CN111130602B - Near field communication card data writing system, method, device and medium - Google Patents

Near field communication card data writing system, method, device and medium Download PDF

Info

Publication number
CN111130602B
CN111130602B CN201911219603.XA CN201911219603A CN111130602B CN 111130602 B CN111130602 B CN 111130602B CN 201911219603 A CN201911219603 A CN 201911219603A CN 111130602 B CN111130602 B CN 111130602B
Authority
CN
China
Prior art keywords
near field
field communication
communication card
key data
door lock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911219603.XA
Other languages
Chinese (zh)
Other versions
CN111130602A (en
Inventor
李绍斌
唐杰
王春燕
陈道远
杨苗
周宝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201911219603.XA priority Critical patent/CN111130602B/en
Publication of CN111130602A publication Critical patent/CN111130602A/en
Application granted granted Critical
Publication of CN111130602B publication Critical patent/CN111130602B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K1/00Methods or arrangements for marking the record carrier in digital fashion
    • G06K1/12Methods or arrangements for marking the record carrier in digital fashion otherwise than by punching
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • H04B5/77
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means

Abstract

The invention relates to a system, a method, a device and a medium for writing data into a near field communication card. According to the scheme provided by the embodiment of the invention, the data can be rewritten into the NFC card through the interaction among the mobile terminal with the NFC function, the server and the intelligent door lock without using a card writer. Due to the popularity of the mobile terminal, the convenience of rewriting the NFC card is greatly improved, the NFC card can be rewritten in time without finding a card writer in a special place, and the problem of inconvenience in rewriting the NFC card is solved.

Description

Near field communication card data writing system, method, device and medium
Technical Field
The invention relates to the technical field of internet, in particular to a system, a method, a device and a medium for writing data into a near field communication card.
Background
The Near Field Communication (NFC) technology is developed by combining a wireless interconnection technology on the basis of a non-contact Radio Frequency Identification (RFID) technology, and provides a safe and rapid communication mode for various electronic products.
An Integrated Circuit (IC) card using NFC technology may be referred to as an NFC card. NFC cards may be used in a variety of scenarios, for example, in access control scenarios. The NFC card is safe and convenient for the key, and it is consuming time short to open the door, can not appear the key quality problem and block the condition of lock, consequently, more and more NFC cards are used for entrance guard.
The NFC card for entrance guard needs to rewrite data, for example, when the NFC card is returned after being lost or used by another person, the NFC card for entrance guard needs to rewrite data (rewrite the card) in order to ensure the security of the entrance guard, so as to prevent the NFC card from being copied.
When the NFC card is rewritten, the existing scheme can only rewrite the card through a special card writer, and if the user is an individual user, the user needs to go to a specific location to find the card writer to rewrite the card, for example, go to a property company to find the card writer to rewrite the card, which causes the problem of inconvenient card rewriting operation.
Disclosure of Invention
The embodiment of the invention provides a system, a method, a device and a medium for writing data into an NFC card, which are used for solving the problem of inconvenient card rewriting operation of the NFC card.
The invention provides a near field communication card data writing system, which comprises a mobile terminal with a near field communication function, a server and an intelligent door lock, wherein a client installed on the mobile terminal is bound with the intelligent door lock through a login account, and the system comprises:
the client is used for sending an identification verification request to the server, wherein the identification verification request carries the login account and a near field communication card identification in a near field communication card read through a near field communication function of the mobile terminal; the secret key data sent by the server are received, and the received secret key data and the read near field communication card identification are sent to the intelligent door lock; setting a success message according to the secret key sent by the intelligent door lock, clearing secret key data in the near field communication card through a near field communication function of the mobile terminal, and writing the received secret key data into the near field communication card;
the server is used for receiving the identification verification request, adding key data corresponding to the near field communication card identification carried in the identification verification request into a blacklist if the near field communication card identification is determined to belong to the determined near field communication card identification corresponding to the smart door lock bound to the login account, generating the key data for the near field communication card identification again, and sending the regenerated key data to the client; receiving a key verification request sent by the intelligent door lock, and if the key data carried in the key verification request belongs to the key data corresponding to the near field communication card identifier carried in the key verification request, sending a verification passing message to the intelligent door lock;
the intelligent door lock is used for receiving the secret key data and the near field communication card identification sent by the client side, sending a secret key verification request to the server, setting the received secret key data as legal secret key data if a secret key verification passing message sent by the server is received, and returning a secret key setting success message to the client side.
According to the scheme provided by the embodiment of the invention, the data can be rewritten into the NFC card through the interaction among the mobile terminal with the NFC function, the server and the intelligent door lock without using a card writer. Due to the popularity of the mobile terminal, the convenience of rewriting the NFC card is greatly improved, the NFC card can be rewritten in time without finding a card writer in a special place, and the problem of inconvenience in rewriting the NFC card is solved.
In a possible implementation scheme, the server is further configured to return an identifier verification failure message to the client if it is determined that the near field communication card identifier does not belong to the determined near field communication card identifier corresponding to the smart door lock bound to the login account;
the client is further configured to receive the identifier verification failure message, confirm that the card needs to be rewritten continuously according to the identifier verification failure message, and send a card rewriting continuous request to the server;
the server is further configured to establish a corresponding relationship between the near field communication card identifier carried in the identifier verification request and the smart door lock if a card rewriting continuation request sent by the client is received, add key data corresponding to the near field communication card identifier to a blacklist, regenerate the key data for the near field communication card identifier, and send the regenerated key data to the client.
That is, in the scheme provided in the embodiment of the present invention, if it is determined that the NFC card read by the mobile terminal is not a near field communication card corresponding to the smart door lock bound by the client installed on the mobile terminal through the login account, the client may also be prompted that the NFC card verification fails, and if the client confirms that the card needs to be rewritten, data rewriting to the NFC card may be continued. Therefore, the NFC cards corresponding to other intelligent door locks can be rewritten through data, the intelligent door lock bound by the client installed on the mobile terminal through the login account number is opened, misoperation on the NFC card is avoided, accuracy of card rewriting operation on the NFC card is improved, meanwhile, the application scene of card rewriting of the NFC card is expanded, and convenience of card rewriting of the NFC card is further improved.
The following describes the scheme provided by the embodiment of the present invention from the mobile terminal side.
The invention also provides a data writing method of the near field communication card, the method is applied to a client installed on a mobile terminal, the client is bound with the intelligent door lock through a login account, the mobile terminal has a near field communication function, and the method comprises the following steps:
sending an identification verification request to a server, wherein the identification verification request carries the login account and a near field communication card identification in a near field communication card read through a near field communication function of the mobile terminal;
receiving key data sent by the server;
sending the received key data and the read near field communication card identification to the intelligent door lock;
and if a successful key setting message sent by the intelligent door lock is received, clearing the key data in the near field communication card through the near field communication function of the mobile terminal, and writing the received key data into the near field communication card.
In one possible implementation manner, after sending the identifier verification request to the server and before receiving the key data sent by the server, the method further includes:
receiving an identification verification failure message sent by the server;
and if the verification fails according to the identification, confirming that the card needs to be rewritten continuously, and sending a card rewriting continuous request to the server.
The following describes the scheme provided by the embodiment of the invention from the server side.
The invention also provides a data writing method of the near field communication card, which is applied to a server and comprises the following steps:
receiving an identification verification request sent by a client, wherein the identification verification request carries a login account and a near field communication card identification;
if the near field communication card identification is determined to belong to the determined near field communication card identification corresponding to the intelligent door lock bound to the login account, adding key data corresponding to the near field communication card identification carried in the identification verification request into a blacklist, generating key data for the near field communication card identification again, and sending the generated key data to the client;
receiving a secret key verification request sent by an intelligent door lock, wherein the secret key verification request carries secret key data and a near field communication card identifier;
and if the key data carried in the key verification request belongs to the key data corresponding to the near field communication card identifier carried in the key verification request, sending a key verification passing message to the intelligent door lock.
In a possible implementation manner, if it is determined that the nfc card identifier carried in the identifier authentication request does not belong to the determined nfc card identifier corresponding to the smart door lock bound to the login account, the method further includes:
returning an identification verification failure message to the client;
and if a request for continuously rewriting the card sent by the client is received, establishing a corresponding relation between the near field communication card identifier carried in the identifier verification request and the intelligent door lock, adding the key data corresponding to the near field communication card identifier into a blacklist, generating the key data for the near field communication card identifier again, and sending the regenerated key data to the client.
The scheme provided by the embodiment of the invention is explained from the side of the intelligent door lock.
The invention also provides a data writing method of the near field communication card, which is applied to the intelligent door lock, wherein the intelligent door lock is bound with the client installed on the mobile terminal through a login account number, and the method comprises the following steps:
receiving secret key data and a near field communication card identifier sent by the client;
sending a key verification request to a server, wherein the key verification request carries the received key data and the received near field communication card identifier;
and if the received key verification passing message sent by the server is received, setting the received key data as legal key data, and returning a key setting success message to the client.
The invention also provides a client, which is installed on a mobile terminal with a near field communication function and is bound with the intelligent door lock through a login account, and the client comprises:
the sending module is used for sending an identification verification request to a server, wherein the identification verification request carries the login account and a near field communication card identification in a near field communication card read through a near field communication function of the mobile terminal; sending the secret key data received by the receiving module and the read near field communication card identification to the intelligent door lock;
the receiving module is used for receiving the key data sent by the server; receiving a key setting success message sent by the intelligent door lock;
and the writing module is used for clearing the secret key data in the near field communication card through the near field communication function of the mobile terminal and writing the secret key data received by the receiving module into the near field communication card if the receiving module receives the secret key setting success message sent by the intelligent door lock.
The present invention also provides a server, comprising:
the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving an identification verification request sent by a client, and the identification verification request carries a login account and a near field communication card identification; receiving a secret key verification request sent by the intelligent door lock, wherein the secret key verification request carries secret key data and a near field communication card identifier;
the identification determining module is used for determining whether the near field communication card identification belongs to the determined near field communication card identification corresponding to the intelligent door lock bound by the login account;
the secret key generation module is used for adding secret key data corresponding to the near field communication card identifier carried in the identifier verification request into a blacklist and generating secret key data for the near field communication card identifier again if the identifier determination module determines that the near field communication card identifier belongs to the determined near field communication card identifier corresponding to the smart door lock bound to the login account;
the sending module is used for sending the key data regenerated by the key generating module to the client; and if the key data carried in the key verification request belongs to the key data corresponding to the near field communication card identifier carried in the key verification request, sending a key verification passing message to the intelligent door lock.
The invention also provides an intelligent door lock, which is bound with a client installed on a mobile terminal through a login account number, and comprises the following steps:
the receiving module is used for receiving the secret key data and the near field communication card identification sent by the client; receiving a verification passing message sent by the server;
the sending module is used for sending a secret key verification request to the server, wherein the secret key verification request carries the received secret key data and the received near field communication card identifier; and if the receiving module receives the key verification passing message sent by the server, setting the received key data as legal key data, and returning a key setting success message to the client.
The present invention also provides a non-volatile computer storage medium having stored thereon an executable program for execution by a processor to implement the method as described above.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of an NFC card data writing system according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a data writing method for an NFC card according to a second embodiment of the present invention;
fig. 3 is a schematic flowchart of a data writing method for an NFC card according to a third embodiment of the present invention;
fig. 4 is a schematic flowchart of a data writing method for an NFC card according to a fourth embodiment of the present invention;
fig. 5 is a schematic flowchart of a data writing method for an NFC card according to a fifth embodiment of the present invention;
fig. 6 is a schematic structural diagram of a client according to a sixth embodiment of the present invention;
fig. 7 is a schematic structural diagram of a server according to a seventh embodiment of the present invention;
fig. 8 is a schematic structural diagram of an intelligent door lock according to an eighth embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that, the "plurality" or "a plurality" mentioned herein means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
The terms "first," "second," and the like in the description and in the claims, and in the drawings described above, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein.
Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example one
An NFC card data writing system according to an embodiment of the present invention may have a structure as shown in fig. 1, and includes a mobile terminal 11 (e.g., a mobile phone, a tablet computer, or a smart watch), a server 12, and a smart door lock 13, where a client 111 installed on the mobile terminal 11 is bound to the smart door lock 13 through a login account, where:
the client 111 is configured to send an identifier verification request to the server, where the identifier verification request carries the login account and a near field communication card identifier in a near field communication card read through a near field communication function of the mobile terminal; the secret key data sent by the server are received, and the received secret key data and the read near field communication card identification are sent to the intelligent door lock; setting a success message according to the secret key sent by the intelligent door lock, clearing secret key data in the near field communication card through a near field communication function of the mobile terminal, and writing the received secret key data into the near field communication card;
the server 12 is configured to receive the identifier verification request, add key data corresponding to the near field communication card identifier carried in the identifier verification request to a blacklist if it is determined that the near field communication card identifier belongs to the near field communication card identifier corresponding to the smart door lock bound to the determined login account, re-generate key data for the near field communication card identifier, and send the re-generated key data to the client; receiving a key verification request sent by the intelligent door lock, and if the key data carried in the key verification request belongs to the key data corresponding to the near field communication card identifier carried in the key verification request, sending a verification passing message to the intelligent door lock;
the smart door lock 13 is configured to receive the key data and the nfc card identifier sent by the client, send a key verification request to the server, where the key verification request carries the received key data and the received nfc card identifier, set the received key data as legal key data if a key verification passing message sent by the server is received, and return a key setting success message to the client.
It should be noted that the server 12 may determine the nfc card identifier corresponding to the smart door lock bound by the login account in the following manner:
and determining the bound intelligent door lock corresponding to the login account carried in the identification verification request according to the corresponding relation between the stored login account and the bound intelligent door lock, and determining the near field communication card identifier corresponding to the bound intelligent door lock corresponding to the login account carried in the identification verification request according to the corresponding relation between the stored intelligent door lock and the near field communication card identifier.
The server 12 may determine whether the key data carried in the key verification request belongs to the key data corresponding to the nfc card identifier carried in the key verification request by:
and determining whether the key data carried in the key verification request belongs to the key data corresponding to the near field communication card identifier carried in the key verification request according to the corresponding relationship between the stored NFC card identifier and the key data.
The server 12 is further configured to, if it is determined that the near field communication card identifier does not belong to the determined near field communication card identifier corresponding to the smart door lock bound to the login account, return an identifier verification failure message to the client;
the client 111 is further configured to receive the identifier verification failure message, determine that the card needs to be rewritten continuously according to the identifier verification failure message, and send a card rewriting continuous request to the server;
the server 12 is further configured to, if a request for continuously rewriting the card sent by the client is received, establish a correspondence between the near field communication card identifier carried in the identifier verification request and the smart door lock, add key data corresponding to the near field communication card identifier to a blacklist, regenerate the key data for the near field communication card identifier, and send the regenerated key data to the client.
It should be noted that, if the server rewrites the NFC card according to the request for continuously rewriting the card sent by the client, a correspondence between the NFC card identifier and the smart door lock needs to be further established, which can be understood as adding the NFC card identifier into the NFC card identifier corresponding to the smart door lock, and updating the NFC card identifier corresponding to the smart door lock, so that the server subsequently performs related operations according to the correspondence between the updated smart door lock and the near-field communication card identifier, for example, determining the near-field communication card identifier corresponding to the bound smart door lock corresponding to the login account carried in the identifier verification request.
Corresponding to the system provided in the first embodiment, the following method is provided.
Example two
An embodiment of the present invention provides a method for writing data into an NFC card, where the method is applied to a client installed on a mobile terminal, the client is bound to an intelligent door lock through a login account, the mobile terminal has a near field communication function, and a flow of steps of the method may be as shown in fig. 2, where the method includes:
step 101, sending an identification verification request to a server.
In this step, the client may send an identifier verification request to the server, where the identifier verification request carries the login account and the nfc card identifier in the nfc card read through the nfc function of the mobile terminal.
And step 102, receiving the key data sent by the server.
In this step, the client may receive the key data sent by the server.
The secret key data can be understood as secret key data generated for the near field communication card identifier again by adding the secret key data corresponding to the near field communication card identifier carried in the identifier verification request to a blacklist if the server determines that the near field communication card identifier belongs to the determined near field communication card identifier corresponding to the smart door lock bound to the login account.
And 103, sending the received key data and the read near field communication card identification to the intelligent door lock.
In this step, the client may send the received key data and the read near field communication card identifier to the smart door lock, so that after the validity of the key data is verified by the smart door lock, the key data is set as valid key data, and the smart door lock can be subsequently unlocked by the key data.
And step 104, rewriting the data.
In this step, if the client receives a successful key setting message sent by the smart door lock, the client can clear the key data in the near field communication card through the near field communication function of the mobile terminal, write the received key data into the near field communication card, and complete the card rewriting operation of the near field communication card, so that the near field communication card can unlock the smart door lock by using the rewritten key data, thereby ensuring the timeliness and convenience of the card rewriting operation and further ensuring the security of the smart door lock.
It should be noted that, after step 101 and before step 102, the present embodiment may further include the following steps:
step 102', receiving the identification verification failure message sent by the server.
In this step, the client may receive an identity verification failure message sent by the server. And can verify the failing message according to the received identification, confirm whether it needs to continue rewriting the card.
The message that the identification authentication fails can be understood as that the message is sent when the server determines that the near field communication card identification does not belong to the determined near field communication card identification corresponding to the smart door lock bound by the login account after receiving the identification authentication request.
If the client confirms that the card needs to be rewritten continuously, a continuous card rewriting request can be sent to the server. The server may proceed with step 102 in accordance with the resume rewrite card request. Of course, if the client confirms that the card does not need to be rewritten, the flow may be ended.
In a possible implementation manner, the client may verify that the failure message is received according to the identifier, prompt the user that the NFC card is not the NFC card matching the smart door lock, for example, display a dialog box in which a text prompt that the NFC card is not the NFC card matching the smart door lock failed is displayed, and may further ask the user whether the card rewriting operation needs to be continued, for example, display a dialog box including a continue button and an end button, and may confirm that the user needs to continue rewriting the card by clicking the continue button by the user, and confirm that the user does not need to continue rewriting the card by clicking the end button by the user. If it is determined that the card needs to be rewritten further, the client may send a request to the server to rewrite the card further.
It should be noted that, when the server generates the key data, it is necessary to establish a correspondence between the near field communication card identifier and the smart door lock, in addition to adding the key data corresponding to the near field communication card identifier carried in the identifier verification request to the blacklist, re-generating the key data for the near field communication card identifier, and sending the re-generated key data to the client.
EXAMPLE III
An embodiment of the present invention provides a method for writing data into an NFC card, where the method is applied to a server, and a flow of the steps of the method may be as shown in fig. 3, where the method includes:
step 201, receiving an identifier verification request sent by a client.
In this step, the server may receive an identifier verification request sent by the client, where the identifier verification request carries the login account and the nfc card identifier.
Step 202, determining whether the near field communication card identification is legal.
In this step, the server may determine that the nfc card identifier belongs to the determined nfc card identifier corresponding to the smart door lock bound to the login account, if the nfc card identifier does not belong to the determined nfc card identifier, the step 203 may be continuously performed, otherwise, the step 204 may be performed.
Step 203, an identification verification failure message is returned to the client.
If the server determines that the near field communication card identification does not belong to the determined near field communication card identification corresponding to the intelligent door lock bound by the login account, an identification verification failure message can be returned to the client so as to inform the client that the NFC card is not the NFC card matched with the intelligent door lock.
If a request for continuing rewriting the card is received, which is sent by the client, step 204 may be continuously executed, otherwise, the process may be ended.
And step 204, sending the regenerated key data to the client.
If it is determined that the near field communication card identifier belongs to the determined near field communication card identifier corresponding to the smart door lock bound to the login account, in this step, the server may add key data corresponding to the near field communication card identifier carried in the identifier verification request to a blacklist, generate key data for the near field communication card identifier again, and send the generated key data to the client.
If it is determined that the near field communication card identifier does not belong to the determined near field communication card identifier corresponding to the smart door lock bound to the login account, and a card rewriting request sent by the client is received, in this step, the server may establish a correspondence between the near field communication card identifier carried in the identifier verification request and the smart door lock, add key data corresponding to the near field communication card identifier to a blacklist, generate key data for the near field communication card identifier again, and send the generated key data to the client.
And step 205, receiving a key verification request sent by the intelligent door lock.
In this step, the server may receive a key verification request sent by the smart door lock, where the key verification request carries key data and the nfc card identifier.
Step 206, verifying the validity of the key.
In this step, the server may determine whether the key data carried in the key verification request belongs to the key data corresponding to the nfc card identifier carried in the key verification request, and if the key data belongs to the nfc card identifier carried in the key verification request, may send a key verification passing message to the smart door lock to notify that the key data of the smart door lock is legal, and if the key data does not belong to the nfc card identifier, may send a key verification failing message to the smart door lock to notify that the key data of the smart door lock is illegal, so that the smart door lock may execute a corresponding operation according to a verification result of the server on the validity of the key data.
Example four
A fourth embodiment of the present invention provides a method for writing data into an NFC card, where the method is applied to an intelligent door lock, and the intelligent door lock is bound to a client installed on a mobile terminal through a login account, and a flow of the steps of the method may be as shown in fig. 4, where the method includes:
step 301, receiving the key data and the near field communication card identifier sent by the client.
In this step, the smart door lock may receive the key data and the nfc card identifier sent by the client.
Step 302, sending a key verification request to the server.
In this step, the smart door lock may send a key verification request to the server, where the key verification request carries the received key data and the received nfc card identifier.
And step 303, receiving the verification message returned by the server.
In this step, the smart door lock may receive an authentication message returned by the server, and if the received authentication message is a key authentication pass message, in this step, the smart door lock may set the received key data as legal key data, and return a key setting success message to the client.
If the received verification message is a key verification failure message, in this step, the smart door lock may return a key illegal message to the client, so that the client ends the card rewriting process according to the key illegal message.
The methods provided in the second to fourth embodiments of the present invention are described below by way of a specific example.
EXAMPLE five
An embodiment of the present invention provides a data writing method for an NFC card, where a flow of the steps of the method may be as shown in fig. 5, and the method includes:
step 401, the client starts the card rewriting function.
In this step, the user can log in the client through the login information (login account and login password), and the client receives the login information to realize the user login.
After the user logs in, the client can start the card rewriting function. The client initiating the card re-write function may be triggered by the user, for example, by the user selecting the card re-write function in the client to trigger the client to begin re-writing the card.
It should be noted that, in order to implement the card rewriting of the client, in this step, the NFC card may be placed at a proper position, so that when the client rewrites the card, the mobile terminal where the client is located may read the NFC card through the NFC function.
Step 402, the client reads the NFC card.
In this step, the client may read the NFC card identifier and the key data in the NFC card through the NFC function of the mobile terminal.
Step 403, the client requests the server to perform NFC card verification.
In this step, the client may send an identifier verification request to the server, where the identifier verification request carries the login account and the read NFC card identifier.
Step 404, the client receives the NFC card verification result.
And if the server determines that the NFC card identification carried in the identification verification request does not belong to the NFC card identification corresponding to the intelligent door lock bound by the login account carried in the determined identification verification request, returning an identification verification failure message to the client side, wherein the identification verification failure message is failed.
After receiving the identification verification failure message, the client may prompt the user that the NFC card is not the NFC card matching the smart door lock, and may further ask the user whether the card rewriting operation needs to be continued, and if it is determined that the card rewriting operation needs to be continued, a card rewriting continuation request may be sent to the server, and the server continues to perform step 405, and if it is determined that the card rewriting operation does not need to be continued, the process may end.
It should be noted that, if the server determines that the NFC card identifier carried in the identifier authentication request belongs to the near field communication card identifier corresponding to the smart door lock bound to the login account carried in the determined identifier authentication request, the server may directly execute step 405.
It should be noted that, the server may determine the near field communication card identifier corresponding to the smart door lock bound to the login account carried in the identifier verification request in the following manner:
and determining the bound intelligent door lock corresponding to the login account carried in the identification verification request according to the corresponding relation between the stored login account and the bound intelligent door lock, and determining the near field communication card identifier corresponding to the bound intelligent door lock corresponding to the login account carried in the identification verification request according to the corresponding relation between the stored intelligent door lock and the near field communication card identifier.
Step 405, the server adds the original key data to the blacklist.
In this step, the server may add the key data corresponding to the NFC card identifier carried in the identifier verification request to the blacklist, and delete the door opening qualification of the key data.
Step 406, the server regenerates the key data.
In this step, the server may generate key data for the NFC card identifier in the identifier verification request again according to a key generation rule of the smart door lock, establish a corresponding relationship between the key data and the NFC card identifier, and send the generated key data to the client.
It should be noted that, if the server executes step 405 and step 406 according to the request for continuously rewriting the card sent by the client, in this step, it is also necessary to establish a corresponding relationship between the near field communication card identifier carried in the identifier verification request and the corresponding smart door lock.
After receiving the key data, the client may send the received key data and the read NFC card identifier to the smart door lock.
Step 407, the server performs a key validity verification.
After the smart door lock receives the key data and the NFC card identifier sent by the client, in this step, a key verification request may be sent to the server, where the key verification request carries the received key data and the received NFC card identifier.
After receiving the key verification request sent by the intelligent door lock, the server can verify the validity of the key. The method includes the steps that whether secret key data carried in a secret key verification request belong to secret key data corresponding to a near field communication card identifier carried in the secret key verification request or not can be determined according to the corresponding relation between a stored NFC card identifier and the secret key data, if the secret key data carried in the secret key verification request belong to the secret key data corresponding to the near field communication card identifier carried in the secret key verification request, a secret key verification passing message is sent to an intelligent door lock, otherwise, a secret key verification failing message can be sent to the intelligent door lock, so that the intelligent door lock returns a secret key illegal message to a client side, the client side can finish a card rewriting process according to the secret key illegal message.
And step 408, setting key data for the intelligent door lock.
In this step, if the smart door lock receives the key verification passing message, the received key data sent by the client may be set as legal key data, the smart door lock is allowed to be unlocked by using the key data, and a key setting success message may be returned to the client.
And step 409, rewriting data into the NFC card by the client.
In this step, the client may set a success message according to the key sent by the smart door lock, clear the key data in the NFC card through the NFC function of the mobile terminal, write the received key data sent by the server into the NFC card, and write the key data into the NFC card may be understood as writing the key data into the data block of the NFC card.
After the client writes the secret key data into the NFC card, the client can also prompt the user that the NFC card is successfully rewritten and prompt the user to take the NFC card away.
Based on the same inventive concept, embodiments of the present invention provide the following apparatus and medium.
EXAMPLE six
An embodiment of the present invention provides a client, where the client is installed on a mobile terminal having a near field communication function and is bound to an intelligent door lock through a login account, and a structure of the client may be as shown in fig. 6, where the structure includes:
the sending module 21 is configured to send an identifier verification request to a server, where the identifier verification request carries the login account and a near field communication card identifier in a near field communication card read through a near field communication function of the mobile terminal; sending the secret key data received by the receiving module and the read near field communication card identification to the intelligent door lock; the receiving module 22 is configured to receive key data sent by the server; receiving a key setting success message sent by the intelligent door lock; the writing module 23 is configured to clear the key data in the near field communication card through the near field communication function of the mobile terminal if the receiving module receives the key setting success message sent by the smart door lock, and write the key data received by the receiving module into the near field communication card.
The receiving module 22 is further configured to receive an identity verification failure message sent by the server; the sending module 21 is further configured to, if the verification fails according to the identifier, confirm that the card needs to be rewritten continuously, and send a request for rewriting the card continuously to the server.
EXAMPLE seven
A seventh embodiment of the present invention provides a server, a structure of which may be as shown in fig. 7, including:
the receiving module 31 is configured to receive an identifier verification request sent by a client, where the identifier verification request carries a login account and an nfc card identifier; receiving a secret key verification request sent by the intelligent door lock, wherein the secret key verification request carries secret key data and a near field communication card identifier; the identification determining module 32 is configured to determine whether the near field communication card identification belongs to the determined near field communication card identification corresponding to the smart door lock bound to the login account; the secret key generating module 33 is configured to add secret key data corresponding to the near field communication card identifier carried in the identifier verification request to a blacklist if the identifier determining module determines that the near field communication card identifier belongs to the determined near field communication card identifier corresponding to the smart door lock bound to the login account, and generate secret key data for the near field communication card identifier again; the sending module 34 is configured to send the key data regenerated by the key generating module to the client; and if the key data carried in the key verification request belongs to the key data corresponding to the near field communication card identifier carried in the key verification request, sending a key verification passing message to the intelligent door lock.
The sending module 34 is further configured to return an identifier verification failure message to the client if the identifier determining module determines that the near field communication card identifier carried in the identifier verification request does not belong to the determined near field communication card identifier corresponding to the smart door lock bound to the login account; the receiving module 31 is further configured to receive a card rewriting continuation request sent by the client; the secret key generating module 33 is further configured to, if the receiving module receives a request for continuously rewriting the card sent by the client, establish a correspondence between the near field communication card identifier carried in the identifier verification request and the smart door lock, add secret key data corresponding to the near field communication card identifier to a blacklist, and generate secret key data for the near field communication card identifier again.
Example eight
An eighth embodiment of the present invention provides an intelligent door lock, where the intelligent door lock is bound to a client installed on a mobile terminal through a login account, and a structure of the intelligent door lock may be as shown in fig. 8, where the structure includes:
the receiving module 41 is configured to receive the key data and the nfc card identifier sent by the client; receiving a verification passing message sent by the server; the sending module 42 is configured to send a key verification request to the server, where the key verification request carries the received key data and the received nfc card identifier; and if the receiving module receives the key verification passing message sent by the server, setting the received key data as legal key data, and returning a key setting success message to the client.
The ninth embodiment of the present invention provides a nonvolatile computer storage medium, where the computer storage medium stores an executable program, and when the executable program is executed by a processor, the method provided in the second to fourth embodiments of the present invention is implemented.
In particular implementations, computer storage media may include: various storage media capable of storing program codes, such as a Universal Serial Bus Flash Drive (USB), a mobile hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
In the embodiments of the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the described unit or division of units is only one division of logical functions, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical or other form.
The functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be an independent physical module.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, all or part of the technical solutions of the embodiments of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device, such as a personal computer, a server, or a network device, or a processor (processor) to execute all or part of the steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a Universal Serial Bus Flash Drive (usb Flash Drive), a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (11)

1. A near field communication card data writing system is characterized by comprising a mobile terminal with a near field communication function, a server and an intelligent door lock, wherein a client installed on the mobile terminal is bound with the intelligent door lock through a login account, and the near field communication card data writing system comprises:
the client is used for sending an identification verification request to the server, wherein the identification verification request carries the login account and a near field communication card identification in a near field communication card read through a near field communication function of the mobile terminal; the secret key data sent by the server are received, and the received secret key data and the read near field communication card identification are sent to the intelligent door lock; setting a success message according to the secret key sent by the intelligent door lock, clearing secret key data in the near field communication card through a near field communication function of the mobile terminal, and writing the received secret key data into the near field communication card;
the server is used for receiving the identification verification request, adding key data corresponding to the near field communication card identification carried in the identification verification request into a blacklist if the near field communication card identification is determined to belong to the determined near field communication card identification corresponding to the smart door lock bound to the login account, generating the key data for the near field communication card identification again, and sending the regenerated key data to the client; and receiving a key verification request sent by the intelligent door lock, and if the key data carried in the key verification request belongs to the key data corresponding to the near field communication card identifier carried in the key verification request, sending a key verification passing message to the intelligent door lock;
the intelligent door lock is used for receiving the secret key data and the near field communication card identification sent by the client side, sending a secret key verification request to the server, setting the received secret key data as legal secret key data if a secret key verification passing message sent by the server is received, and returning a secret key setting success message to the client side.
2. The system of claim 1, wherein the server is further configured to, if it is determined that the near field communication card identifier does not belong to the determined near field communication card identifier corresponding to the smart door lock bound to the login account, return an identifier verification failed message to the client;
the client is further configured to receive the identifier verification failure message, confirm that the card needs to be rewritten continuously according to the identifier verification failure message, and send a card rewriting continuous request to the server;
the server is further configured to establish a corresponding relationship between the near field communication card identifier carried in the identifier verification request and the smart door lock if a card rewriting continuation request sent by the client is received, add key data corresponding to the near field communication card identifier to a blacklist, regenerate the key data for the near field communication card identifier, and send the regenerated key data to the client.
3. A near field communication card data writing method is characterized in that the method is applied to a client installed on a mobile terminal, the client is bound with an intelligent door lock through a login account, the mobile terminal has a near field communication function, and the method comprises the following steps:
sending an identification verification request to a server, wherein the identification verification request carries the login account and a near field communication card identification in a near field communication card read through a near field communication function of the mobile terminal;
receiving key data sent by the server;
sending the received key data and the read near field communication card identification to the intelligent door lock;
and if a successful key setting message sent by the intelligent door lock is received, clearing the key data in the near field communication card through the near field communication function of the mobile terminal, and writing the received key data into the near field communication card.
4. The method of claim 3, wherein after sending an identity verification request to a server and before receiving key data sent by the server, the method further comprises:
receiving an identification verification failing message sent by the server, wherein the identification verification failing message is sent when the server determines that the near field communication card identification does not belong to the determined near field communication card identification corresponding to the intelligent door lock bound by the login account;
and if the verification fails according to the identification, confirming that the card needs to be rewritten continuously, and sending a card rewriting continuous request to the server.
5. A data writing method of a near field communication card is applied to a server and comprises the following steps:
receiving an identification verification request sent by a client, wherein the identification verification request carries a login account and a near field communication card identification;
if the near field communication card identification is determined to belong to the determined near field communication card identification corresponding to the intelligent door lock bound to the login account, adding key data corresponding to the near field communication card identification carried in the identification verification request into a blacklist, generating key data for the near field communication card identification again, and sending the generated key data to the client;
receiving a secret key verification request sent by an intelligent door lock, wherein the secret key verification request carries secret key data and a near field communication card identifier;
and if the key data carried in the key verification request belongs to the key data corresponding to the near field communication card identifier carried in the key verification request, sending a key verification passing message to the intelligent door lock.
6. The method of claim 5, wherein if it is determined that the nfc card identifier carried in the identifier authentication request does not belong to the determined nfc card identifier corresponding to the smart door lock bound to the login account, the method further comprises:
returning an identification verification failure message to the client;
and if a request for continuously rewriting the card sent by the client is received, establishing a corresponding relation between the near field communication card identifier carried in the identifier verification request and the intelligent door lock, adding the key data corresponding to the near field communication card identifier into a blacklist, generating the key data for the near field communication card identifier again, and sending the regenerated key data to the client.
7. A data writing method of a near field communication card is characterized in that the method is applied to an intelligent door lock, the intelligent door lock is bound with a client installed on a mobile terminal through a login account, and the method comprises the following steps:
receiving secret key data and a near field communication card identifier sent by the client;
sending a key verification request to a server, wherein the key verification request carries the received key data and the received near field communication card identifier;
and if the received key verification passing message sent by the server is received, setting the received key data as legal key data, and returning a key setting success message to the client.
8. The client is installed on a mobile terminal with a near field communication function, and is bound with an intelligent door lock through a login account, and the client comprises:
the sending module is used for sending an identification verification request to a server, wherein the identification verification request carries the login account and a near field communication card identification in a near field communication card read through a near field communication function of the mobile terminal; sending the secret key data received by the receiving module and the read near field communication card identification to the intelligent door lock;
the receiving module is used for receiving the key data sent by the server; receiving a key setting success message sent by the intelligent door lock;
and the writing module is used for clearing the secret key data in the near field communication card through the near field communication function of the mobile terminal and writing the secret key data received by the receiving module into the near field communication card if the receiving module receives the secret key setting success message sent by the intelligent door lock.
9. A server, characterized in that the server comprises:
the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving an identification verification request sent by a client, and the identification verification request carries a login account and a near field communication card identification; receiving a secret key verification request sent by the intelligent door lock, wherein the secret key verification request carries secret key data and a near field communication card identifier;
the identification determining module is used for determining whether the near field communication card identification belongs to the determined near field communication card identification corresponding to the intelligent door lock bound by the login account;
the secret key generation module is used for adding secret key data corresponding to the near field communication card identifier carried in the identifier verification request into a blacklist and generating secret key data for the near field communication card identifier again if the identifier determination module determines that the near field communication card identifier belongs to the determined near field communication card identifier corresponding to the smart door lock bound to the login account;
the sending module is used for sending the key data regenerated by the key generating module to the client; and if the key data carried in the key verification request belongs to the key data corresponding to the near field communication card identifier carried in the key verification request, sending a key verification passing message to the intelligent door lock.
10. The utility model provides an intelligence lock, its characterized in that, intelligence lock is bound through the login account number with the client-side of installing on mobile terminal, includes:
the receiving module is used for receiving the secret key data and the near field communication card identification sent by the client; receiving a key verification passing message sent by the server;
the sending module is used for sending a secret key verification request to the server, wherein the secret key verification request carries the received secret key data and the received near field communication card identifier; and if the receiving module receives the key verification passing message sent by the server, setting the received key data as legal key data, and returning a key setting success message to the client.
11. A non-transitory computer storage medium storing an executable program for execution by a processor to perform the method of any one of claims 3 to 7.
CN201911219603.XA 2019-12-03 2019-12-03 Near field communication card data writing system, method, device and medium Active CN111130602B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911219603.XA CN111130602B (en) 2019-12-03 2019-12-03 Near field communication card data writing system, method, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911219603.XA CN111130602B (en) 2019-12-03 2019-12-03 Near field communication card data writing system, method, device and medium

Publications (2)

Publication Number Publication Date
CN111130602A CN111130602A (en) 2020-05-08
CN111130602B true CN111130602B (en) 2021-01-29

Family

ID=70497230

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911219603.XA Active CN111130602B (en) 2019-12-03 2019-12-03 Near field communication card data writing system, method, device and medium

Country Status (1)

Country Link
CN (1) CN111130602B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111653013A (en) * 2020-06-02 2020-09-11 广东小天才科技有限公司 Target point arrival reminding system and method, wearable intelligent device and storage medium
CN112105003A (en) * 2020-09-15 2020-12-18 公牛集团股份有限公司 Data synchronization system, method and device of intelligent door lock and readable storage medium
CN112466014B (en) * 2020-12-15 2023-04-07 歌尔科技有限公司 Shared vehicle offline unlocking and authorization method, wearable device, terminal and system
CN114038094A (en) * 2021-11-05 2022-02-11 上海酉擎物联技术有限公司 Method for realizing NFC card standby key based on CCC application
CN116052306A (en) * 2022-12-27 2023-05-02 北京深盾科技股份有限公司 Door lock message pushing method, user terminal, server, intelligent door lock and medium

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102982592A (en) * 2011-09-06 2013-03-20 上海博路信息技术有限公司 NFC terminal electronic key
CN103366140A (en) * 2013-06-20 2013-10-23 李晓容 Card writing method and card writing device based on NFC (Near Field Communication)
US9313651B2 (en) * 2014-06-19 2016-04-12 Kabushiki Kaisha Toshiba Memory system and method of controlling memory system
CN104200410A (en) * 2014-08-30 2014-12-10 南京物联传感技术有限公司 NFC (Near Field Communication) hotel room card system and use method thereof
US10380546B2 (en) * 2015-10-08 2019-08-13 Shenzhen Wale Intelligent Systems Limited Intelligent display and self-serve experience system and method
CN205428003U (en) * 2016-03-29 2016-08-03 董自强 Prevent maloperation electronic lock with what handheld intelligent terminal unblanked
CN109285241A (en) * 2017-07-20 2019-01-29 深圳市智汇创科技有限公司 A kind of intelligent access control system
CN107464320A (en) * 2017-08-04 2017-12-12 深圳市鹏力凯科技有限公司 The intelligent door lock and system of a kind of high safety

Also Published As

Publication number Publication date
CN111130602A (en) 2020-05-08

Similar Documents

Publication Publication Date Title
CN111130602B (en) Near field communication card data writing system, method, device and medium
CN110111472B (en) Vehicle key control method and device
CN108880797B (en) Authentication method of Internet of things equipment and Internet of things equipment
CN110136306B (en) Vehicle key control method and system
US9734091B2 (en) Remote load and update card emulation support
CN110103883B (en) Vehicle key control method and device
CN104375836A (en) Method and device for showing lock screen window
CN104169952A (en) Network payment method, device and system
CN106503492A (en) A kind of authorization management method, server, customer equipment and system
CN104182874A (en) All-purpose card device, all-purpose card system and card information loading method
CN102930435A (en) Authentication method and system for mobile payment
CN105225359A (en) Nothing based on Quick Response Code blocks withdraw the money method and finger print identifying server
CN104038924A (en) Method and system for achieving resource exchange information processing
CN109587164A (en) A kind of information encrypting transmission method, device, equipment and storage medium
CN104363589A (en) Identity authentication method, device and terminal
CN107995200B (en) Certificate issuing method, identity authentication method and system based on smart card
CN110942537B (en) Intelligent door lock unlocking system, method, device and medium
CN105913508B (en) A kind of Work attendance method based on intelligent NFC label
CN104572135A (en) Command processing method, command processing device and terminal
CN107947934B (en) Fingerprint identification and authentication system and method of mobile terminal based on bank system
CN112422281B (en) Method and system for changing secret key in security module
CN103248487A (en) Near field communication authentication method, certificate authorization center and near field communication equipment
CN114445071A (en) Payment method, payment device, computer-readable storage medium and electronic equipment
CN102880819A (en) Password setting method and system for users outside system and password setting center
CN102122332A (en) Method and system for managing password of electronic signing tool

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant