CN110881182A - Terminal and intelligent Bluetooth lock checking method, Bluetooth lock and storage medium - Google Patents
Terminal and intelligent Bluetooth lock checking method, Bluetooth lock and storage medium Download PDFInfo
- Publication number
- CN110881182A CN110881182A CN201911192141.7A CN201911192141A CN110881182A CN 110881182 A CN110881182 A CN 110881182A CN 201911192141 A CN201911192141 A CN 201911192141A CN 110881182 A CN110881182 A CN 110881182A
- Authority
- CN
- China
- Prior art keywords
- bluetooth lock
- mobile terminal
- intelligent bluetooth
- cloud server
- check code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a method for checking a terminal and an intelligent Bluetooth lock, the intelligent Bluetooth lock and a storage medium, which comprises the following steps: the mobile terminal initiates an unlocking request to the intelligent Bluetooth lock; the intelligent Bluetooth lock receives the unlocking request, generates a unique identification code, sends the unique identification code to the mobile terminal and the cloud server, and sends a check code acquisition request to the cloud server; the mobile terminal acquires the unique identification code and initiates a check code acquisition request to the cloud server; the cloud server receives the check code acquisition request, generates a dynamic check code according to the unique identification code and returns the dynamic check code to the mobile terminal and the intelligent Bluetooth lock; the mobile terminal receives the dynamic check code and sends a data packet containing the dynamic check code to the intelligent Bluetooth lock; the intelligent Bluetooth lock receives the dynamic check code of the cloud server and the data packet of the mobile terminal, and checks; and if the verification is successful, executing an unlocking command. According to the invention, the security of the user for operating the intelligent lock is increased by checking the dynamic check codes of the cloud server and the mobile terminal.
Description
Technical Field
The invention relates to the technical field of intelligent lock development, in particular to a method for verifying a terminal and an intelligent Bluetooth lock, the intelligent Bluetooth lock and a storage medium.
Background
With the development of the AI technology, intelligent security is gradually developing, and the intelligent lock becomes the focus of intelligent security. The intelligent lock is of a type such as a digital lock, a fingerprint lock, a magnetic card lock, an IC card lock, a biological lock and the like. The application of intelligence bluetooth lock is also more and more extensive, and the user unlocks the intelligence lock through other bluetooth terminals. However, the existing intelligent bluetooth lock also has the following disadvantages: the password instruction is simple and traditional, is not hidden in operation and is easy to steal, the instruction is easy to intercept in the transmission process, and the password is pretended to be a user terminal for connection so as to tamper data and steal information.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention aims to provide a method for checking a terminal and an intelligent Bluetooth lock, the intelligent Bluetooth lock and a storage medium.
One of the purposes of the invention is realized by adopting the following technical scheme:
a method for verifying a terminal and an intelligent Bluetooth lock comprises a mobile terminal, the intelligent Bluetooth lock and a cloud server, and comprises the following steps:
s10, the mobile terminal is connected with the intelligent Bluetooth lock through Bluetooth and initiates an unlocking request to the intelligent Bluetooth lock;
s20, the intelligent Bluetooth lock receives the unlocking request, generates a unique identification code, sends the unique identification code to the mobile terminal and the cloud server, and sends a check code acquisition request to the cloud server;
s30, the mobile terminal acquires the unique identification code and initiates a check code acquisition request to the cloud server;
s40, the cloud server receives a check code acquisition request of the mobile terminal and the intelligent Bluetooth lock, and generates a dynamic check code according to the unique identification code and returns the dynamic check code to the mobile terminal and the intelligent Bluetooth lock;
s50, the mobile terminal receives the dynamic check code, sends a data packet containing the dynamic check code to the intelligent Bluetooth lock and requests a final unlocking command;
s60, the intelligent Bluetooth lock receives the dynamic check code of the cloud server and the data packet of the mobile terminal, and checking is carried out; and if the verification is successful, executing an unlocking command.
Further, the intelligent bluetooth lock in S60 is checked to determine whether the bluetooth instruction and the dynamic check code of the mobile terminal are consistent with the dynamic check code of the cloud server, and if so, an unlocking command is executed, and a successfully checked data packet is sent to the mobile terminal; and if the data packets are not consistent, the verification fails, and the data packets with the failed verification are sent to the mobile terminal.
And further, the method also comprises S70, polling and receiving the data packet of the callback of the intelligent Bluetooth lock by the mobile terminal, finishing the initiation of unlocking and the polling of the callback, and displaying an unlocking result.
Further, the dynamic check code is generated by performing byte replacement on the unique identification code by the cloud server according to a replacement rule.
Further, the unique identification code comprises a 13-bit time stamp and a 3-bit 0-100 random code.
Further, the mobile terminal and the intelligent Bluetooth lock are connected with a wireless network, and the cloud server is connected with the intelligent Bluetooth lock and the mobile terminal.
Further, the data packet of the mobile terminal further comprises a bluetooth instruction for controlling the intelligent bluetooth lock to be opened.
Further, still include: if the verification fails, the intelligent Bluetooth lock starts the camera device to record and sends the record to the cloud server.
The second purpose of the invention is realized by adopting the following technical scheme:
an intelligent Bluetooth lock comprises a lock body, a Bluetooth module, a processor, a memory and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the computer program to realize the method for checking the intelligent Bluetooth lock and the terminal.
The third purpose of the invention is realized by adopting the following technical scheme:
a storage medium having stored thereon a computer program which, when executed, implements a method of verifying a terminal with an intelligent bluetooth lock as described above.
Compared with the prior art, the invention has the beneficial effects that:
the invention provides a method for checking a terminal and an intelligent Bluetooth lock, the intelligent Bluetooth lock and a storage medium, wherein when a mobile terminal requests to open the intelligent Bluetooth lock, a cloud server generates a dynamic check code according to a unique identification code of the intelligent Bluetooth lock and sends the dynamic check code to the intelligent Bluetooth lock and the mobile terminal, and the intelligent Bluetooth lock checks the dynamic check code sent by the mobile terminal and the cloud server, so that the use safety of the intelligent Bluetooth lock is improved, and the problems that the existing Bluetooth lock in the market is easy to intercept instructions and steal information in the transmission process are solved.
Drawings
FIG. 1 is a schematic flow chart of a first embodiment of the present invention;
fig. 2 is a schematic structural diagram of a second embodiment of the present invention.
Detailed Description
The present invention will be further described with reference to the accompanying drawings and the detailed description, and it should be noted that any combination of the embodiments or technical features described below can be used to form a new embodiment without conflict.
Example one
As shown in fig. 1, the invention provides a method for checking a terminal and an intelligent bluetooth lock, which is implemented by a mobile terminal, the intelligent bluetooth lock and a cloud server. The mobile terminal and the intelligent Bluetooth lock are both connected with a wireless network, and the cloud server is connected with the mobile terminal and the intelligent Bluetooth lock through the wireless network. The method specifically comprises the following steps:
s10, the mobile terminal is connected with the intelligent Bluetooth lock through Bluetooth and initiates an unlocking request to the intelligent Bluetooth lock;
s20, the intelligent Bluetooth lock receives an unlocking request of the mobile terminal, generates a unique identification code and sends the unique identification code to the mobile terminal and the cloud server, and sends a check code acquisition request to the cloud server; the unique identification code comprises a 13-bit timestamp and a 3-bit 0-100 random code, so that the identification code of each unlocking request is randomly acquired, other people cannot acquire the identification code according to rules, and the safety of the intelligent Bluetooth lock is improved.
S30, the mobile terminal acquires the unique identification code of the intelligent Bluetooth lock and sends a check code acquisition request to the cloud server;
and S40, the cloud server receives a check code acquisition request of the mobile terminal and the intelligent Bluetooth lock, and generates a dynamic check code according to the unique identification code and returns the dynamic check code to the mobile terminal and the intelligent Bluetooth lock. Specifically, the cloud server receives a check code acquisition request of the mobile terminal, generates a first dynamic check code according to the unique identification code of the mobile terminal, and sends the first dynamic check code to the mobile terminal. The cloud server receives a cargo check code request of the intelligent Bluetooth lock, generates a second dynamic check code according to the unique identification code, and sends the second dynamic check code to the intelligent Bluetooth lock.
The dynamic check code is generated by the cloud server through byte replacement of the unique identification code according to a replacement rule. The replacement rule is stored in the cloud server, and in this embodiment, the cloud server may define 0 for 1, 2 for 3,3 for 4, and so on, to generate the dynamic check code. The replacement rule may be set by the user and stored in the cloud server, and is not limited. Because the unique identification code has uniqueness and randomness, even if the replacement rule is cracked by others, the accurate unique identification code cannot be acquired at the same time.
S50, the mobile terminal receives the first dynamic check code generated by the cloud server, sends a data packet containing the first dynamic check code and a Bluetooth instruction to the intelligent Bluetooth lock, and requests a final unlocking command; the Bluetooth instruction is used for controlling the intelligent Bluetooth lock to be opened by the mobile terminal.
S60, the intelligent Bluetooth lock receives the second dynamic verification code of the cloud server and the data packet of the mobile terminal, and verification is carried out; and if the verification is successful, executing an unlocking command. Checking whether a first dynamic check code of the mobile terminal is consistent with a second dynamic check code of the cloud server or not, if so, executing an unlocking command, and sending a data packet which is successfully checked to the mobile terminal; if the password is inconsistent, the verification fails, the data packet of the verification failure is sent to the mobile terminal, the intelligent Bluetooth lock starts the camera device to record the external condition of the intelligent door lock, the external condition of the intelligent door lock is uploaded to the cloud server to be shot, the user is informed to check and timely process the external condition of the intelligent door lock, and the safety performance of using the temporary password is improved.
In addition, after the verification result comes out, the method also comprises the following steps: and S70, the mobile terminal receives the data packet of the callback of the intelligent Bluetooth lock by polling, finishes initiating unlocking and receiving the callback polling, and displays the unlocking result.
When the mobile terminal requests to open the intelligent Bluetooth lock, the cloud server generates a dynamic check code according to the unique identification code of the intelligent Bluetooth lock and sends the dynamic check code to the intelligent Bluetooth lock and the mobile terminal, the dynamic check code sent by the mobile terminal and the cloud server is checked by the intelligent Bluetooth lock, the use safety of the intelligent Bluetooth lock is improved, and the problem that the existing Bluetooth lock in the market is easily intercepted in the transmission process and stolen with instructions is solved.
In addition, the invention also provides a storage medium, wherein the storage medium stores a computer program, and the computer program realizes the steps of the method for alarming the abnormality of the intelligent door lock system when being executed by the processor.
Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying computer program code, recording medium, U.S. disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution media, and the like. It should be noted that the computer-readable medium may contain any suitable combination of elements that may be modified in accordance with the requirements of statutory and patent practice in the jurisdiction, for example, in some jurisdictions, computer-readable media may not contain electrical carrier signals or telecommunications signals in accordance with statutory and patent practice.
The invention is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like, as in embodiment two.
Example two
An intelligent bluetooth lock, as shown in fig. 2, includes a lock body, a bluetooth module, a memory, a processor and a program stored in the memory, and is connected with a mobile terminal through the bluetooth module. The program is configured to be executed by a processor, and the processor executes the program to realize the steps of the method for checking the terminal and the intelligent Bluetooth lock.
The Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. The general processor can be a microprocessor or the processor can be any conventional processor and the like, the processor is a control center of the intelligent Bluetooth lock, and various interfaces and lines are used for connecting various parts of the intelligent Bluetooth lock.
The memory can be used for storing computer programs and/or modules, and the processor can realize various functions of the method for checking the terminal and the intelligent Bluetooth lock by running or executing the computer programs and/or modules stored in the memory and calling the data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program (such as a sound playing function, an image playing function, etc.) of the at least one function station advocate, and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, etc. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash-Card) at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
The above embodiments are only preferred embodiments of the present invention, and the protection scope of the present invention is not limited thereby, and any insubstantial changes and substitutions made by those skilled in the art based on the present invention are within the protection scope of the present invention.
Claims (10)
1. A method for checking a terminal and an intelligent Bluetooth lock is characterized by comprising a mobile terminal, the intelligent Bluetooth lock and a cloud server, and comprises the following steps:
s10, the mobile terminal is connected with the intelligent Bluetooth lock through Bluetooth and initiates an unlocking request to the intelligent Bluetooth lock;
s20, the intelligent Bluetooth lock receives the unlocking request, generates a unique identification code, sends the unique identification code to the mobile terminal and the cloud server, and sends a check code acquisition request to the cloud server;
s30, the mobile terminal acquires the unique identification code and initiates a check code acquisition request to the cloud server;
s40, the cloud server receives a check code acquisition request of the mobile terminal and the intelligent Bluetooth lock, and generates a dynamic check code according to the unique identification code and returns the dynamic check code to the mobile terminal and the intelligent Bluetooth lock;
s50, the mobile terminal receives the dynamic check code, sends a data packet containing the dynamic check code to the intelligent Bluetooth lock and requests a final unlocking command;
s60, the intelligent Bluetooth lock receives the dynamic check code of the cloud server and the data packet of the mobile terminal, and checking is carried out; and if the verification is successful, executing an unlocking command.
2. The method according to claim 1, wherein the intelligent bluetooth lock performs the verification in S60 to verify whether the bluetooth command and the dynamic check code of the mobile terminal are consistent with the dynamic check code of the cloud server, and if so, executes an unlocking command and sends a successfully verified data packet to the mobile terminal; and if the data packets are not consistent, the verification fails, and the data packets with the failed verification are sent to the mobile terminal.
3. The method for verifying the terminal and the intelligent bluetooth lock according to claim 2, further comprising S70, wherein the mobile terminal polls for receiving the callback data packet of the intelligent bluetooth lock, ends the polling of initiating unlocking and receiving the callback, and displays the unlocking result.
4. The method for checking a terminal and an intelligent bluetooth lock according to claim 1, wherein the dynamic check code is generated by a cloud server by performing byte replacement on the unique identification code according to a replacement rule.
5. The method for checking a terminal and an intelligent bluetooth lock according to claim 1, wherein the unique identification code comprises a 13-bit timestamp and a 3-bit random code of 0-100.
6. The method according to claim 1, wherein the mobile terminal and the smart bluetooth lock are both connected to a wireless network, and the cloud server is connected to the smart bluetooth lock and the mobile terminal.
7. The method as claimed in claim 1, wherein the data packet of the mobile terminal further includes a bluetooth command for controlling the intelligent bluetooth lock to open.
8. The method for verifying the terminal and the intelligent Bluetooth lock as claimed in claim 1, further comprising: if the verification fails, the intelligent Bluetooth lock starts the camera device to record and sends the record to the cloud server.
9. An intelligent Bluetooth lock, characterized in that it comprises a lock body, a Bluetooth module, a processor, a memory and a computer program stored in the memory and capable of running on the processor, wherein the processor implements the method for verifying the terminal and the intelligent Bluetooth lock according to any one of claims 1 to 8 when executing the computer program.
10. A storage medium having stored thereon a computer program which, when executed, implements a method of verifying a terminal with an intelligent bluetooth lock as claimed in any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911192141.7A CN110881182B (en) | 2019-11-28 | 2019-11-28 | Terminal and intelligent Bluetooth lock verification method, bluetooth lock and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911192141.7A CN110881182B (en) | 2019-11-28 | 2019-11-28 | Terminal and intelligent Bluetooth lock verification method, bluetooth lock and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110881182A true CN110881182A (en) | 2020-03-13 |
CN110881182B CN110881182B (en) | 2023-09-15 |
Family
ID=69730304
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911192141.7A Active CN110881182B (en) | 2019-11-28 | 2019-11-28 | Terminal and intelligent Bluetooth lock verification method, bluetooth lock and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110881182B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105447949A (en) * | 2015-12-30 | 2016-03-30 | 深圳市多度科技有限公司 | Intelligent access control system |
CN106293816A (en) * | 2016-08-02 | 2017-01-04 | 成都荷码科技有限公司 | A kind of method of the viscosity increasing the App that user installs with mobile intelligent terminal |
CN106296900A (en) * | 2016-08-02 | 2017-01-04 | 成都荷码科技有限公司 | A kind of method opening smart lock |
CN106898064A (en) * | 2017-01-09 | 2017-06-27 | 云丁网络技术(北京)有限公司 | A kind of generation method and its system of the off-line verification code based on intelligent door lock system |
CN107845169A (en) * | 2017-10-27 | 2018-03-27 | 张荣斌 | A kind of unlocking system and method for unlocking based on dynamic password |
CN108111998A (en) * | 2017-12-18 | 2018-06-01 | 北京博创联动科技有限公司 | A kind of wireless method for unlocking and system |
CN109102607A (en) * | 2018-08-09 | 2018-12-28 | 上海幸卓智能科技有限公司 | Method for unlocking coded lock, system, equipment, coded lock and server |
CN109243017A (en) * | 2018-08-22 | 2019-01-18 | 天网互联科技(深圳)有限公司 | A kind of bluetooth method for unlocking, device and computer readable storage medium |
US20190236874A1 (en) * | 2016-12-28 | 2019-08-01 | Jiangsu Hongbao Hardware Co., Ltd. | Systems and methods for unlocking a lock |
CN110276574A (en) * | 2019-03-27 | 2019-09-24 | 比奥香港有限公司 | A kind of safe delivery system, method, cloud server and electronic equipment |
-
2019
- 2019-11-28 CN CN201911192141.7A patent/CN110881182B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105447949A (en) * | 2015-12-30 | 2016-03-30 | 深圳市多度科技有限公司 | Intelligent access control system |
CN106293816A (en) * | 2016-08-02 | 2017-01-04 | 成都荷码科技有限公司 | A kind of method of the viscosity increasing the App that user installs with mobile intelligent terminal |
CN106296900A (en) * | 2016-08-02 | 2017-01-04 | 成都荷码科技有限公司 | A kind of method opening smart lock |
US20190236874A1 (en) * | 2016-12-28 | 2019-08-01 | Jiangsu Hongbao Hardware Co., Ltd. | Systems and methods for unlocking a lock |
CN106898064A (en) * | 2017-01-09 | 2017-06-27 | 云丁网络技术(北京)有限公司 | A kind of generation method and its system of the off-line verification code based on intelligent door lock system |
CN107845169A (en) * | 2017-10-27 | 2018-03-27 | 张荣斌 | A kind of unlocking system and method for unlocking based on dynamic password |
CN108111998A (en) * | 2017-12-18 | 2018-06-01 | 北京博创联动科技有限公司 | A kind of wireless method for unlocking and system |
CN109102607A (en) * | 2018-08-09 | 2018-12-28 | 上海幸卓智能科技有限公司 | Method for unlocking coded lock, system, equipment, coded lock and server |
CN109243017A (en) * | 2018-08-22 | 2019-01-18 | 天网互联科技(深圳)有限公司 | A kind of bluetooth method for unlocking, device and computer readable storage medium |
CN110276574A (en) * | 2019-03-27 | 2019-09-24 | 比奥香港有限公司 | A kind of safe delivery system, method, cloud server and electronic equipment |
Non-Patent Citations (2)
Title |
---|
邓婷: "基于移动互联网的动态密码电子锁的设计与实现", 《中国优秀硕士学位论文全文数据库(电子期刊)》 * |
邓婷: "基于移动互联网的动态密码电子锁的设计与实现", 《中国优秀硕士学位论文全文数据库(电子期刊)》, 15 June 2019 (2019-06-15) * |
Also Published As
Publication number | Publication date |
---|---|
CN110881182B (en) | 2023-09-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA3020059C (en) | Method and device for registering biometric identity and authenticating biometric identity | |
CN108965250B (en) | Digital certificate installation method and system | |
CN108964925B (en) | File authentication equipment method, device, equipment and readable medium | |
CN110222531A (en) | A kind of method, system and equipment accessing database | |
US20110162051A1 (en) | Authentication methods | |
CN111353176B (en) | Method and system for inquiring block chain data | |
CN112100594A (en) | Service processing method, device and equipment based on block chain | |
US7437563B2 (en) | Software integrity test | |
CN108616361B (en) | Method and device for identifying uniqueness of equipment | |
CN108600259B (en) | Authentication and binding method of equipment, computer storage medium and server | |
CN113792307A (en) | Seal management method and device and electronic equipment | |
CN110717770B (en) | Anti-counterfeiting detection method, device, equipment and storage medium for vehicle parts | |
CN110930552A (en) | Unlocking method, equipment and storage medium based on two-dimensional code | |
CN110881182B (en) | Terminal and intelligent Bluetooth lock verification method, bluetooth lock and storage medium | |
CN116244764A (en) | Method and system for generating device unique ID of Android device | |
CN114387137A (en) | Block chain-based electronic contract signing method, device, equipment and storage medium | |
CN105790946B (en) | Method, system and related equipment for establishing data channel | |
CN108449753B (en) | Method for reading data in trusted computing environment by mobile phone device | |
CN111161456A (en) | Setting method of intelligent lock, intelligent lock and storage medium | |
CN104134025A (en) | Mobile terminal locking method and device based on SIM cards and mobile terminal | |
CN113810413B (en) | Method, device and equipment for processing equipment account | |
CN117176472B (en) | Data tamper-proof method, device and system based on intelligent password security equipment | |
CN113643015B (en) | Method, device and system for managing account transfer | |
CN114039873B (en) | Audit method and operation and maintenance security audit system aiming at client type | |
US20230376703A1 (en) | Multiple identifiers of radio frequency identification (rfid) tags |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: No.1, No.2 highway, No.2, Panyu, Guangzhou Applicant after: Guangdong haomadame smart home Co.,Ltd. Address before: No.1, No.2 highway, No.2, Panyu, Guangzhou Applicant before: GUANGDONG KELAINI INTELLIGENT TECHNOLOGY Co.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |