the room card to the door lock, when the connection between the server and the door lock is interrupted, the room card cannot be configured for the door lock, and the card can be written again after the door lock is connected with the server on line.
The invention provides a method for configuring an access card, the access card, a door lock control method and the door lock.
In a first aspect, the present invention provides a method for configuring an access card, applied to an access system, where the access system includes a door lock and an access card for unlocking the door lock, the method includes the following steps:
selecting at least one piece of identification data from a plurality of pieces of identification data pre-stored in a door lock;
and writing the effective information of the access control card and at least one piece of identification data into the access control card, wherein the at least one piece of identification data is used for enabling the access control card to be bound with the door lock.
According to an embodiment of the present invention, preferably, writing the valid information of the access card and at least one piece of the identification data into the access card includes:
and writing the card issuing time, the effective period and the secret key for unlocking the door lock of the access card and at least one piece of identification data into the access card.
According to an embodiment of the present invention, preferably, the method for configuring an access card further includes the following steps:
and deleting at least one piece of identification data from the door lock when the service time of the access card exceeds the effective period of the access card, so that the access card is unbinding with the door lock.
According to an embodiment of the present invention, preferably, writing the card issuing time, the expiration date, and the key for unlocking the door lock, and at least one piece of the identification data of the access card into the access card includes:
and correspondingly writing the card issuing time, the effective period and the secret key for unlocking the door lock of the access card and at least one piece of identification data into the same sector of the access card.
According to an embodiment of the present invention, preferably, when the key for unlocking the door lock is a plurality of keys, writing the card issuing time, the expiration date, and the key for unlocking the door lock and at least one piece of the identification data into the door lock card includes:
writing the card issuing time, the effective period and at least one piece of identification data of the access card into the same sector of the access card correspondingly;
and writing the keys into a plurality of sectors of the access card respectively.
According to an embodiment of the present invention, preferably, when the key for unlocking the door lock is a plurality of keys and at least one piece of the identification data is a plurality of pieces of identification data, writing the card issuing time, the expiration date, and the key for unlocking the door lock and at least one piece of the identification data into the door lock includes:
writing the card issuing time and the valid period of the access card into the same sector of the access card correspondingly;
writing the plurality of identification data into a plurality of sectors of the access card respectively;
and writing the keys into a plurality of sectors of the access card respectively.
In a second aspect, the present invention provides an access card configured by a method of configuring an access card.
In a third aspect, the present invention provides a control method for a door lock, which is applied to the door lock, and includes the following steps:
when the distance between the access card and the door lock is smaller than a preset threshold value, reading the card issuing time, the effective period, the identification data and the secret key of the access card stored in the access card;
comparing the secret key in the access card with the secret key stored in the door lock, and judging whether the secret key in the access card is consistent with the secret key stored in the door lock or not:
when the secret key in the access card is consistent with the secret key stored in the door lock, comparing the identification data in the access card with the identification data stored in the door lock, and judging whether the identification data in the access card is the identification data stored in the door lock or not:
when the identification data is the identification data stored by the door lock, judging whether the access card is effective according to the card issuing time, the effective period and the local time of the door lock of the access card:
and when the access control card is effective, controlling the door lock to be opened.
According to an embodiment of the present invention, preferably, the control method of the door lock further includes the following steps:
and calibrating the local time of the door lock before judging whether the access card is effective according to the card issuing time, the effective period and the local time of the door lock.
According to the embodiment of the invention, it is preferable to judge whether the access card is valid according to the card issuing time, the valid period and the local time of the door lock of the access card, and the method specifically comprises the following steps:
calculating the time difference between the card issuing time of the access card and the local time of the door lock;
judging whether the time difference is smaller than the valid period of the access card or not:
and when the time difference is smaller than the valid period of the access card, judging that the access card is valid.
In a fourth aspect, the present invention provides a door lock comprising a memory and a processor, the memory having stored thereon a computer program which, when executed by the processor, implements the steps of the control method of the door lock described above.
One or more embodiments of the above-described solution may have the following advantages or benefits compared to the prior art:
1) By applying the method for configuring the access card, the card issuing time, the effective period and the secret key for unlocking the door lock and at least one piece of identification data of the access card are written into the access card, so that the door lock can successfully configure the access right and the effective period of the access card under the condition that the door lock is offline with a server;
2) By applying the method for configuring the access card, at least one piece of identification data is deleted from the door lock, so that the access card and the door lock are unbinding without changing the key of the door lock, and the method is simple and convenient;
3) By applying the method for configuring the access card, the plurality of secret keys are written into the plurality of sectors of the access card respectively, so that when judging whether the secret keys in the access card are consistent with the secret keys stored by the door lock or not, the comparison of identification data is further carried out only when the secret keys in each sector in the access card are consistent with the secret keys stored by the door lock, and the matching safety of the access card and the door lock is improved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings are included to provide a further understanding of the invention, and are incorporated in and constitute a part of this specification, illustrate the invention and together with the embodiments of the invention, serve to explain the invention, without limitation to the invention. In the drawings:
FIG. 1 is a flow chart of a method for configuring an access card according to an embodiment of the present invention;
FIG. 2 is a flow chart of a method for configuring an access card according to a second embodiment of the present invention;
FIG. 3 is a flow chart illustrating a method of configuring an access card according to a third embodiment of the present invention;
fig. 4 shows a flowchart of a control method of the fifth door lock according to the embodiment of the present invention.
Detailed Description
The following will describe embodiments of the present invention in detail with reference to the drawings and examples, thereby solving the technical problems by applying technical means to the present invention, and realizing the technical effects can be fully understood and implemented accordingly. It should be noted that, as long as no conflict is formed, each embodiment of the present invention and each feature of each embodiment may be combined with each other, and the formed technical solutions are all within the protection scope of the present invention.
Example 1
In order to solve the technical problems in the prior art, the embodiment of the invention provides a method for configuring an access card, wherein in the embodiment, only one piece of identification data and one key prestored in a door lock are written into the access card.
Referring to fig. 1, an embodiment of the present invention provides a method for configuring an access card, which is applied to an access system, wherein the access system includes a door lock and an access card for unlocking the door lock, and the method includes the following steps:
s110, selecting one piece of identification data from a plurality of pieces of identification data pre-stored in a door lock;
s120, writing the card issuing time, the effective period and a secret key for unlocking the door lock and the identification data into the same sector of the door lock correspondingly, so that the door lock can be unlocked by the door lock;
s130, judging whether the service time of the access card exceeds the effective period of the access card according to the time of the access card swiping the door lock: if yes, go to step S140; if not, not responding;
and S140, deleting the piece of identification data from the door lock so as to unbind the access card from the door lock.
In step S120, the key is used to read and write the sector data block, and the key must be used to read and write the sector data block, and the keys of the card sectors corresponding to the same door lock are identical, except that the specific information is different. The keys of the card sectors corresponding to different door locks are different and are used for distinguishing the cards corresponding to the different door locks, specifically, the different door locks are distinguished by the keys of the sectors, the different door locks are provided with different keys, the different cards corresponding to the same door lock are distinguished by identification information, when the door locks leave the factory, the keys are stored in the door locks, and when the card corresponding to the door lock leaves the factory, the keys which are the same as the key of the door lock are written in. Therefore, two locks of one card cannot be opened, and the information of the data blocks in the card needs to be compared when the card is unlocked, so that the information can be read only when the secret keys are matched.
In the embodiment of the invention, the blank card of the access card may be a mifare 50 card, and the standard structure of the mifare 50 card is as follows: each card has sixteen independent sectors, the block3 of each sector stores the secret key of the sector, each card pairs with the door lock by using the secret key of the sector, and then reads and writes data, wherein, for safer, the method with highest security is as follows: sixteen keys are used at most, sixteen keys are stored in the door lock, and when the card is used, the keys of each sector of the card are successfully matched to continue data block comparison.
The following describes in detail, by way of example, implementation of the method for configuring an access card according to the embodiment of the present invention:
the door lock pre-stores a plurality of pieces of identification information, such as 100 pieces of identification information before leaving the factory, each piece of identification information is 16 bytes of random number, a foreground is provided with a MIFARE S50 card as an access control card, the card has a unique table identifier UID, the card has a read-write function and a memory function, the card has a plurality of sectors, each sector can store a secret key of the card and access conditions of data blocks of each sector, and the foreground is provided with a card writing machine for supporting read-write operation of the MIFARE S50 card.
When a tenant registers in a foreground: the foreground manager writes the randomly extracted 100 pieces of identification information pre-stored in the door lock into the access card by using the card writing machine, and simultaneously writes the card issuing time and the effective period of the access card, wherein the card issuing time, the year, the month and the day of the hexadecimal data format are stored into the appointed data blocks in the following table 1, for example 2019 is hexadecimal 0x7E3, the effective period of 3 days is 4320 minutes or 0x10E0, so that the configuration of the access right of the door lock of a tenant and the setting of the effective time by the foreground manager are completed, and the door lock and a server are not required to be connected on line in the process.
When a tenant swipes a card, the door lock identifies whether the identification information in the access control card is one of 100 pieces of prestored identification information, after identification is successful, the card issuing time and the effective period recorded in the appointed data block in the following table 1 are read, and whether the access control card is in the effective period is judged.
Table 1 is a structure of an access card (MIFARE S50 card) configured by the method for configuring an access card according to the embodiment of the present invention.
TABLE 1
In table 1 above, in Block2 of sector 0, the card issue time+expiration date is: card issuing time year+month+day (2 bytes+2 bytes) +valid time year+month+day (2 bytes+2 bytes), 12 bytes in total.
In table 1, an identification data, a card issuing time, an expiration date of the access card and a key pre-stored in the door lock are written into the sector 0 of the access card, and in practice, an identification data, a card issuing time, an expiration date of the access card and a key pre-stored in the door lock may be written into other sectors of the access card.
In more detail, in practical application, an identification data, a card-issuing time, an expiration date of an access card and a key prestored in the door lock may be written in any three sectors, for example, an identification data is written in sector 0, a card-issuing time and an expiration date of an access card are written in sector 2, and a key prestored in the door lock is written in sector 15, so long as an identification data, a card-issuing time, an expiration date of an access card and a key prestored in the door lock are written in specified different blocks. For example, the key is written in Block3 of any sector, one piece of identification data is written in Block1 of any sector, and the card issuing time and the expiration date of the access card are written in Block2 of any sector for the door lock to read.
According to the method, the device and the system, the door lock pre-stores a plurality of pieces of identification information, the foreground randomly extracts one piece of identification information from the pre-stored pieces of identification information to write in when the access control card is written in, so that the access control card access permission can be supported for offline configuration, card issuing time and valid period are input while card writing, the door lock records the card issuing time and the valid period when the card is read for the first time, and after the door lock is reconnected with the server, the door lock local time of the door lock is calibrated, so that whether the time difference between the card issuing time and the door lock local time exceeds the valid period can be calculated, and the access control card can be supported for offline configuration.
Example two
