CN110807854A - Unlocking strategy configuration method and equipment - Google Patents

Unlocking strategy configuration method and equipment Download PDF

Info

Publication number
CN110807854A
CN110807854A CN202010017009.9A CN202010017009A CN110807854A CN 110807854 A CN110807854 A CN 110807854A CN 202010017009 A CN202010017009 A CN 202010017009A CN 110807854 A CN110807854 A CN 110807854A
Authority
CN
China
Prior art keywords
unlocking
door lock
intelligent door
strategy
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010017009.9A
Other languages
Chinese (zh)
Other versions
CN110807854B (en
Inventor
孙吉平
刘跃峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Senseshield Technology Co Ltd
Original Assignee
Beijing Senseshield Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Senseshield Technology Co Ltd filed Critical Beijing Senseshield Technology Co Ltd
Priority to CN202010017009.9A priority Critical patent/CN110807854B/en
Publication of CN110807854A publication Critical patent/CN110807854A/en
Application granted granted Critical
Publication of CN110807854B publication Critical patent/CN110807854B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The disclosure relates to the technical field of intelligent door locks, in particular to an unlocking strategy configuration method and equipment. The method is applied to a door lock server and comprises the following steps: receiving unlocking strategy data configured on a first terminal from the first terminal and information of each intelligent door lock to be configured with an unlocking strategy; the first terminal is a special device for configuring an unlocking strategy for the intelligent door lock, and does not have a fixed corresponding or binding relationship with each intelligent door lock to be configured with the unlocking strategy; and sending the unlocking strategy data to each intelligent door lock to be configured with an unlocking strategy based on the information of each intelligent door lock, so that each intelligent door lock is configured with the unlocking strategy according to the received unlocking strategy data. The embodiment scheme of the invention configures the unlocking strategy through the preset terminal equipment and issues the unlocking strategy to each intelligent door lock through the door lock server, thereby realizing the centralized configuration management of the intelligent door lock strategy.

Description

Unlocking strategy configuration method and equipment
Technical Field
The disclosure relates to the technical field of intelligent door locks, in particular to an unlocking strategy configuration method and equipment.
Background
At present, most of intelligent door locks adopt a local management mode, and functions such as setting a management password, adding a new user, collecting unlocking certificates and the like need to be completed locally on the intelligent door lock.
However, in some situations, a large number of intelligent door locks need to be managed and configured, for example, for a plurality of intelligent door locks in an office, even if the same unlocking strategy is used, each lock needs to be configured once, which results in high management cost.
Disclosure of Invention
The invention provides an unlocking strategy configuration method and device aiming at solving the problems in the background art, and aims to realize centralized configuration management of the unlocking strategy of intelligent door locks by setting the unlocking strategy by preset terminal equipment and issuing the unlocking strategy to each intelligent door lock through a door lock server.
In a first aspect, an embodiment of the present invention provides an unlocking policy configuration method, where the method is applied to a door lock server, and includes: receiving unlocking strategy data configured on a first terminal from the first terminal and information of each intelligent door lock to be configured with an unlocking strategy; the first terminal is a special device for configuring an unlocking strategy for the intelligent door lock, and does not have a fixed corresponding or binding relationship with each intelligent door lock to be configured with the unlocking strategy; and sending the unlocking strategy data to each intelligent door lock to be configured with an unlocking strategy based on the information of each intelligent door lock so as to configure the unlocking strategy of each intelligent door lock according to the received unlocking strategy data, wherein the unlocking strategy configured based on the unlocking strategy data in the intelligent door lock is at least applied to unlocking verification finished by the intelligent door lock or finished by interaction of the intelligent door lock and a door lock server in the unlocking process.
In a second aspect, an embodiment of the present invention provides a door lock server, which includes a processor configured to execute predetermined computer executable instructions to perform the unlocking policy configuration method according to the first aspect.
In a third aspect, an embodiment of the present invention provides an unlocking policy configuration method, where the method is applied to a first terminal, where the first terminal is a dedicated device for configuring an unlocking policy for an intelligent door lock, and has no fixed correspondence or binding relationship with each intelligent door lock to be configured with the unlocking policy, and the method includes: acquiring unlocking strategy data configured for each intelligent door lock to be configured with an unlocking strategy based on the operation of a management user; and sending the unlocking strategy data and the information of each intelligent door lock to be configured with the unlocking strategy to a door lock server, so that the unlocking strategy data is configured into each intelligent door lock through the door lock server, wherein the unlocking strategy configured to the intelligent door lock is at least applied to unlocking verification finished by the intelligent door lock itself or finished by interaction of the intelligent door lock and the door lock server in the unlocking process.
In a fourth aspect, an embodiment of the present invention provides a terminal device, which includes a processor configured to execute a predetermined computer executable instruction to execute the unlocking policy configuration method according to the third aspect.
In a fifth aspect, an embodiment of the present invention provides an unlocking policy configuration method, where the method is applied to an intelligent door lock, and includes: receiving unlocking strategy data from a door lock server, wherein the unlocking strategy data are configured based on a first terminal and are provided to the door lock server by the first terminal; the first terminal is a special device for configuring an unlocking strategy for the intelligent door lock, and the intelligent door lock receiving unlocking strategy data does not have a fixed corresponding or binding relationship with the first terminal; and configuring unlocking strategies according to the unlocking strategy data, wherein the unlocking strategies configured based on the unlocking strategy data are at least applied to unlocking verification finished by the intelligent door lock or finished by interaction of the intelligent door lock and a door lock server in the unlocking process.
In a sixth aspect, an embodiment of the present invention provides an intelligent door lock, including a processor configured to execute predetermined computer executable instructions to execute the unlocking strategy configuration method of the fifth aspect.
The method has the advantages that the unlocking strategy of the intelligent door lock is set based on the preset terminal equipment (namely, the first terminal), wherein the first terminal does not have fixed corresponding or binding relation with the intelligent door lock needing to be configured with the unlocking strategy and is specially used for configuring the unlocking strategy for the intelligent door lock; the unlocking strategy data configured on the first terminal is pushed to each intelligent door lock through the door lock server, so that each intelligent door lock is configured with the unlocking strategy based on the received unlocking strategy data, and the unlocking strategy configured in the intelligent door lock is at least applied to unlocking verification in the unlocking process.
Drawings
In order that the invention may be more readily understood, it will be described in more detail with reference to specific embodiments thereof that are illustrated in the accompanying drawings. These drawings depict only typical embodiments of the invention and are not therefore to be considered to limit the scope of the invention.
Fig. 1 is a flowchart of an unlocking strategy configuration method according to a first embodiment of the present invention;
fig. 2 is a schematic structural diagram of a door lock system for implementing an unlocking strategy configuration method according to an embodiment of the present invention;
fig. 3 is a flowchart of an unlocking strategy configuration method according to a second embodiment of the present invention;
fig. 4 is a flowchart of an unlocking policy configuration method according to a third embodiment of the present invention.
Detailed Description
Embodiments of the present invention will now be described with reference to the drawings, wherein like parts are designated by like reference numerals. The embodiments described below and the technical features of the embodiments may be combined with each other without conflict.
Fig. 1 is a flowchart of an unlocking policy configuration method according to a first embodiment of the present invention. Fig. 2 is a schematic structural diagram of a door lock system for implementing an unlocking strategy configuration method according to an embodiment of the present invention. As shown in fig. 2, the door lock system according to the embodiment of the present invention includes a door lock server 200, each intelligent door lock 300, and a first terminal 100, where the first terminal 100 is in communication connection with the door lock server 200, where the first terminal 100 is a dedicated device for configuring an unlocking policy for the intelligent door lock 300, but the first terminal 100 does not have a fixed correspondence or binding relationship with each intelligent door lock 300 to be configured with the unlocking policy, and functionally, the first terminal 100 belongs to a service-side management device, and may be configured as a device having a management authority when actually deployed, for example, a door lock or other terminal device having a management authority and supporting configuring policy data for each intelligent door lock 300 that does not have a correspondence or binding relationship, and the other terminal device may be, for example, a mobile phone, a computer, a tablet device, or the like. The first terminal 100 is only used for configuring the unlocking strategy for the intelligent door lock 300, and does not participate in the unlocking verification and other processes of configuring the intelligent door lock 300 completing the unlocking strategy. Further, each of the intelligent door locks 300 shown in fig. 2 is an intelligent door lock 300 to be configured with an unlocking strategy, and is respectively connected to the door lock server 200; optionally, during specific implementation, each of the intelligent door locks 300 may be directly in communication connection with the door lock server 200, or may interact with the door lock server 200 through a terminal device having a binding relationship with the intelligent door lock 300, where the terminal device is different from the first terminal 100, and the terminal device establishes a corresponding or binding relationship with the intelligent door lock 300, and may participate in processes such as unlocking verification of the intelligent door lock 300 configured to complete an unlocking policy.
The method shown in fig. 1 is applied to a door lock server in the system shown in fig. 2, and as shown in fig. 1, the processing steps of the method include:
step S101: and receiving unlocking strategy data configured on the first terminal from the first terminal and information of each intelligent door lock to be configured with an unlocking strategy.
Step S102: and sending the unlocking strategy data to each intelligent door lock to be configured with an unlocking strategy based on the information of each intelligent door lock so as to configure the unlocking strategy of each intelligent door lock according to the received unlocking strategy data, wherein the unlocking strategy configured based on the unlocking strategy data in the intelligent door lock is at least applied to unlocking verification finished by the intelligent door lock or finished by interaction of the intelligent door lock and a door lock server in the unlocking process.
In the embodiment of the invention, the management user configures the unlocking strategy based on the first terminal, which is different from the situation that the unlocking strategy needs to be set locally one-to-one in the prior art, the unlocking strategy configured based on the first terminal is sent to the door lock server in the embodiment of the invention, and the unlocking strategy is pushed to each intelligent door lock to be configured with the unlocking strategy through the door lock server. During specific implementation, each intelligent door lock to be configured with the unlocking strategy can be all intelligent door locks managed by the door lock server, after the unlocking strategy is set on the first terminal, the intelligent door lock list is obtained from the door lock server, all door locks in the intelligent door lock list are used as the door locks to be configured with the unlocking strategy, and the set unlocking strategy is pushed to all intelligent door locks managed by the door lock server through the door lock server. In another possible design, the first terminal supports simultaneous setting of multiple unlocking strategies, and supports setting of intelligent door lock information corresponding to each unlocking strategy on the first terminal side, and after the unlocking strategies and the corresponding intelligent door lock information are set on the first terminal, unlocking strategy data are pushed to the corresponding intelligent door lock, and further the above configured unlocking strategy modes can be further combined, for example, part of the set unlocking strategies correspond to all the intelligent door locks managed by the door lock server, and part of the unlocking strategies correspond to specific intelligent door locks managed by the door lock server. It should be noted that the first terminal supports configuration of the unlocking policy data and the intelligent door lock information corresponding to the unlocking policy data, but the first terminal does not have a fixed correspondence or binding relationship with each intelligent door lock, after the first terminal sends the configured policy data to the door lock server, the door lock server and each intelligent door lock perform pushing of the policy data, policy configuration, subsequent unlocking verification based on the unlocking policy, door lock management and the like, and the first terminal does not participate any more. For example, in the unlocking process, the intelligent door lock can automatically complete unlocking verification based on the configured unlocking strategy and also can complete unlocking verification through interaction with the door lock server, wherein the interaction between the intelligent door lock and the door lock server can be performed through terminal equipment in a binding relationship with the intelligent door lock, for example, the terminal equipment in the binding relationship with the intelligent door lock can be an unlocking certificate, and unlocking is verified through acquiring the information of the terminal equipment; or the terminal equipment is an intermediate medium for interaction between the intelligent door lock and the door lock server, and the intelligent door lock interacts data with the door lock server through the terminal equipment with the binding relationship and completes unlocking verification.
Further, the unlocking strategy refers to all configurations related to unlocking of the intelligent door lock, including one or more of door lock management configuration, unlocking verification rule and unlocking user configuration. Wherein the door lock management configuration may include: the addition and deletion of the administrator user and the addition, modification, deletion and the like of the authentication certificate of the management user are realized, namely, the centralized configuration of the information of the intelligent door lock management user is realized through the first terminal.
The unlocking verification rule is a basis for judging whether the received unlocking instruction meets the unlocking condition or not by the intelligent door lock, wherein the unlocking verification rule can comprise an unlocking mode supported by the intelligent door lock, a judgment rule when the unlocking is supported by a plurality of unlocking credential combinations, a generation/verification rule of an unlocking password when the unlocking is supported by the password, and the like.
The unlocking user configuration comprises the addition and the deletion of an unlocking user, the addition, the deletion, the modification and the like of an unlocking certificate of the unlocking user. The unlocking certificate of the unlocking user refers to a certificate used for opening the door by the user, and includes but is not limited to a static password, a dynamic password key, a door card, a fingerprint, face recognition, unlocking of a terminal (such as a mobile phone) and the like. In the embodiment of the invention, different from the situation that unlocking user information and unlocking certificates of unlocking users need to be configured one by one locally in the intelligent door lock in the prior art, the scheme of the embodiment of the invention supports the collection of the unlocking user information and the unlocking certificates of the unlocking users at the first terminal, and the unlocking user information and the unlocking certificates are configured in the intelligent door lock in batches through the door lock server, so that the efficiency of configuring the unlocking users for the intelligent door lock is improved.
In a specific implementation manner, one unlocking strategy may include added new user information and acquired unlocking credentials of the new user, and the new user and the unlocking credentials in the unlocking strategy may be configured to all or part of the intelligent door locks through the door lock server. For example, the new user and the unlocking certificate in the unlocking strategy are configured in all the intelligent door locks managed by the door lock server, or the intelligent door lock information required to be configured is correspondingly set when the unlocking strategy is configured, and the unlocking certificate of the new user and the new user is configured in the corresponding intelligent door lock through the door lock server.
Further, in order to ensure that the unlocking policy configured in the first terminal is uploaded by a legal administrator, before acquiring unlocking policy data based on the first terminal device, the identity of the administrator needs to be authenticated, including: the identity information of the current user of the first terminal is obtained, and whether the current user is a legal management user is verified based on the identity information. The first terminal acquiring identity information of a current user comprises the following steps: requiring a current user to input an administrator password on a first terminal, wherein the administrator password can be a static password, a dynamic password, a mobile phone verification code and the like; in addition, the current user may also be required to use an administrator card on the first terminal, be required to enter personal biometric information such as a fingerprint, facial recognition, etc. to authenticate the administrator.
In one embodiment of the invention, in order to protect the security of the unlocking strategy data, the first terminal encrypts the unlocking strategy data by using a first encryption key and obtains a first ciphertext by using a first private key signature before sending the unlocking strategy data to the door lock management server, and sends the first ciphertext to the door lock server;
and after receiving the first ciphertext encrypted by the first encryption key and signed by the first private key, the door lock server verifies the signature of the first ciphertext by using the first public key and decrypts by using the first decryption key to obtain the unlocking strategy data plaintext. Before the lock server sends the unlocking strategy data plaintext to each intelligent lock, the lock server encrypts the unlocking strategy data by using a second encryption key and obtains a second ciphertext by using a second private key signature, and the lock server sends the second ciphertext to each intelligent lock.
In another possible mode, after receiving the first ciphertext encrypted by the first encryption key and signed by the first private key, the door lock server may also directly send the first ciphertext to each intelligent door lock server, or after the door lock server performs encryption, signature, transformation and the like on the first ciphertext, send the first ciphertext to each intelligent door lock server.
In the scheme of the embodiment of the invention, the unlocking strategy data sent by the first terminal to the door lock server and the unlocking strategy data sent by the door lock server to each intelligent door lock are ciphertext data, so that the safety of the unlocking strategy data can be protected, and the identity authentication between the first terminal and the door lock server and between the door lock server and the intelligent door lock can be realized.
Corresponding to the embodiment of the unlocking policy configuration method, the embodiment of the present invention further provides an embodiment of a door lock server, where the door lock server includes a memory and a processor, the memory is configured to store computer-executable instructions, and the processor is configured to execute the computer-executable instructions in the memory to execute the unlocking policy configuration method.
Fig. 3 is a flowchart of an unlocking strategy configuration method according to a second embodiment of the present invention. The method shown in fig. 3 is applied to a first terminal, where the first terminal is in communication connection with a door lock server, and supports setting of a door lock unlocking policy based on user operation for a dedicated device for configuring an unlocking policy, and unlocking policy data set in the first terminal is sent to each intelligent door lock to which an unlocking policy is to be configured through the door lock server, where it is to be noted that the first terminal configures unlocking policy data for each intelligent door lock to which an unlocking policy is to be configured, but the first terminal does not have a fixed correspondence or binding relationship with the intelligent door lock to which an unlocking policy is to be configured. As shown in fig. 3, the processing steps of the method include:
step S201: and acquiring unlocking strategy data configured for each intelligent door lock to be configured with the unlocking strategy based on the operation of the management user.
Step S202: and sending the unlocking strategy data and the information of each intelligent door lock to be configured with the unlocking strategy to a door lock server so as to configure the unlocking strategy data into each intelligent door lock through the door lock server, wherein the unlocking strategy configured to the intelligent door lock is at least applied to unlocking verification finished by the intelligent door lock itself or finished by interaction of the intelligent door lock and the door lock server in the unlocking process.
In the scheme of the embodiment of the invention, the unlocking strategy data in the intelligent door locks are not set locally one-to-one in the door locks, but are set through special equipment (namely a first terminal), and the unlocking strategy data are pushed to each intelligent door lock through a door lock server. The management user sets first unlocking strategy data and pushes the first unlocking strategy data to all intelligent door locks managed by the door lock server or all intelligent door locks needing to be set with unlocking strategies under the management of the door lock server.
In a possible design, when the administrative user sets the unlocking policy data through the first terminal, the administrative user may input information of the intelligent door lock that needs to be configured with the policy in the first terminal or obtain a door lock information list from the door lock server and select a door lock that needs to be configured with the unlocking policy from the door lock information list. Besides being configured to all intelligent door locks, the unlocking strategy data set by the first terminal can be configured to a plurality of unlocking strategies based on the first terminal, and each unlocking strategy is pushed to all or part of the intelligent door locks through the door lock server.
In the embodiment of the invention, the unlocking strategy data comprises one or more of door lock management configuration, unlocking verification rule and unlocking user configuration. In an optional mode, the unlocking user configuration includes adding a new user and an unlocking certificate of the new user, that is, the first terminal supports collecting the unlocking certificate of the unlocking user, such as collecting the fingerprint of the unlocking user, the facial information, the unlocking password and the like.
In the scheme of the embodiment of the invention, before the unlocking strategy data is sent to the door lock server by the first terminal, the unlocking strategy data is encrypted by using the first encryption key and signed by using the first private key to obtain the first ciphertext, the first terminal sends the first ciphertext to the door lock server, and the door lock server obtains the unlocking strategy data plaintext after successful signature verification and decryption, so that the safety of the unlocking strategy data can be protected, and the identity authentication can be carried out between the door lock server and the first terminal.
In one embodiment of the invention, before the unlocking strategy data configured for a plurality of intelligent door locks is obtained based on the operation of the management user, the identity information of the current user is obtained, and after the current user is verified to be a legal management user according to the identity information, the management user is allowed to set the unlocking strategy data.
Corresponding to the embodiment of the unlocking policy configuration method in which the first terminal is used as an execution subject, the present invention further provides an embodiment of the first terminal, where the first terminal includes a memory and a processor, the memory is configured to store computer-executable instructions, and the processor is configured to execute the computer-executable instructions in the memory to execute the unlocking policy configuration method.
Fig. 4 is a flowchart of an unlocking policy configuration method according to a third embodiment of the present invention. The method shown in fig. 4 is applied to an intelligent door lock, and the intelligent door lock is in communication connection with a door lock server and acquires unlocking strategy data from the door lock server. As shown in fig. 4, the processing steps of the method include:
step S301: receiving unlocking strategy data from a door lock server, wherein the unlocking strategy data are configured based on a first terminal and are provided to the door lock server by the first terminal; the first terminal is a special device for configuring an unlocking strategy for the intelligent door lock, and the intelligent door lock receiving unlocking strategy data does not have a fixed corresponding or binding relationship with the first terminal.
Step S302: and configuring unlocking strategies according to the unlocking strategy data, wherein the unlocking strategies configured based on the unlocking strategy data are at least applied to unlocking verification finished by the intelligent door lock or finished by interaction of the intelligent door lock and a door lock server in the unlocking process.
In the scheme of the embodiment of the invention, the unlocking strategy data comprises one or more of door lock management configuration, unlocking verification rules and unlocking user configuration. The unlocking user configuration comprises the addition of a new user and an unlocking certificate of the new user, namely an unlocking strategy in the intelligent door lock, the unlocking certificate of the new user and the unlocking certificate of the new user are pushed through the door lock server, and local configuration is not needed.
In the scheme of the embodiment of the invention, the unlocking strategy data received by the intelligent door lock from the door lock server is a second ciphertext obtained by encrypting through a second encryption key and signing through a second private key, so that after the intelligent door lock receives the unlocking strategy data, the second ciphertext is signed by using a second public key and decrypted through a second decryption key to obtain an unlocking strategy data plaintext.
Corresponding to the embodiment of the unlocking strategy configuration method with the intelligent door lock as an execution subject, the invention also provides an intelligent door lock, wherein the first door lock comprises a memory and a processor, the memory is configured to store computer executable instructions, and the processor is configured to execute the computer executable instructions in the memory to execute the unlocking strategy configuration method.
The embodiment of the unlocking strategy configuration method of the intelligent door lock as the execution subject corresponds to the embodiment of the method of the door lock server and the first terminal as the execution subject, and the details of the method and the effect of the embodiment can be referred to the contents in the embodiment.
The core idea of the embodiment scheme of the invention is that the function of configuring the unlocking strategy of the intelligent door lock is realized by special equipment, and the unlocking strategy data set on the special equipment can be issued to each intelligent door lock in batches through the door lock server, so that the centralized configuration of the unlocking strategy of the intelligent door lock is realized, the management efficiency of the intelligent door lock is improved, and the management cost is reduced. A specific example is given below to illustrate the embodiment of the present invention.
For convenience of explanation, in this example, the door lock server (hereinafter referred to as a) is connected to a dedicated policy configuration terminal (hereinafter referred to as B) and 2 intelligent door locks (hereinafter referred to as C, D) via a network. The following processes are realized, namely, adding a new user in the door lock system and registering a fingerprint for the new user as an unlocking certificate, and the processes comprise the following steps:
(1) the system administrator starts B.
(2) And the system administrator inputs an administrator password on the B and enters a policy configuration interface.
(3) The system administrator creates a new user, i.e., a new unlocking user that needs to be configured into the smart door lock C, D, and enters information such as the user's name.
(4) And the system administrator adds a fingerprint unlocking Token for the newly added user.
(5) The newly added user enters his fingerprint using B.
(6) And B, the system administrator finishes the strategy configuration operation, and obtains strategy configuration data according to the operation of the system administrator, wherein the strategy configuration data comprises newly added user information and newly added fingerprint data thereof.
(7) B, encrypting the strategy configuration data by using a preset AES key; b, signing the strategy configuration data by using a preset RSA private key; b sends the encrypted and signed data to a over the network.
(8) And A, verifying the signature by using a preset RSA public key, and if the verification is successful, decrypting the policy configuration data by using a preset AES key and storing the policy configuration data.
(9) A encrypts the policy configuration data using a preset AES key, which may be the same as or different from that used in step (8). A signs the policy configuration data using a preset RSA private key.
(10) A sends the encrypted and signed policy configuration data to C and D through the network.
(11) And C and D respectively verifying the data signature, and if the data signature passes the verification, decrypting the strategy configuration data to obtain a strategy data plaintext and storing the strategy data plaintext.
Thus, one unlocking strategy configuration is completed, and the new user can use the fingerprint to unlock the lock on the C and the D.
The above-described embodiments are merely preferred embodiments of the present invention, and general changes and substitutions by those skilled in the art within the technical scope of the present invention are included in the protection scope of the present invention.

Claims (19)

1. An unlocking strategy configuration method is applied to a door lock server and comprises the following steps:
receiving unlocking strategy data configured on a first terminal from the first terminal and information of each intelligent door lock to be configured with an unlocking strategy; the first terminal is a special device for configuring an unlocking strategy for the intelligent door lock, and does not have a fixed corresponding or binding relationship with each intelligent door lock to be configured with the unlocking strategy;
and sending the unlocking strategy data to each intelligent door lock to be configured with an unlocking strategy based on the information of each intelligent door lock so as to configure the unlocking strategy of each intelligent door lock according to the received unlocking strategy data, wherein the unlocking strategy configured based on the unlocking strategy data in the intelligent door lock is at least applied to unlocking verification finished by the intelligent door lock or finished by interaction of the intelligent door lock and a door lock server in the unlocking process.
2. The method of claim 1, wherein the unlocking policy data includes one or more of a door lock management configuration, an unlocking validation rule, and an unlocking user configuration.
3. The method of claim 2, wherein the unlocking user configuration comprises adding a new user and an unlocking credential of the new user.
4. The method of claim 3, wherein the new user and the new user's unlocking credentials are used to be added to some or all of the smart door locks.
5. The method according to claim 1, wherein the unlocking strategy data configured from the first terminal is a first ciphertext obtained by encrypting through a first encryption key and signing through a first private key;
after receiving the unlocking strategy data configured from the first terminal, the method further comprises the following steps: and verifying the first ciphertext by using the first public key and decrypting by using the first decryption key to obtain the unlocking strategy data plaintext.
6. The method according to claim 1 or 5, wherein the step of sending unlocking strategy data to each intelligent door lock to be configured with an unlocking strategy comprises the following steps:
encrypting the unlocking strategy data by using a second encryption key and signing by using a second private key to obtain a second ciphertext; and sending the second ciphertext to each intelligent door lock to be configured with an unlocking strategy.
7. A door lock server, comprising a processor configured to execute predetermined computer-executable instructions to perform the unlocking policy configuration method of any one of claims 1-6.
8. An unlocking strategy configuration method is applied to a first terminal, wherein the first terminal is a special device used for configuring an unlocking strategy for an intelligent door lock, and has no fixed corresponding or binding relation with each intelligent door lock to be configured with the unlocking strategy, and the method comprises the following steps:
acquiring unlocking strategy data configured for each intelligent door lock to be configured with an unlocking strategy based on the operation of a management user;
and sending the unlocking strategy data and the information of each intelligent door lock to be configured with the unlocking strategy to a door lock server, so that the unlocking strategy data is configured into each intelligent door lock through the door lock server, wherein the unlocking strategy configured to the intelligent door lock is at least applied to unlocking verification finished by the intelligent door lock itself or finished by interaction of the intelligent door lock and the door lock server in the unlocking process.
9. The method of claim 8, wherein the unlocking policy data includes one or more of a door lock management configuration, an unlocking validation rule, and an unlocking user configuration.
10. The method of claim 9, wherein the unlocking user configuration comprises adding a new user and an unlocking credential of the new user.
11. The method of claim 10, wherein the new user and the new user's unlocking credentials are used to be added to some or all of the smart door locks.
12. The method of claim 8, wherein the unlocking strategy data sent to the door lock server is a first ciphertext encrypted by a first encryption key and signed by a first private key.
13. The method according to claim 8, wherein before configuring unlocking policy data for each intelligent door lock to be configured with an unlocking policy based on an operation of an administrative user, the method further comprises:
and acquiring the identity information of the current user, and verifying whether the current user is a legal management user or not based on the identity information.
14. A terminal device comprising a processor configured to execute predetermined computer-executable instructions to perform the unlocking policy configuration method of any one of claims 8-13.
15. An unlocking strategy configuration method is applied to an intelligent door lock and comprises the following steps:
receiving unlocking strategy data from a door lock server, wherein the unlocking strategy data are configured based on a first terminal and are provided to the door lock server by the first terminal; the first terminal is a special device for configuring an unlocking strategy for the intelligent door lock, and the intelligent door lock receiving unlocking strategy data does not have a fixed corresponding or binding relationship with the first terminal;
and configuring unlocking strategies according to the unlocking strategy data, wherein the unlocking strategies configured based on the unlocking strategy data are at least applied to unlocking verification finished by the intelligent door lock or finished by interaction of the intelligent door lock and a door lock server in the unlocking process.
16. The method of claim 15, wherein the unlocking policy data includes one or more of a door lock management configuration, an unlocking validation rule, and an unlocking user configuration.
17. The method of claim 16, wherein the unlocking user configuration comprises adding a new user and an unlocking credential of the new user.
18. The method of claim 15, wherein the unlocking strategy data from the door lock server is a second ciphertext obtained by encrypting the data with a second encryption key and signing the data with a second private key;
after receiving the unlocking strategy data, the method further comprises: and the second public key is used for verifying the second ciphertext and the second decryption key is used for decrypting to obtain the unlocking strategy data plaintext.
19. An intelligent door lock, comprising a processor configured to execute predetermined computer-executable instructions to perform the unlocking strategy configuration method of any of claims 15-18.
CN202010017009.9A 2020-01-08 2020-01-08 Unlocking strategy configuration method and equipment Active CN110807854B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010017009.9A CN110807854B (en) 2020-01-08 2020-01-08 Unlocking strategy configuration method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010017009.9A CN110807854B (en) 2020-01-08 2020-01-08 Unlocking strategy configuration method and equipment

Publications (2)

Publication Number Publication Date
CN110807854A true CN110807854A (en) 2020-02-18
CN110807854B CN110807854B (en) 2020-10-09

Family

ID=69493473

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010017009.9A Active CN110807854B (en) 2020-01-08 2020-01-08 Unlocking strategy configuration method and equipment

Country Status (1)

Country Link
CN (1) CN110807854B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112991599A (en) * 2021-03-25 2021-06-18 武汉虹信技术服务有限责任公司 Passage control method of multifunctional access control machine
CN113674455A (en) * 2021-08-13 2021-11-19 京东科技信息技术有限公司 Intelligent door lock remote control method, device, system, equipment and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104134261A (en) * 2014-08-05 2014-11-05 武汉百施达智能技术有限公司 Smartphone-based intelligent lock management system
CN104143230A (en) * 2014-07-29 2014-11-12 诚迈科技(南京)股份有限公司 Intelligent lock system
CN104898507A (en) * 2015-04-29 2015-09-09 德施曼机电(中国)有限公司 Bluetooth intelligent cloud lock system
CN106296899A (en) * 2016-08-02 2017-01-04 成都荷码科技有限公司 A kind of method that user account is unbinding with smart lock
KR101717992B1 (en) * 2015-11-23 2017-03-20 주식회사 에스씨테크원 System and method for controlling doorlock
CN106600780A (en) * 2016-12-14 2017-04-26 新开普电子股份有限公司 Address division and code division method for door lock
CN106683242A (en) * 2016-12-02 2017-05-17 歌尔科技有限公司 Intelligent lock system, intelligent lock and intelligent wearable equipment
CN106788531A (en) * 2016-12-19 2017-05-31 国网浙江杭州市富阳区供电公司 A kind of handheld terminal and system
CN107680009A (en) * 2017-10-20 2018-02-09 成都市红亿科技有限公司 The hotel management mechanism of batch remote management can be realized
WO2019098413A1 (en) * 2017-11-16 2019-05-23 주식회사 다자요 Digital door lock system and control method thereof

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104143230A (en) * 2014-07-29 2014-11-12 诚迈科技(南京)股份有限公司 Intelligent lock system
CN104134261A (en) * 2014-08-05 2014-11-05 武汉百施达智能技术有限公司 Smartphone-based intelligent lock management system
CN104898507A (en) * 2015-04-29 2015-09-09 德施曼机电(中国)有限公司 Bluetooth intelligent cloud lock system
KR101717992B1 (en) * 2015-11-23 2017-03-20 주식회사 에스씨테크원 System and method for controlling doorlock
CN106296899A (en) * 2016-08-02 2017-01-04 成都荷码科技有限公司 A kind of method that user account is unbinding with smart lock
CN106683242A (en) * 2016-12-02 2017-05-17 歌尔科技有限公司 Intelligent lock system, intelligent lock and intelligent wearable equipment
CN106600780A (en) * 2016-12-14 2017-04-26 新开普电子股份有限公司 Address division and code division method for door lock
CN106788531A (en) * 2016-12-19 2017-05-31 国网浙江杭州市富阳区供电公司 A kind of handheld terminal and system
CN107680009A (en) * 2017-10-20 2018-02-09 成都市红亿科技有限公司 The hotel management mechanism of batch remote management can be realized
WO2019098413A1 (en) * 2017-11-16 2019-05-23 주식회사 다자요 Digital door lock system and control method thereof

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112991599A (en) * 2021-03-25 2021-06-18 武汉虹信技术服务有限责任公司 Passage control method of multifunctional access control machine
CN113674455A (en) * 2021-08-13 2021-11-19 京东科技信息技术有限公司 Intelligent door lock remote control method, device, system, equipment and storage medium
CN113674455B (en) * 2021-08-13 2023-08-04 京东科技信息技术有限公司 Remote control method, device, system, equipment and storage medium for intelligent door lock

Also Published As

Publication number Publication date
CN110807854B (en) 2020-10-09

Similar Documents

Publication Publication Date Title
CN107070667B (en) Identity authentication method
CN107113315B (en) Identity authentication method, terminal and server
CN101828357B (en) Credential provisioning method and device
CN107358441B (en) Payment verification method and system, mobile device and security authentication device
US20180082050A1 (en) Method and a system for secure login to a computer, computer network, and computer website using biometrics and a mobile computing wireless electronic communication device
CN111614637A (en) Secure communication method and system based on software cryptographic module
EP2879421B1 (en) Terminal identity verification and service authentication method, system, and terminal
US8397281B2 (en) Service assisted secret provisioning
CN108540457B (en) Safety equipment and biological authentication control method and device thereof
US20180121636A1 (en) Authentication System
CN112396735B (en) Internet automobile digital key safety authentication method and device
CN110807854B (en) Unlocking strategy configuration method and equipment
WO2017216796A1 (en) System and methods for securing security processes with biometric data
CN110321682B (en) Unified identity authentication method and device based on UAF (Universal authentication framework) and IBC (identity based communication)
CN101282215A (en) Method and apparatus for distinguishing certificate
CN108964883B (en) Digital certificate storage and signature method taking smart phone as medium
US20090327704A1 (en) Strong authentication to a network
JP2003298574A (en) Electronic apparatus, authentication station, electronic apparatus authentication system, and electronic apparatus authentication method
JP6723422B1 (en) Authentication system
CN112184960B (en) Intelligent lock control method and device, intelligent lock system and storage medium
CN114885326A (en) Bank mobile operation safety protection method, device and storage medium
JP4372403B2 (en) Authentication system
CN111246480A (en) Application communication method, system, equipment and storage medium based on SIM card
JP2021111925A (en) Electronic signature system
CN111079109A (en) Local security authorization login method and system compatible with multiple browsers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee after: Beijing Shendun Technology Co.,Ltd.

Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.