CN111275855A - Door lock control method, device and system, electronic equipment and storage medium - Google Patents

Door lock control method, device and system, electronic equipment and storage medium Download PDF

Info

Publication number
CN111275855A
CN111275855A CN202010054611.XA CN202010054611A CN111275855A CN 111275855 A CN111275855 A CN 111275855A CN 202010054611 A CN202010054611 A CN 202010054611A CN 111275855 A CN111275855 A CN 111275855A
Authority
CN
China
Prior art keywords
user
door lock
key
target
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010054611.XA
Other languages
Chinese (zh)
Inventor
余百明
刘洪钊
唐杰
陈道远
韩乃安
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202010054611.XA priority Critical patent/CN111275855A/en
Publication of CN111275855A publication Critical patent/CN111275855A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application provides a door lock control method, device and system, electronic equipment and a storage medium, and belongs to the technical field of door locks. The method comprises the steps of acquiring environmental noise in a current scene when a control instruction sent by a user terminal is received, and obtaining environmental noise data; encrypting the environmental noise data to obtain a prompt key; sending a prompt key to the user terminal, wherein the prompt key is used for decrypting the prompt key by the user terminal to obtain environmental noise data, and generating a response key of the target user based on the user characteristic data and the environmental noise data of the target user; if the response key is received, decrypting the response key to obtain a decryption result; if the decryption result contains the environmental noise data, extracting the user characteristic data of the target user from the decryption result; and if the user characteristic data of the target user is found in the pre-stored user characteristic data, executing control operation corresponding to the control instruction so as to solve the problem of poor safety of the door lock.

Description

Door lock control method, device and system, electronic equipment and storage medium
Technical Field
The present application relates to the field of door lock technologies, and in particular, to a method, an apparatus, a system, an electronic device, and a storage medium for controlling a door lock.
Background
Different from mechanical unlocking by adopting a metal key, the door lock is unlocked by adopting a digital authentication mode, and the convenience of unlocking the door lock and the safety of the door lock can be ensured.
In the correlation technique, the door lock can carry out digital authentication based on sound wave, opens the door lock after the authentication passes, and concrete processing procedure is: when a user wants to unlock the door lock, the user can execute unlocking operation on the user terminal, and then the user terminal can acquire the voiceprint characteristics of the user, encrypt the voiceprint characteristics of the user and obtain the secret key. And then, the user terminal can perform sound wave coding on the secret key and send sound wave information subjected to sound wave coding to the door lock. The door lock can decode sound waves of sound wave information to obtain a secret key, then the secret key is decrypted by adopting a preset decryption algorithm to obtain the voiceprint characteristics of the user, and then the door lock can match the voiceprint characteristics of the user with the preset voiceprint characteristics. If the match is successful, the door lock may determine that the authentication is successful and unlock the door lock.
However, when the sound wave information sent by the user terminal is maliciously stolen by a lawbreaker, the door lock may unlock the door lock after receiving the copied sound wave information played by the lawbreaker, resulting in poor security of the door lock.
Disclosure of Invention
An object of the embodiments of the present application is to provide a method, an apparatus, a system, an electronic device, and a storage medium for controlling a door lock, so as to solve the problem of poor security of the door lock. The specific technical scheme is as follows:
in a first aspect, a door lock control method is provided, the method being applied to a door lock, the method including:
if a control instruction sent by a user terminal is received, acquiring environmental noise in the current scene to obtain environmental noise data;
encrypting the environmental noise data to obtain a prompt key;
sending the prompt key to the user terminal, wherein the prompt key is used for the user terminal to decrypt the prompt key to obtain the environmental noise data, and generating a response key of a target user based on user characteristic data of the target user who sends a control instruction and the environmental noise data;
if the response key is received, decrypting the response key to obtain a decryption result;
if the decryption result contains the environmental noise data, extracting user characteristic data of the target user from the decryption result;
and if the user characteristic data of the target user is found in the pre-stored user characteristic data, executing the control operation corresponding to the control instruction.
Optionally, the control instruction is an unlocking instruction, and the executing of the control operation corresponding to the control instruction includes:
determining target unlocking information corresponding to the target user in a pre-stored corresponding relationship between the user and the unlocking information;
and if the target unlocking information is matched with preset unlocking information, executing unlocking operation.
Optionally, the method further includes:
determining a target data conversion mode corresponding to the target user in a pre-stored corresponding relationship between the user and the data conversion mode;
performing data conversion on the target unlocking information by adopting the target data conversion mode to obtain converted unlocking information;
if the target unlocking information is matched with preset unlocking information, unlocking operation is executed, and the method comprises the following steps:
and if the converted unlocking information is consistent with the preset unlocking information, executing unlocking operation.
Optionally, the unlocking information includes a character combination, and characters in the character combination represent a high level or a low level.
Optionally, the sending the prompt key to the user terminal includes:
converting the prompt key into a first transmission signal of a preset type, wherein the first transmission signal of the preset type comprises one of an acoustic signal, an electric signal and an optical signal;
and sending the first transmission signal to the user terminal.
Optionally, the user characteristic data includes a voiceprint characteristic.
In a second aspect, a door lock control method is provided, where the method is applied to a user terminal, and the method includes:
responding to the control operation of a target user, and sending a control instruction to the door lock;
if a prompt key sent by the door lock is received, decrypting the prompt key to obtain environmental noise data;
encrypting the environmental noise data and the acquired user characteristic data of the target user to obtain a response key of the target user;
and sending the response key of the target user to the door lock so that the door lock decrypts the response key when receiving the response key to obtain a decryption result of the response key, extracting the user characteristic data of the target user from the decryption result of the response key when the decryption result of the response key contains the environmental noise data, and executing the control operation corresponding to the control instruction when the target user characteristic data is found in the pre-stored user characteristic data.
Optionally, the sending the response key of the target user to the door lock includes:
converting the response key of the target user into a second transmission signal of a preset type, wherein the second transmission signal of the preset type comprises one of an acoustic signal, an electric signal and an optical signal;
and sending the second transmission signal to the door lock.
In a third aspect, a door lock opening system is provided, which comprises a door lock and a user terminal, wherein the door lock is configured to perform the method steps of any of the first aspects, and the user terminal is configured to perform the method steps of any of the second aspects.
In a fourth aspect, there is provided a door lock control device applied to a door lock, the device including:
the acquisition module is used for acquiring the environmental noise in the current scene to obtain environmental noise data when receiving a control instruction sent by the user terminal;
the encryption module is used for encrypting the environmental noise data to obtain a prompt key;
a sending module, configured to send the hint key to the user terminal, where the hint key is used for the user terminal to decrypt the hint key to obtain the environmental noise data, and generate a response key of a target user based on user feature data of the target user who sends a control instruction and the environmental noise data;
the decryption module is used for decrypting the response key when the response key is received to obtain a decryption result;
the extraction module is used for extracting the user characteristic data of the target user from the decryption result when the decryption result contains the environmental noise data;
and the control module is used for executing the control operation corresponding to the control instruction when the user characteristic data of the target user is found in the pre-stored user characteristic data.
Optionally, the control instruction is an unlocking instruction, and the control module includes:
the first determining submodule is used for determining target unlocking information corresponding to the target user in a pre-stored corresponding relationship between the user and the unlocking information;
and the matching submodule is used for executing unlocking operation when the target unlocking information is matched with preset unlocking information.
Optionally, the control module further includes:
the second determining submodule is used for determining a target data conversion mode corresponding to the target user in the pre-stored corresponding relation between the user and the data conversion mode;
the first conversion submodule is used for performing data conversion on the target unlocking information in the target data conversion mode to obtain converted unlocking information;
and the matching submodule is also used for executing unlocking operation when the converted unlocking information is consistent with the preset unlocking information.
Optionally, the unlocking information includes a character combination, and characters in the character combination represent a high level or a low level.
Optionally, the sending module includes:
the second conversion submodule is used for converting the prompt key into a first transmission signal of a preset type, and the first transmission signal of the preset type comprises one of an acoustic signal, an electric signal and an optical signal;
and the sending submodule is used for sending the first transmission signal to the user terminal.
Optionally, the user characteristic data includes a voiceprint characteristic.
In a fifth aspect, a door lock control device is provided, where the device is applied to a user terminal, and the device includes:
the first sending module is used for responding to the control operation of a target user and sending a control instruction to the door lock;
the decryption module is used for decrypting the prompt key sent by the door lock when the prompt key is received to obtain environmental noise data;
the encryption module is used for encrypting the environmental noise data and the acquired user characteristic data of the target user to obtain a response key of the target user;
and the second sending module is used for sending the response key of the target user to the door lock so that the door lock decrypts the response key when receiving the response key to obtain a decryption result of the response key, extracts the user characteristic data of the target user from the decryption result of the response key when the decryption result of the response key contains the environmental noise data, and executes the control operation corresponding to the control instruction when the target user characteristic data is found in the pre-stored user characteristic data.
Optionally, the second sending module includes:
the conversion submodule is used for converting the response key of the target user into a second transmission signal of a preset type, wherein the second transmission signal of the preset type comprises one of an acoustic signal, an electric signal and an optical signal;
and the sending submodule is used for sending the second transmission signal to the door lock.
In a sixth aspect, an electronic device is provided, which includes a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory complete communication with each other through the communication bus;
a memory for storing a computer program;
a processor adapted to perform any of the method steps of the first aspect or any of the method steps of the second aspect when executing a program stored in the memory.
In a seventh aspect, the present application provides a computer readable storage medium having a computer program stored thereon, wherein the program is configured to, when executed by a processor, perform the method steps of any of the first aspects, or any of the second aspects.
In an eighth aspect, there is provided a computer program product containing instructions which, when run on a computer, cause the computer to perform any of the above described door lock control methods.
The embodiment of the application has the following beneficial effects:
the embodiment of the application provides a door lock control method, a door lock control device, a door lock control system, electronic equipment and a storage medium, and the door lock control method, the door lock control device, the door lock control system, the electronic equipment and the storage medium can acquire environmental noise in a current scene when receiving a control instruction sent by a user terminal, obtain environmental noise data, encrypt the environmental noise data to obtain a prompt key, and then send the prompt key to the user terminal. When receiving the response key sent by the user terminal, the response key may be decrypted to obtain a decrypted result, and then, when the decrypted result includes the environmental noise data, the user characteristic data of the target user who executes the control instruction may be extracted from the decrypted result. And then, when the user characteristic data of the target user is found in the pre-stored user characteristic data, executing the control operation corresponding to the control instruction.
After receiving the control instruction, the door lock can send the prompt key containing the environmental noise data to the user terminal, so that the user terminal can generate the response key containing the same environmental noise data based on the received prompt key, the uniqueness of the response key sent by the user terminal is ensured, the response key cannot be copied and cracked, and the safety of the door lock can be improved.
Of course, not all advantages described above need to be achieved at the same time in the practice of any one product or method of the present application.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
Fig. 1 is a flowchart of a door lock control method according to an embodiment of the present application;
fig. 2 is a flowchart of a door lock control method according to an embodiment of the present application;
fig. 3 is a flowchart of a door lock control method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a door lock control device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a door lock control device according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The embodiment of the application provides a door lock control method, which can be applied to a door lock, wherein the door lock can be any one of intelligent door locks with a door lock control function based on digital authentication in the related technology.
The following will describe a door lock control method applied to a door lock according to an embodiment of the present application in detail with reference to specific embodiments, as shown in fig. 1, the specific steps are as follows:
step 101, if a control instruction sent by a user terminal is received, collecting environmental noise in a current scene to obtain environmental noise data.
Wherein the door lock may contain an audio capture component.
In the implementation, when a user wants to unlock the door lock or sets unlocking information of the door lock, the user can send a control instruction to the door lock through the user terminal. The following will explain the specific processing procedure of the user terminal sending the control command in detail.
The door lock can acquire the environmental noise in the current scene through the audio acquisition component after receiving a control instruction sent by the user terminal, so as to obtain environmental noise data. The door lock may also store ambient noise data locally.
And 102, encrypting the environmental noise data to obtain a prompt key.
In implementation, the door lock may encrypt the ambient noise data by using a preset encryption algorithm to obtain an encryption result, and then the door lock may use the encryption result as a prompt key.
In the embodiment of the present application, the preset encryption algorithm may be any algorithm with an encryption function in the related art, and the door lock uses the specific processing procedure of encrypting the environmental noise data by using the preset encryption algorithm, and may refer to the processing procedure of encrypting the information by using any encryption algorithm in the related art, which is not described herein again.
Step 103, sending the prompt key to the user terminal.
The prompting key is used for the user terminal to decrypt the prompting key to obtain environmental noise data, and the response key of the target user is generated based on the user characteristic data and the environmental noise data of the target user sending the control command.
In an implementation, the door lock may convert the reminder key into a first transmission signal of a preset kind and then transmit the first transmission signal to the user terminal. The first transmission signal of the preset type comprises one of an acoustic signal, an electric signal and an optical signal.
Specifically, in a possible implementation manner, the first transmission signal may be an acoustic signal, the door lock may perform acoustic coding on the prompt key to obtain an acoustic signal representing the prompt key, and then the door lock may transmit the acoustic signal to the user terminal. In the embodiment of the present application, the acoustic signal may be in the form of ultrasonic waves.
In another possible implementation, the first transmission signal may be an optical signal, the door lock may optically encode the reminder key to obtain an optical signal representing the reminder key, and the door lock may then transmit the optical signal to the user terminal. In yet another possible implementation, the first transmission signal may be an electrical signal, the door lock may electrically encode the reminder key, resulting in an electrical signal representing the reminder key, and the door lock may then transmit the electrical signal to the user terminal.
After receiving the hint key, the user terminal may generate a response key for the target user based on the ambient noise data contained in the hint key and the user data characteristics of the target user. The user terminal may then send the response key of the target user to the door lock. The specific process of the user terminal generating the response key of the target user will be described in detail later.
And 104, if the response key is received, decrypting the response key to obtain a decryption result.
In implementation, if the response key is received, the door lock may decrypt the response key by using a preset decryption algorithm to obtain a decryption result.
In this embodiment of the application, the preset decryption algorithm may be a decryption algorithm corresponding to the preset encryption algorithm, and the specific processing procedure of decrypting the response key by using the preset decryption algorithm for the door lock may refer to the processing procedure of decrypting the information by using any one decryption algorithm in the related art, which is not described herein again.
Optionally, when performing data communication based on the sound wave, the door lock may convert the sound signal representing the response key into a digital signal representing the response key, and then decrypt the digital signal to obtain the response key.
Step 105, determine whether the decryption result includes the ambient noise data.
In practice, the door lock may determine whether the decryption result includes the ambient noise data, and if the decryption result includes the ambient noise data, the door lock may perform step 106, and if the decryption result does not include the ambient noise data, the door lock may perform step 109.
And 106, extracting the user characteristic data of the target user from the decryption result.
The user feature data may be a voiceprint feature or user-defined information set by a user, for example, the user-defined information may be a password string formed by combining a plurality of characters.
In implementation, the door lock may use data other than the ambient noise data in the decryption result as the user characteristic data of the target user.
In the embodiment of the application, if the decryption result contains the environmental noise data, it indicates that the received response key is sent by the user terminal of the target user, and therefore, the door lock can extract the user characteristic data of the target user from the decryption result.
And step 107, searching the user characteristic data of the target user in the pre-stored user characteristic data.
In an implementation, the door lock may obtain user characteristic data of a plurality of users, and then the door lock may search the user characteristic data of the target user from the user characteristic data of the plurality of users.
In the embodiment of the application, the door lock may acquire the user characteristic data of a plurality of users in a plurality of ways, for example, the door lock may locally store the user characteristic data of the plurality of users, the door lock may acquire the locally stored user characteristic data of the plurality of users, or a preset server may store the user characteristic data of the plurality of users, and the door lock may acquire the user characteristic data of the plurality of users from the server.
And step 108, if the user characteristic data of the target user is found in the user characteristic data of the plurality of users, executing the control operation corresponding to the control instruction.
In implementation, the door lock may directly perform the control operation corresponding to the control instruction, or the door lock may further verify the user and then perform the control operation corresponding to the control instruction.
Taking the control operation corresponding to the control instruction as the unlocking operation as an example, the door lock can directly unlock the door lock, the door lock can also acquire the unlocking information of the target user, the unlocking information is further verified, and the door lock is unlocked after the verification is passed.
If the user characteristic data of the target user is not found in the user characteristic data of the plurality of users, the door lock may perform step 109.
Step 109, do not follow-up processing or send the preset operation failure message to the user terminal.
In the embodiment of the application, when a control instruction sent by a user terminal is received, the environmental noise in the current scene is collected to obtain environmental noise data, the environmental noise data is encrypted to obtain the prompt key, and then the prompt key is sent to the user terminal. When receiving the response key sent by the user terminal, the response key may be decrypted to obtain a decrypted result, and then, when the decrypted result includes the environmental noise data, the user characteristic data of the target user who executes the control instruction may be extracted from the decrypted result. And then, when the user characteristic data of the target user is found in the pre-stored user characteristic data, executing the control operation corresponding to the control instruction.
After receiving the control instruction, the door lock can send the prompt key containing the environmental noise data to the user terminal, so that the user terminal can generate the response key containing the same environmental noise data based on the received prompt key, the uniqueness of the response key sent by the user terminal is ensured, the response key cannot be copied and cracked, and the safety of the door lock can be improved.
Optionally, to further improve the security of the door lock control, when the prompt key is generated, the door lock may generate a random key, and then the door lock may encrypt the random key and the environmental noise data by using a preset encryption algorithm to obtain an encryption result, and then the door lock may use the encryption result as the prompt key. Correspondingly, after the user terminal receives the prompt key and decrypts the prompt key to obtain the random key and the environmental noise data, the user terminal can encrypt the random key, the environmental noise data and the user characteristic data of the target user to obtain the response key of the target user.
Because the prompt secret key and the response secret key both comprise random secret keys, the difficulty of cracking the prompt secret key and the response secret key can be improved, and the safety of door lock control can be further improved.
Optionally, when the control instruction is an unlocking instruction, the embodiment of the present application provides a manner of further verifying unlocking information of a user, and when the verification is passed, the implementation manner of unlocking is performed, as shown in fig. 2, and includes the following steps:
step 201, in the pre-stored corresponding relationship between the user and the unlocking information, the target unlocking information corresponding to the target user is determined.
In implementation, the door lock can obtain the corresponding relationship between the user and the unlocking information by accessing the server, and then the door lock can use the unlocking information corresponding to the target user as the target unlocking information in the corresponding relationship between the user and the unlocking information.
Step 202, judging whether the target unlocking information is matched with the preset unlocking information.
In implementation, the door lock can calculate the matching degree of the target unlocking information and the preset unlocking information, if the matching degree is greater than a preset matching degree threshold value, the door lock can judge that the target unlocking information is matched with the preset unlocking information, and then the door lock can execute the step 3; if the matching degree is not greater than the preset matching degree threshold value, the door lock can determine that the target unlocking information is not matched with the preset unlocking information, and then the door lock can execute the step 4.
And step 203, executing unlocking operation.
And step 204, not performing subsequent processing or sending a preset operation failure message to the user terminal.
In the embodiment of the application, the door lock can determine the target unlocking information corresponding to the target user in the pre-stored corresponding relation between the user and the unlocking information, judge whether the target unlocking information is matched with the preset unlocking information, execute the unlocking operation when the target unlocking information is matched with the preset unlocking information, and do not perform subsequent processing or send the preset unlocking failure message to the user terminal when the target unlocking information is not matched with the preset unlocking information. Because when the target unlocking information is matched with the preset unlocking information, the unlocking operation is executed, so that the secondary verification of the target user based on the unlocking information can be realized, and the safety of the door lock can be further improved.
Optionally, the unlocking information includes a character combination, and characters in the character combination represent a high level or a low level.
For example, the unlocking information may be 101011, where 1 corresponds to high level and 0 corresponds to low level; alternatively, the unlocking information may be ababaa, where a corresponds to a high level and b corresponds to a low level.
In the related art, the unlocking information is a single character indicating a high level or a low level, and the door lock is easily opened by a potential change caused by the interference of the tesla coil. In the embodiment of the application, the unlocking information is set to be the character combination, and the characters in the character combination represent high level or low level, so that the condition that the door lock is opened due to the change of a single potential or a plurality of potentials can be avoided when the door lock is interfered by the Tesla coil. Further, the safety of the door lock can be improved.
Optionally, because the information of unblanking probably comprises the character of different forms, for the convenience of matchd target information of unblanking with preset information of unblanking, the lock can also carry out data conversion to target information of unblanking, and the target information of unblanking after the data conversion matches with preset information of unblanking, and specific processing procedure includes:
step 1, determining a target data conversion mode corresponding to a target user in a pre-stored corresponding relationship between the user and the data conversion mode.
In implementation, the door lock may store a correspondence between the user and the data conversion method locally or in the server, and the door lock may use the data conversion method corresponding to the target user as the target data conversion method in the correspondence between the user and the data conversion method.
For example, the target data conversion manner is that a corresponds to a character 1 indicating a high level and b corresponds to a character 0 indicating a low level.
And 2, performing data conversion on the target unlocking information by adopting a target data conversion mode to obtain converted unlocking information.
In implementation, the door lock may adopt a target data conversion method for each character included in the target unlocking information, perform data conversion on the character to obtain a character after data conversion, and determine the unlocking information after data conversion.
For example, the door lock may perform data conversion on the character a included in the target unlocking information ababaa by using a target data conversion method to obtain a character 1 after the data conversion; similarly, the door lock may perform data conversion on the character b included in the target unlocking information ababaa by using a target data conversion method, so as to obtain a character 0 after the data conversion. Thus, the converted unlocking information is 101011.
And 3, judging whether the converted unlocking information is consistent with preset unlocking information or not.
In the implementation, the door lock can judge whether the converted unlocking information is consistent with the preset unlocking information, and if the converted unlocking information is consistent with the preset unlocking information, the door lock can execute the step 4; if the converted unlocking information is inconsistent with the preset unlocking information, the door lock can execute the step 5.
For example, the door lock may determine that the converted unlocking information 101011 is not consistent with the preset unlocking information 101000, and the door lock may perform step 5.
And 4, executing unlocking operation.
And 5, not performing subsequent processing or sending a preset operation failure message to the user terminal.
In the embodiment of the application, the door lock can determine the target data conversion mode corresponding to the target user in the pre-stored corresponding relationship between the user and the data conversion mode, perform data conversion on the target unlocking information by adopting the target data conversion mode to obtain the converted unlocking information, and then judge whether the converted unlocking information is consistent with the preset unlocking information. Executing unlocking operation under the condition that the converted unlocking information is consistent with the preset unlocking information; and under the condition that the converted unlocking information is inconsistent with the preset unlocking information, carrying out no subsequent processing or sending a preset operation failure message to the user terminal.
Because the target data conversion mode corresponding to the target user is adopted to carry out data conversion on the target unlocking information, and the unlocking operation is executed when the converted unlocking information is consistent with the preset unlocking information, the unlocking information conversion and verification can be carried out by adopting the data conversion protocol customized by the user aiming at each user under the condition that lawless persons send error data conversion protocols to the door lock to interfere the control of the door lock, thereby ensuring the safety of the door lock.
Optionally, after the verification passes, the door lock can delete the environmental noise data, the prompt key and the response key which are collected and used in the door lock opening process, so that the door lock can be prevented from being sniffed and cracked in close-range monitoring, and the door lock opening safety can be improved.
The embodiment of the application further provides a door lock control method, which can be applied to a user terminal, where the user terminal can be an electronic device with a data processing function, for example, the user terminal can be a mobile phone, a tablet computer, a wearable electronic device, and the like. The user terminal can be pre-installed with a client for controlling the door lock.
The following will describe in detail a door lock control method applied to a user terminal according to an embodiment of the present application with reference to a specific embodiment, as shown in fig. 3, the specific steps are as follows:
step 301, responding to the control operation of the target user, and sending a control instruction to the door lock.
In implementation, when a user wants to unlock a door lock or set an unlock password of the door lock, the user may perform a control operation, where the control operation may be to click a preset button in a user terminal, and the control operation may also be to send a voice command.
The user terminal can send a control instruction to the door lock after detecting the control operation.
And step 302, if a prompt key sent by the door lock is received, decrypting the prompt key to obtain environmental noise data.
In implementation, after receiving the control instruction, the door lock may generate a prompt key, and then the door lock may send the prompt key to the user terminal. The specific processing procedure of the door lock generation prompting key may refer to the specific processing procedure of step 102, and is not described herein again.
If the user terminal receives the prompt key sent by the door lock, the user terminal can decrypt the prompt key by adopting a preset decryption algorithm to obtain the environmental noise data.
In this embodiment of the application, the preset decryption algorithm may be any algorithm with a decryption function in the related art, and the specific processing procedure in which the user terminal decrypts the hint key by using the preset decryption algorithm may refer to the processing procedure in which information is decrypted by using any decryption algorithm in the related art, which is not described herein again.
In this embodiment, the preset encryption algorithm may be an encryption algorithm corresponding to the preset decryption algorithm.
And step 303, encrypting the environmental noise data and the acquired user characteristic data of the target user to obtain a response key of the target user.
In implementation, the user terminal may obtain the user feature data of the target user in a plurality of ways, for example, the user terminal may obtain the user feature data of the target user, which is stored locally in advance, and the user terminal may also prompt the target user to input the user feature data, so as to obtain the user feature data of the target user.
Then, the user terminal may perform encryption processing on the environmental noise data and the obtained user characteristic data of the target user by using a preset encryption algorithm to obtain a response key of the target user.
Step 304, sending the response key of the target user to the door lock.
In implementation, similar to the sending manner of the prompt key, the user terminal may convert the response key of the target user into a second transmission signal of a preset type, and send the second transmission signal to the door lock. Wherein the second transmission signal of the preset kind comprises one of an acoustic signal, an electrical signal and an optical signal.
The user terminal can send the response key of the target user to the door lock, so that the door lock can decrypt the response key after receiving the response key to obtain a decryption result of the response key. Then, when the decryption result of the response key contains the environmental noise data, the user terminal may extract the user feature data of the target user from the decryption result of the response key, and execute the control operation corresponding to the control instruction when the target user feature data is found in the pre-stored user feature data.
The specific processing procedure of the door lock receiving the response key of the target user may refer to the specific processing procedures from step 104 to step 109, which are not described herein again.
In the embodiment of the application, the user terminal can respond to the control operation of the target user and send a control instruction to the door lock, and if the prompt key sent by the door lock is received, the prompt key is decrypted to obtain the environmental noise data. And then, encrypting the environmental noise data and the acquired user characteristic data of the target user to obtain a response key of the target user, and sending the response key of the target user to the door lock.
The user terminal can generate the response key containing the same environmental noise data based on the received prompt key, so that the response key sent by the user terminal is ensured to be unique and cannot be copied and cracked, and the safety of the door lock can be improved.
Optionally, when the control instruction is to set unlocking information of the door lock, the user terminal may further receive the unlocking information input by the user, send the unlocking information and the user identifier of the user to the door lock, and then the door lock may correspondingly store the user identifier and the unlocking information. In a feasible implementation manner, the user terminal may send the unlocking information and the user identifier of the user to a preset server, so that the server correspondingly stores the unlocking information and the user identifier of the user to obtain a corresponding relationship between the unlocking information and the user.
Optionally, the door lock and the user terminal may communicate in a full duplex communication manner, that is, the door lock receives data sent by the user terminal while sending data to the user terminal. Therefore, the data processing speed can be improved, and the door lock control speed can be improved.
Or, the door lock and the user terminal may also communicate in a half-duplex communication manner, which is not specifically limited in this embodiment of the present application.
Based on the same technical concept, the embodiment of the present application further provides a door lock control device, which is applied to a door lock, and as shown in fig. 4, the device includes:
the acquisition module 410 is configured to acquire environmental noise in a current scene when receiving a control instruction sent by a user terminal, so as to obtain environmental noise data;
the encryption module 420 is configured to encrypt the environmental noise data to obtain a prompt key;
a sending module 430, configured to send the hint key to the user terminal, where the hint key is used for the user terminal to decrypt the hint key to obtain the environmental noise data, and generate a response key of a target user based on user feature data of the target user who sends a control instruction and the environmental noise data;
the decryption module 440 is configured to, when the response key is received, perform decryption processing on the response key to obtain a decryption result;
an extracting module 450, configured to extract user feature data of the target user from the decryption result when the decryption result includes the ambient noise data;
the control module 460 is configured to execute a control operation corresponding to the control instruction when the user characteristic data of the target user is found in the pre-stored user characteristic data.
Optionally, the control instruction is an unlocking instruction, and the control module includes:
the first determining submodule is used for determining target unlocking information corresponding to the target user in a pre-stored corresponding relationship between the user and the unlocking information;
and the matching submodule is used for executing unlocking operation when the target unlocking information is matched with preset unlocking information.
Optionally, the control module further includes:
the second determining submodule is used for determining a target data conversion mode corresponding to the target user in the pre-stored corresponding relation between the user and the data conversion mode;
the first conversion submodule is used for performing data conversion on the target unlocking information in the target data conversion mode to obtain converted unlocking information;
and the matching submodule is also used for executing unlocking operation when the converted unlocking information is consistent with the preset unlocking information.
Optionally, the unlocking information includes a character combination, and characters in the character combination represent a high level or a low level.
Optionally, the sending module includes:
the second conversion submodule is used for converting the prompt key into a first transmission signal of a preset type, and the first transmission signal of the preset type comprises one of an acoustic signal, an electric signal and an optical signal;
and the sending submodule is used for sending the first transmission signal to the user terminal.
Optionally, the user characteristic data includes a voiceprint characteristic.
In the embodiment of the application, when a control instruction sent by a user terminal is received, the environmental noise in the current scene is collected to obtain environmental noise data, the environmental noise data is encrypted to obtain the prompt key, and then the prompt key is sent to the user terminal. When receiving the response key sent by the user terminal, the response key may be decrypted to obtain a decrypted result, and then, when the decrypted result includes the environmental noise data, the user characteristic data of the target user who executes the control instruction may be extracted from the decrypted result. And then, when the user characteristic data of the target user is found in the pre-stored user characteristic data, executing the control operation corresponding to the control instruction.
After receiving the control instruction, the door lock can send the prompt key containing the environmental noise data to the user terminal, so that the user terminal can generate the response key containing the same environmental noise data based on the received prompt key, the uniqueness of the response key sent by the user terminal is ensured, the response key cannot be copied and cracked, and the safety of the door lock can be improved.
Based on the same technical concept, an embodiment of the present application further provides a door lock control device, which is applied to a user terminal, and as shown in fig. 5, the door lock control device includes:
a first sending module 510, configured to send a control instruction to the door lock in response to a control operation of a target user;
the decryption module 520 is configured to, when receiving the prompt key sent by the door lock, decrypt the prompt key to obtain environmental noise data;
an encryption module 530, configured to encrypt the environmental noise data and the obtained user characteristic data of the target user to obtain a response key of the target user;
a second sending module 540, configured to send the response key of the target user to the door lock, so that the door lock decrypts the response key when receiving the response key, to obtain a decryption result of the response key, and when the decryption result of the response key includes the environmental noise data, extract the user feature data of the target user from the decryption result of the response key, and execute a control operation corresponding to the control instruction when the target user feature data is found in the pre-stored user feature data.
Optionally, the second sending module includes:
the conversion submodule is used for converting the response key of the target user into a second transmission signal of a preset type, wherein the second transmission signal of the preset type comprises one of an acoustic signal, an electric signal and an optical signal;
and the sending submodule is used for sending the second transmission signal to the door lock.
In the embodiment of the application, the user terminal can respond to the control operation of the target user and send a control instruction to the door lock, and if the prompt key sent by the door lock is received, the prompt key is decrypted to obtain the environmental noise data. And then, encrypting the environmental noise data and the acquired user characteristic data of the target user to obtain a response key of the target user, and sending the response key of the target user to the door lock.
The user terminal can generate the response key containing the same environmental noise data based on the received prompt key, so that the response key sent by the user terminal is ensured to be unique and cannot be copied and cracked, and the safety of the door lock can be improved.
Based on the same technical concept, the embodiment of the present application further provides an electronic device, as shown in fig. 6, including a processor 601, a communication interface 602, a memory 603 and a communication bus 604, where the processor 601, the communication interface 602 and the memory 603 complete communication with each other through the communication bus 604,
a memory 603 for storing a computer program;
the processor 601 is configured to implement the method steps of the door lock control method executed by the door lock or the method steps of the door lock control method executed by the user terminal when executing the program stored in the memory 603.
The communication bus mentioned in the electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface is used for communication between the electronic equipment and other equipment.
The Memory may include a Random Access Memory (RAM) or a Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component.
In another embodiment provided by the present application, a computer-readable storage medium is further provided, in which a computer program is stored, and the computer program, when executed by a processor, implements the steps of any of the above-mentioned door lock control methods.
In yet another embodiment provided by the present application, there is also provided a computer program product containing instructions which, when run on a computer, cause the computer to perform any of the door lock control methods of the above embodiments.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is merely exemplary of the present application and is presented to enable those skilled in the art to understand and practice the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (19)

1. A door lock control method, characterized in that the method is applied to a door lock, the method comprising:
if a control instruction sent by a user terminal is received, acquiring environmental noise in the current scene to obtain environmental noise data;
encrypting the environmental noise data to obtain a prompt key;
sending the prompt key to the user terminal, wherein the prompt key is used for the user terminal to decrypt the prompt key to obtain the environmental noise data, and generating a response key of a target user based on the user characteristic data of the target user sending the control instruction and the environmental noise data;
if the response key is received, decrypting the response key to obtain a decryption result;
if the decryption result contains the environmental noise data, extracting user characteristic data of the target user from the decryption result;
and if the user characteristic data of the target user is found in the pre-stored user characteristic data, executing the control operation corresponding to the control instruction.
2. The method according to claim 1, wherein the control instruction is an unlocking instruction, and the executing the control operation corresponding to the control instruction comprises:
determining target unlocking information corresponding to the target user in a pre-stored corresponding relationship between the user and the unlocking information;
and if the target unlocking information is matched with preset unlocking information, executing unlocking operation.
3. The method of claim 2, further comprising:
determining a target data conversion mode corresponding to the target user in a pre-stored corresponding relationship between the user and the data conversion mode;
performing data conversion on the target unlocking information by adopting the target data conversion mode to obtain converted unlocking information;
if the target unlocking information is matched with preset unlocking information, unlocking operation is executed, and the method comprises the following steps:
and if the converted unlocking information is consistent with the preset unlocking information, executing unlocking operation.
4. The method according to claim 2 or 3, wherein the unlocking information includes a character combination, and characters in the character combination represent a high level or a low level.
5. The method of claim 1, wherein the sending the hint key to the user terminal comprises:
converting the prompt key into a first transmission signal of a preset type, wherein the first transmission signal of the preset type comprises one of an acoustic signal, an electric signal and an optical signal;
and sending the first transmission signal to the user terminal.
6. The method of claim 1, wherein the user characteristic data comprises a voiceprint characteristic.
7. A door lock control method is applied to a user terminal, and comprises the following steps:
responding to the control operation of a target user, and sending a control instruction to the door lock;
if a prompt key sent by the door lock is received, decrypting the prompt key to obtain environmental noise data;
encrypting the environmental noise data and the acquired user characteristic data of the target user to obtain a response key of the target user;
and sending the response key of the target user to the door lock so that the door lock decrypts the response key when receiving the response key to obtain a decryption result of the response key, extracting the user characteristic data of the target user from the decryption result of the response key when the decryption result of the response key contains the environmental noise data, and executing the control operation corresponding to the control instruction when the target user characteristic data is found in the pre-stored user characteristic data.
8. The method of claim 7, wherein sending the response key of the target user to the door lock comprises:
converting the response key of the target user into a second transmission signal of a preset type, wherein the second transmission signal of the preset type comprises one of an acoustic signal, an electric signal and an optical signal;
and sending the second transmission signal to the door lock.
9. A door lock opening system, characterized in that the door lock opening system comprises a door lock and a user terminal, wherein the door lock is adapted to perform the method steps of any of the preceding claims 1-6, and the user terminal is adapted to perform the method steps of any of the preceding claims 7-8.
10. A door lock control apparatus, characterized in that the apparatus is applied to a door lock, the apparatus comprising:
the acquisition module is used for acquiring the environmental noise in the current scene to obtain environmental noise data when receiving a control instruction sent by the user terminal;
the encryption module is used for encrypting the environmental noise data to obtain a prompt key;
a sending module, configured to send the hint key to the user terminal, where the hint key is used for the user terminal to decrypt the hint key to obtain the environmental noise data, and generate a response key of a target user based on user feature data of the target user who sends a control instruction and the environmental noise data;
the decryption module is used for decrypting the response key when the response key is received to obtain a decryption result;
the extraction module is used for extracting the user characteristic data of the target user from the decryption result when the decryption result contains the environmental noise data;
and the control module is used for executing the control operation corresponding to the control instruction when the user characteristic data of the target user is found in the pre-stored user characteristic data.
11. The apparatus of claim 10, wherein the control command is an unlock command, and the control module comprises:
the first determining submodule is used for determining target unlocking information corresponding to the target user in a pre-stored corresponding relationship between the user and the unlocking information;
and the matching submodule is used for executing unlocking operation when the target unlocking information is matched with preset unlocking information.
12. The apparatus of claim 11, wherein the control module further comprises:
the second determining submodule is used for determining a target data conversion mode corresponding to the target user in the pre-stored corresponding relation between the user and the data conversion mode;
the first conversion submodule is used for performing data conversion on the target unlocking information in the target data conversion mode to obtain converted unlocking information;
and the matching submodule is also used for executing unlocking operation when the converted unlocking information is consistent with the preset unlocking information.
13. The apparatus according to claim 11 or 12, wherein the unlocking information includes a character combination, and a character in the character combination indicates a high level or a low level.
14. The apparatus of claim 10, wherein the sending module comprises:
the second conversion submodule is used for converting the prompt key into a first transmission signal of a preset type, and the first transmission signal of the preset type comprises one of an acoustic signal, an electric signal and an optical signal;
and the sending submodule is used for sending the first transmission signal to the user terminal.
15. The apparatus of claim 10, wherein the user characteristic data comprises a voiceprint characteristic.
16. A door lock control apparatus, wherein the apparatus is applied to a user terminal, the apparatus comprising:
the first sending module is used for responding to the control operation of a target user and sending a control instruction to the door lock;
the decryption module is used for decrypting the prompt key sent by the door lock when the prompt key is received to obtain environmental noise data;
the encryption module is used for encrypting the environmental noise data and the acquired user characteristic data of the target user to obtain a response key of the target user;
and the second sending module is used for sending the response key of the target user to the door lock so that the door lock decrypts the response key when receiving the response key to obtain a decryption result of the response key, extracts the user characteristic data of the target user from the decryption result of the response key when the decryption result of the response key contains the environmental noise data, and executes the control operation corresponding to the control instruction when the target user characteristic data is found in the pre-stored user characteristic data.
17. The apparatus of claim 16, wherein the second sending module comprises:
the conversion submodule is used for converting the response key of the target user into a second transmission signal of a preset type, wherein the second transmission signal of the preset type comprises one of an acoustic signal, an electric signal and an optical signal;
and the sending submodule is used for sending the second transmission signal to the door lock.
18. An electronic device is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface are used for realizing mutual communication by the memory through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any one of claims 1 to 6, or claims 7 to 8, when executing a program stored in a memory.
19. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method steps of claims 1 to 6 or of any of claims 7 to 8.
CN202010054611.XA 2020-01-17 2020-01-17 Door lock control method, device and system, electronic equipment and storage medium Pending CN111275855A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010054611.XA CN111275855A (en) 2020-01-17 2020-01-17 Door lock control method, device and system, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010054611.XA CN111275855A (en) 2020-01-17 2020-01-17 Door lock control method, device and system, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111275855A true CN111275855A (en) 2020-06-12

Family

ID=71003288

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010054611.XA Pending CN111275855A (en) 2020-01-17 2020-01-17 Door lock control method, device and system, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111275855A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111951435A (en) * 2020-07-17 2020-11-17 北京骑胜科技有限公司 Vehicle unlocking method and device, vehicle and storage medium
CN112765638A (en) * 2021-01-28 2021-05-07 武汉市博畅软件开发有限公司 Data encryption communication method and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN204375043U (en) * 2015-02-06 2015-06-03 北京博联科科技有限公司 Smart bluetooth is locked
CN105118117A (en) * 2015-07-30 2015-12-02 浪潮(北京)电子信息产业有限公司 Entrance guard identification device and method
CN105989643A (en) * 2015-02-03 2016-10-05 吉林省施泰信息技术股份有限公司 Communication encryption method used for electronic lock, electronic lock apparatus and system thereof
CN109147123A (en) * 2018-08-03 2019-01-04 北京旷视科技有限公司 Unlocking method, device, electronic equipment and the computer storage medium of door-control lock
CN109389711A (en) * 2018-08-31 2019-02-26 深圳壹账通智能科技有限公司 Gate inhibition's unlocking method, device, equipment and medium based on living things feature recognition
CN109961542A (en) * 2017-12-22 2019-07-02 国民技术股份有限公司 A kind of entrance guard device, verifying device, verifying system and its verification method
JP2019185605A (en) * 2018-04-16 2019-10-24 パスロジ株式会社 Authentication system, authentication method, and program

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105989643A (en) * 2015-02-03 2016-10-05 吉林省施泰信息技术股份有限公司 Communication encryption method used for electronic lock, electronic lock apparatus and system thereof
CN204375043U (en) * 2015-02-06 2015-06-03 北京博联科科技有限公司 Smart bluetooth is locked
CN105118117A (en) * 2015-07-30 2015-12-02 浪潮(北京)电子信息产业有限公司 Entrance guard identification device and method
CN109961542A (en) * 2017-12-22 2019-07-02 国民技术股份有限公司 A kind of entrance guard device, verifying device, verifying system and its verification method
JP2019185605A (en) * 2018-04-16 2019-10-24 パスロジ株式会社 Authentication system, authentication method, and program
CN109147123A (en) * 2018-08-03 2019-01-04 北京旷视科技有限公司 Unlocking method, device, electronic equipment and the computer storage medium of door-control lock
CN109389711A (en) * 2018-08-31 2019-02-26 深圳壹账通智能科技有限公司 Gate inhibition's unlocking method, device, equipment and medium based on living things feature recognition

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
初雪: "《计算机信息安全技术与工程实施》", 31 March 2019 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111951435A (en) * 2020-07-17 2020-11-17 北京骑胜科技有限公司 Vehicle unlocking method and device, vehicle and storage medium
CN112765638A (en) * 2021-01-28 2021-05-07 武汉市博畅软件开发有限公司 Data encryption communication method and system
CN112765638B (en) * 2021-01-28 2023-02-24 武汉市博畅软件开发有限公司 Data encryption communication method and system

Similar Documents

Publication Publication Date Title
AU2016217549B2 (en) Systems and methods for securely managing biometric data
CN104065653B (en) A kind of interactive auth method, device, system and relevant device
US20090158033A1 (en) Method and apparatus for performing secure communication using one time password
JP5088381B2 (en) Data communication method and system
CN110324143A (en) Data transmission method, electronic equipment and storage medium
CN106330442B (en) Identity authentication method, device and system
US9218473B2 (en) Creation and authentication of biometric information
EP1912151A1 (en) Biometric authentication system, enrollment terminal, authentication terminal and authentication server
WO2008149366A2 (en) Device method & system for facilitating mobile transactions
KR102578428B1 (en) Update biometric template protection key
CN109005144B (en) Identity authentication method, equipment, medium and system
CN111275855A (en) Door lock control method, device and system, electronic equipment and storage medium
CN108989331B (en) Use authentication method of data storage device, device and storage medium thereof
JPH10269182A (en) User authentication method and user authentication system
CN114547589A (en) Privacy-protecting user registration and user authentication method and device
CN114501431A (en) Message transmission method and device, storage medium and electronic equipment
CN113872989A (en) Authentication method and device based on SSL protocol, computer equipment and storage medium
CN110619228B (en) File decryption method, file encryption method, file management system and storage medium
JP2001052182A (en) Personal authenticating method and recording medium recording personal authentication program
CN112425116A (en) Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment
CN111698253A (en) Computer network safety system
CN111709000A (en) Encryption and decryption method based on multi-biological-feature fusion and application
CN107077558B (en) Authentication method and authentication device based on biological characteristics and electronic equipment
CN114360541A (en) Bluetooth voice system for remote controller development
CN113593088A (en) Intelligent unlocking method, intelligent lock, mobile terminal and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200612