CN111583451A - Identity verification method and device of electronic lock, computer equipment and storage medium - Google Patents

Identity verification method and device of electronic lock, computer equipment and storage medium Download PDF

Info

Publication number
CN111583451A
CN111583451A CN202010274989.0A CN202010274989A CN111583451A CN 111583451 A CN111583451 A CN 111583451A CN 202010274989 A CN202010274989 A CN 202010274989A CN 111583451 A CN111583451 A CN 111583451A
Authority
CN
China
Prior art keywords
electronic lock
user
mobile phone
phone number
binding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010274989.0A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhou Topband Electronic Technology Co Ltd
Original Assignee
Huizhou Topband Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou Topband Electronic Technology Co Ltd filed Critical Huizhou Topband Electronic Technology Co Ltd
Priority to CN202010274989.0A priority Critical patent/CN111583451A/en
Publication of CN111583451A publication Critical patent/CN111583451A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)

Abstract

The invention is suitable for the technical field of safety, and provides an identity verification method and device of an electronic lock, computer equipment and a storage medium, wherein a cloud server sends prompt information for requesting to input user biological characteristic information and original binding mobile phone number information to a client user when receiving an electronic lock rebinding application sent by the client user; and when the fact that the user biological characteristic information corresponding to the originally-bound mobile phone number information stored locally is consistent with the user biological characteristic information input by the client user is detected, the cloud server binds the electronic lock by using the newly-bound mobile phone number information. According to the technical scheme, the cloud binding information can be reset through the biological characteristic information of the user under the condition that the mobile phone of the user is lost, so that the normal use of the electronic lock is ensured; and the manager who need not through the high in the clouds platform carries out artifical audit, alright continue normal use after binding again, when guaranteeing the security, improved the convenience of use.

Description

Identity verification method and device of electronic lock, computer equipment and storage medium
Technical Field
The invention belongs to the technical field of safety, and particularly relates to an identity verification method and device of an electronic lock, computer equipment and a storage medium.
Background
With the continuous development of global science and technology and the continuous improvement of technology, the standards of people for safety requirements are also gradually improved. In order to meet the demands of consumers, researchers have made a lot of research and development work in the field of safety technology, and have made considerable research and development results in recent years. More and more door control locks with higher safety performance and convenient and quick use appear in the market, and meet the high-end safety requirements of part of consumers to a certain extent.
At present, the traditional mechanical lock is gradually replaced by the electronic lock with the anti-theft alarm function, and the electronic lock can avoid potential safety hazards caused by imitation of keys. Moreover, the electronic lock only needs to remember a group of passwords or unlock the electronic lock through the biological characteristics of a user, and a traditional metal key does not need to be carried, so that the convenience is greatly improved. At present, the electronic lock is widely applied to life and work of people, and plays a very important role in business and office as well as home life of people.
The inventor finds that the existing electronic lock is generally bound with the mobile phone of the user in the process of researching and developing the electronic lock, and if the mobile phone of the user is lost, the corresponding mobile phone number of the user is also lost. At this time, if the electronic lock is to be reused, the user is required to declare the electronic lock to the background, and then the background manager performs manual review on the declared content, and after the manual review of the background is passed, the electronic lock can be bound again. However, this method is undoubtedly complicated to operate, and cannot achieve synchronous unlocking, and the operation convenience is poor.
Disclosure of Invention
The embodiment of the invention provides an identity verification method and device of an electronic lock, computer equipment and a storage medium, and aims to solve the problems that after a mobile phone of a user is lost, the user needs to manually apply a complaint to a background to request for verification if the user wants to reuse the electronic lock, so that the operation is complicated and the convenience is poor in the conventional electronic lock.
The embodiment of the invention is realized in such a way, and provides an identity authentication method of an electronic lock, wherein the method comprises the following steps:
when an electronic lock rebinding application sent by a client user is received, sending prompt information for asking for inputting user biological characteristic information and original binding mobile phone number information to the client user; the electronic lock rebinding application comprises information of a newly bound mobile phone number;
acquiring user biological characteristic information and original binding mobile phone number information input by the client user;
detecting whether the user biological characteristic information which is locally stored and corresponds to the original binding mobile phone number information is consistent with the user biological characteristic information input by the client user;
and if the electronic lock is consistent with the electronic lock, using the newly bound mobile phone number information to bind the electronic lock.
Further, before receiving an electronic lock rebinding application sent by a client user, the method further includes:
receiving an electronic lock binding application sent by the client user, wherein the electronic lock binding application comprises first binding mobile phone number information;
generating a verification code corresponding to the electronic lock binding application, and sending the verification code to the client user, so that the client user inputs the verification code into the electronic lock, and verifies whether the verification code is successfully verified through the electronic lock;
and if the electronic lock successfully verifies the verification code, determining that the first-time binding of the mobile phone number information and the electronic lock is successful.
Still further, after the client user enters the verification code into the electronic lock, the method further comprises:
receiving the verification code sent by the electronic lock;
verifying whether the received verification code is consistent with the generated verification code;
and if the first binding mobile phone number information is consistent with the electronic lock, determining that the first binding mobile phone number information is successfully bound with the electronic lock.
Furthermore, after determining that the first-time binding of the mobile phone number information and the electronic lock is successful, the method further includes:
sending prompt information for asking to input user biological characteristic information to the client user;
acquiring user biological characteristic information input by the client user;
and binding the user biological characteristic information, the first binding mobile phone number information and the electronic lock.
Furthermore, the user biological characteristic information is user face authentication information and/or user fingerprint authentication information.
The embodiment of the invention also provides an identity verification device of the electronic lock, wherein the device comprises:
the sending unit is used for sending prompt information for asking for inputting user biological characteristic information and original binding mobile phone number information to the client user when receiving an electronic lock rebinding application sent by the client user; the electronic lock rebinding application comprises information of a newly bound mobile phone number;
the acquisition unit is used for acquiring the user biological characteristic information and the original binding mobile phone number information input by the client user;
the detection unit is used for detecting whether the locally stored user biological characteristic information corresponding to the original binding mobile phone number information is consistent with the user biological characteristic information input by the client user;
and the binding unit is used for binding the electronic lock by using the newly bound mobile phone number information if the locally stored user biological characteristic information corresponding to the originally bound mobile phone number information is consistent with the user biological characteristic information input by the client user.
Furthermore, the identity verification device of the electronic lock further comprises:
the receiving unit is used for receiving an electronic lock binding application sent by the client user, wherein the electronic lock binding application comprises first binding mobile phone number information;
the generating unit is used for generating a verification code corresponding to the electronic lock binding application and sending the verification code to the client user, so that the client user inputs the verification code into the electronic lock and verifies whether the verification code is verified successfully through the electronic lock;
and the determining unit is used for determining that the first-time binding of the mobile phone number information and the electronic lock is successful if the electronic lock successfully verifies the verification code.
Furthermore, the identity verification device of the electronic lock further comprises:
the receiving unit is further used for receiving the verification code sent by the electronic lock;
the verification unit is used for verifying whether the received verification code is consistent with the generated verification code;
the determining unit is further configured to determine that the first-time binding of the mobile phone number information and the electronic lock is successful if the received verification code is consistent with the generated verification code.
The embodiment of the present invention further provides a computer device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the method for authenticating the electronic lock as described above when executing the computer program.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored, where the computer program, when executed by a processor, implements an authentication method for an electronic lock as described above.
Compared with the prior art that manual review needs to be performed by background management personnel when the electronic lock is used after the mobile phone is lost, the identity verification method, the identity verification device, the computer equipment and the storage medium of the electronic lock provided by the invention have the advantages that the user biological characteristic information corresponding to the client user is unique, the unique biological characteristic information of the user can be used as an identity identification basis under the condition that the mobile phone of the user is lost, and particularly, when the biological characteristic information input by the user is detected to be consistent with the user biological characteristic information corresponding to the original binding mobile phone number information, the cloud server can rebind the newly bound mobile phone number information to the current electronic lock. It can be understood that, because the whole re-binding process is completed by calling and judging the cloud server data and a background manual auditing program is not introduced, the complex auditing process is effectively avoided, and the timeliness and the convenience are improved while the safety is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings required in the description of the embodiments or the prior art will be briefly described below. It is obvious that the drawings in the following description are only embodiments of the invention, and that other drawings can be derived from the provided drawings by a person skilled in the art without inventive effort.
Fig. 1 is a schematic flowchart of an authentication method of an electronic lock according to a first embodiment of the present invention;
fig. 2 is a method for initially binding information of an electronic lock according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of an information initial binding system according to a second embodiment of the present invention;
fig. 4 is a schematic structural diagram of a cloud server according to a third embodiment of the present invention;
fig. 5 is a schematic structural diagram of an information initial binding system according to a fourth embodiment of the present invention;
fig. 6 is a schematic structural diagram of a cloud server according to a fourth embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The existing electronic lock is generally bound with a mobile phone of a user, and if the mobile phone of the user is lost, a corresponding mobile phone number of the user is also lost. At this time, if the electronic lock is to be reused, the user is required to request for the review in a manner of manually claiming to the background, and the electronic lock can be bound again after the manual review of the background is passed.
In order to solve the technical problem, the invention provides an identity verification method of an electronic lock, which is characterized in that unique biological characteristic information of a user is used as an identity recognition basis, and if the biological characteristic information input by the user and the original bound mobile phone number information are confirmed to be correct by a cloud server, the newly bound mobile phone number information can be bound again.
Example one
As shown in fig. 1, which is a schematic flow chart of an embodiment of an authentication method for an electronic lock according to the present invention, the method may include the following steps:
s110, when an electronic lock rebinding application sent by a client user is received, sending a prompt message for asking to enter user biological characteristic information and original binding mobile phone number information to the client user.
In this step, the user can choose to replace a new mobile phone, and download the electronic lock APP on the new mobile phone after replacement to register and log in. It can be understood that, since the biological characteristic information of the user and the related information such as the originally bound mobile phone number have been bound with the electronic lock, that is, the biological characteristic information of the user and the originally bound mobile phone number information have been stored in the cloud server, at this time, only the original mobile phone number binding needs to be applied and cancelled, and the new mobile phone number binding is performed again.
Specifically, the electronic lock rebinding application is sent to the cloud server through the electronic lock APP end of the prebinding new mobile phone. It should be noted that, in the transmitted electronic lock rebinding application, the newly bound mobile phone number information must be included.
And after the cloud server receives the electronic lock rebinding application, a prompt message is returned to the mobile phone client. The prompt information sent by the cloud server is used for prompting the user to enter the biological characteristic information and the original bound mobile phone number information.
And S120, acquiring the user biological characteristic information and the original binding mobile phone number information input by the client user.
The user biological characteristic information is the unique biological identification characteristic of the user and can be directly input through the mobile phone client recording equipment of the user; the original bound mobile phone number information is also known by the user, so that the entry of the two information is easy to realize for the user.
It should be noted that the user biometric information may include user face authentication information and/or user fingerprint authentication information. In addition, in practical applications, the type of the biometric information may be specifically set according to actual requirements, and is not limited to the two types of biometric information.
S130, detecting whether the user biological characteristic information which is locally stored and corresponds to the original binding mobile phone number information is consistent with the user biological characteristic information which is input by the client user.
As described above, after the cloud server receives the user biometric information and the originally bound mobile phone number information sent by the new mobile phone client APP, the following detection and judgment needs to be performed in the local database:
1. judging whether the original binding mobile phone number input by the user is stored in the database;
2. if the original bound mobile phone number input by the user is stored in the database, acquiring the biological characteristic information of the user corresponding to the original bound mobile phone number in the database;
3. detecting whether the user biological characteristic information corresponding to the original binding mobile phone number information is consistent with the user biological characteristic information input by the client user, if so, indicating that the current user is a real user of the electronic lock; if the current user is not the false user who changes the electronic lock, the current user is indicated to be the false user who changes the electronic lock, and at this time, alarm information can be sent to a real user of the electronic lock to prompt the potential safety hazard of the electronic lock of the real user.
It should be noted that, in the embodiment of the present invention, the biometric information of the user may be matched through a face recognition technology, that is, the biometric information of the user corresponding to the originally bound mobile phone number information is matched with the biometric information of the user entered by the user at the client through the face recognition technology, if the matching degree is greater than a first preset value, the current user may be determined as a real user of the electronic lock, and if the matching degree is less than a second preset value, the current user may be determined as a false user of the electronic lock, and if the matching degree is between the first preset value and the second preset value, the identity used may be further verified in other ways, and if the identity is determined through other information reserved when the user binds the electronic lock. Specifically, if the matching degree is between the first preset value and the second preset value, the user may be sent 3 questions reserved by the customer, if the user answers all the 3 questions correctly, it may be determined that the user is a real user of the electronic lock, and if the user does not answer all the 3 questions correctly, it may be determined that the user is a false user who is not provided with the electronic lock, and this fact requires sending an alarm message to the real user of the electronic lock to prompt a potential safety hazard of the electronic lock of the real user.
And S140, if the electronic lock is consistent with the electronic lock, using the newly bound mobile phone number information to bind the electronic lock.
And if the fact that the user biological characteristic information which is locally stored and corresponds to the original binding mobile phone number information is consistent with the user biological characteristic information input by the client user is detected, the identity of the user who is currently operating is determined to be legal. The cloud server rebunds the electronic lock by using the newly bound mobile phone number information and the user biological characteristic information corresponding to the current user.
In the method for verifying the identity of the electronic lock provided by this embodiment, compared with the case that manual review needs to be performed by a background manager when the electronic lock is used after the current mobile phone is lost, since the user biometric information corresponding to the client user is unique, the unique biometric information of the user can be used as an identity recognition basis when the mobile phone of the user is lost, specifically, when it is determined that the biometric information entered by the user is consistent with the user biometric information corresponding to the originally bound mobile phone number information, the cloud server can rebind the newly bound mobile phone number information to the current electronic lock. The whole re-binding process is completed by calling and judging the cloud server data, and a background manual auditing program is not introduced, so that a complex auditing process is effectively avoided, and the timeliness and the convenience are improved while the safety is ensured.
Example two
As shown in fig. 2, as a second embodiment of the present invention, a method for initially binding user biometric information, binding mobile phone number information and an electronic lock is provided, the method comprising the following steps:
s210, receiving an electronic lock binding application sent by the client user, wherein the electronic lock binding application comprises first binding mobile phone number information.
It should be preferably noted that, as shown in fig. 3, in the information initial binding system of the electronic lock, the involved ports include: cell phone client 21, cloud server 11 and electronic lock 31. The mobile phone client 21 and the cloud server 11 perform data transmission back and forth, and the electronic lock 31 and the cloud server 11 perform data transmission back and forth. And no direct information transmission link is established between the mobile phone client 21 and the electronic lock 31.
When performing actual binding, firstly, a user sends an electronic lock binding application to the cloud server 11 through the mobile phone client 21, where the electronic lock binding application includes mobile phone number binding information. The cloud server 11 responds in time after receiving the electronic lock binding application, and generates a feedback message to be transmitted back to the mobile phone client of the user.
S220, generating a verification code corresponding to the electronic lock binding application, and sending the verification code to the client user, so that the client user inputs the verification code into the electronic lock, and the electronic lock verifies whether the verification code is successfully verified.
As described in the step S210, further, after the cloud server 11 receives the electronic lock binding application, the cloud server 11 correspondingly generates a verification code corresponding to the electronic lock binding application, and returns the verification code to the client user, that is, sends the verification code to the mobile phone of the user in a short message manner.
After the mobile phone end of the user receives the verification code sent back by the cloud server 11, the user inputs the verification code into the electronic lock 31 in a manual input mode. And verifies whether the currently input verification code can be successfully verified through the electronic lock 31.
Specifically, in this embodiment, the method for verifying the verification code input by the user by the cloud server 11 includes the following steps:
s2201, receiving the verification code sent by the electronic lock.
It should be noted that, in this embodiment, the description is performed by standing at the cloud server 11 side. In this step, after the electronic lock 31 receives the verification code manually input by the user, the information sending module in the electronic lock 31 sends the verification code to the cloud server 11. The cloud server 11 receives the verification code sent by the electronic lock 31.
S2202, it is verified whether or not the received verification code matches the generated verification code.
Further, after receiving the verification code sent by the electronic lock 31, the received current verification code may be compared with the previously generated verification code to determine whether the two are consistent.
S2203, if the mobile phone number information is consistent with the electronic lock, it is determined that the first binding of the mobile phone number information and the electronic lock is successful.
It can be understood that if the cloud server 11 determines that the two are consistent, the condition for further information binding is met, and at this time, the cloud server 11 directly binds the mobile phone number to be bound with the electronic lock 31.
And S230, if the electronic lock successfully verifies the verification code, determining that the first-time binding of the mobile phone number information and the electronic lock is successful.
As described in step S2203, if the cloud server 11 determines that the current mobile phone number information satisfies the binding condition, the mobile phone number to be bound is directly bound with the electronic lock 31, and it is ensured that the binding is successful.
S240, if the first binding of the mobile phone number information and the electronic lock is successful, the biological feature information of the user and the electronic lock are continuously bound.
In this step, after the mobile phone number information is successfully bound with the electronic lock 31, the biometric information corresponding to the user needs to be bound with the electronic lock 31. Specifically, the method for binding the biological characteristic information comprises the following steps:
s2401, sending prompt information for asking for inputting user biological characteristic information to the client user.
As described above, after the cloud server 11 binds the mobile phone number with the electronic lock, the cloud server 11 sends an entry prompt message to the mobile phone client 21 of the user. In this step, the prompt message is used to prompt the user to input the biometric information. In this embodiment, the biometric information is user face information. It should be added that the user biometric information may include not only the face information of the user, but also the fingerprint information of the user, the pupil identification information, and the like, and may be specifically set according to the actual application requirements.
S2402, acquiring the user biological characteristic information input by the client user.
After the cloud server 11 sends the biometric information entry prompt message to the mobile phone client 21 of the user, the user returns the corresponding biometric information to the cloud server 11 through the mobile phone client 21.
S2403, binding the user biological characteristic information, the first binding mobile phone number information and the electronic lock.
After receiving the user biometric information sent by the user client, the cloud server 11 records and stores the mapping relationship between the currently received user biometric information and the corresponding bound mobile phone number. That is, the biometric information of the user corresponds to the mobile phone number of the user.
And finally, binding the user biological characteristic information, the corresponding binding mobile phone number and the electronic lock to finish the initial binding operation.
EXAMPLE III
As shown in fig. 4, fig. 4 is a schematic structural diagram of an authentication apparatus of an electronic lock according to a third embodiment of the present invention, that is, a schematic structural diagram of a cloud server 11 in the present invention, where the cloud server 11 includes a sending unit 111, an obtaining unit 112, a detecting unit 113, and a binding unit 114.
The sending unit 111 is used for sending prompt information for asking for inputting user biological characteristic information and original binding mobile phone number information to a client user when receiving an electronic lock rebinding application sent by the client user; the electronic lock rebinding application comprises information of a newly bound mobile phone number;
an obtaining unit 112, configured to obtain user biometric information and original binding mobile phone number information that are input by the client user;
the detection unit 113 is configured to detect whether locally stored user biometric information corresponding to the original bound mobile phone number information is consistent with user biometric information entered by the client user;
and a binding unit 114, configured to bind the electronic lock with the newly bound mobile phone number information if the locally stored user biometric information corresponding to the originally bound mobile phone number information is consistent with the user biometric information entered by the client user.
Example four
As shown in fig. 5, a fourth embodiment of the present invention provides an information initial binding system for an electronic lock, including: the mobile phone client 21, the cloud server 41 and the electronic lock 31. The mobile phone client 21 and the cloud server 41 perform data transmission back and forth, and the electronic lock 31 and the cloud server 41 perform data transmission back and forth. And no direct information transmission link is established between the mobile phone client 21 and the electronic lock 31.
As shown in fig. 6, fig. 6 is a schematic structural diagram of an authentication apparatus of an electronic lock according to a fourth embodiment of the present invention, that is, a schematic structural diagram of a cloud server 41 in the present invention, where the cloud server 41 includes a receiving unit 411, a generating unit 412, a determining unit 413, and an authenticating unit 414.
The receiving unit 411 is configured to receive an electronic lock binding application sent by the client user, where the electronic lock binding application includes information of a first-time bound mobile phone number;
a generating unit 412, configured to generate a verification code corresponding to the electronic lock binding application, and send the verification code to the client user, so that the client user inputs the verification code into the electronic lock, and verifies whether the verification code is successfully verified through the electronic lock;
a determining unit 413, configured to determine that the first-time mobile phone number information is successfully bound with the electronic lock if the electronic lock successfully verifies the verification code.
The receiving unit 411 is further configured to receive the verification code sent by the electronic lock;
a verification unit 414 for verifying whether the received verification code is consistent with the generated verification code;
the determining unit 413 is further configured to determine that the first-time mobile phone number information is successfully bound with the electronic lock if the verification code sent by the electronic lock is consistent with the generated verification code.
In the identity verification method of the electronic lock, the biological characteristic information of the user corresponding to the client user is unique, so that the unique biological characteristic information of the user can be used as an identity identification basis under the condition that the mobile phone of the user is lost, and particularly, when the biological characteristic information input by the user is detected and judged to be consistent with the biological characteristic information of the user corresponding to the originally bound mobile phone number information, the cloud server can rebind the newly bound mobile phone number information to the current electronic lock. The whole re-binding process is completed by calling and judging the cloud server data, and a background manual auditing program is not introduced, so that a complex auditing process is effectively avoided, and the timeliness and the convenience are improved while the safety is ensured.
The embodiment of the present invention further provides a computer device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the method for authenticating the electronic lock as described above when executing the computer program.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored, where the computer program, when executed by a processor, implements an authentication method for an electronic lock as described above.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.
A1. An authentication method of an electronic lock, wherein the method comprises the following steps:
when an electronic lock rebinding application sent by a client user is received, sending prompt information for asking for inputting user biological characteristic information and original binding mobile phone number information to the client user; the electronic lock rebinding application comprises information of a newly bound mobile phone number;
acquiring user biological characteristic information and original binding mobile phone number information input by the client user;
detecting whether the user biological characteristic information which is locally stored and corresponds to the original binding mobile phone number information is consistent with the user biological characteristic information input by the client user;
and if the electronic lock is consistent with the electronic lock, using the newly bound mobile phone number information to bind the electronic lock.
A2. The method for authenticating the electronic lock according to a1, wherein before receiving the request for rebinding the electronic lock sent by the client user, the method further comprises:
receiving an electronic lock binding application sent by the client user, wherein the electronic lock binding application comprises first binding mobile phone number information;
generating a verification code corresponding to the electronic lock binding application, and sending the verification code to the client user, so that the client user inputs the verification code into the electronic lock, and verifies whether the verification code is successfully verified through the electronic lock;
and if the electronic lock successfully verifies the verification code, determining that the first-time binding of the mobile phone number information and the electronic lock is successful.
A3. The method for authenticating an electronic lock according to a2, wherein after the client user inputs the authentication code into the electronic lock, the method further comprises:
receiving the verification code sent by the electronic lock;
verifying whether the received verification code is consistent with the generated verification code;
and if the first binding mobile phone number information is consistent with the electronic lock, determining that the first binding mobile phone number information is successfully bound with the electronic lock.
A4. An authentication method of an electronic lock according to a2 or A3, wherein after the determining that the binding of the bound cell phone number information and the electronic lock is successful, the method further comprises:
sending user biological characteristic information input prompt information to the client user;
acquiring user biological characteristic information input by the client user;
and binding the user biological characteristic information, the first binding mobile phone number information and the electronic lock.
A5. The identity verification method of the electronic lock according to a1, wherein the user biometric information is user face authentication information and/or user fingerprint authentication information.
B1. An authentication apparatus of an electronic lock, wherein the apparatus comprises:
the sending unit is used for sending prompt information for asking for inputting user biological characteristic information and original binding mobile phone number information to the client user when receiving an electronic lock rebinding application sent by the client user; the electronic lock rebinding application comprises information of a newly bound mobile phone number;
the acquisition unit is used for acquiring the user biological characteristic information and the original binding mobile phone number information input by the client user;
the detection unit is used for detecting whether the locally stored user biological characteristic information corresponding to the original binding mobile phone number information is consistent with the user biological characteristic information input by the client user;
and the binding unit is used for binding the electronic lock by using the newly bound mobile phone number information if the locally stored user biological characteristic information corresponding to the originally bound mobile phone number information is consistent with the user biological characteristic information input by the client user.
B2. The authentication apparatus of an electronic lock according to B1, further comprising:
the receiving unit is used for receiving an electronic lock binding application sent by the client user, wherein the electronic lock binding application comprises first binding mobile phone number information;
the generating unit is used for generating a verification code corresponding to the electronic lock binding application and sending the verification code to the client user, so that the client user inputs the verification code into the electronic lock and verifies whether the verification code is verified successfully through the electronic lock;
and the determining unit is used for determining that the first-time binding of the mobile phone number information and the electronic lock is successful if the electronic lock successfully verifies the verification code.
B3. The authentication device of an electronic lock according to B2, wherein the authentication device of an electronic lock further comprises:
the receiving unit is further used for receiving the verification code sent by the electronic lock;
the verification unit is used for verifying whether the received verification code is consistent with the generated verification code;
the determining unit is further configured to determine that the first-time binding of the mobile phone number information and the electronic lock is successful if the verification code sent by the electronic lock is consistent with the generated verification code.
C1. The embodiment of the present invention further provides a computer device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the method for authenticating the electronic lock according to any one of a1 to a5 when executing the computer program.
D1. An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored, where the computer program, when executed by a processor, implements an authentication method for an electronic lock according to any one of a1 to a5.

Claims (10)

1. An identity verification method of an electronic lock, the method comprising:
when an electronic lock rebinding application sent by a client user is received, sending prompt information for asking for inputting user biological characteristic information and original binding mobile phone number information to the client user; the electronic lock rebinding application comprises information of a newly bound mobile phone number;
acquiring user biological characteristic information and original binding mobile phone number information input by the client user;
detecting whether the user biological characteristic information which is locally stored and corresponds to the original binding mobile phone number information is consistent with the user biological characteristic information input by the client user;
and if the electronic lock is consistent with the electronic lock, using the newly bound mobile phone number information to bind the electronic lock.
2. The method for authenticating the electronic lock according to claim 1, wherein before receiving the request for rebinding the electronic lock sent by the client user, the method further comprises:
receiving an electronic lock binding application sent by the client user, wherein the electronic lock binding application comprises first binding mobile phone number information;
generating a verification code corresponding to the electronic lock binding application, and sending the verification code to the client user, so that the client user inputs the verification code into the electronic lock, and verifies whether the verification code is successfully verified through the electronic lock;
and if the electronic lock successfully verifies the verification code, determining that the first-time binding of the mobile phone number information and the electronic lock is successful.
3. The method of claim 2, wherein after the client user enters the verification code into the electronic lock, the method further comprises:
receiving the verification code sent by the electronic lock;
verifying whether the received verification code is consistent with the generated verification code;
and if the first binding mobile phone number information is consistent with the electronic lock, determining that the first binding mobile phone number information is successfully bound with the electronic lock.
4. The method for authenticating the electronic lock according to claim 2 or 3, wherein after determining that the first-time binding of the mobile phone number information to the electronic lock is successful, the method further comprises:
sending prompt information for asking to input user biological characteristic information to the client user;
acquiring user biological characteristic information input by the client user;
and binding the user biological characteristic information, the first binding mobile phone number information and the electronic lock.
5. The identity verification method of an electronic lock according to claim 1, wherein the user biometric information is user face authentication information and/or user fingerprint authentication information.
6. An authentication apparatus of an electronic lock, the apparatus comprising:
the sending unit is used for sending prompt information for asking for inputting user biological characteristic information and original binding mobile phone number information to the client user when receiving an electronic lock rebinding application sent by the client user; the electronic lock rebinding application comprises information of a newly bound mobile phone number;
the acquisition unit is used for acquiring the user biological characteristic information and the original binding mobile phone number information input by the client user;
the detection unit is used for detecting whether the locally stored user biological characteristic information corresponding to the original binding mobile phone number information is consistent with the user biological characteristic information input by the client user;
and the binding unit is used for binding the electronic lock by using the newly bound mobile phone number information if the locally stored user biological characteristic information corresponding to the originally bound mobile phone number information is consistent with the user biological characteristic information input by the client user.
7. An authentication device of an electronic lock according to claim 6, characterized in that the device further comprises:
the receiving unit is used for receiving an electronic lock binding application sent by the client user, wherein the electronic lock binding application comprises first binding mobile phone number information;
the generating unit is used for generating a verification code corresponding to the electronic lock binding application and sending the verification code to the client user, so that the client user inputs the verification code into the electronic lock and verifies whether the verification code is verified successfully through the electronic lock;
and the determining unit is used for determining that the first-time binding of the mobile phone number information and the electronic lock is successful if the electronic lock successfully verifies the verification code.
8. An authentication device of an electronic lock according to claim 7, characterized in that the device further comprises:
the receiving unit is further used for receiving the verification code sent by the electronic lock;
the verification unit is used for verifying whether the received verification code is consistent with the generated verification code;
the determining unit is further configured to determine that the first-time binding of the mobile phone number information and the electronic lock is successful if the received verification code is consistent with the generated verification code.
9. A computer arrangement comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the method of authentication of an electronic lock according to any of claims 1 to 5 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out a method of authenticating an electronic lock according to any one of claims 1 to 5.
CN202010274989.0A 2020-04-09 2020-04-09 Identity verification method and device of electronic lock, computer equipment and storage medium Pending CN111583451A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010274989.0A CN111583451A (en) 2020-04-09 2020-04-09 Identity verification method and device of electronic lock, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010274989.0A CN111583451A (en) 2020-04-09 2020-04-09 Identity verification method and device of electronic lock, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111583451A true CN111583451A (en) 2020-08-25

Family

ID=72122450

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010274989.0A Pending CN111583451A (en) 2020-04-09 2020-04-09 Identity verification method and device of electronic lock, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111583451A (en)

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004006064A2 (en) * 2002-07-09 2004-01-15 American Express Travel Related Services Company, Inc. A transponder-reader payment system
CN102137077A (en) * 2010-01-26 2011-07-27 凹凸电子(武汉)有限公司 Access control system and method for controlling access right by using computer system
CN102932788A (en) * 2012-10-26 2013-02-13 南宁佰睿技术开发有限公司 Mobile phone-based identity identification and near-field payment method
CN204463264U (en) * 2015-02-03 2015-07-08 浙江恒维工贸有限公司 A kind of intelligent fingerprint lock containing home-use rescue system
CN105374094A (en) * 2015-11-22 2016-03-02 福建优至盾安防技术有限公司 Intelligent crescent lock electronic fingerprint recognition unlocking device
CN105450416A (en) * 2014-09-01 2016-03-30 阿里巴巴集团控股有限公司 Security authentication method and apparatus
CN105827602A (en) * 2016-03-14 2016-08-03 宇龙计算机通信科技(深圳)有限公司 Embedded SIM card registration method and server
CN106652136A (en) * 2016-12-22 2017-05-10 奇酷互联网络科技(深圳)有限公司 Mobile terminal-based access control management information processing method and device
CN107426711A (en) * 2017-07-10 2017-12-01 广州视源电子科技股份有限公司 Bind or unbind the method, apparatus and system of cell-phone number
CN108460862A (en) * 2017-02-20 2018-08-28 掌握科技无锡有限公司 The method and electric lockset, lock system having with palmprint authentication and Mobile phone control lock
US10121301B1 (en) * 2017-06-20 2018-11-06 Amazon Technologies, Inc. Web-based structure access
CN108921989A (en) * 2018-06-25 2018-11-30 江苏大学 A kind of intelligent unlocking method and intelligent lock system based on fingerprint recognition and the certification of two dimensional code cloud security
CN109544731A (en) * 2018-10-17 2019-03-29 广州慧享佳物联科技有限公司 Control method for electronic lock, computer equipment and storage medium
CN109635625A (en) * 2018-10-16 2019-04-16 平安科技(深圳)有限公司 Smart identity checking method, equipment, storage medium and device
CN209044706U (en) * 2018-09-13 2019-06-28 深圳阜时科技有限公司 Access control system with 3D face identification functions
CN110084924A (en) * 2019-04-02 2019-08-02 广东工业大学 Intelligent access control system based on fingerprint recognition and recognition of face
CN110176091A (en) * 2019-05-15 2019-08-27 广东科徕尼智能科技有限公司 A method of smart lock safety is improved by mobile terminal device code
CN110930551A (en) * 2019-11-27 2020-03-27 惠州拓邦电气技术有限公司 Unlocking method and device, password authorization method and device, and door lock system

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004006064A2 (en) * 2002-07-09 2004-01-15 American Express Travel Related Services Company, Inc. A transponder-reader payment system
CN102137077A (en) * 2010-01-26 2011-07-27 凹凸电子(武汉)有限公司 Access control system and method for controlling access right by using computer system
CN102932788A (en) * 2012-10-26 2013-02-13 南宁佰睿技术开发有限公司 Mobile phone-based identity identification and near-field payment method
CN105450416A (en) * 2014-09-01 2016-03-30 阿里巴巴集团控股有限公司 Security authentication method and apparatus
CN204463264U (en) * 2015-02-03 2015-07-08 浙江恒维工贸有限公司 A kind of intelligent fingerprint lock containing home-use rescue system
CN105374094A (en) * 2015-11-22 2016-03-02 福建优至盾安防技术有限公司 Intelligent crescent lock electronic fingerprint recognition unlocking device
CN105827602A (en) * 2016-03-14 2016-08-03 宇龙计算机通信科技(深圳)有限公司 Embedded SIM card registration method and server
CN106652136A (en) * 2016-12-22 2017-05-10 奇酷互联网络科技(深圳)有限公司 Mobile terminal-based access control management information processing method and device
CN108460862A (en) * 2017-02-20 2018-08-28 掌握科技无锡有限公司 The method and electric lockset, lock system having with palmprint authentication and Mobile phone control lock
US10121301B1 (en) * 2017-06-20 2018-11-06 Amazon Technologies, Inc. Web-based structure access
CN107426711A (en) * 2017-07-10 2017-12-01 广州视源电子科技股份有限公司 Bind or unbind the method, apparatus and system of cell-phone number
CN108921989A (en) * 2018-06-25 2018-11-30 江苏大学 A kind of intelligent unlocking method and intelligent lock system based on fingerprint recognition and the certification of two dimensional code cloud security
CN209044706U (en) * 2018-09-13 2019-06-28 深圳阜时科技有限公司 Access control system with 3D face identification functions
CN109635625A (en) * 2018-10-16 2019-04-16 平安科技(深圳)有限公司 Smart identity checking method, equipment, storage medium and device
CN109544731A (en) * 2018-10-17 2019-03-29 广州慧享佳物联科技有限公司 Control method for electronic lock, computer equipment and storage medium
CN110084924A (en) * 2019-04-02 2019-08-02 广东工业大学 Intelligent access control system based on fingerprint recognition and recognition of face
CN110176091A (en) * 2019-05-15 2019-08-27 广东科徕尼智能科技有限公司 A method of smart lock safety is improved by mobile terminal device code
CN110930551A (en) * 2019-11-27 2020-03-27 惠州拓邦电气技术有限公司 Unlocking method and device, password authorization method and device, and door lock system

Similar Documents

Publication Publication Date Title
CN110098932B (en) Electronic document signing method based on safe electronic notarization technology
CN110582769A (en) single-account multi-identity login method, device, server and storage medium
CN111092899B (en) Information acquisition method, device, equipment and medium
CN110489415B (en) Data updating method and related equipment
CN113492797B (en) Method and system for automatically logging in vehicle machine and vehicle
CN111340987A (en) Internet of things door lock communication method, device and system and computer storage medium
CN111415443A (en) Remote unlocking method and device
CN109829321B (en) Method, device, equipment and storage medium for authenticating identity
CN110535809B (en) Identification code pulling method, storage medium, terminal device and server
CN112435366A (en) Vehicle control method and system based on fingerprint identification and computer readable medium
CN110647737B (en) Enterprise user security authentication method and device in warehouse receipt system and electronic equipment
CN112507390A (en) Block chain-based electronic license information acquisition method and equipment
CN112364322A (en) Safety verification system and method for instant communication tool
CN111583451A (en) Identity verification method and device of electronic lock, computer equipment and storage medium
CN110992186A (en) Account management method, system, device and storage medium
CN114936848A (en) Contract flow management method and storage medium
CN115776548A (en) Double recording system
CN112734993B (en) Communication system and method for anti-theft lock
CN110708271A (en) Method for accessing third-party application, aggregation management system and terminal
CN111275506A (en) Bill issuing method and block link point equipment
CN112600843B (en) Authentication method, storage medium and gateway
CN111625547B (en) Information updating method, device, server and storage medium
CN112836195B (en) Password modification method and device for enterprise bank authentication medium
CN112446677B (en) Electronic signature method, device, equipment and storage medium
CN115834073A (en) Financial service information authentication system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200825

RJ01 Rejection of invention patent application after publication