In order to solve the above technical problems in the prior art, the embodiment of the present invention further provides a method for configuring an access card, where in this embodiment, in order to improve the security of unlocking a door lock, the number of keys written into the access card is increased, that is: writing one piece of identification data and a plurality of keys prestored in the door lock into the access card.
Referring to fig. 2, an embodiment of the present invention provides a method for configuring an access card, which is applied to an access system, wherein the access system includes a door lock and an access card for unlocking the door lock, and the method includes the following steps:
s210, selecting one piece of identification data from a plurality of pieces of identification data pre-stored in a door lock;
s220, correspondingly writing the card issuing time, the effective period and the identification data of the access card into the same sector of the access card;
s230, writing the keys into a plurality of sectors of the access card respectively, so that the access card can be identified, and the door lock is opened;
s240, judging whether the service time of the access card exceeds the effective period of the access card according to the time of the access card swiping the door lock: if yes, go to step S250; if not, not responding;
s250, deleting the piece of identification data from the door lock so as to unbind the access card from the door lock.
Table 2 is a structure of an access card (MIFARE S50 card) configured by the method for configuring an access card according to the embodiment of the present invention.
TABLE 2
In table 2, one piece of identification data, card-issuing time and valid period of the access card are written into the same sector of the access card and all written into the sector 0 of the access card, and in practice, one piece of identification data, card-issuing time and valid period of the access card may be written into the same sector of the access card and all written into other sectors of the access card.
In particular, the number of keys is greater than 1 and less than the number of sectors, which is not limited herein.
In more detail, in practical application, one piece of identification data, the card-issuing time and the valid period of the access card may be written in any two sectors, for example, one piece of identification data is written in sector 0, and the card-issuing time and the valid period of the access card are written in sector 2, so long as one piece of identification data, the card-issuing time and the valid period of the access card are written in specified different blocks.
Example III
In order to solve the above technical problems in the prior art, the embodiment of the present invention further provides a method for configuring an access card, where in this embodiment, in order to further improve the security of unlocking a door lock, the number of keys and the number of identification data written into the access card are increased, that is: writing one more identification data and a plurality of keys prestored in the door lock into the access card.
Referring to fig. 3, an embodiment of the present invention provides a method for configuring an access card, which is applied to an access system, wherein the access system includes a door lock and an access card for unlocking the door lock, and the method includes the following steps:
s310, selecting a plurality of pieces of identification data from a plurality of pieces of identification data pre-stored in a door lock;
s320, correspondingly writing the card issuing time and the effective period of the access card into the same sector of the access card;
s330, writing the selected pieces of identification data into a plurality of sectors of the access card respectively;
s340, writing the keys into a plurality of sectors of the access card respectively, so that the access card can be identified, and the door lock is opened;
s350, judging whether the service time of the access card exceeds the effective period of the access card according to the time of the access card swiping the door lock: if yes, go to step S360; if not, the response is not made.
S360, deleting the selected pieces of identification data from the door lock so as to unbind the access card from the door lock.
Table 3 is a structure of an access card (MIFARE S50 card) configured by the method for configuring an access card according to the embodiment of the present invention.
TABLE 3 Table 3
Example IV
In order to solve the technical problems in the prior art, the embodiment of the invention also provides an access control card.
The access card provided by the embodiment of the invention is configured by the method for configuring the access card according to the first to third embodiments.
Example five
In order to solve the technical problems in the prior art, the embodiment of the invention also provides a control method of the door lock.
Referring to fig. 4, the invention provides a control method of a door lock, comprising the following steps:
s510, when the distance between the access card and the door lock is smaller than a preset threshold value, reading the card issuing time, the effective period, the identification data and the secret key of the access card stored in the access card;
s520, comparing the secret key in the access card with the secret key stored in the door lock, and judging whether the secret key in the access card is consistent with the secret key stored in the door lock or not: if yes, go to step S530; if not, not responding;
s530, comparing the identification data in the access card with the identification data stored in the door lock, and judging whether the identification data in the access card is the identification data stored in the door lock or not: if yes, go to step S550; if not, not responding;
s540, calibrating the local time of the door lock;
s550, calculating the time difference between the card issuing time and the door lock local time, and judging whether the time difference is smaller than the valid period of the access card: if yes, controlling the door lock to be opened; if not, the response is not made.
The step S540 is not limited to the step S530, and may be performed before the steps S530, S520, and S510, as long as the step S540 is performed before the step S550.
The implementation of the control method of the door lock according to the embodiment of the present invention is described in detail below by way of example:
when a tenant swipes a card for each time after the first card swiping, the door lock identifies card information, reads card issuing time and effective period in the data block, calculates time difference between local time and card issuing time of the door lock, compares the time difference with the effective period, and can unlock when the time difference is within the effective period, if the time difference exceeds the effective period, the unlocking behavior is not executed.
The local time of the door lock is calculated through the RTC real-time clock module or the chip, if the real-time clock module or the chip is offline with the server for a long time, the local time of the door lock and the accurate time have errors of a single-digit minute level, once the door lock and the server are restored to be connected, the server issues the current accurate time to the door lock, and the door lock can calibrate the local time of the door lock through the current accurate time, so that the calculation errors that a tenant cannot swipe a card into the door in the effective period are prevented.
Example six
In order to solve the technical problems in the prior art, the embodiment of the invention also provides a door lock.
The door lock provided by the embodiment of the invention comprises a memory and a processor, wherein a computer program is stored in the memory, and the steps of the control method of the door lock are realized when the computer program is executed by the processor.
Although the embodiments of the present invention are disclosed above, the embodiments are only used for the convenience of understanding the present invention, and are not intended to limit the present invention. Any person skilled in the art can make any modification and variation in form and detail without departing from the spirit and scope of the present disclosure, but the scope of the present disclosure is still subject to the scope of the present disclosure as defined by the appended claims.

Claims (5)

1. A method for configuring an access card, which is applied to an access system, wherein the access system comprises a door lock and the access card, and the method is characterized by comprising the following steps:
selecting at least one piece of identification data from a plurality of pieces of identification data pre-stored in a door lock;
writing the effective information of the access control card and at least one piece of identification data into the access control card, wherein the method comprises the following steps: writing card issuing time, effective period and secret key for unlocking the door lock and at least one piece of identification data into the access card, wherein the at least one piece of identification data is used for enabling the access card to be bound with the door lock;
and deleting at least one piece of identification data from the door lock when the service time of the access card exceeds the effective period of the access card, so that the access card is unbinding with the door lock.
2. The method of claim 1, wherein writing the card issuing time, expiration date, and key for unlocking the door lock, and at least one piece of the identification data, into the card, comprises:
and correspondingly writing the card issuing time, the effective period and the secret key for unlocking the door lock of the access card and at least one piece of identification data into the same sector of the access card.
3. The method of claim 1, wherein writing the card issuing time, the expiration date, and the key for unlocking the door lock and at least one piece of the identification data into the access card when the key for unlocking the door lock is a plurality of keys, comprises:
writing the card issuing time, the effective period and at least one piece of identification data of the access card into the same sector of the access card correspondingly;
and writing the keys into a plurality of sectors of the access card respectively.
4. The method of claim 1, wherein writing the card issuing time, the expiration date, and the key for unlocking the door lock and at least one piece of identification data into the access card when the key for unlocking the door lock is a plurality of keys and the at least one piece of identification data is a plurality of pieces of identification data, comprises:
writing the card issuing time and the valid period of the access card into the same sector of the access card correspondingly;
writing the plurality of identification data into a plurality of sectors of the access card respectively;
and writing the keys into a plurality of sectors of the access card respectively.
5. An access card, characterized in that it is configured by the method according to any one of claims 1 to 4.
CN201911019534.8A 2019-10-24 2019-10-24 Method for configuring access card, control method of door lock and door lock Active CN110675543B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911019534.8A CN110675543B (en) 2019-10-24 2019-10-24 Method for configuring access card, control method of door lock and door lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911019534.8A CN110675543B (en) 2019-10-24 2019-10-24 Method for configuring access card, control method of door lock and door lock

Publications (2)

Publication Number Publication Date
CN110675543A CN110675543A (en) 2020-01-10
CN110675543B true CN110675543B (en) 2024-02-13

Family

ID=69084424

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911019534.8A Active CN110675543B (en) 2019-10-24 2019-10-24 Method for configuring access card, control method of door lock and door lock

Country Status (1)

Country Link
CN (1) CN110675543B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111489464A (en) 2020-03-25 2020-08-04 北京小米移动软件有限公司 Identity verification method and device, electronic equipment and computer readable storage medium
CN114005208B (en) * 2021-12-30 2022-03-18 深圳灏鹏科技有限公司 Access control method, device, equipment and storage medium
CN115240308B (en) * 2022-09-26 2022-12-06 深圳市极致科技股份有限公司 Access control machine authorization method, device and system, access control machine and computer storage medium
CN116645751B (en) * 2023-06-27 2023-11-24 深圳市亲邻科技有限公司 IC card information changing method and system

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101937586A (en) * 2010-09-10 2011-01-05 上海贝岭股份有限公司 Access control system of residential community
CN104751545A (en) * 2015-02-16 2015-07-01 张泽 System, method and device for processing permissions of door lock
CN106555513A (en) * 2016-10-20 2017-04-05 顺丰科技有限公司 Intelligent storage cabinet, intelligent door lock and its control method
CN106920306A (en) * 2017-03-01 2017-07-04 成都优客智家信息科技有限公司 Intelligent door card encryption system
CN107945324A (en) * 2017-11-14 2018-04-20 广东安居宝数码科技股份有限公司 Card writing method, card reading method and the device of access control system
CN108064398A (en) * 2016-12-20 2018-05-22 深圳中兴力维技术有限公司 Electron key management method and device
CN108091024A (en) * 2018-01-11 2018-05-29 成都千帆科技开发有限公司 Access control equipment Off-line control method
CN109472909A (en) * 2019-01-11 2019-03-15 常州科新永安电子锁有限公司 Blue-tooth intelligence lock, system and application method
CN208605051U (en) * 2018-07-03 2019-03-15 国网冀北电力有限公司检修分公司 A kind of equipment lock for box door system
CN110232762A (en) * 2019-06-24 2019-09-13 沈阳泰格科技发展有限公司 M1 card cabinet door electronic lock copy prevention method
CN110298951A (en) * 2019-07-16 2019-10-01 深圳市凯迪仕智能科技有限公司 Encryption method and encryption system for M1 card

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013093012A (en) * 2011-10-07 2013-05-16 Panasonic Corp Memory controller and memory device
JP5011448B1 (en) * 2011-11-23 2012-08-29 東海理研株式会社 Key management box

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101937586A (en) * 2010-09-10 2011-01-05 上海贝岭股份有限公司 Access control system of residential community
CN104751545A (en) * 2015-02-16 2015-07-01 张泽 System, method and device for processing permissions of door lock
CN106555513A (en) * 2016-10-20 2017-04-05 顺丰科技有限公司 Intelligent storage cabinet, intelligent door lock and its control method
CN108064398A (en) * 2016-12-20 2018-05-22 深圳中兴力维技术有限公司 Electron key management method and device
CN106920306A (en) * 2017-03-01 2017-07-04 成都优客智家信息科技有限公司 Intelligent door card encryption system
CN107945324A (en) * 2017-11-14 2018-04-20 广东安居宝数码科技股份有限公司 Card writing method, card reading method and the device of access control system
CN108091024A (en) * 2018-01-11 2018-05-29 成都千帆科技开发有限公司 Access control equipment Off-line control method
CN208605051U (en) * 2018-07-03 2019-03-15 国网冀北电力有限公司检修分公司 A kind of equipment lock for box door system
CN109472909A (en) * 2019-01-11 2019-03-15 常州科新永安电子锁有限公司 Blue-tooth intelligence lock, system and application method
CN110232762A (en) * 2019-06-24 2019-09-13 沈阳泰格科技发展有限公司 M1 card cabinet door electronic lock copy prevention method
CN110298951A (en) * 2019-07-16 2019-10-01 深圳市凯迪仕智能科技有限公司 Encryption method and encryption system for M1 card

Also Published As

Publication number Publication date
CN110675543A (en) 2020-01-10

Similar Documents

Publication Publication Date Title
CN110675543B (en) Method for configuring access card, control method of door lock and door lock
CN101018127B (en) Remote access system, gateway, client device, program, and storage medium
US4656342A (en) Method and apparatus for authorizing the holder of a portable object such as a card to gain access to at least one service provided by at least one authorizing entity
US8102240B2 (en) Controller providing shared device access for access control systems
CN110782567B (en) Unlocking method and setting method of intelligent lock
CN106161442A (en) A kind of system control user login method
CN101714216B (en) Semiconductor element, biometric authentication method, biometric authentication system and mobile terminal
AU8545398A (en) Method for managing a secure terminal
CN101950342A (en) Device and method for managing access control permission of integrated circuit card
CN113450092A (en) Block chain network-based article safe and efficient transaction method, system and storage medium
CN101004797A (en) Method for safely storing data in smart card with large capacity
CN109753837B (en) Anti-copying and anti-tampering method for IC card
US8281150B2 (en) Smart card and access method thereof
CN114241631A (en) Control method and registration method of intelligent door lock and related devices
JP2007241336A (en) Security system using ic card
CN105608775A (en) Authentication method, terminal, access control card and SAM card
CN206628001U (en) It is self-service to take the Hospitality management system and its electronic lock also blocked
CN101097626A (en) System and method for monitoring remittance draft with electronic label
CN100535887C (en) Security measure management method of prepay IC card meter based on ESAM module
CN111651791A (en) Block chain private key storage and identity authentication device
CN107454972A (en) A kind of IC-card management method, system and access controller
CN111383371B (en) Unlocking method, door lock, server, system, storage medium and electronic device
CN211264341U (en) Anti-copy access control card
JP5292749B2 (en) Admission control system and method
CN106920306A (en) Intelligent door card encryption system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant